Skip to content
MrHow
MrHowMrHow
  • Home
  • Office
    • Word
    • Excel Cơ Bản
    • Excel Nâng Cao
    • Outlook
  • Windows
  • Internet
  • Phần mềm
  • Bảo mật
  • Thủ Thuật
Search:
  • Home
  • Office
    • Word
    • Excel Cơ Bản
    • Excel Nâng Cao
    • Outlook
  • Windows
  • Internet
  • Phần mềm
  • Bảo mật
  • Thủ Thuật

privacyandsecurity-link

How to Turn off Background App Refresh on iPhone or iPad

How to Turn off Background App Refresh on iPhone or iPad

By default, your iPhone (or iPad) lets apps check for new data in the background. It can reduce loading times when switching back to an app, but it also reduces battery life, takes a bit of cellular data, and could allow som…


Benj Edwards
18h ago


Does a VPN Really Make Your Online Activity Private?

Does a VPN Really Make Your Online Activity Private?


VPNs are advertised as the best way—maybe even the only way—to stay private online, but is that really true? If we look beyond the marketing copy, we find a much more messy reality than what is portrayed on the homepages …


Fergus O’Sullivan
20h ago


What Are Android Security Updates, and Why Are They Important?

What Are Android Security Updates, and Why Are They Important?

Updates are a frequent topic when it comes to the Android operating system. There are actually different types of Android updates, one of which is a “Security Update.” What’s different about these updates, and why are they so…


Joe Fedewa
2d ago

ProtonMail vs. Tutanota: Which Is the Best Secure Email Provider?

ProtonMail vs. Tutanota: Which Is the Best Secure Email Provider?

When it comes to secure, private email services, two big names stand out: ProtonMail and Tutanota. Both services offer a free account so you can try them out, but what does each do differently?


Tim Brookes
4d ago


What Is a No-Log VPN, and Why Is That Important for Privacy?

What Is a No-Log VPN, and Why Is That Important for Privacy?


One of the biggest promises VPN services make is that they don’t keep logs. It’s plastered across their websites and features prominently in their marketing material. But what are logs, exactly, and what makes for a “no-log” …


Fergus O’Sullivan
Mar 20th


How to Clear Your Tracked Step History on iPhone

How to Clear Your Tracked Step History on iPhone

If you’ve ever set up a profile in Apple Health on your iPhone, the app will collect data on how many steps you take each day. If you’d like to clear this record of your physical activity, it’s easy to erase it in the Health…


Benj Edwards
Mar 19th

How to Use ProtonMail to Send Secure, Encrypted Emails

How to Use ProtonMail to Send Secure, Encrypted Emails

ProtonMail is a secure email service that prioritizes privacy and security. You can use the service to send encrypted messages that should only be read by the intended recipient. There are a few ways to do this, depending on …


Tim Brookes
Mar 18th


How to Securely Shop Online: 8 Tips to Protect Yourself

How to Securely Shop Online: 8 Tips to Protect Yourself


Cybercrime is an epidemic. In the U.S. alone, nearly half a million complaints are filed about it each year, according to the FBI—and that’s just what’s reported. Here’s how you can stay safe and avoid becoming a statistic….


Marshall Gunnell
Mar 17th



What Is ProtonMail, and Why Is It More Private Than Gmail?

What Is ProtonMail, and Why Is It More Private Than Gmail?


ProtonMail is a secure email service designed to protect your inbox and identity. So how exactly is ProtonMail different from a “regular” email provider like Gmail? And, more importantly: Is it time to make the switch?…


Tim Brookes
Mar 16th



Remembering ActiveX Controls, the Web’s Biggest Mistake

Remembering ActiveX Controls, the Web’s Biggest Mistake


Introduced in 1996, Internet Explorer’s ActiveX controls were a bad idea for the web. They caused serious security problems and helped cement the dominance of Internet Explorer on Windows, which led to the pre-Firefox stagnat…


Chris Hoffman
Mar 12th


What’s the Difference Between Incognito Mode and a VPN?

What’s the Difference Between Incognito Mode and a VPN?

VPNs and Incognito Mode are two of the most popular tools for online privacy. A VPN makes you harder to track while browsing, while Incognito Mode gives you a fresh browser that doesn’t remember your history—and won’t give …


Fergus O’Sullivan
Mar 11th


What Is Secure Email, and Should You Switch?

What Is Secure Email, and Should You Switch?


Email was invented in 1971 and has changed very little since then. In that time, it’s managed to become a major security risk to individuals, governments, and private companies around the world. This might explain the rising …


Tim Brookes
Mar 11th


How to Turn Off GPS Location Tracking on an iPhone

How to Turn Off GPS Location Tracking on an iPhone

If you have Location Services enabled on your iPhone, apps (and system services) you approve can check your location. Here’s how you can toggle GPS and other location-tracking methods off and on, easily….


Benj Edwards
Mar 10th

How to Stop T-Mobile from Selling Your Web Browsing Data to Advertisers

How to Stop T-Mobile from Selling Your Web Browsing Data to Advertisers

T-Mobile will begin sharing your web browsing and mobile app data with advertisers starting April 26, 2021. T-Mobile is automatically enabling this for nearly everyone, but you can opt-out to prevent T-Mobile from selling thi…


Chris Hoffman
Mar 10th


Did You Know Browser Extensions Are Looking at Your Bank Account?

Did You Know Browser Extensions Are Looking at Your Bank Account?


Whenever you sign in to your bank account, your browser extensions watch. They can see your account balances, your transactions, and your online banking password. They see everything in your browser: passwords, credit card nu…


Chris Hoffman
Mar 9th


How to Stop Your iPhone From Tracking Your Location History

How to Stop Your iPhone From Tracking Your Location History

By default, your iPhone keeps track of everywhere you go if you have Location Services turned on. Apple says this history is end-to-end encrypted, but you may not want it created in the first place. Location history is easy t…


Benj Edwards
Mar 5th


How to Use a Voice Assistant Without It “Always Listening”

How to Use a Voice Assistant Without It “Always Listening”


Voice assistants like Siri, Alexa, and Google Assistant are a convenient way to control smart home devices, set timers, hear the weather, and perform other common tasks. But, if you don’t like the “always listening” part, you…


Chris Hoffman
Mar 5th



How to Delete Your Old Online Accounts (and Why You Should)

How to Delete Your Old Online Accounts (and Why You Should)


You’ve probably signed up for a lot of online services that you no longer use. Most of those accounts probably still exist, and they likely contain a mix of your personal data, identity details, and credit card numbers. Don’t…


Chris Hoffman
Mar 3rd



Disconnect Your Smart TV from the Internet to Stop Tracking

Disconnect Your Smart TV from the Internet to Stop Tracking


Your smart TV is probably tracking what you watch. “Automated content recognition” (ACR) technology detects what you’re watching, uploading snippets of content to a reference library so marketers can keep track of your viewin…


Chris Hoffman
Feb 26th



A Private Alternative to Google Maps: DuckDuckGo Maps

A Private Alternative to Google Maps: DuckDuckGo Maps


DuckDuckGo isn’t just a private alternative to Google and Bing’s web search. It has a built-in online mapping solution designed with privacy in mind. If you want to leave Google, you don’t have to stick around for Google Maps…


Tim Brookes
Feb 25th


How to Disconnect Your Roku TV From Wi-Fi

How to Disconnect Your Roku TV From Wi-Fi

Once you’ve connected it to Wi-Fi, your Roku TV will automatically remember your Wi-Fi details and connect in the future. If you want to disconnect it from your wireless network, you can have it forget your Wi-Fi details….


Chris Hoffman
Feb 24th

How to Sign up for Signal or Telegram Anonymously

How to Sign up for Signal or Telegram Anonymously

Secure messaging apps like Signal and Telegram go the extra mile to protect your privacy and secure your conversations. But what if you want to truly chat anonymously, without giving away your personal phone number?…


Tim Brookes
Feb 22nd

How to Use Apple Maps in a Browser on Windows and Android

How to Use Apple Maps in a Browser on Windows and Android

Apple Maps is only officially available on Apple devices like iPhones and Macs. But, thanks to DuckDuckGo, you can browse or get directions in Apple Maps from any platform with a browser, including Windows and Android….


Tim Brookes
Feb 21st

How to Turn on Registration Lock in Signal

How to Turn on Registration Lock in Signal

Signal, the secure messaging application, ties itself to your phone number. For extra protection against thieves stealing your phone number, you can enable Registration Lock, preventing anyone from registering another account…


Tim Brookes
Feb 17th


What Is a Burner Phone, and When Should You Use One?

What Is a Burner Phone, and When Should You Use One?


A “burner phone” is a cheap, prepaid mobile phone that you can destroy or discard when you no longer need it. In popular media, criminals often use burner phones to evade detection by authorities. You might use a burner phone…


Tim Brookes
Feb 17th


  • 1
  • 2
  • 3
  • 4
  • …
  • 96
  • Next »

How to See and Manage Linked Devices in Signal

How to See and Manage Linked Devices in Signal

Signal is a secure messaging app that takes your privacy very seriously. By default, messages only go to your phone, but you can add other devices that will receive copies, letting you chat from your computers and tablets. He…


Tim Brookes
Feb 16th

How to Hide Your “Last Seen Online” Time in Telegram

How to Hide Your “Last Seen Online” Time in Telegram

Telegram is a popular messaging app that places an emphasis on privacy, although not as much as Signal does. By default, Telegram shows anyone and everyone the last time you were online. Here’s how to hide that….


Tim Brookes
Feb 15th

How to Use Bangs in DuckDuckGo (to Search Other Websites)

How to Use Bangs in DuckDuckGo (to Search Other Websites)

DuckDuckGo is a search engine that respects your privacy by not selling your search history or tracking you across the web. It also has a few nifty features, including bangs, which let you search other websites right from Duc…


Tim Brookes
Feb 13th

Do VPN Companies Track Your Browsing Data?

Do VPN Companies Track Your Browsing Data?

People use VPNs to protect their privacy from hackers, ISPs, and data thieves. But do VPNs themselves collect your browsing data and sell it to third parties? Here’s what you need to know.


Vann Vicente
Feb 12th

How to Delete a Reddit Account

How to Delete a Reddit Account

If you’re no longer interested in using Reddit, you can delete your account. However, you’ll need to jump through some extra hoops if you want to delete your Reddit posts and comments, too. Here’s how to do it….


Chris Hoffman
Feb 10th


How to Switch to DuckDuckGo, a Private Search Engine

How to Switch to DuckDuckGo, a Private Search Engine


DuckDuckGo is a privacy-focused search engine that’s been online since 2008. Find websites, maps, videos, news, and more—without tracking your searches and serving you targetted ads. Here’s how to make the switch from Goog…


Tim Brookes
Feb 10th



Is My Smart Speaker Always Listening to Me?

Is My Smart Speaker Always Listening to Me?


Smart speakers like the Amazon Echo and Google Nest Mini can make life easier, but they also present some privacy concerns. Doesn’t a device that responds to voice commands need to be listening all the time? Let’s talk about …


Joe Fedewa
Feb 9th



How to Make Your Signal Chats as Secure as Possible

How to Make Your Signal Chats as Secure as Possible


Signal secures all your conversations with end-to-end encryption, offering more privacy and security than your average chat app. But Signal offers some other useful security options. Here’s how to take advantage of them….


Tim Brookes
Feb 8th


What Is Ecosia? Meet a Google Alternative That Plants Trees

What Is Ecosia? Meet a Google Alternative That Plants Trees

Ecosia is a not-for-profit search engine that uses advertising revenue gained from searches to plant trees. It doesn’t have the privacy-focus of DuckDuckGo, nor does it have the search results of Google. But it does have a un…


Tim Brookes
Feb 5th

How to Encrypt Local Backups of an iPhone or iPad on Windows

How to Encrypt Local Backups of an iPhone or iPad on Windows

Most people back up their iPhones or iPads to iCloud, but it’s not completely private: Apple always holds the key so it can help if you forget your password. If you want a truly secure device backup and you have a Windows mac…


Benj Edwards
Feb 4th


What Is End-to-End Encryption, and Why Does It Matter?

What Is End-to-End Encryption, and Why Does It Matter?


End-to-end encryption (E2EE) ensures that your data is encrypted (kept secret) until it reaches an intended recipient. Whether you’re talking about end-to-end encrypted messaging, email, file storage, or anything else, this e…


Chris Hoffman
Feb 3rd



PSA: Gmail Has Your Old Chat Logs From Google Talk (and Hangouts)

PSA: Gmail Has Your Old Chat Logs From Google Talk (and Hangouts)


Do you remember Google Talk? Google launched its first chat service back in 2005. It’s long gone, but your old Google Talk chat logs may still be stored in your Gmail account. Gmail may remember your Google Hangouts chat hist…


Chris Hoffman
Feb 2nd



Apple’s iMessage Is Secure … Unless You Have iCloud Enabled

Apple’s iMessage Is Secure … Unless You Have iCloud Enabled


Apple’s iMessage service uses secure end-to-end encryption. This ensures only you and the person you’re talking to can see your messages. But there’s a big privacy hole in iMessage, and it’s named iCloud. Here’s what you need…


Chris Hoffman
Jan 27th


How to See Which iPhone Apps Can Access Your Contacts

How to See Which iPhone Apps Can Access Your Contacts

Few iPhone privacy issues go deeper than access to your Contacts list, which exposes your private web of relationships to a third party, which can then compare the list to its records or potentially share it with others. Here…


Benj Edwards
Jan 25th


PSA: Telegram Chats Aren’t End-to-End Encrypted by Default

PSA: Telegram Chats Aren’t End-to-End Encrypted by Default


Telegram and Signal are widely popular privacy-focused messaging apps. However, the two apps have some big differences: While all messages sent via Signal are always end-to-end encrypted by default, Telegram messages aren’t. …


Chris Hoffman
Jan 25th



What Is DuckDuckGo? Meet the Google Alternative for Privacy

What Is DuckDuckGo? Meet the Google Alternative for Privacy


DuckDuckGo is a privacy-focused search engine that doesn’t track you. This alternative to Google, Bing, and Yahoo is growing fast. Here’s an introduction to DuckDuckGo and a look at how it protects your privacy….


Chris Hoffman
Jan 22nd



Why SMS Text Messages Aren’t Private or Secure

Why SMS Text Messages Aren’t Private or Secure


You might think that switching from Facebook Messenger to old-fashioned text messages would help protect your privacy. But standard SMS text messages aren’t very private or secure. SMS is like fax—an old, outdated standard …


Chris Hoffman
Jan 21st


How to See Which iPhone Apps Are Listening to Your Microphone

How to See Which iPhone Apps Are Listening to Your Microphone

Are you worried that your iPhone apps are listening using your device’s built-in microphone? If so, it’s easy to know for sure—and to revoke microphone access if necessary—by checking a list in Settings. Here’s how to do …


Benj Edwards
Jan 20th

How to See Which iPhone Apps Are Accessing Your Camera

How to See Which iPhone Apps Are Accessing Your Camera

Few iPhone privacy issues make people as nervous as whether an app is using your camera or not. Luckily, thanks to Apple’s Privacy settings, it’s easy to know which apps have access to your iPhone’s built-in camera. Here’s ho…


Benj Edwards
Jan 18th

How to See What Data Google Has on You (and Delete It)

How to See What Data Google Has on You (and Delete It)

There are a few companies that people seem to have trust issues with. Google is one of them, and it’s no mystery that the company collects a lot of data about you. But just how much does it have? Let’s check….


Joe Fedewa
Jan 18th


How Devices Use Wi-Fi to Determine Your Physical Location

How Devices Use Wi-Fi to Determine Your Physical Location


Did you know that laptops and other devices without GPS hardware can determine your precise physical location—with just a Wi-Fi radio? Here’s how this often-overlooked feature of modern “Location Services” works….


Chris Hoffman
Jan 18th


How to Check If Signal Is Down

How to Check If Signal Is Down

Is Signal down? At the start of 2021, the encrypted chat app has seen a wave of new users who want to keep their conversations private. Here’s how to check whether Signal is down for everyone else.


