This is Why it’s so Important to Choose a Credible Locksmith

this-is-why-its-so-important-to-choose-a-credible-locksmithWith city inhabitants relying on locksmiths to help them get out of dire situations, these locksmiths need to be reputable. But recently, the residents of Minnesota have had unsettling and potentially dangerous encounters with the head locksmith from Metro Lockout.

When Sue Heroff called Todd Shiber of the otherwise trusted company to fix her car tire, he demanded she stay inside as he completed the task, going so far as to prod her with his jack handle. Heroff grew fearful very quickly, afraid Shiber would hurt her.

Another customer, Zach DuBois, recently had a similar experience with Shiber, whom he called to unlock his vehicle. Shiber reportedly removed his headlight and swung it around to the point where it flew off and hit the ground. Luckily, DuBois’s neighbours helped put a stop to Shiber’s outrageous behaviours.

There were two more notable occurrences in which Shiber argued with a customer and intentionally crashed his van into the car, damaging the front of it, and in which Shiber pointed his screwdriver towards his customer and yelled at him.

These events, in addition to a few others, have earned Shiber criminal charges, and his case is to be taken to court. Though this situation may seem shocking to outsiders, it wasn’t all that unpredictable, considering that Minnesota has not put license requirements into place for locksmiths.

Even if your area doesn’t make locksmith licensing mandatory, it’s extremely important to do as much research as possible before phoning up just any company. You may be in a state of emergency, but taking the extra time to find a credible locksmith is well worth keeping yourself safe.



Tablet Vs. Smartphone Security

tablet-vs-smartphone-securityWhen we think mobile security, we think smartphones. Since these mini computers have become such an essential part of our everyday lives, it’s no wonder that personal security, in relation to these devices, has become such a major concern. Recent news even revealed that Android has officially beat out Windows as the most used system in relation to Internet use!

Tablets have also taken on a greater role in many people’s homes and/or businesses. Since we still don’t use tablets as much as our smartphones, we often don’t pay enough attention to their security features and we would all do well to brush up on the cybersecurity elements of these devices.

We’ll walk you through some steps you can take to up your tablet’s security so that no matter where you are, hackers and cyber criminals will be kept away.

Apps – Be careful as to what apps you’re downloading. Only download reputable apps from official app stores so you don’t expose your device to malware.

Secure your device – Choose a hard-to-guess password and be sure to change it every once in a while. If you sometimes use your device at the office or in any other public spot, be sure that the auto lock function is on and will activate in a short time-frame.

Add a security feature that’s unique to your device – Apply a security solution that is specific to your tablet or system. Features include geo-tracking, locking remotely, being able to wipe your device remotely and so much more.

Wi-Fi – It’s best not to automatically connect to public Wi-Fi. This might be a bit of a hassle at times but it is truly worth it as you’ll have full power over your tablet’s security.

Be on the lookout – Whether you’re surfing the net, shopping online, or banking from your tablet, always be on the lookout! Ignore emails you don’t recognize, prompting you to click on a short link as these can easily be viruses. Another red flag is friends sending you texts or even messages through social media messenger apps asking you to check out a promotion or sale that sounds fake.

We hope these tips were helpful with regards to you being more cyber-aware about your tablet!


Hackers Develop Tools to Tap into Computer Systems

breaking-windows-hackers-develop-tools-to-tap-into-computer-systemsExcitement among software hackers is palpable upon the introduction of several new shortcuts that allow access to Microsoft Windows computers, though owners of said computers are understandably concerned.

It seems that The Shadow Brokers, a popular group in the hacker community, is responsible for seizing these hacks from the NSA, whose workers are required to tear holes in software for spying purposes.

Unfortunately, this isn’t the first time this has happened. The first round of hacks was leaked by the same group in August 2016. This second hit, however, may well be the most detrimental hit to the NSA that we know of.

Releasing the shortcuts at the start of Easter weekend was strategic on the group’s part, as many Windows owners will be preoccupied with cooking, cleaning, and socializing, while beginner hackers dubbed “script kiddies” test out their newfound skills.

Investigators claim that some of these new releases could threaten the security of several different Windows systems. For now, all active Microsoft users are urged to take a break from their computers until the dust has settled.


Robbers Try But Fail To Crack Safe of BURS

robbers-try-but-fail-to-crack-safe-of-bursWhat’s making news today is a frightful scene that occurred at Tlokweng International border that involved Botswana Unified Revenue Service (BURS) workers. What they discovered was that thieves whose fundamental goal was to break into their safes, rummaged through their workplaces, but thankfully they were not successful in breaking into the safes. Luckily none of the workers were present so no one was injured.

On Tuesday morning it was reported that as workers of both units were accounting for undertaking, they discovered the disaster that had occurred. Their office entryways broken completely unlatched and found that there had been gatecrashers who had attempted to interfere their way into their safes however luckily couldn’t and were additionally discouraged by the inescapable stunt. Clearly the robbers were not as successful as they wanted to be or very smart for the matter.

Drake Ramaeba commented on the reports. He is the BURS Tlokweng Border gate Customs Manager. He stated, “It was evident that they were quite curious to get into the rooms and that they would stop at nothing by using dynamite, but they evidently failed. This hasn’t been the first time so they knew what they were getting into and were prepared hence the strong rooms.

