TECH

The case against Kaspersky: a cold war on our PCs?

Sven Krumrey

The facade between Russia and the US is crumbling

Last week, a piece of news shook the IT world. The US government had banned federal agencies from using security software from Russian company Kaspersky as the Department of Homeland Security was worried about potential connections between Kaspersky and the Russian secret service. In an unprecedented move, all Kaspersky software now has to be removed from all government PCs within 150 days. Looking closer, a couple a questions arise the most important of which is: is there anything left that is safe to install?

more

TECH

Like a dog on a leash: a test of the Amazon Fire HD 8 (2017)

Sven Krumrey

Visually conservative but solid build-quality

I recently came upon an offer I could hardly ignore. Amazon's Fire HD 8 was being sold in its basic version for just $50 on "Prime Day". Reason enough to give it a go - it's not like there was anything else to do during my vacation. My reasoning was that, at that price point, I wouldn't be getting a high-end device but it was likewise unlikely that Amazon would market a dud under their own name . Oh the excitement!

more

TECH

Joy, pain and unknown manatees: a Microsoft Video Indexer test

Sven Krumrey

A bright outlook into the future at Build 2017

Recently, Microsoft's Build 2017, an annual developer conference, took place in Seattle and the company once again displayed their crown jewels along with big plans for the future (as always). With a Colgate smile, attendees were shown what smart services can do with cloud data - and data protection officials were probably reaching for their suicide pills right away. Video Indexer is a great example of how to leverage these new technologies and you can give it a try - if you dare. After all, Microsoft didn't lie when they spoke of a "democratization of surveillance tools".

more

TECH

Secure logins: two-factor authentication

Sven Krumrey

Two factors for more sign-in security

We all want data security - and sometimes you need to change your habits for it. I already wrote about strong passwords and how to detect phishing attempts so today's article is about secure logins. Two-factor authentication may sound like a bureaucrat's wet drean but it does wonders for the security of your user accounts, even when your login credentials have already been stolen!

more

TECH

When a secret weapon falls into the wrong hands

Sven Krumrey

The spy on your PC - or is it the villain?

Sunday afternoon movies can be so wonderfully relaxing. Stations frequently show old spy movies with super villains stealing super secret weapons from government facilities. Armed with laser cannons and other gadgetry, they go on a raid until they're stopped by the hero at the last minute. With the world on the verge of unspeakable catastrophes, we hear the cuffs click and see secret societies of villains get uncovered and eradicated. This blog article tells a similar story except that, in this case, heroes are scarce, villains still out and about and the secret weapon is targeted at your PC.

more