MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 12

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
bitcoin stack next to upright dogecoin 1
Bitcoin vs. Dogecoin: Which Is Better?

One is the first-ever crypto, the other is based on a dog meme. Which is the better option?

norton and bitdefender logos on blue digital background 1
Norton vs. Bitdefender: Which Security Suite Will Protect Your PC Best?

Two of the best-known antivirus solutions are Bitdefender and Norton, but which is best? We compare pricing, plans, features, and more.

vpn app open on laptop screen 1
VPN
Does a VPN Protect Against Malware?

Do you really need an antivirus suite if you already have a VPN? Is a VPN an all-in-one-security solution? Here's what you need to know.

person holding smartphone in hand 1
The Top 8 Reasons Why an App Isn't Working on Your Smartphone

Smartphones are great! Until they stop working, that is.

close up shot of person touching iphone screen 1
Why Restarting Your Smartphone Fixes (Most) Problems

Switching it off and on again really does make a difference.

A blue Blockchain Network graphic 1
Cross-Chain Bridges and Atomic Swaps Explained Simply

These crypto techs may act and look similar, but they're not the same.

anonymous hooded figure  1
Interpol Seizes $130 Million in Worldwide Cybercrime Crackdown Operation

Interpol has announced its seizure of $130 million in cash and assets associated with a string of global cybercrimes.

christmas gloves writing on laptop feature 1
6 Tech Gift Mistakes to Avoid This Holiday Period

Don't get caught up with bad or fake tech during the holiday period.

person logging into instagram on phone with google authenticator logo in front 1
Lost Your Phone With a Google Authenticator App? What to Do Next

Lost your smartphone and, with it, the Google Authenticator that lets you sign in securely to various accounts? Here's what you need to do.

blue cosmos crypto graphic 1
What Is Cosmos (ATOM)?

It wants to solve the "hardest problems" in crypto, but how does Cosmos work?

cefi defi letters on blocks feature 1
CeFi vs. DeFi: Which Is Better?

How do these crypto services differ, and which one should you use?

tether coin among regular coins 1
What Causes Stablecoins to Lose Their Peg?

Although its price is pegged to a real-world asset, that doesn't always guarantee that price will remain stable.

blue bitcoin lightning graphic with lock icon 1
What Is a Cryptocurrency Seed Phrase?

Keeping your seed phrase secure is vital, but why?

amazon logo in front of earth with satellite connections 1
ISP
What Is Amazon Project Kuiper? Will It Be Better Than Starlink?

Starlink isn't the company looking to broadcast internet to your home from space.

mcafee and norton logos on grey shield 1
Norton vs. McAfee: Which Internet Security Suite Is Better?

Looking for a good antivirus? Norton and McAfee are both strong options, but which one is better? We compare prices, features, and more.

anonymous hooded figure on laptop hidden by question mark 1
42,000 Imposter Domains Used by Chinese Hackers in Huge Phishing Campaign

Thousands of imposter domains are being used in a massive brand impersonation phishing campaign.

xbox controller in hands 1
RapperBot Malware Used to Launch DDoS Attacks on Game Servers

An updated version of RapperBot malware is being used to carry out DDoS attacks on game servers.

yellow bitcoin digital graphic 1
Is Cryptocurrency Traceable? Or Should You Use a Privacy Coin?

Cryptocurrency is often referred to as private, but it's not as cut and dry as you might think.

photo showing early evolution of smartphones 1
A Brief History of the World's First Cell Phones

How did we go from large room-sized mainframe computers to smartphones in our pockets?

gold bars on black background 1
What Are Gold-Backed Stablecoins?

Do you want to invest in cryptocurrency but can't handle its risk?

10 11 12 13 14
Page 12 / 34