MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 18

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
smartphone on desk with shield symbol on screen 1
What Are the Most Secure Blockchain Smartphones?

Blockchain smartphones fall under a niche product category, but if you're in it for securely storing crypto, here are the best ones to buy.

10 cryptopunk avatars 1
The 6 Best Sites for Minting NFTs

Do you want to mint your NFTs, but don't know where to start? Here are 6 sites to mint your NFTs easily.

lock symbol in front of computer code 1
Can Remote Desktop Protocol Be Hacked?

RDP is useful but also makes you vulnerable to cyberattacks. Here's why RDP is a target and how to protect yourself.

crypto coins held in hand 1
The 7 Best Crypto Coins for Staking

Lending your cryptocurrency to verify transactions is a great way of making a little extra money on the side.

ethereum coin in front of downward arrow 1
What Would Happen if Ethereum's Price Crashes to Zero?

It couldn't, could it? Okay, say Ethereum did crash to zero—what would happen?

shield symbol with ledger logo in centre 1
What Is Ledger's BOLOS? How Does It Secure a Ledger Hardware Wallet?

Ledger's BOLOS sets it apart from the competition—here's why.

girl looking at code on screen 1
The 5 Biggest NFT Scams and How to Avoid Them

The soaring popularity of NFTs brings a wealth of opportunities for investors and, unfortunately, scammers. Be wary…

linux logo in front of red code background behind translucent alert symbol  1
Linux Malware Found to Be at an All-Time High in 2022

Linux malware reached an all-time high in the first half of 2022, with nearly 1.7 million samples discovered.

crypto exchange graph behind various stablecoin logos 1
What Is the Best Way to Use Stablecoins?

You won't make millions with stablecoins, but they're more useful than you might think.

login details stolen by phishing hook on laptop 1
New "Ducktail" Phishing Campaign Targets Facebook Business Accounts via LinkedIn

Employees managing Facebook Business accounts are now being targeted via LinkedIn in a spear phishing campaign known as "Ducktail".

apple and alert symbols on laptop screen 1
New "CloudMensis" Mac Malware Uses Cloud Storage to Steal Data

Researchers have discovered a new kind of malware that's being used to exploit macOS devices and steal private user data.

alert symbol in front of crypto statistics on smartphone 1
The FBI Warns Crypto Investors to Watch Out for Fraudulent Apps

The FBI is warning of fraudulent cryptocurrency apps that have stolen millions from investors.

vertcoin logo in front of two nvidia rtx 2080 gpus  1
The Quick Guide to Mining Vertcoin

It's easier to mine than Bitcoin or Ethereum, so why not give it a try?

shape of skull in computer code 1
5 Key Types of Computer Worms You Should Know

Based on the mode of propagation, computer worms usually fall into one of these five types.

network-btc-1 1
What Is a Mempool in Crypto?

Cryptocurrency transactions aren't as straightforward as a regular digital transaction, and mempools form a crucial part of the process.

phishing hook stealing email on laptop  1
The Top 7 Signs of a Phishing Scam

How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.

close up shot of intel chip on motherboard 1
Researchers Find New Spectre Vulnerabilities in Older AMD and Intel Chips

Researchers have found two additional Spectre security vulnerabilities in older models of AMD and Intel processing chips.

coinbase logo on crypto chart background 1
Does Coinbase Report to the IRS?

Cryptocurrencies are still subject to taxes, like it or not. But does Coinbase actively report on your account information?

office 365 menu behind alert logo 1
Microsoft Warns of AiTM Phishing Attacks Affecting Over 10,000 Organizations

Microsoft is warning users of a large-scale AiTM phishing campaign that has targeted tens of thousands of organizations since September 2021.

brown wallet with ledger and trezor logos on front 1
Crypto Hardware Wallets Compared: Ledger Nano S vs. Trezor Model One

When it comes to crypto hardware wallets, two names ring out more than most.

16 17 18 19 20
Page 18 / 34