AOL Tech

Latest Posts

A Baker's Dozen Tips for Spring Cleaning Your Mac

Whether you're a recent convert, ambivalent veteran or one of those hardened Apple fanboys, let us remind you: a Mac, like any other computer, needs to be maintained. No, you probably don't need anti-virus software (yet), you may never have to fiddle with registry editing, and you'll likely never...

Comments: 1

Complexity Is Killing Us: A Security State of the Union With Eugene Spafford of CERIAS

For our second annual spotlight on cyber-security, Switched turned to a renowned expert in the field: Eugene H. Spafford, Professor of Computer Science at Purdue University. Among his many professional associations and corporate and governmental advisory roles, Spafford is the Executive Director of ...

Comments: 0

Hacked and Hijacked! What to Do if Your Identity Gets Stolen

Symptoms: Imagine the pit in your stomach: finding charges on your credit cards or bank statements for items you didn't buy; applying for credit or a mortgage and being denied due to delinquencies on accounts you didn't open. The amounts for the previous year's reported income on your annual ...

Comments: 0

Hacked and Hijacked! What's Next When Your Facebook/Twitter Is Hacked

Symptom: Maybe your Twitter or Facebook friends have gotten viciously spammed with fake offers for a free iPad, or a link to a fake app -- from your profile. Or, maybe you've discover posts on your profile that you never wrote, often with links leading to websites, apps or coupons. You may disc...

Comments: 0

Hacked and Hijacked! How to Save Data if Your Portable Device Is Stolen

Symptom: You reach into your pocket or bag, and, well, it's empty! Diagnosis: Beyond the understandable distress of losing a pricey smartphone, laptop or tablet PC, the real trauma is the sudden and unfettered access afforded to the slippery-fingered jerk who took it. The cost of a new lap...

Comments: 3

Hacked and Hijacked: What to Do if Your E-mail Account Gets Compromised

Symptoms: People listed in your e-mail contacts report being flooded with spam messages sent from your account. Or, you start receiving a bevy of "bounced" e-mails from random addresses you don't know. You aren't able to log into your account or change its settings, or you've discovered the set...

Comments: 0

Hacked and Hijacked: What to Do if Your PC Gets Compromised

Symptoms: There are a range of telltale signs that your PC has been infiltrated by a binary ne'er-do-well, but, counterintuitively, the worst case scenario is when there are no obvious symptoms at all. For starters, you may have an infection if your PC or Internet throughput has become consiste...

Comments: 0

Backups! How to Save Your Digital World From Doom

It's a fact of life that too many of us learn the excruciatingly painful way: hard drives, like humans, have an unpredictable lifespan. Sometimes they last a long time, but sometimes, well, they die suddenly. Now think of all the physical goods we used to store in shoeboxes and drawers that in toda...

Comments: 6

How to Score Your Dream LCD TV on the Cheap for the Super Bowl

HDTVs have been around for a decade now, and, if you have the lucky pleasure of hosting this year's Super Bowl party and are without an HDTV, we assure you that now is the time to take the plunge. We've got the HDTV that'll score as high as your preferred team, and won't bust your bank account, e...

Comments: 1

Best Tablets of CES: Xoom, VIA, Tab and PlayBook Lead the Way

We're quickly coming up on a year since the iPad was released, and while opinions may have been divided early on, there's simply no questioning now that Apple's take on the tablet PC singlehandedly made that long-failing device category suddenly viable. Apple didn't invent the tablet; it was simply ...

Comments: 7