By Nikesha Harris
Unable to FaceTime, Hangout, or Snap Chat? No problem. Whether you’re an iPhone or Android user there is a new form of video texting that complements any user with a switch view camera. This new software app called Glide.
Glide was established June 2013. It is user friendly and you start by simply opening the app. Then pick or invite the contact you would like to message and press the record button. Glide has some cool features like the ability to record a message for five minutes, replay messages, delete messages, or have group messages. And just like IG and Facebook, you can search and discover people. With apps like FaceTime and Hangouts, video calls are easily missed, but Glide allows you to play recorded video messages at your discretion.
Glide has over 10 million users running the application, so if you’re looking for a new wave of video texting, then download this fabulous software app to your phone and enjoy. Video Texting App Glide Is Going “Viral,” Now Ranked Just Ahead Of Instagram In App Store | TechCrunch
By Joshua Harkins & Tyler Blythe
Sensitive data is often compromised by cyberattacks on computers. These attacks are often a result of malware — malicious software that attempts to gain access to a computer system with the purpose of tracking or gathering sensitive information or disrupting computer operations. Computer viruses (payloads) and spyware are two primary types of malware. The protection of sensitive data is the responsibility of a computer user, and as such, good cybersecurity begins with the user.
In order to prevent a malware attack, the computer operating system needs to incorporate numerous safeguards to prevent personal information from being compromised. These safeguards include:
- Identification and Authentication Techniques
- Encryption Protocols
- Antivirus Protection/Software
For the average user, identification and authentication, encryption, and firewalls are part of a computer’s operating system. Many computer users fail to understand the necessity of antivirus software or the need to update antivirus definitions. These users have the false belief that installation of an antivirus program on a computer protects it against malware from that time forward. It is a user’s responsible to verify installation and to assure maintenance, including the updating of antivirus definitions, of antivirus software. The user should always verify the credibility of the vendor prior to purchasing and installing software. For technical assistance the following are possible sources that a user can contact for help: computer manufacturer, operating system manufacturer, antivirus software manufacturer, and internet provider.
Additional measures a user can perform to prevent a cyber-attack include:
- Verifying a secure site connection, https://, prior to transmitting sensitive or personal data
- Only opening emails and email attachments from a known source
- Maintaining operating system and antivirus software by installing authentic updates as soon as possible.
While these measures are not 100% in preventing a malware attack, it greatly reduces the possibility. In the end, it is the user’s responsibility to be vigilant in the protection of his or her sensitive data.
Antivirus. (2014). Retrieved from http://www.techopedia.com/definition/5416/anti-virus-software.
Authentication. (2014). Retrieved from http://www.techopedia.com/definition/342/authentication.
Cyberattack. (2014). Retrieved from http://www.techopedia.com/definition/24748/cyberattack.
Cybersecurity. (2014). Retrieved from http://www.techopedia.com/definition/24747/cybersecurity.
Encryption. (2014). Retrieved from http://www.techopedia.com/definition/5507/encryption.
Firewall. (2014). Retrieved from http://www.techopedia.com/definition/5355/firewall.
Identification. (2014). Retrieved from http://www.techopedia.com/definition/12552/user-identification-user-id.
Kroenke, D. M. (2014). MIS Essentials. Boston: Pearson.
Malware. (2014). Retrieved from http://www.techopedia.com/definition/4015/malicious-software-malware.
Payload. (2014). Retrieved from http://www.techopedia.com/definition/5381/payload.
Spyware. (2014). Retrieved from http://www.techopedia.com/definition/24747/cybersecurity.
By Spencer Curry & Kegan Ham
How much do you pay for gas? It’s outrageous, right? Wouldn’t you love a solution that saves you money? Well, as cost-conscious student, we have found one at MAPCO. We are sure you’ve heard about them, but you might not realize the benefits they offer. We hope that this post will enlighten you on the subject.
By Bobby Smith & Kevin Keenan
Let’s just take a minute and think about the countless times we use the internet each day. The reason may differ: paying bill, social media, shopping, or reading the news. As we do those things, we leave information about ourselves in the cyber world, this is known as a digital footprint. If you are not aware of your digital foot, you should be.
By Magen Bain & Sarah Murphy
Have you ever thought about how much you really walk during the day versus how much you just sit around? Right now, a wearable device called the Fitbit is a great way to monitor your activity level! The Fitbit allows you to track how far you have walked and how many calories you burn. Not only does it track your activity during the day, but your calorie intake, weight, and sleep patterns as well. It also syncs automatically and wirelessly to your Apple, Android, or Windows phone. You can even keep up with your progress online or on your phone using your Fitbit app!
By Jessica Reynolds & Georgiana Lamar
Do you have the Facebook app? Most people do. Have you noticed that you can’t get messages through your app anymore? Well, there is a reason for that. Facebook is now requiring that everyone download the Facebook Messenger app which is causing quite an uproar. Huffington Post wrote an article about the app, its terms of service, and how it requests a lot of personal information. The article mentioned that the app could; send text messages, call people, record audio through the microphone, take pictures and videos, and read data about your contacts – all without your knowledge.