Heart of Texas Network Consultants Blog

Heart of Texas Network Consultants has been serving the Central Texas area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Are There Hackers Listening to You?

b2ap3_thumbnail_digital_spying_400.jpgTech savvy individuals and businesses alike have moved away from traditional Internet browsers such as Microsoft's Internet Explorer and Apple's Safari to Google's Chrome browser. After all, many people enjoy having a simplistic, yet powerful web browser that easily integrates it's Google Docs tools and Gmail email service. However, users may want to think twice about using the browser now that a new YouTube video has surfaced entitled "Chrome Bug Lets Sites Listen to Your Conversations." In the video, user Tal Ater walks through a very dangerous exploit that allows anyone to access your microphone through Google's voice recognition software embedded in Chrome.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

VPN Two-factor Authentication Hardware Customer Relationship Management Innovation Hacking Users Mobile Devices Laptop Efficiency Wireless Office Workplace Tips Printer Network Security Retail Cost Management Antivirus Cybercrime Government Windows 8 Backup Business Management Employer-Employee Relationship Save Money Managed Service Provider Office Tips Gadgets Marketing Telephone Systems Small Business Search Vulnerability Alert Privacy Android Productivity BYOD communications Mobile Device Management Tech Support Upgrade Data Backup IT Support Wireless Technology Computers Smartphones Applications Office 365 Proactive IT Email Hackers Tip of the Week USB Passwords Tech Term Cybersecurity Mobile Computing Security Tablet Phishing Humor Cloud Bring Your Own Device Software Google iPhone Artificial Intelligence Data WiFi Data Management Mobile Device Managed IT Services Facebook OneNote Networking IT Support Augmented Reality Internet of Things Vendor Management Communication Big Data Virtualization Spam Google Drive Operating System Application Disaster Recovery Money Remote Computing App Holiday Wi-Fi PowerPoint Update Risk Management Windows 10 BDR Health Data Recovery Computer Server Business Quick Tips Hosted Solutions Internet Chrome Smartphone VoIP Education Bandwidth Gmail Going Green User Error Apps Router Malware Best Practice Windows 10 Law Enforcement Microsoft Office Unified Threat Management Maintenance Automation Mobility Password Encryption The Internet of Things Technology Data Security Miscellaneous Browser Windows Social Information Outsourced IT Microsoft Business Computing Social Media Unsupported Software Saving Money Network Collaboration User Tips Business Continuity Best Practices Shortcut Ransomware Avoiding Downtime Information Technology Excel History Cloud Computing Hard Drives Lithium-ion battery Current Events Social Networking IT Services Productivity Mobile Office