MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 14

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
jigsaw blocks in front of blockchain repeated  1
What Is a Cryptocurrency Block and Why Is It Important?

They're the building blocks of any cryptocurrency, but how do they actually work?

graphic of data being stolen and unlocked padlock 1
What Is an Infostealer? Is It Dangerous?

Everyone can be targeted by infostealer malware. But what is it? How does it work? And what are the most common examples doing the rounds right now?

bitcoin in front of text on paper 1
6 Common Types of Crypto Attacks and How to Stay Safe

A growing number of people are eyeing cryptocurrencies as a way to get rich, and that included cybercriminals. Don't let yourself fall victim.

set of deep fake pictures of man 1
How to Use Deepfakes and How They Can Be Misused

Deepfakes is a new and fun tech you can easily get into. Here's how you can try it for yourself and how it could be dangerous in the wrong hands.

login details stolen by phishing hook on laptop 1
The 7 Best Ways to Avoid Phishing Scams

Phishing is a massive threat, but can be hard to spot. So how can you stay safe and avoid being scammed by phishing messages?

various crypto coins on desk 1
The 6 Most Profitable Crypto Mining Pools Compared

Mining pools help you mine more effectively. Here are some of the best pools you can join to get better mining rewards.

chainlink logo within circular network icon 1
What Is Chainlink (LINK) and How Does It Work?

Chainlink is the most vital crypto-cog you've never heard of.

purple and blue computer code on screen 1
Quantum Computers vs. Supercomputers: What's the Difference?

They're both incredibly powerful, but which is more useful, and what's the difference?

Mobile phone receiving OTP 1
7 Ways to Protect Your Email Account and Avoid Scams

People fear hackers, but many attacks simply arrive via email. Here's what you can do to secure your account and safeguard your data.

ultrasonic cleaner on table 1
What Is an Ultrasonic Cleaner and How Does One Work?

Get your stuff clean. Like, really, really clean.

google search page behind fingerprint icon 1
Google Sued Over Unauthorized Biometric Data Collection

Texas has sued Google for allegedly collecting millions of users' biometric data without their consent.

close up shot of quantum computer 1
What Is Quantum Computing, Is It Real, and How Does It Change Things?

How will quantum computing change our relationship with computers?

aptos crypto logo on fire background feature 1
What Is Aptos and Why Is This Solana-Killer So Controversial?

Why is this new cryptocurrency attracting so much attention?

person using exchange on smartphone and laptop 1
Can You Trust Free Crypto Exchanges?

Free sounds great, right? But surely there's a catch...

macbook half closed behind mining icon  1
Can You Mine Crypto On Apple M1 or M2 Silicon?

They're great processors, but can you really use them to mine crypto?

laptop with phishing icon on matrix background  1
What Is Phishing? How Dangerous Is It?

You might have heard of phishing and how terrible it can be to fall victim to it. But what actually is phishing? How does it work?

close up shot of blue and green code  1
What Is Crimeware and Is It the Same as Malware?

Malware is malicious software, but crimeware sounds like software that can be used to carry out crimes. So do they mean the same? Not quite...

close up shot of gold ethereum coin 1
Ethereum Classic (ETC) vs. Ethereum Proof of Work (ETHW): What's the Difference?

Now that Ethereum has switched to proof of stake, will ETC and ETHW have their time in the crypto sun?

picture of duck in pond behind white alert symbol  1
Facebook Business Accounts Hacked via New PHP Version of Ducktail Malware

A PHP version of the Ducktail infostealer malware is being used to compromise Facebook Business accounts.

close up shot of laptop keyboard 1
How to Fix a Sticky Laptop Key

Are you having trouble typing on your keyboard? Here's how to fix a sticky key and get it working normally again.

12 13 14 15 16
Page 14 / 34