Heart of Texas Network Consultants Blog

Heart of Texas Network Consultants has been serving the Central Texas area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Are There Hackers Listening to You?

b2ap3_thumbnail_digital_spying_400.jpgTech savvy individuals and businesses alike have moved away from traditional Internet browsers such as Microsoft's Internet Explorer and Apple's Safari to Google's Chrome browser. After all, many people enjoy having a simplistic, yet powerful web browser that easily integrates it's Google Docs tools and Gmail email service. However, users may want to think twice about using the browser now that a new YouTube video has surfaced entitled "Chrome Bug Lets Sites Listen to Your Conversations." In the video, user Tal Ater walks through a very dangerous exploit that allows anyone to access your microphone through Google's voice recognition software embedded in Chrome.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Wireless Network Computer Communication History Bandwidth Collaboration Search Internet Managed IT Mobile Devices Smartphone Mobile Device Management Automation Tip of the Week Printer Spam Money Password Managed IT Services Backup Router Social Media Phishing Business Computing IT Services Meetings Holiday User Tips Current Events Windows Cybersecurity Hard Drives Passwords Recovery Hosted Solutions Smartphones Big Data Law Enforcement Bring Your Own Device Miscellaneous Health Microsoft Email Office 365 Operating System PowerPoint Managed Service Provider Virtualization Avoiding Downtime Risk Management The Internet of Things Mobile Computing Data Security Office Tips Data Backup Outsourced IT Windows 10 Server Data Customer Relationship Management Privacy Gadgets Two-factor Authentication Unified Threat Management Mobile Office WiFi User Error Humor Malware USB Artificial Intelligence IT Support Apps Office Mobility Small Business Government Networking Data Management Workplace Tips Cloud Computing Hardware Hackers Chrome Encryption Alert Tech Support Browser Efficiency Cloud IT Solutions Productivity Business Management iPhone Google Innovation Wi-Fi Network Security Google Drive Android Windows 10 Quick Tips Best Practice Vendor Management Unsupported Software BDR Social Education Save Money Saving Money VoIP BYOD Microsoft Office Cost Management Disaster Recovery communications Upgrade Tablet OneNote Productivity Augmented Reality Gmail Update Software Proactive IT Business Going Green Vulnerability App Cybercrime Best Practices Marketing IT Support Maintenance Ransomware Applications Technology Telephone Systems Information Employer-Employee Relationship Information Technology Windows 8 Application Tech Term Security Facebook Remote Computing Business Continuity Lithium-ion battery Computers Antivirus Wireless Technology Managed IT Services Internet of Things Shortcut Laptop Data Recovery Hacking Users