Skip to content

Home Computing

The 10 Most Invasive Apps on the Internet

We’ve all gotten used to the apps and websites that help us run our lives. While they do make things more convenient, they’re also collecting huge amounts of our data. You may have accepted the fact that you have to give up some personal info to use your favorite apps and services. But you should…

[Read More]

Geofencing Explained: All You Need to Know

More and more, apps and services are using our locations to deliver information to us. Triggering alerts, ads, or notifications based on geographic location is known as geofencing, and you’ve likely encountered it at least once today. Most of the time, geofencing is harmless. It can be helpful, like when you use a child location…

[Read More]

Credential Stuffing: Why It Matters and What You Can Do to Avoid It

Every day, hackers come up with new ways to steal information and wreak havoc on individuals, organizations, and businesses. It seems like we learn about new types of cyberattacks all the time, requiring us to keep a constant and vigilant eye on all our online accounts. That’s exhausting.  One type of cyber attack that has…

[Read More]

The Dangers of Face Swapping Apps + How to Stay Safe

In recent years, AI face-swapping apps, also known as “deep fake” apps have become hugely popular. Users can swap out their face with a celebrity, put their face in a premade video, or swap faces with friends. While these apps were created for harmless fun, they’ve raised many concerns about data privacy, spreading disinformation, and…

[Read More]

Be the Boss of Your Home Hybrid Workplace Tech

Having two different workspaces—one at home and the other at the office—has its perks. There’s less time spent on the freeway (or subway, or bus) and extra time to squeeze in a session at the gym or a home YouTube workout.  But being a hybrid worker also presents its own challenges. Clearly, the pandemic has…

[Read More]

PC Malware Scan for Free: Protect Your System

Are you suspicious that your computer is infected with malware? Microsoft has a built-in program that runs a malware scan on your PC for free. It’s incredibly simple, and it keeps your computer safe. In the past, Windows Security had a reputation for being useless, but now it’s on par with Avast and Kaspersky. In…

[Read More]

How to Secure Your iCloud Account from Spies

Have you ever wondered if someone is spying on you through your iCloud account? That’s exactly what happened to Britney Spears when her father Jamie hired a security firm to set up a way to spy on her through iCloud. Because Jamie Spears had Britney’s Apple ID password, he was easily able to gain access…

[Read More]

Blocking JavaScript on Your Phone: How and When

The Internet would look vastly different without JavaScript. This programming language powers things like audio and video players, infinite scrolling, and chat boxes. It lets your favorite websites look the way they do. That all may sound innocent, but JavaScript has a dark side too. With the tracking features that JavaScript enables, sometimes it’s better…

[Read More]