MakeUseOf

James Frew-

James Frew

Page 13

About James Frew

James is an experienced technology journalist and was formerly MakeUseOf's Buyer's Guide Editor. His goal is to make tech accessible and safe for everyone. While graduated with a BEng in Mechanical Engineering, he's also passionate about mental health, sustainability, and music.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
 1
4 Reasons to Always Use a VPN When You're Online

VPNs (virtual private networks) are becoming more popular. It's not always clear exactly why you should be using one though. Here's why you should use one whenever you go online.

podcasts-online-security 1
9 Podcasts to Increase Your Online Security Awareness

Want to find out more about online security, but don't have time to read? The answer is simple: podcasts! Here are some excellent security-focused podcasts just waiting for you to listen.

 1
Huawei Watch 2 Ushers In Android Wear 2.0 (Review and Giveaway)

The newest Huawei Watch runs Android Wear 2, which brings a material design refresh and a host of new features. Can it save the smart watch revolution, or is it just more of the same?

cyber-hygiene 1
Improve Your Cyber Hygiene in 5 Easy Steps

In the digital world, "cyber hygiene" is as important as real-world personal hygiene. Regular system checks are needed, along with new, safer online habits. But how can you make these changes?

online-privacy-guide 1
The Complete Guide to Improving Your Online Security and Defending Your Privacy

Everyone wants your data, reputable companies and criminals alike. If you want to build up your defenses and protect yourself online, let us guide you through how to improve your security and safeguard your privacy.

 1
How to Download Photos From Your Camera With Adobe Bridge

Adobe Bridge is a fantastically useful piece of software that many people overlook. Read on to to find out how to use it to make download photos easy!

 1
How Online Dating Uses Data to Find Your Perfect Match

Online dating is a thriving industry. The advent of powerful computers and Big Data analytics means matches are more accurate than ever. But how exactly do they create the perfect match?

 1
TunnelBear: The Easiest VPN For Protecting Your Privacy

TunnelBear aims to simplify the VPN, making it useful for everyone. Its commitment to protecting your privacy online makes it a great provider.

cyberwar-threat 1
Is Cyberwar the Next Threat to Your Security?

Cyberattacks have become commonplace, with DDoS attacks and data leaks now a weekly occurrence. But what is your role in this? Are there precautions you can take to avoid cyberwarfare?

 1
smartwatch 1
4 Reasons Why You Need a Smartwatch in 2020

On the fence about buying a smartwatch? Here are several good arguments that will help you decide if you should get a smartwatch.

wifi-pineapple 1
What Is a Wi-Fi Pineapple and Can It Compromise Your Security?

The Wi-Fi Pineapple is a device that closely resembles a Wi-Fi access point. Designed penetration testing, it can be re-purposed to perform malicious man-in-the-middle attacks. Are you at risk?

airplane-mode-sleep 1
Will You Sleep Better With Airplane Mode Enabled on Your Phone?

Struggling to sleep at night? Where did you leave your smartphone? Is it downstairs, or nestled under your pillow? It could be your phone that is disturbing you at night.

loyalty-cards-privacy 1
How Loyalty Card Apps Compromise Your Privacy

Loyalty cards are everywhere. You give businesses you regularly use your personal information, and they give you discounts, bonuses, or even freebies. But what are you really trading for that free cup of coffee?

 1
Everything You Need to Know About the Google Docs Phishing Scam

Concerned about the phishing attempt that spoofed Google Docs and abused Google's OAuth system? How did the attackers compromise Google accounts? Find out what we know and how you can protect yourself.

vpn-terminology 1
The Short MakeUseOf Guide to VPN Terminology

The need for a secure internet connection has never been more vital. A VPN is a great way to stop unwanted snooping in your internet traffic. We're here to cut through the VPN jargon.

 1
How To Remove The Bedep Malware From XHamster

Since 2015, the Bedep malware has been infecting users via websites, including an initial infection of adult site xHamster. Is your computer infected? And how can you stay safe?

privacy-windows-10 1
Privacy and Windows 10: Your Guide to Windows Telemetry

With the advent of the Windows 10 Creator's Update, Microsoft seems to have decided to be more transparent about their data gathering activities. Find out how much is gathered, and what you can do.

protect-rfid 1
Trust the Tinfoil: 5 Ways to Protect Against Remote Radio and RFID Hacks

RFID chips are everywhere, from in-store tags to smartphones. As cheap RFID enabled products continue to proliferate you need to know the best ways to protect yourself from the criminals.

 1
5 Nifty Ways to Use DNS to Your Advantage

One of the most underappreciated parts of the internet is the Domain Name System. DNS is often referred to as the phonebook of the internet, but it is far more than just a lookup service.

11 12 13 14 15
Page 13 / 15