Chris Hoffman
Jan 15th

The 5 Best Alternatives to WhatsApp

The 5 Best Alternatives to WhatsApp

WhatsApp has become ubiquitous with mobile messaging, but it’s not for everyone. If you’re suffering from WhatsApp fatigue or you don’t like the privacy issues with this Facebook-owned app, here are the best WhatsApp alternat…


Khamosh Pathak
Jan 14th

How to Enable an Extension in Chrome’s Incognito Mode

How to Enable an Extension in Chrome’s Incognito Mode

By default, Google Chrome does not run extensions in Incognito mode because they could potentially compromise your privacy. But, if you’d like to give an extension permission to work in private browsing mode, it’s easy to do….


Benj Edwards
Jan 13th

How to See What Data Facebook Has on You

How to See What Data Facebook Has on You

Facebook knows a lot about you. Some of this information was handed over when you signed up, but there’s some stuff you might not know about. We’ll show you how to see and download it.


Joe Fedewa
Jan 13th

  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 96
  • Next »


What Is Signal, and Why Is Everyone Using It?

What Is Signal, and Why Is Everyone Using It?


Signal is a secure encrypted messaging app. Think of it as a more private alternative to WhatsApp, Facebook Messenger, Skype, iMessage, and SMS. Here’s why you should seriously consider switching to Signal….


Chris Hoffman
Jan 12th


How to Open Firefox’s Private Browsing Mode with a Keyboard Shortcut

How to Open Firefox’s Private Browsing Mode with a Keyboard Shortcut

If you’re browsing the web with Mozilla Firefox and you’d like to quickly open a Private window, there’s no need to reach for a menu. Here’s how to start private browsing in Firefox with just a keyboard shortcut on Windows, L…


Benj Edwards
Jan 11th

Can You Use Signal Without Giving It Your Contacts?

Can You Use Signal Without Giving It Your Contacts?

Signal is a privacy-focused encrypted chat solution, but the first thing it wants after you sign up is access to all the contacts on your phone. Here’s why, what Signal actually does with those contacts, and what using Signal…


Chris Hoffman
Jan 11th

How to Stop Signal From Telling You When Your Contacts Join

How to Stop Signal From Telling You When Your Contacts Join

When someone in your contacts signs up for Signal, you’ll see a message saying that person joined Signal. Now you know you can contact them on Signal. If you’d rather not see these notifications, you can disable them….


Chris Hoffman
Jan 8th

How to Use OpenPGP Encryption for Emails in Thunderbird

How to Use OpenPGP Encryption for Emails in Thunderbird

Mozilla Thunderbird recently integrated OpenPGP right into the main application. No add-ons are needed for email privacy. OpenPGP’s world-class encryption is easy to set up and use without additional software….


Dave McKay
Jan 6th

How to See When Apps Access Your Camera and Microphone on Android

How to See When Apps Access Your Camera and Microphone on Android

Privacy is a big topic when it comes to mobile devices. iPhones and iPads show little orange and green indicator icons when apps access the device’s camera or microphone. Here’s an Android app that can do the same….


Joe Fedewa
Dec 31st, 2020

How to Enable a Firefox Extension in Private Browsing Mode

How to Enable a Firefox Extension in Private Browsing Mode

Private mode in Mozilla Firefox keeps your local browsing history private. But, by default, Firefox turns off extensions while browsing privately to prevent them from leaking data. If you’d like to use a trusted extension whi…


Benj Edwards
Dec 29th, 2020

How to Open Edge’s InPrivate Mode with a Keyboard Shortcut

How to Open Edge’s InPrivate Mode with a Keyboard Shortcut

While using Microsoft Edge, it’s easy to quickly open a new InPrivate window using a keyboard shortcut. InPrivate is a special private browsing mode that doesn’t save your local browsing history. Here’s how to do it….


Benj Edwards
Dec 28th, 2020

How to Delete Your Play Activity on the Nintendo Switch

How to Delete Your Play Activity on the Nintendo Switch

If you’ve been playing some embarrassing games recently on your Nintendo Switch and you don’t want them to show up in your Play Activity where your friends can see it, you can delete your play activity completely. Here’s how …


Benj Edwards
Dec 27th, 2020

How to Open Chrome’s Incognito Mode with a Keyboard Shortcut

How to Open Chrome’s Incognito Mode with a Keyboard Shortcut

If you ever need to do some private browsing in Google Chrome, it’s easy to quickly open an Incognito window using a keyboard shortcut. In this special mode, your browsing history won’t be stored on your local machine. Here’s…


Benj Edwards
Dec 21st, 2020

How to Hide Your Play Activity from Friends on Nintendo Switch

How to Hide Your Play Activity from Friends on Nintendo Switch

Have you been playing some embarrassing Nintendo Switch games? By default, friends on your Switch can see your play activity—that’s the list of games you’ve been playing recently. Luckily, you can hide your play activity fr…


Benj Edwards
Dec 20th, 2020

How to Convert a Login to “Sign in With Apple”

How to Convert a Login to “Sign in With Apple”

When you Sign in with Apple, you don’t need to provide a password at all. Assuming you’re already signed in to your Apple ID, logging in is a simple matter of tapping a button and waiting. Instead of a password, services iden…


Tim Brookes
Dec 17th, 2020

How to Clear Chrome Browsing Data With a Keyboard Shortcut

How to Clear Chrome Browsing Data With a Keyboard Shortcut

Need to clear your Google Chrome browsing data quickly? Three’s no need to dig through menus—it’s as easily as a single keyboard shortcut and a few clicks. Here’s how to do it.


Benj Edwards
Dec 14th, 2020

How to Clear Firefox Browsing Data With a Keyboard Shortcut

How to Clear Firefox Browsing Data With a Keyboard Shortcut

If you’re a fan of Mozilla Firefox and you’d like to clear your browsing history quickly, there’s a simple keyboard shortcut available to help you do the job on Windows, Mac, and Linux. Here’s how to use it….


Benj Edwards
Dec 7th, 2020


Can Websites See Your Physical Location?

Can Websites See Your Physical Location?


Websites you access can determine your physical geographical location in a few ways. Your IP address reveals your general area—unless you use a VPN. Websites can also ask for a more precise location….


Chris Hoffman
Dec 1st, 2020



Why Aren’t Viruses a Problem on Chrome OS?

Why Aren’t Viruses a Problem on Chrome OS?


Chrome OS has a reputation for being virus-proof. Google likes to boast about how secure its operating system is compared to others. Are Chromebooks really immune to viruses, though? And, if so, how do they achieve this? Allo…


Joe Fedewa
Nov 28th, 2020


How to Clear Safari Browsing Data with a Keyboard Shortcut

How to Clear Safari Browsing Data with a Keyboard Shortcut

If you use Safari on Mac and would like to quickly clear your browser history without digging through menus, you can take care of it with a keyboard shortcut and a click by creating a custom shortcut in System Preferences. He…


Benj Edwards
Nov 24th, 2020

How to Turn On HTTPS-Only Mode in Mozilla Firefox

How to Turn On HTTPS-Only Mode in Mozilla Firefox

If you visit a site with HTTPS-Only Mode turned on and the site does not support HTTPS, you will see an error page similar to this one.


Benj Edwards
Nov 19th, 2020


Does Apple Track Every Mac App You Run? OCSP Explained

Does Apple Track Every Mac App You Run? OCSP Explained


Does your Mac really phone home to Apple each time you launch an app? That’s the allegation flying around after October 12, 2020, when an Apple server became slow and modern Macs took a long time to open apps. We’ll explain w…


Chris Hoffman
Nov 18th, 2020


How to Remove Contact Suggestions From the Share Sheet on iPhone and iPad

How to Remove Contact Suggestions From the Share Sheet on iPhone and iPad

By default, your iPhone and iPad suggest a list of people whenever you tap the Share button. It’s easy to share things accidentally. Starting with iOS 14 and iPadOS 14, you can remove suggested contacts from the Share sheet….


Benj Edwards
Nov 7th, 2020

How to Hide Most Used Apps in the Start Menu on Windows 10

How to Hide Most Used Apps in the Start Menu on Windows 10

While using Windows 10, you might see a list of “Most Used” apps in your Start menu. Whether you’d like to simplify to Start menu or conceal the list due to privacy concerns, hiding the most used apps list is easy. Here’s how…


Benj Edwards
Nov 2nd, 2020

Why iPhone Apps Ask for “Devices on Your Local Network”

Why iPhone Apps Ask for “Devices on Your Local Network”

iPhone and iPad apps must ask for permission “to find and connect to devices on your local network.” This request was iOS 14 and iPadOS 14 updates, Here’s what this message means and how you should answer it….


Chris Hoffman
Oct 12th, 2020

Why Are iPhone Apps “Pasting From” Other Apps?

Why Are iPhone Apps “Pasting From” Other Apps?

Your iPhone lets you copy data to your clipboard and paste it into other apps. However, an app can read (“paste”) from your clipboard in the background. A feature added in iOS 14 and iPadOS 14 notifies you when an app reads y…


Chris Hoffman
Oct 9th, 2020

How to Password Protect Photos on iPhone and iPad

How to Password Protect Photos on iPhone and iPad

Sometimes, you need to protect your iPhone or iPad photos from prying eyes that might also have access to your device. Unfortunately, Apple doesn’t provide an obvious, secure way to do this. However, there’s a work-around tha…


Benj Edwards
Oct 1st, 2020


All the New iPhone Privacy Features in iOS 14

All the New iPhone Privacy Features in iOS 14


The iPhone is an excellent investment for anyone concerned about privacy. This is due to its robust permissions system and Apple’s disdain for App Store rule-breakers. With some new privacy features and big improvements to ex…


Tim Brookes
Sep 30th, 2020


  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 96
  • Next »


What Is an “Evil Maid” Attack, and What Does It Teach Us?

What Is an “Evil Maid” Attack, and What Does It Teach Us?


You’ve secured your computer with strong disk encryption and security software. It’s safe—as long as you keep it within eyesight. But, once an attacker has physical access to your computer, all bets are off. Meet the “evil …


Chris Hoffman
Sep 28th, 2020


How to Disable Private Wi-Fi MAC Addresses on iPhone and iPad

How to Disable Private Wi-Fi MAC Addresses on iPhone and iPad

Apple changed the way the iPhone and iPad connect to Wi-Fi networks starting in the iOS 14 and iPadOS 14 updates. If this causes issues with a Wi-Fi network, you can disable it for that network. Here’s how….


Chris Hoffman
Sep 25th, 2020

What Are the Orange and Green Dots on an iPhone or iPad?

What Are the Orange and Green Dots on an iPhone or iPad?

On an iPhone or iPad, you’ll see orange and green dots at the top right corner of the screen—above the cellular, Wi-Fi, and battery icons—when an app is using your microphone or camera. Here’s what you need to know….


Chris Hoffman
Sep 22nd, 2020

How to Get Data Breach Alerts from Mozilla’s Firefox Monitor

How to Get Data Breach Alerts from Mozilla’s Firefox Monitor

Data security and privacy have increasingly become the central focus for Mozilla’s Firefox browser. While Mozilla continues to explore subscription-based services aimed at privacy, such as the Mozilla VPN, a number of tools a…


Eric Hamilton
Sep 16th, 2020


The Ultimate Defense: What Is an Air Gapped Computer?

The Ultimate Defense: What Is an Air Gapped Computer?


When reading about cyber-security, you’ll probably see talk about “air-gapped” computer systems. It’s a technical name for a simple concept: A computer system that’s physically isolated from potentially dangerous networks. Or…


Chris Hoffman
Sep 3rd, 2020



Is Your Microsoft Office Still Getting Security Updates?

Is Your Microsoft Office Still Getting Security Updates?


Is your version of Office still getting security updates? It depends which version you’re using. Microsoft has a published support lifecycle, but it can be difficult to dig up the info. Here’s what you need to know….


Chris Hoffman
Aug 31st, 2020



Why You Should Update All Your Software

Why You Should Update All Your Software


Software updates can be annoying. They take time to install, move (or remove) features you use—and sometimes they even break things. Still, we recommend updating (and upgrading) your software whenever possible. The internet…


Chris Hoffman
Aug 28th, 2020


How to Encrypt Files with gocryptfs on Linux

How to Encrypt Files with gocryptfs on Linux

Do you want to encrypt important files, but not your Linux system’s entire hard drive? If so, we recommend gocryptfs. You’ll get a directory that, essentially, encrypts and decrypts everything you store….


Dave McKay
Aug 27th, 2020

Can Zoom Hosts Really See All Your Private Messages?

Can Zoom Hosts Really See All Your Private Messages?

Viral social media posts are alleging that Zoom’s private messages aren’t really private—if you’re chatting privately during a Zoom meeting, the host can see your entire conversation. Is that true? Well, not exactly….


Chris Hoffman
Aug 26th, 2020

How to Manage the Data LinkedIn Collects on You

How to Manage the Data LinkedIn Collects on You

LinkedIn is meant to give your career a boost. In the process, though, it collects a lot of data about you. Here’s how to manage your data privacy settings on the site.


Vann Vicente
Aug 14th, 2020


How to Protect Your Mac From Ransomware

How to Protect Your Mac From Ransomware


macOS has a relatively good reputation for security as a result of Apple’s tight grip, but no platform is safe from attack. Ransomware is just one example of this, and it’s a growing problem. Here’s how to keep your Mac safe….


Tim Brookes
Aug 11th, 2020


How to Block Someone on Strava

How to Block Someone on Strava

Strava, like all social media apps, can reveal a huge amount of information about you. Even if you stop random strangers from stumbling across your home address, you might sometimes need to actively stop a specific person fro…


Harry Guinness
Aug 6th, 2020

How to Remove Location Data When Sharing Photos on iPhone

How to Remove Location Data When Sharing Photos on iPhone

If you have Location Services enabled for the Camera app on your iPhone or iPad, every photo you take includes GPS info about where it was taken. Starting with iOS 13, though, you can choose to share photos without location d…


Benj Edwards
Aug 3rd, 2020


Audio Deepfakes: Can Anyone Tell If They’re Fake?

Audio Deepfakes: Can Anyone Tell If They’re Fake?


Video deepfakes mean you can’t trust everything you see. Now, audio deepfakes might mean you can no longer trust your ears. Was that really the president declaring war on Canada? Is that really your dad on the phone asking fo…


Dave Johnson
Aug 3rd, 2020


Who Can See My Runs and Rides on Strava?

Who Can See My Runs and Rides on Strava?

Strava is the biggest name in running and bike-ride tracking. However, it occasionally gets in trouble for revealing secret U.S. military bases or enabling doxing. If you use it, you might be wondering who exactly can see you…


Harry Guinness
Jul 31st, 2020

How to Make a Run or Ride Private on Strava

How to Make a Run or Ride Private on Strava

Strava doesn’t have the best privacy reputation and, by default, all your activities are public and visible to everyone. However, you can change the privacy settings on any activity.


Harry Guinness
Jul 29th, 2020


All the Ways Your Location Can Be Tracked on an iPhone

All the Ways Your Location Can Be Tracked on an iPhone


Your iPhone can be configured to share your real-time location with any individual. It also tags your location in the photos you take, and many apps beg for location access. Here’s how to take control….


Chris Hoffman
Jul 24th, 2020



Watch Out: 99.9 Percent of Hacked Microsoft Accounts Don’t Use 2FA

Watch Out: 99.9 Percent of Hacked Microsoft Accounts Don’t Use 2FA


Two-factor authentication (2FA) is the single most effective method of preventing unauthorized access to an online account. Still need convincing? Have a look at these jaw-dropping numbers from Microsoft….


Rob Woodgate
Jul 20th, 2020



Do Hackers Really Battle in Real Time? 

Do Hackers Really Battle in Real Time? 


Everyone knows that hacker-attack scene from NCIS. Working in their dimly lit forensics lab, Abby Sciuto (Pauley Perrette) and Timothy McGee (Sean Murray) have to fend off a cybercriminal, hell-bent on stealing information a…


Matthew Hughes
Jul 15th, 2020


How to Scan with Microsoft Defender Antivirus on Windows 10

How to Scan with Microsoft Defender Antivirus on Windows 10

Windows malware is still a big problem. That’s why Microsoft ships an antivirus named Microsoft Defender with Windows 10. It scans for malware in the background, but you can also perform a full-system scan with Defender….


Benj Edwards
Jul 13th, 2020


Does Private or Incognito Mode Make Web Browsing Anonymous?

Does Private or Incognito Mode Make Web Browsing Anonymous?


Private is a relative term. This is abundantly clear when it comes to “private browsing”—the setting in a web browser that supposedly allows you to hide your history from others who use the same computer….


