By Austin Ray
In recent news, the IRS became under investigation for targeting tax exemption to different political groups and names. Reports stated that the IRS targeted conservative group , the “Tea Party” causing tax increase within the group which led to uproar in the House Oversight Committee. The alleged exemption was towards nonprofit organizations from having to pay federal income tax.
By Lafawn Skipper & Caroline Malone
From texts to your mom to important business documents, our whole lives are now on our phones and securing your personal information is more important than ever. Smartphone theft of both the physical phones and the data contained on them is a rapidly spreading crime you need to be very aware of and know how to prevent.
By Elizabeth Haynes & Jeremy Woodfin
The multi-billion dollar company has done it again and made many park goers’ dreams come true. Disney, for the latter part of the century, has been working on a better way for customers to enjoy their stay at parks, hotels, and resorts. After lots of research and millions of dollars spent, Disney has come up with the new MagicBand.
By Alicia Lux
With the holidays coming up soon such as Hanukah, Christmas, and Kwanza, gift giving is going to be on the front of our brains and adding to the looming pressure of upcoming exams. I personally have many birthdays and anniversaries in my immediate family quickly sweeping in. With full schedules and shortened days, it leaves us with less time to leave the house to peruse the shelves of local department stores. It becomes easier to find the perfect gift with the touch of our fingers elegantly dancing across the touch screened devices while waiting for the next class or shift to start. What is the easiest and fastest way to whittle down the gift list? Online shopping of course! Amazon, Ebay, and Zulily are flooded with shoppers as the clock winds down ticking towards the craziness of gift giving bliss. I do not want to go broke on gift giving, so I want to get the most for my money.
By Joshua Harkins & Tyler Blythe
Sensitive data is often compromised by cyberattacks on computers. These attacks are often a result of malware — malicious software that attempts to gain access to a computer system with the purpose of tracking or gathering sensitive information or disrupting computer operations. Computer viruses (payloads) and spyware are two primary types of malware. The protection of sensitive data is the responsibility of a computer user, and as such, good cybersecurity begins with the user.
By Spencer Curry & Kegan Ham
How much do you pay for gas? It’s outrageous, right? Wouldn’t you love a solution that saves you money? Well, as cost-conscious student, we have found one at MAPCO. We are sure you’ve heard about them, but you might not realize the benefits they offer. We hope that this post will enlighten you on the subject.
By Bobby Smith & Kevin Keenan
Let’s just take a minute and think about the countless times we use the internet each day. The reason may differ: paying bill, social media, shopping, or reading the news. As we do those things, we leave information about ourselves in the cyber world, this is known as a digital footprint. If you are not aware of your digital foot, you should be.