Skip to content

Month: September 2009

Phone Stolen? How to Erase Your Data Remotely

Do you store confidential, personal information on your smartphone? How about friends and family members’ phone numbers and e-mail addresses? Replacing a lost or stolen handset is fairly easy, but the data on it is the important part. Keeping this data from falling into the wrong hands should be a top priority if you are ever a victim of phone loss or theft. Continue reading Phone Stolen? How to Erase Your Data Remotely

OneRiot Pulls Ahead in Real-Time Search Engine Race

The real-time search engine field has exploded the last few months, but most contestants so far haven’t lived up to the hype (Scoopler, Topsy, Collecta, CrowdEye). Traffic tends to drop sharply after the early interest wanes. The exception to the rule appears to be OneRiot, which is certainly pulling ahead in the first leg of the real-time search competition Continue reading OneRiot Pulls Ahead in Real-Time Search Engine Race

Stunning 66% of Social Networkers Vulnerable to Attack

Twitter, Facebook, LinkedIn and other social networking sites are sweeping the world with tweets, friends and more messaging than ever before, but what’s the cost of all this networking? More than two-thirds of social community members don’t proactively protect themselves from cyber attacks, a survey by the CMO Council and security software maker AVG found. Continue reading Stunning 66% of Social Networkers Vulnerable to Attack