How to change app permissions on your devices
When downloading an app to your device, sometimes a message pops up to request permissions that the app would like to have in order...
How to work from home: Keeping safe and sane while remote
The coronavirus outbreak has prompted a lot of companies, including Google and Apple, to recommend their employees work from home. Many events have been...
Let’s Encrypt has issued a billion certificates, securely encrypting nearly 200 million sites
An effortless way to check whether the site you just logged on to maintains an encrypted connection is whether it starts with HTTP or...
The uncrackable Android trojan: What is xHelper?
We’ve advised our readers to stay safe from malware and trojans by keeping their devices updated at all times, but a new strain caught...
What is SIM swapping, and how to avoid it
Malicious actors could cancel your SIM card and divert all your calls to themselves. Here are 5 ways to protect yourself.
How to secure your iPhone, iPad, and other Apple devices
Got a new Apple device? Set up the built-in security features on your new iPhone, iPad, or Mac computer to protect your device and your privacy.
What is an e-signature, and how does it work?
Ever signed a job contract, leased an apartment, or got a loan online? You may have benefited from an e-signature app. Here are seven to try.
What is spyware and how do I remove it?
Spyware is software secretly installed on your machine with malicious intent. Here's how to protect against it.
4 new cybersecurity threats in 2019
Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
Why you can’t judge a VPN by its server count
When you're looking for a VPN provider, a server count alone is not a good enough gauge on how the service will perform.