Matthew Hughes
Jul 13th, 2020


How to View a Saved Password in Safari on Mac

How to View a Saved Password in Safari on Mac

Sometimes, you need to login to a website on a different device or browser, but you can’t remember the password. Luckily, if you have previously allowed Safari to save the password on your Mac, you can recover it. Here’s how….


Benj Edwards
Jul 10th, 2020

How to Scan a File or Folder for Malware with Microsoft Defender on Windows 10

How to Scan a File or Folder for Malware with Microsoft Defender on Windows 10

On Windows 10, Microsoft Defender (formerly called “Windows Defender”) always scans files before you open them unless you’ve installed a third-party antivirus. You can also perform a quick scan of any file or folder, too. Her…


Benj Edwards
Jul 9th, 2020

How to Turn Off Real-Time Protection in Microsoft Defender on Windows 10

How to Turn Off Real-Time Protection in Microsoft Defender on Windows 10

By default, Windows 10’s built-in antivirus program called Microsoft Defender scans your PC for threats in real-time. Sometimes, you might want to turn it off—either temporarily or if you are using your own antivirus solut…


Benj Edwards
Jul 6th, 2020


PSA: All Apps Can Read Your iPhone and Android Clipboard

PSA: All Apps Can Read Your iPhone and Android Clipboard


Have you seen the news about TikTok? A new privacy feature in iOS 14 revealed that the Chinese social media app was constantly reading iPhone clipboards. But that’s nothing new. All apps can read your smartphone clipboard whe…


Chris Hoffman
Jul 1st, 2020


  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 96
  • Next »

What Does Apple’s T2 “Security Chip” Do in Your Mac?

What Does Apple’s T2 “Security Chip” Do in Your Mac?

Apple proudly advertises that its latest and greatest Mac models come with a T2 security chip, but what does it do? And, more importantly, does a T2 chip create more problems than it solves?


Tim Brookes
Jun 29th, 2020

How to Stop Strava From Making Your Home Address Public

How to Stop Strava From Making Your Home Address Public

Strava is one of the best running and cycling tracking apps, but it’s also a privacy nightmare. Not only have people leaked the locations of secret U.S. military bases just by using it, but it also automatically shares your…


Harry Guinness
Jun 26th, 2020


How to Make Google Auto-Delete Your Web and Location History

How to Make Google Auto-Delete Your Web and Location History


Google collects and remembers information about your activity, including your web, search, and location history. Google now auto-deletes history for new users after 18 months, but it will remember history forever if you previ…


Chris Hoffman
Jun 25th, 2020


How to Always Start Microsoft Edge in InPrivate Browsing Mode on Windows 10

How to Always Start Microsoft Edge in InPrivate Browsing Mode on Windows 10

If you use Microsoft Edge on a shared Windows 10 computer and would like to keep your browsing history private by default, you can make Edge always launch in InPrivate mode. Here’s how.


Benj Edwards
Jun 18th, 2020

How to Always Start Mozilla Firefox in Private Browsing Mode

How to Always Start Mozilla Firefox in Private Browsing Mode

If you use Firefox and you don’t want it to keep track of every site you’ve visited, you can configure the browser to always use private browsing mode. Once you close all of your Firefox windows, none of your browsing history…


Benj Edwards
Jun 12th, 2020

How to Always Start Google Chrome in Incognito Mode on Windows 10

How to Always Start Google Chrome in Incognito Mode on Windows 10

Google Chrome normally remembers your browsing history. You can put a stop to that, though, if you set it to always open in Incognito mode. Here’s how you can set up Chrome for private browsing.


Benj Edwards
Jun 10th, 2020


Does It Really Take 60 Seconds to Trace a Phone Call?

Does It Really Take 60 Seconds to Trace a Phone Call?


How do you trace a phone call? According to TV shows and films, you just have to keep someone talking long enough for a detective to pinpoint his location. While this overused trope can add some tension when paired with a tim…


Matthew Hughes
Jun 8th, 2020



Can Your iPhone Be Hacked?

Can Your iPhone Be Hacked?


The iPhone has earned a reputation as a security-focused device thanks (in part) to Apple’s iron grip on the ecosystem. However, no device is perfect when it comes to security. So, can your iPhone be hacked? What are the risk…


Tim Brookes
Jun 5th, 2020


How to Add Exclusions in Windows Defender on Windows 10

How to Add Exclusions in Windows Defender on Windows 10

Windows Defender, integrated into Windows 10, runs in the background and scans your files for malware. To improve performance for tasks like compiling code or running virtual machines, you can add an exclusion and Windows Def…


Benj Edwards
May 25th, 2020


What Is a Man-in-the-Middle Attack?

What Is a Man-in-the-Middle Attack?


A man-in-the-middle (MITM) attack occurs when someone sits between two computers (such as a laptop and remote server) and intercepts traffic. This person can eavesdrop on, or even intercept, communications between the two mac…


Matthew Hughes
May 13th, 2020


How to Use TikTok’s Parental Controls

How to Use TikTok’s Parental Controls

TikTok is a social media platform on which you can create, remix, augment, or share short videos. Because it’s so popular with teens, parents obviously want to protect their kids from inappropriate content. Fortunately, TikT…


Joel Cornell
Apr 23rd, 2020

What Is Credential Stuffing? (and How to Protect Yourself)

What Is Credential Stuffing? (and How to Protect Yourself)

A total of 500 million Zoom accounts are for sale on the dark web thanks to “credential stuffing.” It’s a common way for criminals to break into accounts online. Here’s what that term actually means and how you can protect yo…


Chris Hoffman
Apr 20th, 2020

Why You Shouldn’t Use Your ISP’s Default DNS Server

Why You Shouldn’t Use Your ISP’s Default DNS Server

Your computers, phones, and other devices normally use the Domain Name System (DNS) server with which the router is configured. Unfortunately, this is often the one provided by your Internet Service Provider (ISP). These lack…


Anthony Heddings
Apr 14th, 2020


What Is Zoombombing, and How Can You Stop It?

What Is Zoombombing, and How Can You Stop It?


Amidst the global pandemic that is COVID-19 (which definitely isn’t caused by 5G), more people are working remotely and using Zoom for video-conferencing. However, they’re facing a security issue called “Zoombombing.” What …


Marshall Gunnell
Apr 10th, 2020


How to Secure Your Discord Account

How to Secure Your Discord Account

Discord is all fun and games until your account is stolen. Make sure no one can access your account, even if they steal your password, by implementing two-factor authentication. Don’t forget to regularly update your password …


Joel Cornell
Apr 7th, 2020


Why You Should Never Disable Automatic Updates in Chrome

Why You Should Never Disable Automatic Updates in Chrome


Google Chrome automatically updates itself. There’s no easy way to turn off automatic updates, but you can do it in several ways—by stopping the Google Update Service that handles automatic updates, for example. Here’s why …


Chris Hoffman
Apr 7th, 2020


How to Hide What Game You’re Playing on Discord

How to Hide What Game You’re Playing on Discord

Discord automatically shows your friends the games you’re playing. If a game uses Discord’s Rich Presence feature, your friends can even see where you are in-game. Here’s how you can deactivate this feature and increase your …


Joel Cornell
Apr 3rd, 2020

How to Use Cloudflare DNS’s Parental Controls

How to Use Cloudflare DNS’s Parental Controls

Cloudflare now offers “1.1.1.1 for Families,” new DNS servers with built-in parental controls. Cloudflare’s standard 1.1.1.1 DNS server doesn’t perform any filtering, but Cloudflare can now block malware and adult content. S…


Chris Hoffman
Apr 1st, 2020

Does Zoom Really Monitor Which Apps You’re Using on a Call?

Does Zoom Really Monitor Which Apps You’re Using on a Call?

Viral social media posts are alleging that Zoom, a popular video-conferencing tool, lets hosts “monitor what programs users on the call are running.” So, can your boss (or friend) really see what you’re doing while you’re cha…


Chris Hoffman
Mar 25th, 2020


Are Online Transcription Services Safe and Private?

Are Online Transcription Services Safe and Private?


Transcription was once a manual, tedious process. Doctors, journalists, and a swath of assorted professionals would record their notes and conversations on scratchy Dictaphone tape, and then sit down in front of their compute…


Matthew Hughes
Mar 21st, 2020


How to Stop Facebook from Tracking You in Firefox

How to Stop Facebook from Tracking You in Firefox

Firefox 74 has an official Facebook Container add-on that keeps the social media juggernaut from tracking your browsing activity around the web. It can automatically block any of Facebook’s trackers when outside of Facebook t…


Joel Cornell
Mar 18th, 2020

How to Enable DNS Over HTTPS in Microsoft Edge

How to Enable DNS Over HTTPS in Microsoft Edge

Microsoft will one day enable DNS over HTTPS (DoH) for all Windows applications, but you can enable it in the new version of Microsoft Edge today with a hidden flag. DoH will improve your security and privacy online, but it …


Joel Cornell
Mar 5th, 2020

How to Enable DNS Over HTTPS in Google Chrome

How to Enable DNS Over HTTPS in Google Chrome

Google Chrome supports DNS over HTTPS (DoH) for increased privacy and security. It’s still disabled by default as of Google Chrome 80, but you can enable it using a hidden flag.


Joel Cornell
Mar 3rd, 2020

How to Delete Your Facebook Account

How to Delete Your Facebook Account

Facebook has long been known to take, store, and sell your data and continuously make you re-evaluate how the social network handles your privacy. Whether you want to take a small break or delete your Facebook account comple…


Brady Gavin
Feb 11th, 2020


How to Delete Your Personal Information From People-Finder Sites

How to Delete Your Personal Information From People-Finder Sites


There was a time on the internet when no one would know if you were a dog, but those days are long gone. It’s now incredibly easy to find deeply personal information about someone online thanks to data brokers, more commonl…


Dave Johnson
Feb 11th, 2020


  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 96
  • Next »

How to See Which Companies Are Uploading Data About You to Facebook

How to See Which Companies Are Uploading Data About You to Facebook

It’s no surprise that Facebook stores an immense amount of data about you. Some of that information comes directly from other companies you interact with online. Here’s how to see which companies upload your off-Facebook acti…


Brady Gavin
Feb 4th, 2020


It’s 2020. Is Using Public Wi-Fi Still Dangerous?

It’s 2020. Is Using Public Wi-Fi Still Dangerous?


You’ve probably heard that public Wi-Fi is dangerous. Advice about avoiding it is almost as widespread as public Wi-Fi itself. Some of this advice is outdated, and public Wi-Fi is safer than it used to be. But there are stil…


Chris Hoffman
Feb 4th, 2020



Is Your Antivirus Really Spying on You?

Is Your Antivirus Really Spying on You?


Avast is collecting its users’ browsing histories and selling the data to third parties, according to a joint investigation by PCMag and Motherboard. This is just the latest example of free antivirus software harvesting data….


Chris Hoffman
Jan 29th, 2020



Do You Need Anti-Ransomware Software for Your PC?

Do You Need Anti-Ransomware Software for Your PC?


Unlike other types of malware, you can’t just clean up ransomware and go on with your day. A run-of-the-mill virus won’t destroy all your data and backups. That’s why ransomware is a hazard you need to prepare for in advanc…


Dave Johnson
Jan 27th, 2020



What Is Smishing, and How Do You Protect Yourself?

What Is Smishing, and How Do You Protect Yourself?


You’re probably familiar with email-based phishing, where a scammer emails you and tries to extract sensitive information like your credit card details or social security number. “Smishing” is SMS-based phishing—scam text m…


Chris Hoffman
Jan 24th, 2020


How to Enable the Secure Folder on Samsung Phones

How to Enable the Secure Folder on Samsung Phones

The Secure Folder is a useful feature on Samsung devices that allows you to keep apps and files out of sight. Here’s how to enable it and use it.


Vann Vicente
Jan 13th, 2020

How to Enable Two-Factor Authentication and Secure Your Ring Account

How to Enable Two-Factor Authentication and Secure Your Ring Account

Following reports of bad actors gaining access to people’s Ring doorbell and security cameras, you might be interested in beefing up your account’s defenses. The easiest way to do this is to change your password and set up tw…


Justin Duino
Dec 20th, 2019

How to Set a Password Expiration Date in Windows 10

How to Set a Password Expiration Date in Windows 10

To maintain your cybersecurity, it’s a good idea to change your computer’s password every once in a while. Windows 10 makes this easier because you can set a password expiration date.


Ben Stockton
Dec 20th, 2019


Beware These 7 Facebook Scams

Beware These 7 Facebook Scams


Unlike the email spam of the late 90s and early 2000s, Facebook’s scams can be harder to spot. They hide in plain sight and recycle old tactics while preying on some of the most trusting members of society….


Tim Brookes
Dec 18th, 2019



How a Password Manager Protects You From Phishing Scams

How a Password Manager Protects You From Phishing Scams


Password managers make it easy to use strong, unique passwords everywhere. That’s one significant benefit to using them, but there’s another: Your password manager helps protect you from imposter websites trying to “phish” yo…


Chris Hoffman
Dec 17th, 2019



Can My iPhone or iPad Get a Virus?

Can My iPhone or iPad Get a Virus?


Your iPhone isn’t as susceptible to viruses as a PC or Mac, but iOS malware does exist. Here’s what protects your iPhone from viruses, and how you can avoid other types of malware and threats on your iPhone or iPad….


Tim Brookes
Dec 6th, 2019



What Is a Wangiri or “One Ring” Phone Scam?

What Is a Wangiri or “One Ring” Phone Scam?


All day, strange foreign numbers have called your phone. They’re from a country you’ve never visited. Each time the digits change slightly, making it impossible to block them. They ring for just a few seconds before hangi…


Matthew Hughes
Dec 5th, 2019


How to Log All Devices Out of Your Slack Account

How to Log All Devices Out of Your Slack Account

If you’re worried someone has access to your Slack account, or you want to make sure old devices are no longer logged in, you can log every device out of your account at once. Here’s how to make that happen….


Rob Woodgate
Dec 4th, 2019

How to Turn on Two-Factor Authentication for LinkedIn

How to Turn on Two-Factor Authentication for LinkedIn

Two-factor authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and LinkedIn is no exception. Here’s how to enable it and make yourself safer….


Rob Woodgate
Dec 2nd, 2019

How to Log All Devices Out of Your Twitter Account

How to Log All Devices Out of Your Twitter Account

If you’re worried someone has access to your Twitter account, or you want to make sure old devices are no longer logged in, you can log every device out of your account at once. Here’s how to make that happen….


Rob Woodgate
Nov 29th, 2019


How to Stop Your Disney+ Account From Getting Hacked

How to Stop Your Disney+ Account From Getting Hacked


Thousands of Disney+ accounts have been “hacked” and are for sale online. Criminals are selling login details for compromised accounts from between $3 and $11. Here’s how it likely happened—and how you can protect your Disn…


Chris Hoffman
Nov 22nd, 2019



How to Use OneDrive’s “Personal Vault” to Secure Your Files

How to Use OneDrive’s “Personal Vault” to Secure Your Files


Microsoft’s OneDrive cloud storage service now includes a “Personal Vault” for your sensitive files. These files are encrypted and protected with additional two-factor verification, even when they’re synced to your Windows 10…


Chris Hoffman
Nov 21st, 2019



How DNS Over HTTPS (DoH) Will Boost Privacy Online

How DNS Over HTTPS (DoH) Will Boost Privacy Online


Companies like Microsoft, Google, and Mozilla are pushing forward with DNS over HTTPS (DoH). This technology will encrypt DNS lookups, improving online privacy and security. But it’s controversial: Comcast is lobbying against…


Chris Hoffman
Nov 20th, 2019



10 Easy Steps to Better iPhone and iPad Security

10 Easy Steps to Better iPhone and iPad Security


There’s a good chance you spend more time interacting with the online world on your smartphone than any other device. Let’s take a look at how you can up your iPhone and iPad security game.


Tim Brookes
Nov 19th, 2019



How Can My ISP Tell I’m Using BitTorrent?

How Can My ISP Tell I’m Using BitTorrent?


