Kevin Carbone

Do You Know How To Limit and Privatize Your Search History?

Google has been introducing new privacy settings and tools that we can now use to limit how much is being saved. These new privacy features are also extending into YouTube searches, location history, and virtual assistant data.

keep Reading

How Does Google’s Live View Make Phone Navigation Easier?

Augmented reality uses your phone’s camera and GPS to see where you are and then place arrows and street names in the appropriate spots.

keep Reading

How to Organize and Easily Locate Your Apps

Finding apps on your phone can be a hassle if you have 50+ apps all over the screen. Try finding the voice memo app on your phone (without searching for it) as a test. If you can’t find it easily, then you may need some of these tips.

keep Reading

New Features in Apple’s IOS 13 Update

In addition to these new features for IOS 13, Apple also revealed a new Mac Pro device at the conference that would be launched this fall.

keep Reading

Is the Juice Worth the Squeeze?

The mobile phone uses the same port for charging as it does for data exchange. This means that when a phone is plugged into a charging port, it also has the option to share information stored on the phone’s device.

keep Reading

Blob Phishing Attack on O365 (part 3)

Phishing attacks are getting more sophisticated every day. A new threat that is targeting Office 365 users is called Blob Storage Phishing. Hackers send emails that look real and that contain a link requesting users to log into their Microsoft 365 accounts to update their information. The link takes users to a Microsoft landing page […]

keep Reading

Switching from Windows to Mac

Don’t know where to start with your new Mac computer? In this introductory guide, we will review tips for the basic setup of a new Mac, as well as the most common gestures and way to navigate this computer. Most people come from a Windows background and need some help adjusting to the new settings. […]

keep Reading

Protection from Email Spoofing: Part 2

Ever receive an email that looks like it’s legitimate, but you can’t quite put your finger on the problem? It is possible the email could be spoofed. In an earlier article entitled “Have You Been Spoofed?” by fellow tech Mike Buonaspina, he explained how hackers can use social media to identify one’s inner circle of […]

keep Reading