Can you use emojis in passwords?
No one likes passwords. They take ages to enter, are hard to…
Three most dangerous Android features
Android is a well-designed operating system that gets better and more secure…
What to do if you’ve clicked on a phishing link or talked to scammers
We often write about how to prevent cybersecurity hazards and have given…
How and where to opt-out of Google Ad Topics for greater privacy
Within a year, Google plans to stop supporting so-called third-party cookies, a…
Windows driver compatibility and security issues — how to stay safe
Device drivers are irreplaceable programs written specifically for a particular operating system…
Where Linux is in your home, and how to protect Linux devices from hacking
Over the first 23 years of this century, the Linux operating system…
How to protect your child’s privacy when using social networks and IMs
When I was growing up, I never gave much thought to the…
Top apps for encrypted, private videocalls
Videocalls became much more widespread after the COVID-19 pandemic began, and they…
How to manage subscription costs
Digital wellbeing isn’t just about privacy and protection against online scammers and…
Back-to-school threats: virtual classrooms and videoconferencing
Previous posts in our back-to-school series have covered how to protect your…