MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 11

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
amazon logo on smartphone screen 1
Would You Let Amazon Monitor Your Phone Data for $2 a Month?

Is your privacy worth that much?

cracked bitcoin behind declining red arrow 1
Why Did Bitcoin's Price Fall by Over 60% in 2022?

It's been a rough year for crypto, and Bitcoin has often been at the forefront of the battering. Will things improve in 2023?

green price graphs on computer screen 1
What Were the 10 Top Performing Cryptos of 2022?

It's been a bad year for crypto, but these ten cryptos fared slightly better than the rest.

crypto exchange interface on smartphone 1
7 Signs of a Suspicious Cryptocurrency Platform

Cybercriminals develop crypto platforms dedicated to stealing your money. Here are some red flags to watch out for to keep your crypto safe.

electric car connected to charging station 1
How Much Does It Cost to Charge an Electric Car?

Is it cheaper to charge an EV than fill up a gas tank?

phishing key on keyboard  1
The Biggest Security Threat of 2023? It's Phishing

There's an abundance of scams cybercriminals use to target your private data. So what's the biggest threat of 2023? The answer might shock you.

crypto coins next to a christmas tree with baubles 1
Can You Use Crypto to Buy Gifts?

If you're all in on crypto, you'll probably want to use it to buy gifts, too.

close up shot of raspberry pi board with company logo 1
Raspberry Pi Hires Former Police Officer With Background in Surveillance Tech

The Raspberry Pi Foundation has hired an ex-police officer with experience of hiding Pi boards in various objects, including a piece of chocolate.

various crypto coins on black background 1
The 5 Best Crypto Moments of 2022

It's been a tough year for crypto, but there have been some great bits, no doubt.

highlighting importance of privacy 1
6 Ways Your Privacy and Security Were Threatened in 2022

Our world isn't very conducive to anyone concerned about their privacy. Here are a few ways cybercriminals have been stealing your data in 2022.

cracked bitcoin behind declining red arrow 1
The Biggest Crypto Fails of 2022

It's not been a great year for crypto, that's for sure.

coinbase logo with bitcoins around feature 1
What's the Difference Between Coinbase.com and Coinbase Wallet?

Coinbase owns and operates two different crypto wallets, but which one should you use?

samsung phone being used to take photo of football game 1
How to Use the Camera on a Samsung Phone

Here's a quick and easy guide to the basics of using the camera on your Samsung Galaxy phone.

man confused about bitcoin holding coin feature 1
Don't Get Crypto? The Quick Jargon-Busting Crypto Explainer

Crypto doesn't have to be confusing... but it often is.

photo of electric car charging 1
How Long Does it Take to Charge an Electric Car?

Charging an EV takes longer than filling up with gas, no doubt about it. But how long does it take to charge an EV?

blockchain link in binary code feature 1
What Data Does the Bitcoin Blockchain Store?

Once information is uploaded to the blockchain, it's there forever.

last pass logo in front of padlock and key 1
Customer Data Accessed in LastPass Password Manager Breach

LastPass has announced that customer data was accessed in a security breach, marking the company's second hack in 2022.

spy behind windows logo 1
Google Discovers an Exploit Framework Used to Spread Spyware

Google has discovered an exploit framework using now-patched Windows, Firefox, and Chrome vulnerabilities to deploy spyware.

zcash and monero logos on pale blue background 1
ZCash vs. Monero: Which Is More Private?

If you don't want anyone to know about your crypto transactions, you need to use one of these privacy-focused coins.

person in dark room holding phone with tiktok app open 1
Hackers Are Spreading Malware via TikTok's "Invisible Body" Challenge

A popular TikTok challenge is being exploited by hackers to spread infostealer malware.

9 10 11 12 13
Page 11 / 34