You are here: Features Drew's News

Drew's News

It's Tax Time Again. These Tips Can Help.

Tax season. For many people those words mean it's time to complete an unpopular task. So whether you like to get this chore done as soon as possible or wait until the last minute, here are some tips, reminders, and other information to help you prepare your taxes.

Read on

What You Need to Know About the Meltdown and Spectre Computer Chip Flaws

In early January, researchers announced two flaws in computer chips known as central processing units (CPUs). CPUs are what makes our digital devices run. These flaws affect almost every computer, laptop, tablet and smartphone including PC, Mac, servers, iOS and Android devices. The flaws could let attackers capture sensitive information from the CPU that they shouldn't be able to access. There are no known exploits of these flaws.

Read on

Shopping for Toys? Safety and Privacy Are Important Considerations

Do you do your homework before shopping for toys? Do you make sure that you are buying toys that are appropriate for the age of the child? Here are some tips to help you be an informed toy shopper.

Read on

Before You Start Your Holiday Shopping Read These Tips

The holiday shopping season is here. Whether you plan to shop on Black Friday, Cyber Monday or wait until the last minute, these tips can help you be a smart shopper.

Read on

Reminder: It's Open Enrollment Time for Health Insurance

It's during this time of the year that you should enroll, re-enroll, or make changes to your health insurance plans for the coming year. This includes health insurance provided by your employer, health insurance you buy individually, and Medicare.

Read on

What Do You Need to Know About the KRACK Wi-Fi Vulnerability?

Researchers have discovered a vulnerability in the Wi-Fi WPA2 security protocol. This vulnerability affects most devices that can use a Wi-Fi connection. Hackers could exploit this problem to capture all the traffic coming into or out of any device with a Wi-Fi connection such as laptops, phones, routers, tablets, and smart devices. Though to exploit the problem, a hacker would have to be near the device.

Read on

Page 1 of 25

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »