Why You Should Photograph Your Physical Media Collection
Owning physical media has its benefits , especially in the era of streaming and digital distribution, but it also comes with risks such as loss, […]
Continue reading »Let Everything Be Better
Owning physical media has its benefits , especially in the era of streaming and digital distribution, but it also comes with risks such as loss, […]
Continue reading »If you recently updated Google Chrome to version 104 , you may be surprised to know that another update is already available for your browser. […]
Continue reading »If you spend all day videoconferencing, you might think that Zoom has completely taken over your Mac. However, a serious security vulnerability allows hackers to […]
Continue reading »Mac computers have security features installed by default that prevent you from installing applications that contain viruses or malware. This is generally a great system, […]
Continue reading »Apple and App Store devices are generally considered to be more secure than competitors such as Android or Windows. Apple has better control and curation […]
Continue reading »I receive a lot of spam texts . A lot . They are immediately recognized: the original number does not look familiar and is attached […]
Continue reading »Let’s set the scene: you’re in the world, doing what you’re doing when you stumble upon an abandoned USB drive. What could be inside? Maybe […]
Continue reading »Unless you have vowed to leave Google forever , at least some part of your digital life is most likely connected to the company. Maybe […]
Continue reading »In an ideal world, software should not have security vulnerabilities. The code must be written perfectly, eliminating any bugs or glitches in the system that […]
Continue reading »Android users take note: There is a new malware in the Google Play Store that is attacking your data. Dubbed “Facestealer”, this new malware can […]
Continue reading »Bots and spam comments are nothing new on YouTube, but lately the site has been flooded with fake accounts trying to trick viewers into commenting […]
Continue reading »Yesterday (May 10) was Microsoft’s “Patch Tuesday” and should not be ignored . The new system update fixes 75 security vulnerabilities in Windows, including three […]
Continue reading »As we all know, some password options are clearly better than others, starting with a solid password manager. Of course, Apple users can do without […]
Continue reading »Rejoice, because today is World Password Day! You won’t have a day off, but you will be reminded that your security is likely to be […]
Continue reading »It’s been less than two weeks and we’re already talking about another critical Chrome update. However, to be honest, Google does a good job with […]
Continue reading »If you think you’re feeling déjà vu after reading this headline, you’re not: Google has reported yet another zero-day vulnerability affecting Chrome and, by extension, […]
Continue reading »By now, we’re all used to receiving spam texts: messages purporting to be from your carrier offering you a “gift” to pay your bill, or […]
Continue reading »There are three inevitability in life: death, taxes and software updates. Programs like Chrome can never be perfect, and security bugs will inevitably be found […]
Continue reading »Security updates are important and you shouldn’t ignore them. However, while apps and browsers like Chrome will remind you when it’s time to upgrade, you […]
Continue reading »We all know about the threat of phishing attacks, but hackers use a similar SMS-based tactic called “smishing” to infect smartphones with malware and steal […]
Continue reading »You may have noticed that we have firmly entered the era of the QR code – in every restaurant, government agency and store with which […]
Continue reading »Cyber attacks are a huge risk, and they are on the rise. College students, especially those who are away from home, bring their devices to […]
Continue reading »This engaging article from The Wall Street Journal details the arms race taking place in American homes. Concerned parents use internet blocking and filtering techniques […]
Continue reading »Apple’s AirTags and Find My services can be useful for finding the things you are missing, but they also pose a big privacy issue. While […]
Continue reading »Is someone copying my Instagram? This is a more common problem than you might think. Scammers sometimes impersonate legitimate Instagram accounts to trick friends and […]
Continue reading »Firefox shuts down the Lockwise password manager service . Passwords that you save in the Firefox desktop and mobile app will continue to be available […]
Continue reading »The popular stock trading app Robinhood recently faced a security breach that exposed the personal information of millions of users. While the majority of Robinhood […]
Continue reading »A recent report from the Google Threat Intelligence Group highlights a phishing campaign targeting YouTube content creators . Hackers have successfully hijacked thousands of channels […]
Continue reading »Cybersecurity sucks. It seems that every day we learn about another hack or leak that reveals our private digital life. Unfortunately, I will share one […]
Continue reading »Someone recently broke into my car two nights in a row. The first time I thought it was a mistake on my part and that […]
Continue reading »T-Mobile has confirmed a security breach that has leaked information to more than 48 million current, former and potential users. T-Mobile says it has patched […]
Continue reading »We all have accounts we no longer use, but some apps and websites make it difficult to delete your profile. In such cases, it is […]
Continue reading »It is usually not easy to install spyware on smartphones and tablets, especially on iPhone or iPad. But Pegasus spyware is an exception. In July […]
Continue reading »Beware of Android users – a new Trojan infects smartphones around the world, steals personal data from thousands of users and compromises their Facebook accounts. […]
Continue reading »Over the past few years, VPNs have evolved from a niche data protection tool to an everyday product that you’ll see advertised on any technology-focused […]
Continue reading »A new security vulnerability has been discovered in recent versions of Windows that hackers can use to remotely install programs, steal data and passwords, and […]
Continue reading »Keep your key card with you, do not leave valuables unattended in the room, and keep the door locked. Most of us follow basic hotel […]
Continue reading »Microsoft recently released hot fixes to fix a serious zero-day security vulnerability in the Windows Print Spooler code called “PrintNightmare”, but they did not fix […]
Continue reading »Network attached storage (NAS) devices are external hard drives with network connectivity. Basically, these are private cloud drives that you can set up at home […]
Continue reading »Snapchat users have been bombarded with repeated surprise text messages this week with two-factor authentication (2FA), but it’s unclear if the reason is due to […]
Continue reading »