Whether we like it or not, our personal information and smartphones are tied together at the hip. The former needs the latter to deliver a personalized experience that matches our individual needs. This personal data, however, makes your phone a prime target for thieves of all ...more
It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
After setting up your phone, there are a number of things you should do immediately before download your favorite apps. Specifically, now that your data is on the device, you need to take steps now to ensure it's both protected and retained. Fortunately, most of these steps ar ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
When it comes to your security, you want the best of the best. Why settle for mediocre service with something as valuable as your protection? Malware continues to make its way onto the Play Store, leaving millions of devices vulnerable. You need an app that will shield your de ...more
Many people think antivirus apps are useless — why pay a subscription fee when most malware can be avoided with common sense? But the thing is, there were an estimated 3.5 million malicious Android apps discovered last year, with many of them making their way onto the Play Sto ...more
One of the most anticipated new Maps features in iOS 11 for iPhones is live and ready to keep you safe on the road. Right now, Do Not Disturb While Driving is opt-in, but if you missed Apple's on-screen prompt to enable it and want to turn it on, or if you accidentally enabled ...more
For so many of us, bakeware is bakeware. As long as it's oven safe and able to tolerate the high heat, it's fine to bake in, right? Wrong! Don't Miss: 7 Must-Know Guidelines Bakers Swear By There's more to bakeware than we realize: the different casserole pans, baking sheet ...more
A little-known setting on your iPhone gives you the power to change the color of certain contact names and email addresses when drafting an email. Customizing the color works well for visually separating contacts at a glance, and it can even help you from sending an email to t ...more
It's pretty much a given at this point that Facebook has a lot of data on us. While you might be conscious of the data you share with Facebook when you post, upload photos, or chat with friends on Messenger, you might not be thinking about all the data it receives from website ...more
Apple released the iOS 12.1.3 developer beta on Monday, Jan. 7, and the iOS 12.1.3 public beta followed shortly behind. Apple has been pretty on point with its public beta releases for iPhone, always releasing the same day as the dev version unless it's the very start of a bet ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
With iOS 12, Apple is offering users more options than ever to create, store, and manage their saved passwords. Not only can iOS 12 make you new passwords via the AutoFill feature, you can quickly and efficiently access your entire iCloud Keychain using Siri. Why go hunting fo ...more
For years, Skype has been synonymous with video calling and messaging. However, as the industry moved toward encryption and privacy, Skype usage was discouraged by experts due to its murky encryption. To combat this, Skype has introduced true end-to-end encryption. While Skyp ...more
Epic Games just released update v3.4 for Fortnite Battle Royale on all four platforms. This new version brings a number of UI changes, performance improvements, and bug fixes, but the addition that will get the most players excited is a new weapon: the Guided Missile. The Gui ...more
As advanced as the Galaxy S9 is, it can still be susceptible to the occasional hiccup. Several factors can cause your smartphone to behave erratically or become unresponsive, such as buggy apps or updates that didn't properly install. Luckily, most of these issues can be easil ...more
While most smartphones have the ability to receive FM signals via a tuner, mobile carriers prevent users from taking advantage of this hardware — probably in an effort to get their customers to spend more money on data. NextRadio is an app that allows users to listen to the r ...more
If you want to take your iPhone or Android photos to the next level, Snapseed is one of the best options. When it comes time to share pictures with friends and family, you want them to look as good as possible, so a little post-processing is in order. The problem is that Snaps ...more
Did you want an iPhone X, but opted for the iPhone 8 instead? Or, maybe you aren't ready to upgrade from your 7, 6S, 5S, or what-have-you. Did you know iOS 11.1 lets you experience what it would be like if you had upgraded to the iPhone X? Well, in a way. iOS 11.1 beta users ...more
Every now and then, an iPhone will freeze up and become unresponsive due to a software glitch. It can be a buggy app that somehow interferes with iOS or a software update that somehow didn't install properly. Whatever the cause, it's safe to say that no iPhone is immune to thi ...more
Facebook's 'Safety Check' is a useful social media function — it provides users a comfort that in the event of an emergency, they can let friends and family know they are safe. While certainly not perfect, the service is now essential during disasters and tragedies. That servi ...more
Right off of the unveiling of the Moto Z2 Play, it looks like Lenovo is gearing up to announce the highly anticipated Moto Z2. The company has sent out press invites, as posted by MobileXpose. The invites come with an image (seen below) that says "Motorola is back" with the d ...more
My message to Russian hackers is this: LEAVE BRITNEY ALONE! Russian hacking collective Turla has been targeting governments and military operations in the United States, Europe, Asia, and the Middle East for the past decade. Now, it appears that the group is targeting everyda ...more
Malware attacks on mobile phones are reaching an all-time high and it looks like companies like Samsung are doing all that they can to prevent any unwanted hackers from accessing its sensitive user data. When it comes to Samsung, well, they get enough flack already being all ...more
We have some bad news for BlackBerry fans: It looks like the upcoming KeyOne flagship won't be shipped in April after all. At the company's fiscal Q4 2017 earnings call, CEO John Chen confirmed that the new device wouldn't be shipped in April as planned, but instead, will be ...more
While clicking random links on the internet probably isn't the best idea to begin with, now you can rest easy knowing that your iPhone won't repeatedly dial 911 after tapping a malicious link in Twitter, Facebook, or other apps that use iOS's WebView. The links in question, w ...more
If you have multiple Bluetooth accessories, Android's volume system can be pretty annoying. For one thing, most phones reset to a "Safe Volume Level" every time you reconnect a pair of headphones, which means you'll probably need to turn up the volume once or twice a day. But ...more
Okay, check your Food Safety guidelines at the door, because things are about to get real subjective in here. It's late at night, and you've just stuffed yourself to the gills with that large pizza that you ordered—for one. Yeah, maybe it was a little gluttonous on your part, ...more
Got some seriously sensitive information to keep safe and a spare-no-expenses attitude? Then the new Solarin from Sirin Labs is the smartphone for you and your $17,000. The Solarin is touted as the world's most secure smartphone. The makers of the Android-based phone packed i ...more
The desktop browser market has some stiff competition going on, but Opera has always been able to maintain its market share by offering innovative features such as a data saver option. With over 350 million users, it's safe to say folks are appreciative of the efforts being ma ...more
The Stagefright exploit, which allowed for malicious code to be embedded in files on your device, is now very real in the form of Metaphor. Developed by software research company NorthBit, Metaphor is their implementation of exploits to the Stagefright library, and when execut ...more
It's no secret that the microwave is a modern-day wonder that, when used correctly, can cook a wide variety of food in a snap. Don't Miss: 10 Tricks to Use for Better Food from Your Microwave Well, I've got another delectable treat to add to that list of food—a snack that is ...more
Knowing if your meat is cooked properly is both the difference between a delicious meal and an inedible one... and the difference between making your guests sick and keeping them safe. Yes, you can use a thermometer—but not everyone has a reliable gauge, and sometimes you may ...more
My least favorite aspect of the winter season is how my fingers always turn into stiff, numb digits, unfeeling and seemingly incapable of making even the slightest movement. Yes, that might sound overdramatic, but if you hate wearing gloves like I do, you probably know exactly ...more
Hackers are claiming money for a security flaw in Apple's new update. Quick Summary: So, a new security firm called "Zerodium" states that they want to be up to date with the newest vulnerabilities in OS. They have said they are willing to pay seven figures to anyone who can ...more
Cauliflower has become trendy again, and it's mostly thanks to the low-carb crowd who use its mild flavor and soft texture as a replacement for things like rice and pizza dough. But instead of pounding or smashing it into submission, do yourself a favor and throw the entire h ...more
Do you ever walk into a nice boutique, a friend's house, or a fancy restaurant, and think, “I wish my house smelled like this”? Because I sure do. The problem is that most people rely on candles to scent their homes and rooms. Don't get me wrong, I love candles, but they have ...more
These cinnamon buns baked in orange peels are one of the easiest, cutest, and tastiest treats you can make for breakfast, a sweet snack, or dessert. Whether you bake them in the oven or grill them over a campfire, the orange peels infuse the cinnamon rolls with a fragrant, cit ...more
This past weekend, one of the most notorious hacker organizations in the world, Hacking Team, was hacked by some unknown organization. The Hacking Team is an Italian company that sells it software and services to companies and governments (yes, my rookie hackers, there are leg ...more
In addition to sharing emojis and GIFs, most of us also probably share various types of links through email or text, whether it be for a Google Maps location, a bar or restaurant on Yelp, or an awesome song on Spotify. The process typically calls for switching applications, s ...more
