Richard BaguleyComputerworld

Richard Baguley has been writing about, testing and breaking technology for the past 20 years. He has written for Wired, Macworld, USA Today, Amiga Format and many others

It's not just Apple developers that are threatened by Lodsys

The Lodsys patent threats don't just affect iOS developers, argues Computerworld's Richi Jennings. They're just the tip of the iceberg.

Privacy: what bad guys do with stolen data

macworld.com

When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.

Protect your privacy: social networking

macworld.com

Maintaining privacy on social networks is much like hanging all your dirty laundry on a highway billboard, then asking only your friends to look. While it's possible to avoid sharing your life's story with the entire world, it takes effort.

Protect your privacy: Web browsing

macworld.com

Ad networks, search engines, Internet service providers, and social networks all track, analyze, and sell almost everything you do online.

Protect your privacy: what happens to your data?

When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.

Protect your privacy: browse the Web safely

When you browse the Web, it’s like you’ve allowed a bunch of companies to implant a tracking device in your arm and a small camera in your head, recording where you go and what you look at. Thanks to ad networks, search engines, ISPs, and social networks, your online activities are tracked, analyzed, and sold.

Protect your privacy: keep your data safe

In the old days, you probably kept all of your private data on your Mac. Today, your information is most likely stored across multiple Macs, iOS devices, and cloud-based storage services. Fortunately, there are tools that can keep your data safe, no matter where it lies.

Protect your privacy: take control of social networking

Maintaining privacy on social networks is much like hanging all your dirty laundry on a highway billboard—and then asking only your friends to look. While it's possible to avoid sharing your life's story with the entire world, it takes a lot of effort and is often contrary to the goals of the services you use. Remember, these services are free because they’re selling access to you.

Adobe Acrobat X: Do you feel safe yet?

Despite Acrobat's vulnerabilities, and its exploitation on Windows, the risk to Mac users today is immeasurably low. We just aren't seeing the attacks, says security expert Rich Mogull.

Living with Windows: security

When you use a Mac, you don't have to worry too much about malware. But when you put a Mac on a network with Windows PCs (or when you run Windows on a Mac), you have to give security some thought. Rich Mogull tells you what you do and don't have to worry about.

Aaxa P2

This powerful pico projector delivers very bright images and crisp text, but lackluster color and limited battery life lower its ranking.

Optoma PK102

The tiny Optoma PK102 pico projector delivers vivid color images and handles stand-alone presentations via its built-in media player.

WowWee Cinemin Swivel

Designed primarily as an Apple accessory, the Cinemin Swivel pico projector displays colorful iPod and iPhone images right out of the box.

Favi PJM-1000

The basic, low-cost PJM-1000 pico projector provides limited features and delivers mediocre image quality.

Ray Displays Ray

The $229 Ray, a liquid crystal on silicon (LCoS) pico projector from Ray Designs features 10 lumens of brightness, and a 20,000-hour LED.