For most five year-olds, rule breaking usually consists of jumping in puddles and staying up past bedtime. Not so, for Kristoffer Von Hassel, the son of San Diego security researcher Robert Davies. You see, young Von Hassel managed to discover a major security flaw in the Xbox One gaming console on his own, and Microsoft, [ Read More ]
Archive for the ‘Blog’ Category
Five Year Old Boy Hacks His Xbox One
Comments Off on Five Year Old Boy Hacks His Xbox OneTools and Tips for Monitoring Your Child’s Cell Phone Usage
Comments Off on Tools and Tips for Monitoring Your Child’s Cell Phone UsageNearly 11 percent of 3,767 students interviewed for the Journal of Adolescent Health said that someone bullied them electronically in the past several months. Keeping your child safe from bullies and predators is one of the reasons you should monitor your child’s cell phone usage. However, there are plenty of other reasons you may want [ Read More ]
Not Using WeChat Yet? You Might Be Soon
Comments Off on Not Using WeChat Yet? You Might Be SoonFacebook Messenger. WhatsApp. Viber. Skype. There are already plenty of mobile-messaging systems you can use to keep in touch with family and friends. But soon you might be getting familiar with another, especially if you live in Asia: WeChat. Developed by China’s largest listed Internet company Tencent, WeChat — known as Weixin in China — [ Read More ]
Parents, Put Down that Smart Phone!
Comments Off on Parents, Put Down that Smart Phone!It’s not just kids who are overdoing screen time. Parents are often just as guilty of spending too much time checking smartphones and e-mail — and the consequences for their children can be troubling. Dr. Jenny Radesky is a pediatrician specializing in child development. When she worked at a clinic in a high tech savvy [ Read More ]
How to locate a lost smartphone
Comments Off on How to locate a lost smartphoneIf you’ve ever lost a smartphone, you’re well aware the cost to replace the hardware is the least of your worries. What resides on the phone — including private personal or corporate information — isn’t something you want falling into the wrong hands. Locking a smartphone with a password or PIN isn’t enough. To really [ Read More ]