The EFS partition on modern Android phones houses the unique IMEI for your device, which is essentially an identification number that lets you connect to mobile networks. But sometimes, when you're flashing ROMs or restoring backups in custom recovery, the EFS partition can be ...more
We have all seen videos of people walking off of platforms and into street signs because they were too distracted by their phones to pay attention. This has become such a problem that cities have even considered fining pedestrians for texting and walking. Even though I find t ...more
As a Mac and Sasmsung Galaxy S6 user, I quickly realized that the two devices don't play well with one another out of the box, and using ADB commands to record my Android's screen isn't as simple as it is would be with a Windows PC. Though you might feel like attempting to us ...more
Smartphones are great at keeping us busy with games, social media, and messaging apps, but there has been a recent push for them to also help keep us safe (and I'm not talking about from hackers, though that is equally important). A while back I covered an app that sent out a ...more
With troves of sensitive information, like receipts and password reminders, hiding in your email, your inbox can become a sort of Holy Grail for hackers—or anyone with your password. Although my crazy ex-girlfriend had no hacking experience, using my email login, she was able ...more
Thanks to a couple of photoshopped images that made rounds across Twitter last year, iPhone users were duped into thinking that iOS 8 included a security feature that would lock individual apps. Of course, none of it ended up being true, but we covered other features and apps ...more
A group ironically called the "Guardians of Peace" hacked into Sony Pictures' computer systems and released a mountain of internal information such as medical records, leaked scripts, work complaints, and even celebrity aliases. Why did this happen? Sure, a lot of well-though ...more
A ziplock freezer bag full of raw egg yolk and chopped up vegetables in a pot of boiling water may not sound like the most appetizing way to make an omelet, but this technique definitely works when you're camping and don't have a stove. There are tons of things you can do wit ...more
Welcome back, my newbie hackers! We've already saved the world from nuclear annihilation and covered our tracks afterwards, but the world is still threatened by a malicious, megalomaniacal dictator with missiles and nuclear weapons. We need to keep a close eye on him, so in ...more
Going out on New Year's Eve is not for the faint of heart, especially if you live in a big city. Follow the New Year's Eve survival guide below to make sure you are prepared for worst-case scenarios that can range from losing your phone to figuring out how to quickly remove a ...more
If you've ever logged on to the popular music application Pandora, your password is saved onto that computer in the local storage...for good. So for everyone reading this article, you should change your password to a throwaway one that's only used for Pandora, because if you ...more
Let's say you forgot the code to your Master Lock combination padlock. What can you do besides buy another one? Well, there's a surprising abundance of ways to open a combination lock other than with just the combination, some of which will even let you reset the code. Of cour ...more
Even though we all know it's a bad idea, a lot of people still use their browser's store password function to keep up with all their accounts. While convenient, this shortcut also makes their passwords very easy to find if you have access to the computer they're stored on. He ...more
Do you own an HP printer? If so, it may be vulnerable to malware attacks. Researchers at Columbia University discovered that 25% of Hewlett-Packard printers have significant vulnerabilities that put your printer in danger from hackers—even your home. With a budget of just $2,0 ...more
Need to break out of the restrictions your school or workplace have on internet browsing? Maybe you want to waste some time on YouTube, check out some gaming action on Twitch, or simply just browse Facebook or Twitter. Don't Miss: 10 Easy Speed Hacks for Google Chrome Distra ...more
There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help ...more
Over the years, we've seen security breach after security breach, as well as high-profile data scandals where collected personal information was misused by companies. Apple makes customer privacy a priority, so there have been few issues to worry about when it comes to its ser ...more
There are a number of options and hidden menus within Android that provide users more control over their device. With this control, you can better manage how your phone operates. We came up with a list of tips and shortcuts that, when used, will slowly put you on a path to bec ...more
One of Android's most glaring weaknesses is its lack of an iMessage equivalent. That is, of course, until now. There's one app that will allow Android users to experience iMessage on their non-Apple phone, complete with end-to-end encryption, message effects, and group messagi ...more