Robson Maleka, the Tlokweng police headquarters Commander Superintendent mentioned how the incident was strange. The case was reported to their office and the details were confirmed. Cases like these although strange, are common. It’s important to make sure they can’t break into safes and that a safe workplace environment is established.

“It would seem that whoever was there, attempted to open the safes yet fizzled and they wound up going back on their intensions of ransacking both spots,” he said.

Since the robbers failed to open the safes, they gave up and took off and didn’t bother robbing the other areas.

Maleka said the robbers have not been caught so unfortunately no arrests have been made. This of course will not stop the police from finding the crooks and from further investigating the case.


This App Turns Finding Lost Items into a Game

this-app-turns-finding-lost-items-into-a-gameAugmented reality games are becoming increasingly popular as evidenced by the success of the recent Pokemon Go. Imagine applying that concept to finding your keys, your remote, or anything else you tend to lose on a regular basis. Bluetooth item trackers are not a new invention. Both Tile and Protag’s Duet have proven to be effective and popular.

However, no one has ever thought to turn that tracking capability into a game. Pixie endeavours to change that, turning the concept of a Bluetooth item tracker into something that functions as a game that can be pretty fun to play. Pixie functions in the same way that products like Tile or Protag’s Duet do, but Pixie adds augmented reality to the mix. The game will show you the general location of whatever is attached to your Pixie clip. Finding your item then becomes a matter of playing a game of Hot and Cold.

A neat feature within Pixie is the product’s ability to communicate with multiple devices. At the same time, it is important to keep in mind that despite Pixie’s claims, the product does not function exactly like GPS. What it actually does is work like any standard Bluetooth device. This means you will need to at least be within a range of around forty feet.

Pixie is already drawing a good deal of attention for this product. They are also expanding into some pretty interesting areas. For example, they are manufacturing an iPhone case in which the trackers are built right into the case. What’s even better is that these products are going to come with a battery life that will extend to an impressive twelve months.

You will have the ability to purchase a pack of two (including a phone case) for forty-nine dollars, as well as the opportunity to purchase a pack of four (which also includes a phone case) for ninety-nine dollars.


August Home Allows use of Smart Locks for Doors Internationally

august-home-allows-use-of-smart-locks-for-doors-internationallyAugust Home is a company that is well-known for its internet-connected smart locks. This product already works with most of the door locks that you will generally come across within the United States and Canada. However, the company has yet to create a solution that can be used in conjunction with a style of lock that is known as the Mortise. This lock represents a smaller market share within the United States, but it is in fact a very popular type of lock overseas. This is particularly true in Europe.

Things are about to change. August Home has indicated that they plan to create a new smart lock that will have the ability to work with Mortise locks. August Home CEO Jason Johnson has indicated that they are already seeing their locks appear in countries beyond North America, which is currently the only place in which August Home manufactures and distributes its products. As their products continue to appear in countries around the world, August Home hopes to continue making moves that will eventually allow them to distribute and release products around the world.

In the meantime, August Home is working on a partnership with Logitech Pop, which will include creating a very simple, but profoundly effective button. The main purpose of this button will be to give people the ability to turn off TVs, lights, and even lock doors, with the simple push of a button.

In the end, August Home hopes to continue working on becoming a more open platform, as users look for ways to better protect their homes.


Atlas Recall Gives your Mac a Photographic Memory

atlas-recall-gives-your-mac-a-photographic-memoryThis Seattle based startup company, Atlas Informatics, sees its mission as “if you’ve seen it, you can search for it.” Atlas Recall could become a highly important app (free, at the moment) for Mac users. This digital search software doesn’t just remember text summaries of or a link to a site you visited recently, but reproduces “what you viewed.”

Yes, when you search for a previously viewed site, Atlas Recall returns “visual thumbnails” of what you saw when you visited the site. How? This app indexes everything that you’ve looked at and snaps a picture of what you viewed previously. When you search for it, the app returns the image to you.

How Does It Sort Your Search Results?

Atlas Recall organizes the sites you visited today, last week, or last year with most recent first, divided by timeframe, and oldest last. This app will reproduce the content relevant to your search terms.  Atlas Recall doesn’t just reproduce web pages, as it includes emails, chats, documents, or anything else you viewed in the reasonable past.

It then sorts and lists (displays) them in order of when you looked at them. Atlas Recall is designed to capture these items from Safari and Chrome browsers with a Mac, Word, Excel, PowerPoint, Outlook, and PDFs including web pages.

How Does It Work?

Atlas Recall captures data from your Mac, encrypts it, and stores it in the cloud. Hence, you’ll need to be connected to the ‘Net to use this app. However, storing data in the cloud allows you to make digital searches encompassing multiple computers.

This complement to major search engines, like Google, will even display results in a panel “next door” to the main Google search results page. The app is not intended to render Google or other major search engines obsolete.

Rather it’s designed to support these primary search engines, reminding users that they may want to visit other web pages or documents they’ve previously seen.  Atlas Recall thoroughly has been tested in beta mode and has proven to work well.


Although Atlas Recall works, not surprisingly, it has some limitations. For now, it only works on Mac machines and iOS mobile devices. The iOS application only points to those items you’ve visited on your computer, not on your iPhone.

Further, you must install the app, which will not record your visits prior to downloading the Atlas Recall software. To enhance your security, you can erase items from your Mac photographic memory, such as signing in to your bank account.

Regardless of these limitations, Atlas Recall is a worthwhile addition to your recall arsenal, particularly while it’s still free.