Bluetooth technology lets you set up a wireless network that can be used to connect any devices that are equipped with the technology. Bluetooth is used in a wide variety of devices, including home entertainment systems, phones, and computers. One of the most widely used implementations of Bluetooth is headsets for cell phones. Bluetooth can…Read More
- Richard Medugno is a marketing writer for the Consumer and Small Business departments of Trend Micro.
Most of us are aware of the need to protect our computers, but what about our cell phones? Can phones be infected with viruses or other malware? Unfortunately, the answer is yes. Smartphones (phones that have Internet capabilities and function more as mini-computers, such as the Droid or iPhone) can be at risk for viruses…Read More
Like many other sites that encourage users to share information, Foursquare and Facebook Places can be used relatively safely if you use them wisely. Foursquare and Facebook Places both allow users to enter their location via cell phone apps. This allows friends to see where other friends are at any given time. You can see…Read More
It’s scary how many people share information on the Internet that should always be kept private. Here are five things that you should never share online: 1. Confidential information about your identity – This includes your address, phone number, social security number, and birth date. Don’t share this information about other family members either. This…Read More
If you use an Apple® iPad® or Amazon Kindle™, you may be wondering how safe the devices are. When wireless devices are connected to the Internet, the possibility of security problems can arise. While there have been a few security issues related to the Kindle, there haven’t been any major problems because most people use…Read More
Many viruses are spread through email, so it is smart to use a little caution when you get an attachment to an email. Here’s how to avoid many problems associated with email attachments. Don’t open any attachment(s) from someone you don’t know. If you receive an email from an unknown sender, delete it immediately or…Read More