Many people have reported getting notices from their internet service providers after downloading files using torrents. How does your ISP know? It’s all in how BitTorrent works. BitTorrent is a lot less anonymous than it migh…


Vann Vicente
Nov 18th, 2019



Why You Shouldn’t Use Your Web Browser’s Password Manager

Why You Shouldn’t Use Your Web Browser’s Password Manager


We recommend using a password manager like 1Password, LastPass, or Bitwarden. But modern web browsers have built-in password managers, so why install a different one? There are many good reasons to avoid your web browser’s bu…


Chris Hoffman
Nov 15th, 2019


How to Import LinkedIn Contacts While Keeping Your Email Private

How to Import LinkedIn Contacts While Keeping Your Email Private

When you use LinkedIn, it’s all about who you know. However, to import contacts, you normally have to permit the service to access your email and give up some privacy. Here’s how to export your contacts as a CSV file and th…


Brady Gavin
Nov 5th, 2019


Why You Can’t Block BitTorrent on Your Router

Why You Can’t Block BitTorrent on Your Router


Can you block or slow BitTorrent traffic on your router? It’s a question we’ve gotten many times. Someone else using BitTorrent on your network can slow down your connection and even open you to lawsuits. Unfortunately, there…


Chris Hoffman
Nov 5th, 2019


How to Disable Face Unlock on the Google Pixel 4 and Pixel 4 XL

How to Disable Face Unlock on the Google Pixel 4 and Pixel 4 XL

Face Unlock is one of the Google Pixel 4 and Pixel 4 XL’s flagship features. But if the facial recognition is a form of biometric security you’re uncomfortable with, you can delete your face data right off the phone. Here’s h…


Justin Duino
Nov 4th, 2019


The Best Way to Tackle the LastPass Security Challenge

The Best Way to Tackle the LastPass Security Challenge


If you use LastPass, you should take the Security Challenge. It will scan your vault for compromised, weak, reused, and old passwords and recommend passwords you should change. LastPass will give you a numerical security scor…


Chris Hoffman
Nov 4th, 2019


  • « Previous
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 96
  • Next »


How to Install a Video Doorbell

How to Install a Video Doorbell


A video doorbell is the best smarthome gadgets you can own. But, if you’ve never installed any doorbell before, the actual installation can feel a little daunting. It’s a pretty easy installation process—we’ll walk you thro…


Josh Hendrickson
Nov 3rd, 2019


How to Prevent Face Unlock from Bypassing the Lock Screen on the Google Pixel 4

How to Prevent Face Unlock from Bypassing the Lock Screen on the Google Pixel 4

Google’s Face Unlock feature on the Pixel 4 and Pixel 4 XL automatically bypasses the lock screen once it authenticates your identity. Unfortunately, this means you can’t check notifications prior to entering the phone. Here’…


Justin Duino
Nov 1st, 2019

How to Set Up Face Unlock on the Google Pixel 4 and Pixel 4 XL

How to Set Up Face Unlock on the Google Pixel 4 and Pixel 4 XL

Google ditched the fingerprint sensor and instead went with facial recognition on the Pixel 4 and Pixel 4 XL. If you didn’t enable Face Unlock during the phone’s setup process, here’s how to configure it from the Settings men…


Justin Duino
Oct 31st, 2019

How to Disable and Delete Your Siri History on iPhone & iPad

How to Disable and Delete Your Siri History on iPhone & iPad

Apple’s new iOS 13.2 upgrade for iPhones and iPads offers improved privacy controls for Siri. You can now choose whether you want humans listening to snippets of your Siri interactions. You can delete any existing recordings …


Chris Hoffman
Oct 30th, 2019


How Safe Are Public Charging Stations?

How Safe Are Public Charging Stations?


These days, airports, fast-food restaurants, and even buses have USB charging stations. But are these public ports safe? If you use one, could your phone or tablet be hacked? We checked it out!


Matthew Hughes
Oct 28th, 2019


How to Remove Your PIN and Other Sign-In Options from Windows 10

How to Remove Your PIN and Other Sign-In Options from Windows 10

Windows 10 boasts a suite of security features to keep your PC safe. But what if you need to remove a password or security key? This guide shows how to remove your PIN and other sign-in options from Windows 10….


Kevin Parrish
Oct 23rd, 2019


How Safe Are Password Managers?

How Safe Are Password Managers?


A password manager stores all your passwords and automatically fills them in your web browser and mobile apps. But is trusting an app with your passwords and storing them all in one place a smart idea?…


Chris Hoffman
Oct 23rd, 2019



What Is “Military-Grade Encryption”?

What Is “Military-Grade Encryption”?


Many companies tout “military-grade encryption” to protect your data. If it’s good enough for the military, it must be the best—right? Well, kind of. “Military-grade encryption” is more of a marketing term that doesn’t have…


Chris Hoffman
Oct 22nd, 2019


How macOS Catalina’s New Security Features Work

How macOS Catalina’s New Security Features Work

macOS Catalina introduces new security controls. For example, apps are now required to ask your permission before accessing parts of the drive where documents and personal files are kept. Let’s take a look at what’s new for s…


Tim Brookes
Oct 21st, 2019

How to Enable or Disable Secure Sign-In for Windows 10

How to Enable or Disable Secure Sign-In for Windows 10

Windows is the most targeted operating system on the planet. That means you should fortify your PC’s defenses to stay safe both online and offline. This guide shows you how to enable or disable Secure Sign-In for Windows 10….


Kevin Parrish
Oct 15th, 2019


The Best Ways to Secure Your SSH Server

The Best Ways to Secure Your SSH Server


Secure your Linux system’s SSH connection to protect your system and data. System administrators and home users alike need to harden and secure internet-facing computers, but SSH can be complicated. Here are ten easy quick-wi…


Dave McKay
Oct 15th, 2019



Is Your Old Router Still Getting Security Updates?

Is Your Old Router Still Getting Security Updates?


Security researchers from Fortinet recently discovered security holes in some D-Link routers. Many of these routers are still sold online, but D-Link no longer manufactures them and won’t patch them. So how do you tell if you…


Chris Hoffman
Oct 12th, 2019


How to Block Senders in Mail App on iPhone and iPad

How to Block Senders in Mail App on iPhone and iPad

Keep getting added to annoying email threads that spam filters just won’t catch? Use the new Block Sender feature in iOS 13 and iPadOS 13 to automatically archive new email from a particular sender in the Apple Mail app….


Khamosh Pathak
Oct 8th, 2019

Does Your Computer Have a Virus? Here’s How to Check

Does Your Computer Have a Virus? Here’s How to Check

Windows computers sometimes do get viruses and other malware, but not every slow or misbehaving PC is infected by malware. Here’s how to check if you actually have a virus—and whether that suspicious process is dangerous or…


Chris Hoffman
Oct 7th, 2019

How to Turn on Two-Factor Authentication for Twitter

How to Turn on Two-Factor Authentication for Twitter

Two-Factor Authentication (2FA) is a great security tool as it makes it harder for attackers to break into your account. Most apps make it pretty easy to turn on 2FA, and Twitter is no exception. Here’s how to enable it….


Rob Woodgate
Oct 4th, 2019

How to Automatically Delete Your YouTube History

How to Automatically Delete Your YouTube History

Google now offers a tool that automatically deletes your search and activity history from YouTube. By default, your data is stored forever, but it can be wiped from Google’s servers every 3 or 18 months….


Justin Duino
Oct 4th, 2019


What Is “Mixed Content,” and Why Is Chrome Blocking It?

What Is “Mixed Content,” and Why Is Chrome Blocking It?


Google Chrome already blocks some types of “mixed content” on the web. Now, Google announced it’s getting even more serious: Starting in early 2020, Chrome will block all mixed content by default, breaking some existing web p…


Chris Hoffman
Oct 4th, 2019



Just Updated to iOS 13? Change These Eight Settings Now

Just Updated to iOS 13? Change These Eight Settings Now


Did you know you can now reject all unknown calls on your iPhone to block telemarketing and scam phone calls? This is just one of the useful new settings Apple included in September’s iOS 13 update for iPhones and iPads….


Tim Brookes
Oct 3rd, 2019


Google Announces Maps Incognito Mode and More Privacy Controls

Google Announces Maps Incognito Mode and More Privacy Controls

Today, Google is announcing a plethora of new privacy and security features: Incognito Mode for Google Maps, auto-deletion of your YouTube history, voice privacy controls in Google Assistant, and Password Checkup built into G…


Chris Hoffman
Oct 2nd, 2019

Why You Should Sign In With Google, Facebook, or Apple

Why You Should Sign In With Google, Facebook, or Apple

Are you still creating user accounts everywhere? Maybe you should stop and sign in with your Google, Facebook, or Apple account instead. It might just be more secure—and it’s definitely more secure if you’re not currently u…


Chris Hoffman
Sep 30th, 2019

How HTTP/3 and QUIC Will Speed Up Your Web Browsing

How HTTP/3 and QUIC Will Speed Up Your Web Browsing

HTTP/3 is becoming more widespread. Cloudflare is now supporting HTTP/3, which is already part of Chrome Canary and will be added to Firefox Nightly soon. This new standard will make your web browsing faster and more secure….


Chris Hoffman
Sep 27th, 2019

How to Make iPhone Apps Always Ask for Location Access

How to Make iPhone Apps Always Ask for Location Access

It’s time to take another look at your iPhone location permissions. Now, you don’t have to give apps permanent access to your location: You can grant access only once and require consent every time an app wants your location….


Chris Hoffman
Sep 26th, 2019


Do You Need an Antivirus on a Mac?

Do You Need an Antivirus on a Mac?


No software is immune to attack, including macOS. The rising popularity of Apple computers has made them a prime target for malware. And security companies are increasingly offering antivirus for Macs, but do you really need …


Tim Brookes
Sep 26th, 2019



How to Protect Your Identity Online

How to Protect Your Identity Online


When Sandra Bullock starred in The Net in 1995, identity theft seemed new and unbelievable. But the world has changed. Starting in 2017, nearly 17 million Americans are victims of identity fraud every year….


Dave Johnson
Sep 25th, 2019


How to Report Suspicious Android Apps

How to Report Suspicious Android Apps

All it takes is one suspicious or malicious Android app installed on your device for it to put your data and security at risk. If you’ve found a suspicious app and you want to report it to Google, here’s how to do it….


Ben Stockton
Sep 23rd, 2019

  • « Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 96
  • Next »

Protect Your Home Minecraft Server From DDOS Attacks with AWS

Protect Your Home Minecraft Server From DDOS Attacks with AWS

Want to run a Minecraft server from home without revealing your IP address? You can! Just set up a free proxy with Amazon Web Services to protect your server from denial-of-service attacks. We’ll show you how….


Anthony Heddings
Sep 23rd, 2019


How to Remove Activation Lock on an iPhone

How to Remove Activation Lock on an iPhone


The Activation Lock makes iPhones less attractive to thieves. When you set up an iPhone, it’s associated with your iCloud ID. Even if someone steals it, they can’t set it up and use it unless you remove the Activation Lock….


Tim Brookes
Sep 23rd, 2019



How to Set Up a Smarthome Without the Cloud

How to Set Up a Smarthome Without the Cloud


The easiest smarthome tech uses the cloud to do the heavy lifting. But that means you give up your privacy. And if the company shuts down, so does your smarthome. Here’s how to bypass the cloud in your smarthome setup….


Josh Hendrickson
Sep 22nd, 2019



Could Your Bluetooth Devices Be Hacked in 2019?

Could Your Bluetooth Devices Be Hacked in 2019?


fizkes/ShutterstockBluetooth is everywhere, and so are its security flaws. But how great is the risk? How concerned should you be about Bluejacking, Bluesnarfing, or Bluebugging? Here’s what you need to know to protect your d…


Dave Johnson
Sep 12th, 2019


What Should You Do If You Receive a Phishing Email?

What Should You Do If You Receive a Phishing Email?

If you receive a phishing email, it can be a bit scary. Fortunately, nothing infects your computer if you don’t click any links or respond. Here’s what to do (and what not to do) if you receive a phishing email….


Rob Woodgate
Sep 4th, 2019

How to Stream UFC 242 Khabib vs. Poirier Live Online

How to Stream UFC 242 Khabib vs. Poirier Live Online

For the first time, UFC plays out in the United Arab Emirates on Saturday, September 7. In this highly anticipated lightweight title unification bout, champion Khabib Nurmagomedov takes on interim champion Dustin Poirier. H…


Walter Glenn
Sep 1st, 2019

How to Let a Contact Bypass iOS’ Do Not Disturb Mode

How to Let a Contact Bypass iOS’ Do Not Disturb Mode

The iPhone’s Do Not Disturb feature is a great way to make sure your handset doesn’t disturb you when you’re sleeping or busy. But if you want a certain contact to still be able to get ahold of you, you can whitelist them. He…


Khamosh Pathak
Aug 27th, 2019

How to Unblock “Potentially Sensitive Content” on Twitter

How to Unblock “Potentially Sensitive Content” on Twitter

Twitter blocks some tweets with a “potentially sensitive content” warning. You can disable this warning—even on an iPhone or iPad, where the option isn’t normally available. You can also disable sensitive content warnings o…


Chris Hoffman
Aug 22nd, 2019


Want to Survive Ransomware? Here’s How to Protect Your PC

Want to Survive Ransomware? Here’s How to Protect Your PC


Ransomware is everything bad about humanity distilled into malware—maliciousness, greed, and casual incompetence. It encrypts your files and demands payment for a key that might not even work. But with the right backup stra…


Dave Johnson
Aug 22nd, 2019


How to Stream UFC 241 Cormier vs. Miocic Live Online

How to Stream UFC 241 Cormier vs. Miocic Live Online

It’s been just over a year since Daniel Cormier won the UFC heavyweight championship with a KO punch to Stipe Miocic. Saturday, August 16, Cormier is set to defend that title against Stipe. Here’s how to watch….


Walter Glenn
Aug 17th, 2019

How iOS 13’s “Silence Unknown Callers” Will Stop Phone Spam

How iOS 13’s “Silence Unknown Callers” Will Stop Phone Spam

iOS 13 has a new feature that might just save you from all spam and robocalls. The new Silence Unknown Callers feature will mute all calls coming from a number that’s not in your contact list.


Khamosh Pathak
Aug 13th, 2019

What to Do Before (and After) Your Phone Is Stolen

What to Do Before (and After) Your Phone Is Stolen

Millions of phones are stolen every year, and there’s a chance yours could be one of them. But it doesn’t have to be—you can make your phone theftproof! We’ll show you how, and what you should do if your phone is stolen….


Andrew Heinzman
Aug 12th, 2019


The Tech Industry Wants to Kill the Password. Or Does It?

The Tech Industry Wants to Kill the Password. Or Does It?


Some people can’t stop talking about the death of the password. Passwords are old, insecure, and easily leaked. Soon, we’ll all be using biometrics, hardware security keys, and other futuristic solutions—right? Well, not so…


Chris Hoffman
Aug 12th, 2019



How to Stop Companies From Listening to Your Voice Assistant Recordings

How to Stop Companies From Listening to Your Voice Assistant Recordings


It’s been in the news for weeks: Employees and contractors at Amazon, Google, Apple, and Microsoft are listening to recordings of you talking to voice assistants like Alexa, Google Assistant, Siri, Cortana. Here’s how to stop…


Chris Hoffman
Aug 9th, 2019


Opinion


Netflix’s Parental Controls Are Terrible

Netflix’s Parental Controls Are Terrible


Netflix has a parental control problem. You can create “Kids” profiles, but kids can easily escape them. You can set a PIN to block content, but Netflix still bombards kids with mature trailers. Netflix’s parental controls ne…


Josh Hendrickson
Aug 8th, 2019


Why Does Windows Defender Firewall Block Some App Features?

Why Does Windows Defender Firewall Block Some App Features?

Almost everyone who uses Windows has seen it. You launch an application or game, and Windows Firewall pops up and says it’s “blocked some features of this app.” What does this mean, and should you allow access?…


Chris Hoffman
Aug 6th, 2019

What’s the Worst Thing Someone Can Do With Your Unlocked iPhone?

What’s the Worst Thing Someone Can Do With Your Unlocked iPhone?

We use our phones for event tickets, reservations, insurance cards, and even driver’s licenses. But what happens when someone takes your unlocked iPhone out of view for a moment—what’s the risk? What’s the worst thing someo…


Chris Hoffman
Aug 5th, 2019

How to Protect Your Smarthome from Attack

How to Protect Your Smarthome from Attack

Every new device you introduce into your smarthome is another device that can be attacked. You can secure your smarthome with simple steps like locking down your router and taking proper care of the gadgets in your smarthome….


Josh Hendrickson
Aug 4th, 2019


Should You Pay Up If You Get Hit by Ransomware?

Should You Pay Up If You Get Hit by Ransomware?


It might be your worst nightmare. You turn on your PC only to discover it’s been hijacked by ransomware that won’t decrypt your files unless you pay up. Should you? What are the pros and cons of paying off cyber-criminals…


Dave Johnson
Aug 1st, 2019



Why Are Companies Still Storing Passwords In Plain Text?

Why Are Companies Still Storing Passwords In Plain Text?


Several companies have recently admitted to storing passwords in plain-text format. That’s like storing a password in Notepad and saving it as a .txt file. Passwords should be salted and hashed for security, so why isn’t tha…


Josh Hendrickson
Jul 31st, 2019


How to Stream UFC 240 Holloway vs. Edgar Live Onlne

How to Stream UFC 240 Holloway vs. Edgar Live Onlne

UFC is in Edmonton, Alberta this time around. On Saturday, July 27 at 10:00 PM Eastern Time (US), Max Holloway tries to defend his men’s featherweight championship against challenger Frankie Edgar. Here’s how to watch….


Walter Glenn
Jul 27th, 2019

How to Hide the Games You’re Playing on Steam

How to Hide the Games You’re Playing on Steam

Steam shares your gameplay activity by default. If you’re playing Hello Kitty: Island Adventure or Bad Rats, you might want to keep your gameplay a secret. Here’s how to hide your Steam activity from your friends….


Chris Hoffman
Jul 26th, 2019

Free Download: Remove PC Bloatware With Malwarebytes AdwCleaner

Free Download: Remove PC Bloatware With Malwarebytes AdwCleaner

AdwCleaner just got better. The latest version of the free Malwarebytes tool can now remove manufacturer-installed bloatware on Windows PCs. We already loved it for removing potentially unwanted programs (PUPs) like adware an…


Chris Hoffman
Jul 25th, 2019


How to Kick People Off Your Wi-Fi Network

How to Kick People Off Your Wi-Fi Network


Once you’ve given someone your Wi-FI password, they have unlimited access to your Wi-Fi, and they can join your network on all their devices. That’s how it usually works, anyway. Here’s how to boot them off….


Chris Hoffman
Jul 19th, 2019



Can Pacemakers (and Other Medical Devices) Really Be Hacked?

Can Pacemakers (and Other Medical Devices) Really Be Hacked?


From pacemakers to smartwatches, we’re increasingly becoming a cybernetic species. That’s why recent headlines about vulnerabilities in implanted medical devices might set off alarm bells. Can your grandfather’s pacemaker r…


Dave Johnson
Jul 18th, 2019


  • « Previous
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 96
  • Next »

How to Disable Twitter’s “News For You” Notifications

How to Disable Twitter’s “News For You” Notifications

Twitter typically notifies you about likes, retweets, or mentions. But sometimes it notifies you about “News for You,” inviting you to read the latest news on Twitter. Here’s how to turn off those news notifications on your i…


Chris Hoffman
Jul 16th, 2019

Fight Night: How to Stream Pacquiao vs. Thurman Online

Fight Night: How to Stream Pacquiao vs. Thurman Online

Manny Pacquiao returns to the ring Saturday, July 20 at 9:00 PM Eastern Time (US) to face off against undefeated Super WBA Welterweight Champion Keith Thurman in Las Vegas. Here’s how to watch.


Walter Glenn
Jul 15th, 2019

How to Stream UFC Fight Night 155 de Randamie vs. Ladd Online

How to Stream UFC Fight Night 155 de Randamie vs. Ladd Online

UFC comes to Sacramento, California tonight, July 13 as Germaine de Randamie faces off against Aspen Ladd. Here’s how to watch.


Walter Glenn
Jul 13th, 2019

How to Encrypt and Decrypt Files With GPG on Linux

How to Encrypt and Decrypt Files With GPG on Linux

Protect your privacy with the Linux gpg command. Use world-class encryption to keep your secrets safe. We’ll show you how to use gpg to work with keys, encrypt files, and decrypt them.


Dave McKay
Jul 12th, 2019

Windows 7’s July 2019 Security Patch Includes Telemetry

Windows 7’s July 2019 Security Patch Includes Telemetry

To the surprise of Windows watchers, the latest Windows 7 “security-only” update includes telemetry. The telemetry in question is Microsoft’s “Compatibility Appraiser,” which checks PCs for problems that could prevent upgradi…


Chris Hoffman
Jul 11th, 2019

Why Am I Getting Spam From My Own Email Address?

Why Am I Getting Spam From My Own Email Address?

Have you ever opened an email only to find it’s spam or blackmail that seemed to come from your own email address? You’re not alone. Faking email addresses is called spoofing and, unfortunately, there’s little you can do abou…


Josh Hendrickson
Jul 11th, 2019


How to Check and Tighten All Your iPhone’s Privacy Settings

How to Check and Tighten All Your iPhone’s Privacy Settings


Apps on your iPhone have to ask permission before accessing your data, but have you ever agreed to a permission request only to reconsider it later? Take back control of your data by reviewing your privacy settings….


Tim Brookes
Jul 9th, 2019


How to Use Google Chrome to Generate Secure Passwords

How to Use Google Chrome to Generate Secure Passwords

Google Chrome offers to save passwords for all your online accounts. It then stores and syncs them to your Google account as part of the Smart Lock feature. Chrome also has a built-in password generator that automatically cre…


Brady Gavin
Jul 8th, 2019

What to Do Before Selling, Giving Away, or Trading Your iPhone

What to Do Before Selling, Giving Away, or Trading Your iPhone

A factory reset of your iPhone erases all of your content and settings, reverting it to a like-new state. However, there are a few extra steps you should take if you plan to get rid of your iPhone.


Adam Doud
Jul 8th, 2019

How to Turn on Two-Factor Authentication For Your Amazon Account

How to Turn on Two-Factor Authentication For Your Amazon Account

Two-Factor Authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and Amazon is no exception. Here’s how to enable it and make yourself safer….


Rob Woodgate
Jul 5th, 2019

How to See the Applications Using Your Network on Windows 10

How to See the Applications Using Your Network on Windows 10

Windows can show you which applications are using your network right now and how much data they’re transferring. You can even see a list of apps that have used your network over the last 30 days.


Chris Hoffman
Jul 5th, 2019


How to See All Devices on Your Network With nmap on Linux

How to See All Devices on Your Network With nmap on Linux


Think you know what’s connected to your home network? You might be surprised. Learn how to check using nmap on Linux, which will let you explore all the devices connected to your network.


Dave McKay
Jul 5th, 2019


How to Stop Superhuman (and Other Apps) From Tracking Your Email Opens

How to Stop Superhuman (and Other Apps) From Tracking Your Email Opens

Superhuman’s email tracking informed someone when you opened their email—and from where. Even if Superhuman completely removed this feature in response to privacy pressure, other apps will still be able to track your email …


Chris Hoffman
Jul 4th, 2019

How to Stream UFC 239 Jon Jones vs. Santos Online

How to Stream UFC 239 Jon Jones vs. Santos Online

UFC returns to Las Vegas tonight, July 6 as Jon Jones, the light heavyweight champion, faces off against Thiago Santos. Here’s how to watch.


Walter Glenn
Jul 1st, 2019

How to Stream Wimbledon 2019 Online (Without Cable)

How to Stream Wimbledon 2019 Online (Without Cable)

Wimbledon 2019 starts Monday, July 1 and runs through July 14th. If you want to watch without cable, you’ve got options—depending on where you live. Here’s how to watch.


Walter Glenn
Jul 1st, 2019

How to See All Your Saved Wi-Fi Passwords on Windows 10

How to See All Your Saved Wi-Fi Passwords on Windows 10

Windows remembers every Wi-Fi password you’ve ever used. That’s how it reconnects to those networks. Here’s how you can view the saved password of any network you’ve ever connected to on your Windows PC….


Chris Hoffman
Jun 28th, 2019


How iOS 13 Will Unlock NFC’s Potential

How iOS 13 Will Unlock NFC’s Potential


NFC has long been held back by Apple not supporting it—only Android did. Now that both major smartphone platforms will soon support NFC, the technology can reach its full potential. From keyless locks to digital IDs, the fu…


Josh Hendrickson
Jun 26th, 2019


How to Speed Up Face ID on Your iPhone

How to Speed Up Face ID on Your iPhone

Apple announced Face ID alongside the iPhone X and touted its strong security improvements over Touch ID. But with the security dialed all the way up Face ID can be slow. Here’s how to make it work a little quicker….


Oliver Haslam
Jun 25th, 2019

How to Disable Form Autofill in Google Chrome

How to Disable Form Autofill in Google Chrome

When you fill out a form, Chrome asks if you want to save the information to speed things up the next time. If you neither use this feature nor like Google storing your information, it’s easy to turn off….


Brady Gavin
Jun 21st, 2019

How to Turn on Two-Factor Authentication in Slack

How to Turn on Two-Factor Authentication in Slack

Two-Factor Authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and Slack is no exception. Here’s how to enable it and make yourself safer….


Rob Woodgate
Jun 20th, 2019

How to Report Phishing and Malicious Websites in Google Chrome

How to Report Phishing and Malicious Websites in Google Chrome

Google now makes it much easier to report “suspicious websites” in Chrome. Websites you might want to report include phishing websites, sites hosting malware, and similar bad things. Google will use these reports to block web…


Chris Hoffman
Jun 18th, 2019

How to Update Your Mac and Keep Apps Up to Date

How to Update Your Mac and Keep Apps Up to Date

Keeping your Mac up-to-date may seem like a chore, but it’s an essential part of protecting yourself online. Apple and app developers patch security holes when they’re found—and they add helpful new features to macOS and yo…


Tim Brookes
Jun 18th, 2019

Do You Really Need Antivirus For Your Smart TV?

Do You Really Need Antivirus For Your Smart TV?

Samsung says you should be running a virus scan on your Samsung smart TV “every few weeks.” The company added McAfee antivirus to its TVs recently. But do you really need to manually run an antivirus scan—on your TV?!…


Chris Hoffman
Jun 17th, 2019

How to See Which Apps Are Using Your Webcam on Windows 10

How to See Which Apps Are Using Your Webcam on Windows 10

Your webcam’s light is on, but which applications are watching you? Windows 10 now has an easy, built-in way to find out. You can also see which apps have previously used your webcam—and the precise time they last accessed …


Chris Hoffman
Jun 17th, 2019

Hardware Security Keys Keep Getting Recalled; Are They Safe?

Hardware Security Keys Keep Getting Recalled; Are They Safe?

We recommend hardware security keys like Yubico’s YubiKeys and Google’s Titan Security Key. But both manufacturers have recently recalled keys due to hardware flaws, and that sounds a little worrying. What’s the problem? Are …


Chris Hoffman
Jun 14th, 2019

  • « Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 96
  • Next »

How to Create and Install SSH Keys From the Linux Shell

How to Create and Install SSH Keys From the Linux Shell

Take cybersecurity seriously and use SSH keys to access remote logins. They’re a more secure way to connect than passwords. We show you how to generate, install, and use SSH keys in Linux.


Dave McKay
Jun 13th, 2019

How to Watch the 2019 U.S. Open Online (Without Cable)

How to Watch the 2019 U.S. Open Online (Without Cable)

The 2019 U.S. Open starts Thursday, June 13 and runs through Sunday, June 16. If you want to watch without cable, you’ve got options—depending on where you live. Here’s how to watch.


Walter Glenn
Jun 13th, 2019

How to Install and Use the Tor Browser on Linux

How to Install and Use the Tor Browser on Linux

Surf with anonymity using the Tor browser. Here’s how to install Tor on a Linux desktop. Ubuntu users beware: The Tor project recommends not installing Tor from Ubuntu’s regular software repositories.


Dave McKay
Jun 11th, 2019

How to See Which Apps Are Using Your Microphone on Windows 10

How to See Which Apps Are Using Your Microphone on Windows 10

Have you ever wondered which applications on your PC are listening to your microphone? A new feature in Windows 10’s May 2019 Update tells you, but it’s easy to miss. This feature works for both desktop apps and Store apps….


Chris Hoffman
Jun 11th, 2019

How to Enable Tamper Protection for Windows Security on Windows 10

How to Enable Tamper Protection for Windows Security on Windows 10

Windows 10’s May 2019 Update brings a new “tamper protection” feature to Windows Security, also known as the Windows Defender antivirus. Tamper Protection is off by default, and Windows Security says “your device may be vulne…


Chris Hoffman
Jun 10th, 2019

How to Stop People from Stealing Your Packages

How to Stop People from Stealing Your Packages

Is your home being targeted by porch pirates? Maybe it’s time to fight back. Luckily, you can protect your packages through a few simple steps, ranging from proper delivery instructions to in-home delivery options….


Andrew Heinzman
Jun 10th, 2019

How to Watch the 2019 FIFA Women’s World Cup Online (Without Cable)

How to Watch the 2019 FIFA Women’s World Cup Online (Without Cable)

The 2019 FIFA Women’s World Cup starts Friday, June 7 and runs through Sunday, July 7. If you want to watch the games without cable, you’ve got options—depending on where you live. Here’s how to watch….


Walter Glenn
Jun 7th, 2019

Why Windows 10 Says Your Wi-Fi Network “Isn’t Secure”

Why Windows 10 Says Your Wi-Fi Network “Isn’t Secure”

Windows 10 now warns you that a Wi-Fi network “isn’t secure” when it’s using “an older security standard that’s being phased out.” Windows 10 is warning you about WEP and TKIP. Here’s what that message means—and how to fix …


Josh Hendrickson
Jun 6th, 2019

How to Stream UFC 238 Cejudo vs. Moraes Online

How to Stream UFC 238 Cejudo vs. Moraes Online

UFC returns to Chicago tonight, June 8, for one of the most anticipated fights of the year as Henry Cejudo and Marlon Moraes vie for the vacant bantamweight title. Here’s how to watch.


Walter Glenn
Jun 1st, 2019

How to Delete Your Alexa Recordings by Voice

How to Delete Your Alexa Recordings by Voice

Amazon is rolling out new privacy features today for Alexa. In addition to an educational “privacy hub,” the company lets you delete your stored recordings by voice. But it’s off by default; you’ll need to flip a switch….


Josh Hendrickson
May 29th, 2019


What Are Internet Worms, and Why Are They So Dangerous?

What Are Internet Worms, and Why Are They So Dangerous?


We don’t hear much about internet worms anymore, but they’re still an important part of the malware ecosystem. But what are worms, how do they spread, and how are they used by hackers?


Andrew Heinzman
May 29th, 2019



How to Stop All the Voice Assistants from Storing Your Voice

How to Stop All the Voice Assistants from Storing Your Voice


Voice assistants, like Google Assistant and Alexa, record what you say after the wake word to send off to company servers. The companies keep your recordings until you delete them. Some companies let you turn that behavior of…


Josh Hendrickson
May 26th, 2019



Do iPhone “Security” Apps Actually Do Anything?

Do iPhone “Security” Apps Actually Do Anything?


Apple won’t allow “antivirus” apps in the App Store, but there are many “security” apps available. For example, Norton Mobile Security costs $14.99 per year, and Lookout Premium costs $29.99 per year. But do these apps actual…


Chris Hoffman
May 24th, 2019


What Is a Throwaway Reddit Account, and How Do I Create One?

What Is a Throwaway Reddit Account, and How Do I Create One?

On Reddit, every post and comment you leave is tied to your user account. That’s usually fine, but what if you want to post anonymously? That’s what a throwaway account is for.


Oliver Haslam
May 17th, 2019


Tired of Robocalls? Stop Answering Your Phone

Tired of Robocalls? Stop Answering Your Phone


The robocall problem keeps getting worse. Nearly half of all calls come from automated systems, and that number is increasing. Tired of answering your phone and talking to robots, scammers, or scammer robots? Just stop answer…


Andrew Heinzman
May 17th, 2019



Only New CPUs Can Truly Fix ZombieLoad and Spectre

Only New CPUs Can Truly Fix ZombieLoad and Spectre


Current CPUs have design flaws. Spectre exposed them, but attacks like Foreshadow and now ZombieLoad exploit similar weaknesses. These “speculative execution” flaws can only truly be fixed by buying a new CPU with built-in p…


Chris Hoffman
May 16th, 2019



How Your Echo’s “Alexa Guard” Can Protect Your Home

How Your Echo’s “Alexa Guard” Can Protect Your Home


Amazon just rolled out Alexa Guard to all Echo users. Your Echo can now listen for breaking glass, alert you to smoke alarms, and randomly turn your lights on and off. But it’s not a full security system….


Josh Hendrickson
May 15th, 2019



How to Stop Your Google Home From Recording All Your Conversations

How to Stop Your Google Home From Recording All Your Conversations


Google may be storing everything you say to your Google Home and keeping the recordings forever, just as Alexa does. Google recently changed the default behavior not to keep the recordings. But that change only affected new u…


Josh Hendrickson
May 12th, 2019


Is it Safe To Preview Your Email?

Is it Safe To Preview Your Email?

In the early 2000s, many security professionals advised disabling your email client’s preview function. Simply previewing an email could be dangerous! This is no longer good advice. With a modern email client, you can preview…


Rob Woodgate
May 10th, 2019

How to Browse as a Guest in Chrome and on a Chromebook

How to Browse as a Guest in Chrome and on a Chromebook

Guest mode for Google Chrome and on Chromebooks is perfect if you need to lend your computer to a friend without giving them complete access to all your personal information stored inside your browser. Here’s how to browse as…


Brady Gavin
May 2nd, 2019

How to Delete Synced Information in Chrome

How to Delete Synced Information in Chrome

When you sign in to Chrome using your Google Account, a whole bunch of your personal information gets saved and synced across all your devices, but what if you want to delete everything stored in the cloud? Here’s how to remo…


Brady Gavin
Apr 29th, 2019

How Email Bombing Uses Spam to Hide an Attack

How Email Bombing Uses Spam to Hide an Attack

If you suddenly start receiving an endless stream of junk email, perhaps asking for confirmation of a subscription, you’re the victim of email bombing. The perpetrator is probably trying to hide their real goal, so here’s wha…


Josh Hendrickson
Apr 29th, 2019

How to Choose What Information to Sync in Chrome

How to Choose What Information to Sync in Chrome

Google recently changed the way you view your synced data in Chrome, but you’re still able to save and sync bookmarks, passwords, themes, extensions, and more wherever you are, using your Google Account. Here’s how to choose …


Brady Gavin
Apr 26th, 2019

How to Stop LinkedIn From Telling Someone You Viewed Their Profile

How to Stop LinkedIn From Telling Someone You Viewed Their Profile

LinkedIn often tells people when you view their profiles and shows them your name. That person may even get an email or alert saying you viewed their profile. Here’s how to browse privately without LinkedIn sharing this infor…


Chris Hoffman
Apr 25th, 2019

How to Export or Delete Your Outlook.com Search History

How to Export or Delete Your Outlook.com Search History

If you use the online version of Outlook, you can delete your email search history (useful if you’ve got privacy concerns) or export it (useful for finding old searches or data analysis). Here’s how to do it….


Rob Woodgate
Apr 24th, 2019

  • « Previous
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 96
  • Next »

How to Configure the Windows Sandbox

How to Configure the Windows Sandbox

Windows 10’s new Sandbox feature lets you safely test programs and files downloaded from the internet by running them in a secure container. It’s easy to use, but its settings are buried in a text-based configuration file….


Josh Hendrickson
Apr 24th, 2019

How to Allow or Block Pop-ups in Chrome

How to Allow or Block Pop-ups in Chrome

Google Chrome does a great job at blocking pop-up windows out of the box, but sometimes it prevents them even if you’re expecting one from a trusted site. Here’s how you can take control and allow or block pop-ups in Chrome….


Brady Gavin
Apr 23rd, 2019


What is RAT Malware, and Why Is It So Dangerous?

What is RAT Malware, and Why Is It So Dangerous?


A Remote Access Trojan (RAT) is a type of malware that allows hackers to monitor and control your computer or network. But how does a RAT work, why do hackers use them, and how do you avoid them?


Andrew Heinzman
Apr 22nd, 2019


How to Detect Hidden Surveillance Cameras With Your Phone

How to Detect Hidden Surveillance Cameras With Your Phone

A family recently discovered a rude surprise at their Airbnb: a hidden camera disguised as a smoke detector in the living room. Here are two ways to check for cameras—in an Airbnb or elsewhere—using only an iPhone or Andr…


Josh Hendrickson
Apr 21st, 2019

Windows Updates Are Breaking PCs With These Antivirus Programs

Windows Updates Are Breaking PCs With These Antivirus Programs

On April 9, Microsoft issued a Windows patch that broke PCs with certain antivirus programs installed. This affects PCs running Windows 7, 8.1, Server 2008 R2, Server 2012, and Server 2012 R2—not Windows 10, this time….


Chris Hoffman
Apr 19th, 2019


How the UK’s New Internet “Porn Block” Will Work

How the UK’s New Internet “Porn Block” Will Work


On July 15, 2019, the UK government will enforce an age-verification requirement for online pornography websites. Websites that don’t comply with the UK’s rules will be blocked in the country. Here’s how this online censorshi…


Chris Hoffman
Apr 19th, 2019


How to Change a Site’s Camera and Microphone Permissions in Chrome

How to Change a Site’s Camera and Microphone Permissions in Chrome

Google Chrome lets you manage which individual sites can have access to your microphone and camera. If you don’t see any video or the mic isn’t picking up voice, you might need to change the permissions Chrome is giving to a …


Brady Gavin
Apr 17th, 2019


How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement

How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement


Google’s Sensorvault is a location history database that police can query to see phones near the location of a crime. Google is the only company with such a database—and innocent people have been arrested because of it….


Chris Hoffman
Apr 16th, 2019


How to See All of the Data Instagram Has on You

How to See All of the Data Instagram Has on You

Instagram is the place to share your photos, and just like most social networks, it keeps tabs on some weird and wonderful things. Have you ever wondered what kinds of things it tracks? Here’s how to see it all….


Oliver Haslam
Apr 15th, 2019


Alexa, Why Are Employees Looking at My Data?

Alexa, Why Are Employees Looking at My Data?


Everyone’s been talking about Bloomberg’s report that Amazon workers are listening to the voice recordings created when you speak to Alexa. But Amazon is far from alone. Here’s how tech companies can—and have—looked at th…


Chris Hoffman
Apr 15th, 2019


How to Create an Alias for Your iCloud Email Address

How to Create an Alias for Your iCloud Email Address

Using an iCloud email alias is a great way of disguising your real email address. You can use an alias when signing up for newsletters or websites, keeping your real address out of their database. We’re going to show you how….


Oliver Haslam
Apr 12th, 2019

How to Remove a Chrome Extension “Installed by Enterprise Policy” on Windows

How to Remove a Chrome Extension “Installed by Enterprise Policy” on Windows

Google Chrome extensions that say “Installed by Enterprise Policy” do not let you uninstall them because they install with elevated permissions. If you’re part of an Enterprise or business, your administrator installed these….


Brady Gavin
Apr 11th, 2019

How to Enforce Multi-Factor Authentication for All Users of Your Office 365 Subscription

How to Enforce Multi-Factor Authentication for All Users of Your Office 365 Subscription

Multi-Factor Authentication (MFA) is a great security tool, and we always recommend it. Office 365 admins can enforce MFA for users, which means you can help protect anyone sharing your Office 365 business subscription….


Rob Woodgate
Apr 9th, 2019

How to Make Chrome Stop Offering to Save Credit Card Data

How to Make Chrome Stop Offering to Save Credit Card Data

Google Chrome lets you save credit card information for a quick and breezy checkout when purchasing something online. But if you never use this autofill feature and want Chrome to stop offering to save your data, here’s how t…


Brady Gavin
Apr 4th, 2019


Update WinRAR Now to Protect Your PC From Attacks

Update WinRAR Now to Protect Your PC From Attacks


Do you have WinRAR installed on your Windows PC? Then you’re probably vulnerable to attack. RARLab patched a dangerous security bug at the end of February 2019, but WinRAR doesn’t automatically update itself. Most WinRAR inst…


Chris Hoffman
Mar 29th, 2019


How to See and Remove All The Data Websites Have Saved on Your iPhone or iPad

How to See and Remove All The Data Websites Have Saved on Your iPhone or iPad

Whenever you visit a website on an iPhone or iPad, snippets of data are saved to your device. Cookies and other cached data eventually start to take up significant space, so you may want to clean them out. Here’s how….


Oliver Haslam
Mar 25th, 2019

How to Stop Google Maps Review Requests on Android and iPhone

How to Stop Google Maps Review Requests on Android and iPhone

If you have Google Maps on your smartphone, you may receive notifications requesting a review for businesses you visit. Google usually asks “How was [Business Name]?” and expects a rating or review. Here’s how to turn those n…


Josh Hendrickson
Mar 19th, 2019


How to Safely Dispose of (or Sell) Smarthome Hardware

How to Safely Dispose of (or Sell) Smarthome Hardware


When you decide to get rid of your smarthome gadgets, you shouldn’t just toss them in the trash, sell them, or give them away. Before you take the products out of your house, you should wipe the data off them….


Josh Hendrickson
Mar 17th, 2019



How to Use a Security Camera’s Night Vision Through a Window

How to Use a Security Camera’s Night Vision Through a Window


Wi-Fi cameras rely on infrared (IR) for night vision. But IR bounces off glass—so, if you’re using your camera behind a window, you’ll only see a blurry reflection at night. Here’s how to get a clear image….


Josh Hendrickson
Mar 16th, 2019


What is maftask, and Why is it Running on my Mac?

What is maftask, and Why is it Running on my Mac?

Maftask is a helper process for Mac Auto Fixer, a very common adware program. It claims to clean up your Mac from viruses but will insert ads into your browser and run itself on startup.


Anthony Heddings
Mar 14th, 2019


Don’t Share Your Digital Games With Your Friend’s Xbox

Don’t Share Your Digital Games With Your Friend’s Xbox


You may have seen advice on how to share your Xbox One’s digital games with your friends. But Microsoft doesn’t intend for you to share your game library when you’re not there. Doing so puts you at risk….


Josh Hendrickson
Mar 14th, 2019


How to Manage Saved Passwords in Chrome

How to Manage Saved Passwords in Chrome

Google Chrome comes with a handy password manager already built in. You can have your browser save and fill out passwords for different sites when you’re asked to sign in. Here’s how to manage all your saved passwords in Chro…


Brady Gavin
Mar 12th, 2019

How to Turn an Old Android Phone into a Security Camera

How to Turn an Old Android Phone into a Security Camera

If you have an old phone lying around, you can easily put it to good use by turning it into a mobile security camera. With the help of an app by Edward Snowden, it’s super simple. Here’s how.


Tom Westrick
Mar 11th, 2019


How to Convert Your Existing Amazon Echo to Kid’s Edition

How to Convert Your Existing Amazon Echo to Kid’s Edition


Amazon offers a $70 Echo Dot Kid’s Edition with integrated parental controls. But you can convert any Amazon Echo into a “Kid’s Edition” model and get the same child-friendly features for your kids.


Josh Hendrickson
Mar 9th, 2019


How to Log Into Your Mac Automatically Without a Password

How to Log Into Your Mac Automatically Without a Password

Security is super important, but sometimes speed is of the essence. If you live and work in an environment where you are confident of your privacy, your Mac can automatically sign you in without a password. Here’s how….


Oliver Haslam
Mar 7th, 2019

  • « Previous
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 96
  • Next »

Wi-Fi Cams Do More Than Just Record Video

Wi-Fi Cams Do More Than Just Record Video

The main purpose of Wi-Fi cameras is to record video, but that’s not the only thing they can do. Modern Wi-Fi cams are sophisticated pieces of hardware and they can do a lot more than simply record video….


Craig Lloyd
Feb 27th, 2019

How to See Which Apps Are Tracking Your Location on iPhone

How to See Which Apps Are Tracking Your Location on iPhone

Apps on your iPhone can track your location, but you have to give them access first. Here’s how to check which apps can monitor your GPS location and revoke their access.


Oliver Haslam
Feb 27th, 2019

How to Block Trackers in Firefox (Without Installing Add-ons)

How to Block Trackers in Firefox (Without Installing Add-ons)

Websites track you online to show you targeted advertisements, and Firefox 65 is just the latest browser to help you opt out. You can now block tracking content online without the need for a third-party add-on….


Brady Gavin
Feb 19th, 2019

What is Google Advanced Protection and Who Should Use It?

What is Google Advanced Protection and Who Should Use It?

Maybe you’ve heard of Google’s “Advanced Protection” program. Maybe you haven’t. Either way, we’re going to talk about what it is, who should use it, and how to enable it. Let’s go.


Cameron Summerson
Feb 18th, 2019

Here We Go Again: 127 Million Accounts Stolen From 8 More Websites

Here We Go Again: 127 Million Accounts Stolen From 8 More Websites

Several days ago, a hacker put 617 million accounts from 16 different websites for sale on the dark web. Now, the same hacker is offering 127 million more records from another eight websites.


Chris Hoffman
Feb 15th, 2019


Are IR Scanners in Phones Bad for Your Eyes?

Are IR Scanners in Phones Bad for Your Eyes?


New Apple and Samsung phones use infrared light to verify your identity. It’s like a hands-free version of the fingerprint scanner. But can the infrared lights used for Face ID and Iris Scanner hurt your eyes?…


Andrew Heinzman
Feb 15th, 2019


Opinion
Do You Miss Touch ID? I Certainly Don’t

Do You Miss Touch ID? I Certainly Don’t

With the launch of the iPhone XS and XR last year, Apple has gone all-in on Face ID. And while there may be some users who miss the fingerprint sensor, I’m not one of them.


Craig Lloyd
Feb 14th, 2019

What is Doxxing, and Why Is It Bad?

What is Doxxing, and Why Is It Bad?

Doxxing is the collection and publishing of someone’s private information online, usually done with the intent of inciting harassment in real life. While not technically illegal, it’s considered harassment by most people, an…


Anthony Heddings
Feb 13th, 2019


Why Do Some Websites Block VPNs?

Why Do Some Websites Block VPNs?


One of the only ways to protect your right to privacy and information online is to use a VPN. Some websites infringe on those rights by blocking VPNs, but they do it for a good reason.


Andrew Heinzman
Feb 13th, 2019



Android’s Real Security Problem is the Manufacturers

Android’s Real Security Problem is the Manufacturers


If you’re running a Google Pixel handset, your phone is safe from a security hole that could let a PNG file completely wreck the system. If you’re using nearly any other Android handset, then your phone is vulnerable. Thi…


Cameron Summerson
Feb 11th, 2019


Are Apps Really Recording Your iPhone’s Screen?

Are Apps Really Recording Your iPhone’s Screen?

TechCrunch claims many iPhone apps “secretly record your screen.” Is that true? Well, yes, kind of—but their recording abilities are limited. Apple is now cracking down on these apps and requiring more transparency, too….


Chris Hoffman
Feb 8th, 2019

Update Now to Fix Group FaceTime on Your iPhone, iPad, and Mac

Update Now to Fix Group FaceTime on Your iPhone, iPad, and Mac

Apple just released iOS 12.1.4 and a macOS 10.14.3 patch. These updates fix the huge group FaceTime flaw that could let anyone call your iPhone, iPad, or Mac and hear audio or see video—even if you don’t accept the call….


Chris Hoffman
Feb 7th, 2019

RIP “Do Not Track,” the Privacy Standard Everyone Ignored

RIP “Do Not Track,” the Privacy Standard Everyone Ignored

As we pointed out back in 2012, the “Do Not Track” option doesn’t stop you from being tracked. It just sends a special piece of information whenever you connect to a website, asking that website not to track you. The vast, va…


Chris Hoffman
Feb 7th, 2019

Why It’s Dangerous to Share Your Birthday Online

Why It’s Dangerous to Share Your Birthday Online

A birthday isn’t something you might think of as being private information you should keep secret. Almost everyone celebrates them on social media, and quite a few people post them on their profile. That’s a horrible idea; he…


Anthony Heddings
Feb 4th, 2019

How to Lock Your Windows 10 PC Remotely

How to Lock Your Windows 10 PC Remotely

Android and Apple have long given people a way to track and disable your gadgets remotely. Microsoft has also joined the club by letting you track and lock your Windows PC using the “Find My Device” on Windows 10….


Brady Gavin
Jan 29th, 2019

How to Remove Your Windows Password

How to Remove Your Windows Password

Not everyone likes having to enter a password every time they need to sign in to their computer. Windows lets you get rid of the password without too much hassle. Here’s how.


Brady Gavin
Jan 28th, 2019

Facebook Fudges Your Password for Your Convenience

Facebook Fudges Your Password for Your Convenience

If you think the only correct version of your password is the exact capitalization and letter/symbol sequence you use, you may be in a shock. Facebook will accept slight variations of your password, for your convenience. And …


Josh Hendrickson
Jan 24th, 2019


Your Expensive Smart Appliance May Not Last A Decade

Your Expensive Smart Appliance May Not Last A Decade


When you buy a new appliance, you’re making an investment that should last a while, but that may not be true for smart appliances. Manufacturers aren’t obligated to keep your machine up to date, which could turn your investme…


Andrew Heinzman
Jan 23rd, 2019


How to Disable Remote Assistance in Windows 10

How to Disable Remote Assistance in Windows 10

Open up Control Panel by clicking the Start Menu, typing “Control Panel,” and then clicking the application’s icon.


Brady Gavin
Jan 22nd, 2019

How Phone Companies Are Finally Verifying Caller ID Numbers

How Phone Companies Are Finally Verifying Caller ID Numbers

Robocalls are a scourge, leaving many people unwilling or afraid to pick up their phone unless they know the caller. If you’re waiting for a job interview or support callback, this is incredibly stressful—but now phone ca…


Josh Hendrickson
Jan 22nd, 2019


Can Anyone Really Track My Phone’s Precise Location?

Can Anyone Really Track My Phone’s Precise Location?


It’s the year 2019, and everyone willingly carries a tracking device in their pockets. People can have their precise locations tracked in real time by the government, advertising companies, and even rogue bounty hunters. It s…


Chris Hoffman
Jan 18th, 2019


What are Office Intelligent Services and Should You Turn Them Off?

What are Office Intelligent Services and Should You Turn Them Off?

Microsoft’s core Office 365 client apps—Word, Excel, PowerPoint, and Outlook—all contain a setting that lets you enable “Office Intelligent Services.” So, what are these, why are they turned on, and should you turn them…


Rob Woodgate
Jan 17th, 2019


Don’t Downgrade From Windows 10 to Windows 8.1

Don’t Downgrade From Windows 10 to Windows 8.1


Windows 10 can sometimes be a real mess. Between botched updates, treating its users as beta testers, and adding features we never wanted it can be tempting to downgrade. But you shouldn’t go back to Windows 8.1, and we can t…


Josh Hendrickson
Jan 17th, 2019


How to Revoke Face ID Access For Apps

How to Revoke Face ID Access For Apps

Face ID is a great addition to iPhone and iPad, and it still feels like magic every time it works. But, just like Touch ID before it, you may need to prevent apps from using it. Here’s how to do that.


Oliver Haslam
Jan 9th, 2019

How to Remove Old Configuration Files from Your iPhone or iPad

How to Remove Old Configuration Files from Your iPhone or iPad

You might not know it, but there’s a chance your iPhone or iPad might have one or more old configuration profiles installed, and that could be a security risk. But don’t worry, we’re going to tell you how to clean them out….


Oliver Haslam
Jan 7th, 2019

  • « Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 96
  • Next »


[Updated] Google Drive Has a Serious Spam Problem, But Google Says a Fix is Coming

[Updated] Google Drive Has a Serious Spam Problem, But Google Says a Fix is Coming


Google Drive has a pretty bad spam problem, and it seems Google doesn’t care. Spammers can share files that automatically appear in your Drive, and there’s no way to stop it.


Cameron Summerson
Jan 4th, 2019


Things You Should Never Post Online but Probably Are

Things You Should Never Post Online but Probably Are

It’s easy to get excited about something and post it on social media for all your friends and family to see, and maybe even the rest of the world. But there are some things that you shouldn’t post online, even if it might see…


Craig Lloyd
Dec 24th, 2018


Why Your PC’s UEFI Firmware Needs Security Updates

Why Your PC’s UEFI Firmware Needs Security Updates


Microsoft just announced Project Mu, promising “firmware as a service” on supported hardware. Every PC manufacturer should take note. PCs need security updates to their UEFI firmware, and PC manufacturers have done a poor job…


Chris Hoffman
Dec 21st, 2018



How to Use Windows 10’s New Sandbox (to Safely Test Apps)

How to Use Windows 10’s New Sandbox (to Safely Test Apps)


Windows 10’s May 2019 Update (19H1) added a new a new Windows Sandbox feature. Here’s how you can use it on your Windows 10 PC today.


Josh Hendrickson
Dec 20th, 2018



Windows 10’s New Sandbox Feature is Everything We’ve Always Wanted

Windows 10’s New Sandbox Feature is Everything We’ve Always Wanted


Whether it’s a program you found on the Internet or something that came in your email, running executable files has always been risky. Testing software in clean systems requires virtual machine (VM) software and a separate W…


Josh Hendrickson
Dec 19th, 2018



Will Credit Monitoring Services Protect Me After a Data Breach?

Will Credit Monitoring Services Protect Me After a Data Breach?


After a major data breach, it’s hard to know whether your information has been compromised and how to protect yourself afterward. Businesses have cropped up that offer credit monitoring services—peace of mind for a price. …


Andrew Heinzman
Dec 18th, 2018


No, You Don’t Need to Disable Password Recovery Questions on Windows 10

No, You Don’t Need to Disable Password Recovery Questions on Windows 10

Recently a group of researchers described a scenario wherein password recovery questions were used to break into Windows 10 PCs. This has led to some suggesting disabling the feature. But you don’t need to do this if you’re a…


Josh Hendrickson
Dec 17th, 2018

What’s the Difference Between Accessibility and Full Disk Access App Permissions in Mojave?

What’s the Difference Between Accessibility and Full Disk Access App Permissions in Mojave?

MacOS recently started using an Android-like permissions system, where apps must ask to access certain resources like your location or contacts. Two of the most permissive options are “Accessibility,” which grants access to “…


Anthony Heddings
Dec 14th, 2018

No, You Don’t Need Antivirus on a Chromebook

No, You Don’t Need Antivirus on a Chromebook

Recently, Malwarebytes announced an antivirus for Chromebooks (through its Android app). But here’s the thing: that’s complete bullshit. You don’t need an antivirus on Chrome OS; I don’t care how they try to sell it….


Cameron Summerson
Dec 14th, 2018


Why Do So Many Apps Ask For Your Location, and Which Ones Really Need It?

Why Do So Many Apps Ask For Your Location, and Which Ones Really Need It?


When it comes to smartphone privacy concerns, location data is usually at the top of the list. The thing is, so many apps ask for your location now that we never really stop to think why they ask in the first place….


Craig Lloyd
Dec 14th, 2018


How to Install and Update Flash on Your Mac

How to Install and Update Flash on Your Mac

Adobe Flash is used for certain content on websites—usually video or web apps. While it’s slowly being phased out in favor of HTML5, occasionally a website still requires you to have the Flash player installed. It’s not i…


Anthony Heddings
Dec 10th, 2018

How to Look up Your Accounts and Passwords on an iPhone or iPad

How to Look up Your Accounts and Passwords on an iPhone or iPad

We all know that password security is important, and both iPhone and iPad can save your passwords for you. That means you can see them at a moment’s notice, which is super convenient. But how do you check up on the passwords …


Oliver Haslam
Dec 10th, 2018


The Best Sites for Sharing Videos (Publicly or Privately)

The Best Sites for Sharing Videos (Publicly or Privately)


There used to be a time when sharing a video online was a tough job. These days, the problem has morphed into having too many options. Whether you want to share a video with the world, or only show it to your friends and fami…


Yuvraj Wadhwani
Dec 6th, 2018


How to Block Phone and FaceTime calls on iPhone and iPad

How to Block Phone and FaceTime calls on iPhone and iPad

Whether it’s a telemarketer or someone you know who’s annoying you, sometimes the best thing to do is block them from calling or FaceTiming you. Here’s how to do that on your iPhone and iPad.


Oliver Haslam
Dec 5th, 2018

HTTPS Is Almost Everywhere. So Why Isn’t the Internet Secure Now?

HTTPS Is Almost Everywhere. So Why Isn’t the Internet Secure Now?

Most web traffic online is now sent over an HTTPS connection, making it “secure.” In fact, Google now warns that unencrypted HTTP sites are “Not Secure.” So why is there still so much malware, phishing, and other dangerous ac…


Chris Hoffman
Nov 30th, 2018


Why You Shouldn’t Trust Free VPNs

Why You Shouldn’t Trust Free VPNs


Free VPNs are too good to be true. You can download a variety of free VPN apps from Google Play or Apple’s App Store, but you shouldn’t. These apps aren’t worthy of your trust.


Chris Hoffman
Nov 28th, 2018


How to Change Your Password on a Chromebook

How to Change Your Password on a Chromebook

It’s good practice to change your password routinely. This is especially true for Chromebooks since you use your Google account to log in. Fortunately, changing your password on a Chromebook is pretty easy to do….


Tom Westrick
Nov 27th, 2018

How to Enable or Disable a Windows 10 User Account

How to Enable or Disable a Windows 10 User Account

Windows lets you have multiple local users accounts on the same device. This lets every user have their own file storage, personalized desktop, and custom settings.


Brady Gavin
Nov 26th, 2018

How to Turn an Echo Button into a Home Lockdown Button

How to Turn an Echo Button into a Home Lockdown Button

Echo Buttons are simple Bluetooth devices that connect to an Amazon Echo. Until now, they’ve been relegated to simple buzzer-like buttons for use in games. Recently Amazon added the ability to connect an Echo Button to a rou…


Josh Hendrickson
Nov 21st, 2018

How to Set an Expiration Date When Sharing Files on Google Drive

How to Set an Expiration Date When Sharing Files on Google Drive

Sharing a file from Google Drive is a great way to let clients and contractors access documents without having them to download them. If you only want people to have temporary access to files, you can set an automatic expira…


Brady Gavin
Nov 21st, 2018

What Wi-Fi Security Cameras Let You Record Locally?

What Wi-Fi Security Cameras Let You Record Locally?

Wi-Fi Cameras are easier to install and set up compared to Wired Cameras. But they often require subscriptions to get the most out of them, and that can include cloud storage. If you don’t want to pay for a subscription, you …


Josh Hendrickson
Nov 19th, 2018

How Do I Open a Port on Windows Firewall?

How Do I Open a Port on Windows Firewall?

Firewalls are there to protect you from threats on the internet (both traffic from the internet and from local applications trying to gain access when they shouldn’t). Sometimes, though, you’ll want to allow otherwise restric…


Brady Gavin
Nov 15th, 2018


What is a “Dark Web Scan” and Should You Use One?

What is a “Dark Web Scan” and Should You Use One?


Experian and many other companies are pushing “dark web scans.” They promise to search the dark web for your personal information to see if criminals are selling it. Don’t waste your money.


Chris Hoffman
Nov 8th, 2018


How to Set Up and Manage Apple Pay on Your Mac

How to Set Up and Manage Apple Pay on Your Mac

Apple Pay lets you store your payment info in a digital wallet, which you can use to pay for things like a regular debit card. It’s most useful at cash registers that support it, where you can pull out your phone instead of y…


Anthony Heddings
Nov 5th, 2018

How to Block a Website in Safari on iPhone and iPad

How to Block a Website in Safari on iPhone and iPad

If you’re an iPhone or iPad owner (especially one whose children use your device), you might occasionally want to block access to a specific website. Whether that website is one of adult nature or just something, you don’t w…


Oliver Haslam
Nov 2nd, 2018

  • « Previous
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 96
  • Next »

How to Make Notifications Actually Display on iPhone

How to Make Notifications Actually Display on iPhone

If your notifications on your iPhone aren’t displaying the full preview of the content on your lock screen, here’s how to change that.


Craig Lloyd
Oct 30th, 2018

How to Create an Apple ID on Your iPhone or iPad

How to Create an Apple ID on Your iPhone or iPad

When you’re using any of Apple’s computers, smartphones, or tablets, an Apple ID is integral to not only setting devices up in the first place but getting the best out of them as you use them, too. When you pay a premium to u…


Oliver Haslam
Oct 29th, 2018


How to Use LastPass for More Than Just Managing Passwords

How to Use LastPass for More Than Just Managing Passwords


LastPass is more than just a password manager. It’s an encrypted vault where you can store secure notes, secret bookmarks, and even entire files. It can also save your address and credit card numbers and fill those into onlin…


Chris Hoffman
Oct 26th, 2018



Cheap Windows 10 Keys: Do They Work?

Cheap Windows 10 Keys: Do They Work?


Microsoft charges $200 for a Windows 10 Professional product key. But, with a quick search online, you can find websites promising Windows 10 Pro keys for $12 or even less. That’s a huge savings—but don’t fall for it….


Chris Hoffman
Oct 24th, 2018



Your Smartphone Has a Special Security Chip. Here’s How It Works

Your Smartphone Has a Special Security Chip. Here’s How It Works


Google’s new Pixel 3 phones have a “Titan M” security chip. Apple has something similar with its “Secure Enclave” on iPhones. Samsung’s Galaxy phones and other Android phones often use ARM’s TrustZone technology. Here’s how …


Chris Hoffman
Oct 23rd, 2018


How to Add Another Face to Face ID on iPhone

How to Add Another Face to Face ID on iPhone

If you want to add a second person to your iPhone’s Face ID recognition, iOS 12 now lets you do just that. Here’s how.


Craig Lloyd
Oct 22nd, 2018

The Best Free Credit Score Apps

The Best Free Credit Score Apps

Your credit score determines the interest rate that lenders charge you for debt (and whether you can secure a loan at all). That means your credit score affects everything major you buy—your car, your house, and even your e…


Yuvraj Wadhwani
Oct 21st, 2018

How to Remove Cards and Passes from the Wallet App on iPhone

How to Remove Cards and Passes from the Wallet App on iPhone

You go to open the Wallet app on your iPhone so that you can delete a card or pass you’ve meant to get rid of, only the button to remove the card is nowhere to be found. Apple made this a bit tricky, but it’s easy once you fi…


Craig Lloyd
Oct 19th, 2018

Turns Out Putting a Facebook Camera in Your House Might Be a Privacy Issue

Turns Out Putting a Facebook Camera in Your House Might Be a Privacy Issue

Right after getting hacked a few weeks back, Facebook announced the Portal, a smart video calling device for your home that they said would respect your privacy. Turns out they didn’t really mean your privacy. Somebody’s pr…


Lowell Heddings
Oct 17th, 2018

How to Remove Old Boarding Passes From Apple Wallet

How to Remove Old Boarding Passes From Apple Wallet

Digital boarding passes are great at the airport, letting you skip the long lines at the check-in and go straight through security. But, once you’ve added a boarding pass to Apple Wallet, it’s there forever—until you remove…


Chris Hoffman
Oct 16th, 2018

How to Change Your Account Picture in Windows 10

How to Change Your Account Picture in Windows 10

Your account picture is what you see on the Windows sign-in screen and the Start menu.  Windows assigns new user accounts on Windows 10 a generic profile picture, but it’s easy to change that to any image you want. Here’s …


Brady Gavin
Oct 15th, 2018


HTG Explains: What is Port Scanning?

HTG Explains: What is Port Scanning?


A port scan is a bit like jiggling a bunch of doorknobs to see which doors are locked. The scanner learns which ports on a router or firewall are open, and can use this information to find a computer system’s potential weakne…


Chris Hoffman
Oct 14th, 2018


How to Change Your Default Card in Apple Pay on iPhone

How to Change Your Default Card in Apple Pay on iPhone

Apple Pay lets you add multiple credit or debit cards, and you can choose between them after double-clicking the home or side button to pay. Here’s how to change the default.


Chris Hoffman
Oct 12th, 2018

How to Take Photos in Public Places Respectfully

How to Take Photos in Public Places Respectfully

Photography is starting to cause a problem. Photographers—both of the DSLR and smartphone variety—are causing havoc at favorite photo locations and tourist sites. Museums and the like are introducing rules to curb bad beh…


Harry Guinness
Oct 11th, 2018


Don’t Upgrade to the Latest Operating Systems on Day One

Don’t Upgrade to the Latest Operating Systems on Day One


Gone are the days of using the same unchanging operating system for years. Windows 10 is getting a significant upgrade every six months, and those updates break things. Even Apple keeps messing up with iPhone updates….


