security

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft Office has supported ActiveX for years as an option for document extensibility and automation, but it's also a serious security vulnerability.

How to disable guest use on Chromebook

How to disable guest use on Chromebook

When you turn this feature off, only registered accounts can use your Chromebook. It's super simple to do.

What is Privacy Dashboard on Android 12? Why is it considered a breakthrough for privacy?

What is Privacy Dashboard on Android 12? Why is it considered a breakthrough for privacy?

Security and privacy are increasingly becoming major concerns for smartphone users in general.

A major cybersecurity company was just hacked and lost 440GB of data.

A major cybersecurity company was just hacked and lost 440GB of data.

The world-famous cybersecurity company Fortinet has just officially confirmed that a large amount of user data was stolen from the company's Microsoft Sharepoint server, and was posted on a hacker forum early in the morning of September 15.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

How to set up face unlock on Samsung Galaxy phones

How to set up face unlock on Samsung Galaxy phones

Some high-end smartphones are now gradually moving users from password and fingerprint security authentication to more convenient facial recognition technology.

Large-scale brute force attack using 2.8 million IPs targeting VPN devices detected

Large-scale brute force attack using 2.8 million IPs targeting VPN devices detected

Security researchers around the world have warned of a large-scale brute force attack underway, using nearly 2.8 million IP addresses to attempt to guess login credentials for a variety of network devices.

Gmail releases extremely useful email encryption feature

Gmail releases extremely useful email encryption feature

Gmail just turned 21, and Google chose to celebrate its special birthday by launching a very meaningful feature for users: an extremely easy and useful automatic email encryption feature.

What is the SIM PIN Code and Why Should You Use One?

What is the SIM PIN Code and Why Should You Use One?

Discover what a SIM PIN is, its security features, and why you should use it for your mobile device. Learn more about SIM PIN and enhance your security today.

Enable and Use Two-Factor Authentication (2FA) for Your Blizzard Account

Enable and Use Two-Factor Authentication (2FA) for Your Blizzard Account

Learn how to enable two-factor authentication for your Blizzard account, and use the Blizzard Authenticator app or SMS Protect to log in securely. Protect your favorite games like World of Warcraft, Overwatch, Hearthstone, or Diablo 3.

How to try to crack a password yourself to test its strength

How to try to crack a password yourself to test its strength

The article tested 3 different passwords with an open source password cracking tool to find out which method really works when it comes to password security.

How to lock access to photos and messages on Android

How to lock access to photos and messages on Android

It can be said that the photo library and message archive are two of the most private locations that need to be tightly secured on Android smartphones and tablets.

How to Turn Off Random MAC Address on Android

How to Turn Off Random MAC Address on Android

To ensure better security, devices running Android 10 and above will use random WiFi MAC addresses by default.

Why You Probably Dont Need a Third-Party Firewall App on Windows

Why You Probably Dont Need a Third-Party Firewall App on Windows

Firewalls are your Windows system's first line of defense against online threats, but is Windows Defender Firewall up to the task?

Microsoft Lists Why TPM, Secure Boot Are Mandatory on Windows 11

Microsoft Lists Why TPM, Secure Boot Are Mandatory on Windows 11

More than three years ago, when Microsoft announced Windows 11, the operating system immediately caused a lot of controversy.

How to Set Up a VPN on iPhone or iPad

How to Set Up a VPN on iPhone or iPad

Virtual Private Networks (VPNs) provide secure access to private networks over the Internet. On iPhone and iPad, Apple has made setting up a VPN relatively easy. Here's how to do it.