MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 16

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
coinbase website behind magnifying glass 1
Is Coinbase a Scam? No, But You May Find It Hard to Trust

It's one of the biggest crypto exchanges in the world, but can you really trust Coinbase?

phishing hook stealing credit card via cookie 1
What Is an Adversary-in-the-Middle Phishing Attack?

AiTM scams can even bypass security precautions like two-factor authentication. So how do these phishing variations work? How can you stay safe?

close up shot of judge's hammer 1
The Top 7 Governance Tokens in Crypto

Although these tokens still have a tradable value, they have more than one use.

graphic of man mining ethereum classic coin 1
How to Start Mining Ethereum Classic (ETC)

Ethereum's time is over. Ethereum Classic mining is where its at now.

opensea logo in front of digital graphic background  1
3 Ways to Keep Your OpenSea Account Secure

OpenSea is the largest digital marketplace for crypto and NFTs. That makes it a target for cybercriminals too. Here's how to keep yourself safe.

microsoft-exchange-1 1
Hackers Take Over Microsoft Exchange Servers with OAuth Apps

Malicious attackers are using rogue OAuth apps to gain control of Microsoft Exchange servers and spread spam.

blue and purple blurred code 1
15-Year-Old Unpatched Python Bug Allows Code Execution in Over 350k Projects

A fifteen-year-old Python code vulnerability poses a threat to over 350,000 projects.

money being stolen from person via laptop 1
Crypto Market Maker Wintermute Loses $160 Million to Hackers

U.K-based cryptocurrency market maker Wintermute has lost over $160 million via a hack, according to the company's CEO.

bitcoins stacked on box next to pick axe 1
The 6 Best Bitcoin Mining Software

Getting into Bitcoin mining? You'll need Bitcoin mining software—and these are the best options.

bitcoin coin held in hand with grid graphics 1
Crypto Is Complex: 5 Ways to Make Crypto Easier

Are you lost when it comes to crypto? Check out our five tips to help you understand it better before investing.

robinhood logo in front of bitcoin 1
Is Robinhood Safe, Legit, and Trustworthy for Investing With?

The investment platform, Robinhood, began in 2013, and seems a good option for many. But is Robinhood safe to use? Can you trust the app?

gold bitcoin on top of dollar bill 1
Can You Buy Bitcoins Anonymously With a Credit Card?

Crypto is meant to be private, but it's not always the case.

coinbase logo in front of blue graph 1
What Is the Coinbase Text Scam and How Can You Avoid It?

You might have heard about the cryptocurrency Coinbase phishing scam sent out via SMS. So what is it? And how can you stay safe?

black and white wordpress graphic 1
WordPress Plugin Vulnerability Abused in Zero-Day Exploit

The WPGateway premium WordPress plugin has been exploited by malicious actors.

picture of diamond mining machine in quarry 1
What You Need to Build a Bitcoin Mining Machine and How Much It Costs

Looking to get into Bitcoin mining? You'd better prep your wallet.

different cryptocurrency coins 1
The Top 10 Crypto Coins to Look Out For in 2022

These are the 10 crypto projects to keep an eye on in 2022.

blue matrix background behind steam logo 1
Steam Accounts at Risk in New Browser-in-Browser Attack

Malicious actors are now using a new technique to get their hands on Steam account credentials.

coin-base-alert 1
Have You Been Hit by the Coinbase Email Scam?

Do you invest in cryptocurrency? You're a big target for cybercriminals. So what is the Coinbase phishing scam? What should you look out for?

keyboard with add to cart enter key 1
The 16 Weirdest Things Sold on the Internet

The internet is home to many strange things, and among them all, here are some of the weirdest things sold on the internet.

image of nebula behind malware graphic 1
Hackers Exploit James Webb Telescope Image to Spread Malware

One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.

14 15 16 17 18
Page 16 / 34