MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 17

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
black and white photo of tiktok app on smartphone 1
TikTok Denies Security Breach After Claims It Has Been Hacked [UPDATED]

TikTok has denied claims that it has suffered a massive data breach, though speculation is still running rife.

graphic of blue digital chain 1
Off-Chain vs. On-Chain in Crypto: What's the Difference?

Everyone knows crypto transactions are slow. Could off-chain transaction be the solution?

person typing on laptop 1
How Often Should You Upgrade Your Laptop?

Every three years? How about every five?

graphic of falling algorand coins 1
From Staking to Governance: How to Still Make a Profit Using Algorand

With no more staking rewards, how can you earn with your ALGO?

blue and red lock graphic behind entrust company logo 1
LockBit Claims Responsibility for Entrust Ransomware Attack

LockBit operators have taken responsibility for the ransomware attack on digital security company Entrust.

monero coin next to cybercriminal graphic 1
Why Are More Cybercriminals Using Monero Cryptocurrency?

Yes, cybercriminals, especially those deploying ransomware, love using Bitcoin, but there's a new cryptocurrency that's becoming a firm favorite too.

skull on padlock and chains 1
Everything You Need to Know About the LockBit Ransomware Family

LockBit is a huge threat that uses the Ransomware-as-a-Service model. Here's what you need to know.

robot icon in front of crypto exchange on screen 1
What Is an Automated Market Maker (AMM) in Crypto?

When it comes to crypto trading, there are so many new terms to learn.

person holding bitcoin between kraken and binance logos 1
Binance vs. Kraken: Which Is the Best Crypto Exchange For You?

They're two of the biggest crypto exchanges, but which is the best crypto exchange for your needs?

graphic of horse in front of green matrix background 1
What Is a Trojan Dropper?

Most people have heard about Trojan horses, but what do you know about Trojan droppers? Here's what you need to know, including how to avoid them.

anonymous hooded person and blue digital background 1
What Is the LockBit 3.0 Ransomware and What Can You Do About It?

Also known as LockBit Black, this ransomware uses a double extortion method to get as much money from you as possible. Here's what you need to know.

windows logo in front of lock icon on digital grid background 1
Microsoft Finally Patches "DogWalk" Zero-Day Vulnerability to Stop Attacks

Microsoft confirms that the previously exploited "DogWalk" zero-day vulnerability has been patched.

toncoin icon on blue gradient background 1
What Is Toncoin and Is It Safe?

It has links to Telegram, but Toncoin isn't one and the same. Here's what you need to know.

usb bitcoin miners with fans feature 1
What Is a USB Bitcoin Miner? Is USB Bitcoin Mining Profitable?

Wait, surely a USB stick isn't capable of mining Bitcoin?

hexagonal blockchain graphic behind lock symbol 1
No, You Cannot Remove Data From the Blockchain. Here's Why.

Once data is on the blockchain, there's no way to get it off.

signal and shield symbols next to person on laptop 1
RDP vs. VPNs: What's the Difference?

You might have heard that Remote Desktop Protocol and Virtual Private Networks allow remote access. So what are they? Can you use them together?

graphic of blockchain with lock symbol  1
What Is a Consortium Blockchain and How Does It Work?

You won't join a consortium blockchain on a whim.

solana spelled in scrabble pieces behind lock icon 1
Thousands of Solana Wallets Hacked and Drained in Multimillion Dollar Attack

Thousands of Solana wallets have been drained in an overnight exploit resulting in the theft of millions of dollars.

graphic of various cryptocurrency coins with purple background  1
Why Do So Many Cryptocurrencies Fail? Why Do Some Succeed?

Some cryptos are huge—but even more fall by the wayside.

person coding on laptop behind windows logo 1
LockBit Ransomware Exploits Windows Defender to Load Cobalt Strike

A type of ransomware known as "LockBit 3.0" is being used to deploy Cobalt Strike payloads via the Windows Defender command line tool.

15 16 17 18 19
Page 17 / 34