About Katie Rees
Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring.
What Are the Most Secure Blockchain Smartphones?
Blockchain smartphones fall under a niche product category, but if you're in it for securely storing crypto, here are the best ones to buy.
The 6 Best Sites for Minting NFTs
Do you want to mint your NFTs, but don't know where to start? Here are 6 sites to mint your NFTs easily.
Can Remote Desktop Protocol Be Hacked?
RDP is useful but also makes you vulnerable to cyberattacks. Here's why RDP is a target and how to protect yourself.
The 7 Best Crypto Coins for Staking
Lending your cryptocurrency to verify transactions is a great way of making a little extra money on the side.
What Would Happen if Ethereum's Price Crashes to Zero?
It couldn't, could it? Okay, say Ethereum did crash to zero—what would happen?
What Is Ledger's BOLOS? How Does It Secure a Ledger Hardware Wallet?
Ledger's BOLOS sets it apart from the competition—here's why.
The 5 Biggest NFT Scams and How to Avoid Them
The soaring popularity of NFTs brings a wealth of opportunities for investors and, unfortunately, scammers. Be wary…
Linux Malware Found to Be at an All-Time High in 2022
Linux malware reached an all-time high in the first half of 2022, with nearly 1.7 million samples discovered.
What Is the Best Way to Use Stablecoins?
You won't make millions with stablecoins, but they're more useful than you might think.
New "Ducktail" Phishing Campaign Targets Facebook Business Accounts via LinkedIn
Employees managing Facebook Business accounts are now being targeted via LinkedIn in a spear phishing campaign known as "Ducktail".
New "CloudMensis" Mac Malware Uses Cloud Storage to Steal Data
Researchers have discovered a new kind of malware that's being used to exploit macOS devices and steal private user data.
The FBI Warns Crypto Investors to Watch Out for Fraudulent Apps
The FBI is warning of fraudulent cryptocurrency apps that have stolen millions from investors.
The Quick Guide to Mining Vertcoin
It's easier to mine than Bitcoin or Ethereum, so why not give it a try?
5 Key Types of Computer Worms You Should Know
Based on the mode of propagation, computer worms usually fall into one of these five types.
What Is a Mempool in Crypto?
Cryptocurrency transactions aren't as straightforward as a regular digital transaction, and mempools form a crucial part of the process.
The Top 7 Signs of a Phishing Scam
How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.
Researchers Find New Spectre Vulnerabilities in Older AMD and Intel Chips
Researchers have found two additional Spectre security vulnerabilities in older models of AMD and Intel processing chips.
Does Coinbase Report to the IRS?
Cryptocurrencies are still subject to taxes, like it or not. But does Coinbase actively report on your account information?
Microsoft Warns of AiTM Phishing Attacks Affecting Over 10,000 Organizations
Microsoft is warning users of a large-scale AiTM phishing campaign that has targeted tens of thousands of organizations since September 2021.
Crypto Hardware Wallets Compared: Ledger Nano S vs. Trezor Model One
When it comes to crypto hardware wallets, two names ring out more than most.