Chris Hoffman
Oct 11th, 2018


How to Manage App Permissions on Windows 10

How to Manage App Permissions on Windows 10

Modern Windows 10 apps have permissions you can control, just like modern iPhone, iPad, and Android apps. You can control access to resources like your location, camera, microphone, and photos.


Chris Hoffman
Oct 10th, 2018


How to Autofill Your Credit Card Number (Securely)

How to Autofill Your Credit Card Number (Securely)


Online shopping is great, but typing in your credit card number on every new website can get annoying fast. Here’s how to skip the typing and check out sooner, whether you’re on your iPhone, Android phone, PC, Mac, or Chrome…


Chris Hoffman
Oct 9th, 2018



Facebook Announces a Camera for Your House. Didn’t They Just Get Hacked?

Facebook Announces a Camera for Your House. Didn’t They Just Get Hacked?


Today Facebook announced their new Portal smart video calling device, complete with Alexa built-in, to help reinvent video chatting… but with their privacy track record, is this something you want?


Lowell Heddings
Oct 8th, 2018



How People Can See When You Open Emails (and How to Stop Them)

How People Can See When You Open Emails (and How to Stop Them)


Practically every email message you receive from a company has a tracker in it. The sender gets a ping when you open the message. You can block this trick—or use it yourself to track your messages.


Chris Hoffman
Oct 5th, 2018


What to Do if You Lose a U2F Key

What to Do if You Lose a U2F Key

U2F is widely regarded as the best way to secure your important accounts since it relies on access to a physical key before the account will be unlocked. But what happens if you lose that key?


Cameron Summerson
Oct 3rd, 2018

What Is the “Presidential Alert” Popup on Your Phone Today?

What Is the “Presidential Alert” Popup on Your Phone Today?

Your cell phone will receive a national alert today, October 3, at around 2:18 pm ET. It’s only a test, so there’s nothing to worry about. Here’s what you need to know about these “presidential” alerts….


Walter Glenn
Oct 3rd, 2018

Now that Password Autofill is Part of iOS 12, There’s No Reason Not to Use a Password Manager

Now that Password Autofill is Part of iOS 12, There’s No Reason Not to Use a Password Manager

The biggest reason to use a password manager is security. Many people reuse the same handful of passwords across the web because they’re easy to remember—but this is also the worst way to handle account security. What if s…


Cameron Summerson
Oct 2nd, 2018


Touch ID and Face ID Don’t Make You More Secure

Touch ID and Face ID Don’t Make You More Secure


Touch ID and Face ID area great. We like them, and we use them. But they’re convenience features, not security features, and you have fewer legal protections when using them in the US. When necessary, you can temporarily disa…


Chris Hoffman
Oct 2nd, 2018



Can You Place Wi-Fi Cams In Front of Windows?

Can You Place Wi-Fi Cams In Front of Windows?


A simple, but great use for a Wi-Fi camera is to set it in front of a window to keep tabs on the outside of your house, but there are some things to be aware of when doing this.


Craig Lloyd
Oct 1st, 2018


Don’t Want the Windows October 2018 Update Yet? Here’s How to Pause It

Don’t Want the Windows October 2018 Update Yet? Here’s How to Pause It

Microsoft will likely release the October 2018 Update, codenamed Redstone 5, on October 2. You can pause the update to avoid receiving it immediately—as long as you’re using Windows 10 Professional, Enterprise, or Education…


Chris Hoffman
Oct 1st, 2018

  • « Previous
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 96
  • Next »


How to Make Your Chromebook as Secure as Possible

How to Make Your Chromebook as Secure as Possible


One of Chrome OS’ biggest benefits is its inherent security features. It’s regarded as one of the most secure consumer-focused operating systems, but here’s how you can eek just a bit more out of it.


Cameron Summerson
Sep 29th, 2018


Facebook is Using Your Phone Number to Target Ads and You Can’t Stop It

Facebook is Using Your Phone Number to Target Ads and You Can’t Stop It

Tech publications are screaming today that giving Facebook your phone number for 2FA allows them to target you for ads. But this misses a bigger point: Facebook is using your phone number to target ads whether you give it to …


Lowell Heddings
Sep 28th, 2018

Kids Can, and Will, Work Around Any Parental Restrictions You Set Up

Kids Can, and Will, Work Around Any Parental Restrictions You Set Up

Kids are easily working around Apple’s parental control system Screen Time, finding various ways to do what they want regardless of restrictions set up by their parents.


Justin Pot
Sep 27th, 2018


How to Hide Your IP Address (and Why You Might Want To)

How to Hide Your IP Address (and Why You Might Want To)


Your IP address is like your public ID on the internet. Any time you do anything on the internet, your IP address lets servers know where to send back information you’ve requested. Many sites log these addresses, effectively …


Anthony Heddings
Sep 27th, 2018


Chrome Now Logs all Google Users Into the Browser. Should You Care?

Chrome Now Logs all Google Users Into the Browser. Should You Care?

Google changed how logging into the browser works earlier this month: logging into any Google app now logs you in with Chrome as well.


Justin Pot
Sep 24th, 2018


No, Google Doesn’t Just Let Apps Read Your Email

No, Google Doesn’t Just Let Apps Read Your Email


There’s a story spreading in the news today that Google is letting companies scan through your email and sell the data, but this is really misleading. So what’s actually going on?


Lowell Heddings
Sep 21st, 2018


What Are the Most Beneficial Smarthome Devices to Own?

What Are the Most Beneficial Smarthome Devices to Own?

When deciding which smarthome products to install in your house or apartment, there are a lot of things to consider. Your first step should be deciding which products will give you the most value.


Craig Lloyd
Sep 20th, 2018


How to Make Android as Secure as Possible

How to Make Android as Secure as Possible


Mobile security is a big deal, probably now more than ever. Most of us live on our phones, with financial information, calendar appointments, family photos, and more stored on our devices. Here’s how to keep your Android phon…


Cameron Summerson
Sep 19th, 2018


What is LockApp.exe on Windows 10?

You may see a process named LockApp.exe running on your PC. This is normal. LockApp.exe is a part of the Windows 10 operating system and is responsible for displaying the lock screen.


Chris Hoffman
Sep 18th, 2018

CCleaner Is Silently Updating Users Who Turned Off Automatic Updates

CCleaner Is Silently Updating Users Who Turned Off Automatic Updates

CCleaner is forcing updates on users who specifically opt out of automatic updates. Users will only find out about these unwanted updates when they check the version number.


Justin Pot
Sep 17th, 2018

CCleaner Launches a Public Beta, Which Will Hopefully Help Users Catch Sketchy Changes

CCleaner Launches a Public Beta, Which Will Hopefully Help Users Catch Sketchy Changes

CCleaner launched a public beta last week, a month after a sketchy update gathered data on users and reversed user preferences.


Justin Pot
Sep 17th, 2018


Windows 10 Tries to Push Firefox and Chrome Over the Edge

Windows 10 Tries to Push Firefox and Chrome Over the Edge


Windows 10 now “warns” you not to install Chrome or Firefox when you download them. It’s just one of the many annoying ways Microsoft pushes Edge, which only has 4% market share despite Microsoft’s increasing desperation….


Chris Hoffman
Sep 13th, 2018


Does Publicly Shaming Companies Improve Security?

Does Publicly Shaming Companies Improve Security?

You might think security teams inside big companies hate it when researchers and the press point out vulnerabilities, but that’s not always the case.


Justin Pot
Sep 11th, 2018

Credit Freezes Will Be Free Soon, Helping You Stop Identity Thieves

Credit Freezes Will Be Free Soon, Helping You Stop Identity Thieves

Freezing your credit can stop identity thieves from opening an account in your name, but until recently it cost money to do so in some US states. That’s about to change.


Justin Pot
Sep 11th, 2018


App Stores Can’t Protect You From Apps Abusing Your Data

App Stores Can’t Protect You From Apps Abusing Your Data


Apps you get from an app store aren’t necessarily trustworthy. A top app in the Mac App Store hoovering up browsing data is just the latest example. Even an app you get from an app store might do bad things with your data….


Chris Hoffman
Sep 11th, 2018


Apple Removed Sketchy Mac Apps From the App Store, But Only After Researchers Went Public

Apple Removed Sketchy Mac Apps From the App Store, But Only After Researchers Went Public

Popular applications from the Mac App Store were routinely downloading users’ web history, but Apple only took them down when security researchers went public.


Justin Pot
Sep 10th, 2018


Don’t Give Apps Access to Your Email (Even to Save Money)

Don’t Give Apps Access to Your Email (Even to Save Money)


Some online services want full access to your email account, so they can scan it for purchases, travel plans, or annoying newsletters. Apps like these generally sell your private data. They’re not great for your email account…


Chris Hoffman
Sep 10th, 2018



How to Put Your Smarthome in Vacation Mode

How to Put Your Smarthome in Vacation Mode


When you go on vacation, there are probably a handful of things you to do to your house to prepare it for a prolonged vacancy. That list should include taking care of your smarthome devices.


Craig Lloyd
Sep 8th, 2018


How to Set Up and Use the Google Titan Key Bundle

How to Set Up and Use the Google Titan Key Bundle

Google recently released a set of two-factor authentication (2FA) security keys called the Titan Security Bundle. This set includes a traditional USB-based Universal Second Factor (U2F) key for use on a computer and a combina…


Cameron Summerson
Sep 6th, 2018

How to Record Skype Calls

How to Record Skype Calls

Skype now lets you record calls with no additional software. Microsoft’s new call-recording feature works for both audio and video calls, and even records shared screens in video calls. Skype notifies everyone on the call tha…


Chris Hoffman
Sep 6th, 2018


Why Do Websites Redirect to Fake “Congratulations” Gift Card Pages?

Why Do Websites Redirect to Fake “Congratulations” Gift Card Pages?


It’s probably happened to most people by now: You’re viewing a web page on your phone and, suddenly, you see a popup saying you’ve won a $1000 Amazon gift card or similar fake prize. What’s going on?


Chris Hoffman
Sep 5th, 2018



Chrome 69 No Longer Says Websites Are “Secure” (Even Though They Are)

Chrome 69 No Longer Says Websites Are “Secure” (Even Though They Are)


Google is celebrating Chrome’s ten-year anniversary with a slick new theme, but there’s another big new change. The familiar green lock and “Secure” indicator in the address bar are going away.


Chris Hoffman
Sep 4th, 2018



Why is Chrome Telling Me to “Update or Remove Incompatible Applications?”

Why is Chrome Telling Me to “Update or Remove Incompatible Applications?”


Many Windows applications, such as antivirus software, inject code into Chrome to modify its behavior. This results in more frequent browser crashes, so Google is taking a stand by blocking these techniques….


Chris Hoffman
Sep 3rd, 2018


How to Make Your Venmo Transactions Private

How to Make Your Venmo Transactions Private

Did you know your Venmo transactions are public by default? Everyone on the Internet can see your name, the recipient’s name, the message you send, and any comments. They can even jump in and comment on your transactions….


Chris Hoffman
Aug 31st, 2018

Google’s Ad Tracking Knows Every Mastercard Purchase You Make, Online or Off

Google’s Ad Tracking Knows Every Mastercard Purchase You Make, Online or Off

Google tracks Mastercard purchases to see if online advertisements prompt real-world sales. The deal is worth millions of dollars, with Mastercard basically selling customer data to Google.


Justin Pot
Aug 31st, 2018

  • « Previous
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 96
  • Next »

What Is a Checksum (and Why Should You Care)?

What Is a Checksum (and Why Should You Care)?

A checksum is a sequence of numbers and letters used to check data for errors. If you know the checksum of an original file, you can use a checksum utility to confirm your copy is identical.


Chris Hoffman
Aug 29th, 2018


How to Protect Yourself From Public USB Charging Ports

How to Protect Yourself From Public USB Charging Ports


USB charging ports in public places are convenient but possibly risky. Data is transferrable over a USB connection, so plugging your phone into an unknown charging port puts it at risk.


Chris Hoffman
Aug 28th, 2018


Security Cameras Are Useless If They Can’t Identify Anyone

Security Cameras Are Useless If They Can’t Identify Anyone

It’s important to consider the location of your security cameras carefully. While you might think you have every area covered, you’ll also want to make sure your cameras are close enough to the potential action to capture sho…


Craig Lloyd
Aug 27th, 2018


What is Code Injection on Windows?

What is Code Injection on Windows?


Code injection is common on Windows. Applications “inject” pieces of their own code into another running process to modify its behavior. This technique can be used for good or evil, but either way it can cause problems….


Chris Hoffman
Aug 27th, 2018



Dark Patterns: When Companies Use Design to Manipulate You

Dark Patterns: When Companies Use Design to Manipulate You


Ever feel like you’re being prompted into going along with something you don’t want because better options aren’t clearly being presented? You probably just found a dark pattern.


Justin Pot
Aug 26th, 2018


T-Mobile Hacked Again: Over 2 Millions Account Numbers and Addresses Potentially Leaked

T-Mobile Hacked Again: Over 2 Millions Account Numbers and Addresses Potentially Leaked

Attackers may have compromised three percent of T-Mobile’s 77 million customers on Monday, revealing personal information like addresses, phone numbers, and account numbers.


Justin Pot
Aug 24th, 2018


How to Enable Microsoft’s New OneDrive Folder Protection in Windows

How to Enable Microsoft’s New OneDrive Folder Protection in Windows


Microsoft OneDrive now offers to “protect” the contents of your Desktop, Documents, and Pictures folders. You can use your standard file storage folders, and OneDrive will synchronize them as if they were saved in the regular…


Chris Hoffman
Aug 24th, 2018


Facebook Removed Their Spying VPN From The App Store (But It’s Still on Google Play)

Facebook Removed Their Spying VPN From The App Store (But It’s Still on Google Play)

Facebook removed Onavo—a free VPN run by the social networking company—from the iOS App Store today. The voluntary move by Facebook was prompted by discussions with Apple about privacy policy.


Justin Pot
Aug 23rd, 2018

How macOS Mojave’s Privacy Protection Works

How macOS Mojave’s Privacy Protection Works

Apple is adding more privacy protections in macOS 10.14 Mojave. Mac applications must request permission before accessing data like your photos, emails, webcam, microphone, calendars, and contacts. If an app tries accessing p…


Chris Hoffman
Aug 22nd, 2018


Should You Buy a Smart Smoke Alarm?

Should You Buy a Smart Smoke Alarm?


If your house is already decked out with a ton of smarthome products, your next addition might be some smart smoke alarms, but are they worth buying in the first place? Here are some things to keep in mind….


Craig Lloyd
Aug 19th, 2018


How Multiple Nest Protect Smoke Alarms Work Together

How Multiple Nest Protect Smoke Alarms Work Together

Having just one smoke alarm in your home isn’t enough, so if you want to go all-in with the Nest Protect, you’ll need more than one unit. Here’s how multiple Protect units work together.


Craig Lloyd
Aug 17th, 2018

How to Check if a Photo is Stolen

How to Check if a Photo is Stolen

Photos and other images get stolen all the time online. Someone takes a photo from the photographer’s website or social media channels and uses it for their own needs. This is completely illegal and happens to me all the ti…


Harry Guinness
Aug 17th, 2018

Will the Nest Protect Still Work Without a Wi-Fi Connection?

Will the Nest Protect Still Work Without a Wi-Fi Connection?

If the Wi-Fi goes out and your smarthome devices lose connectivity, it’s mostly just an inconvenience. However, what about devices that are potential lifesavers, like the Nest Protect?


Craig Lloyd
Aug 16th, 2018

Mozilla Recommend a Privacy Extension That Is Tracking Your Web History

Mozilla Recommend a Privacy Extension That Is Tracking Your Web History

Web Security, a Firefox extension with over 200,000 current users, tracks every website users visit and stores that information on a German web server.


Justin Pot
Aug 16th, 2018

How to Set Up Parental Controls on Chromebooks

How to Set Up Parental Controls on Chromebooks

Once upon a time, Chromebooks had built-in parental controls. Google removed them but added support for Family Link—its parental control software for Android phones and tablets. Here’s how it works on Chromebooks….


Cameron Summerson
Aug 16th, 2018

How to File a Chargeback on a Credit Card Purchase (to Get Your Money Back)

How to File a Chargeback on a Credit Card Purchase (to Get Your Money Back)

A chargeback lets you dispute a credit card transaction and reverse it, getting your money back. For example, if you paid a subscription fee to MoviePass and the company just won’t let you cancel your subscription, you can do…


Chris Hoffman
Aug 15th, 2018