MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 15

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
dogecoin in front of exchange candlestick graph 1
Everything You Need to Know About How to Buy Dogecoin on Coinbase

Looking to buy some Dogecoin? Coinbase might be the easiest option.

black and white close up shot of smartphone 1
Android Found to Be Leaking Data Even with VPN On

It has been stated that Android is leaking Wi-Fi connection data despite the use of a VPN.

crypto coins on us dollars 1
Is the Government & SEC Going to Regulate Cryptocurrency?

It wouldn't be a surprise, would it?

hooded person behind matrix symbols and microsoft exchange logo 1
LockBit Ransomware Deployed via Windows Exchange Server Hack

Cybercriminals have reportedly exploited a Microsoft zero-day vulnerability to hack Exchange servers.

login credentials being stolen from laptop via phishing 1
New Phishing-as-a-Service Tool Poses Significant Risks

A new phishing-as-a-service tool is making data theft that much easier for cybercriminals.

person using exchange on laptop 1
7 Things to Consider Before Using a Crypto Exchange

Picking a crypto exchange doesn't have to be difficult, but there are some things to consider before you do.

digital graphic of skull in vector 1
What Is a Hyperjacking Attack and Are You at Risk?

Do you use a virtual machine? You might be targeted using an attack that was seen as theoretical for years before the first confirmed case in 2022.

foot print in snow 1
What Is Snowshoeing and Is It Dangerous?

This is a technique used by cybercriminals to scam you via your emails. So what is snowshoeing? How does it actually work?

skull and bones in green matrix code 1
BlackByte Ransomware Abuses Legitimate Drivers to Disable Security Measures

Threat actors are using BlackByte ransomware to abuse legitimate servers and bypass security layers.

red and blue digital lock graphic 1
The 7 Most Common Causes of Data Breaches

Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.

bitcoins next to ledger hardware wallet on table 1
What Is a Bitcoin Cold Storage Wallet?

Anything connected to the internet could be hacked; that's why you should keep your crypto wallet offline.

android logo in front of matrix background 1
New "RatMilad" Android Malware Can Steal Data and Spy on Victims

A new kind of Android malware is being used against victims on smartphones to spy and steal data.

hooded person and fractured background behind discord logo 1
Hackers Exploit Beeple Discord Server to Drain Wallets

The Beeple Discord server has been hacked by malicious actors attempting to drain user wallets.

close up shot of person holding dogecoin 1
What Is the Best Dogecoin Wallet? 7 Crypto Storage Options to Try

Keep your Dogecoin safe with one of these handy crypto wallets.

cryptocurrency bitcoin next to wallet 1
How to Get a Bitcoin Wallet to Hold Your Crypto

If you're getting into Bitcoin, you need a wallet.

yellow bitcoin digital graphic 1
The Best Bitcoin Accelerators to Speed Up Your Transactions

You want your Bitcoin transaction processed, and you want it done now.

graphic of nft word in front of circuit board 1
Can You Hide Data in an NFT?

Can something be hidden within an NFT? Here's what you need to know about steganography in the age of digital art.

person being scammed by criminal via laptop 1
What Is Consent Phishing and Why Is It Dangerous?

Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?

pile of paperclips behind alert symbol 1
How to Spot and Avoid Malicious Attachments

Malware can be spread via email attachments, but what are the tell-tale signs of a malicious attachment? Here's what to look out for.

close up shot of crypto coins on pouch of wallet 1
Hardware vs. Software Crypto Wallets: What's the Difference?

You need to keep your crypto somewhere, and you need to keep it safe.

13 14 15 16 17
Page 15 / 34