MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 23

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
wifi logo next to shanghai skyline 1
Is It Safe to Connect to Public Wi-Fi in China?

What is internet access like in China? If you're visiting the country, is it safe to connect to public Wi-Fi networks?

vpn app on laptop screen in office 1
What Are VPN Logs and Are They a Security Risk to You?

Virtual Private Networks are supposed to keep your data anonymous. But that's not always the case. Here's why VPN logs are so bad.

coinbase vs binance logo graphic 1
Coinbase vs. Binance: Which Should You Choose?

When it comes to crypto, these are two of the biggest players. But, which you should choose, and why?

bitcoin coins stacked on laptop 1
Here’s Why Bitcoin’s 21 Million Coin Supply Limit Will Never Be Increased

Removing the limit would mean more Bitcoin to go around, but it could have serious consequences.

vpn map on laptop screen outside 1
Free vs. Paid VPNs: Which Should You Choose?

With many providers offering VPN services free of charge, is it worth spending money on a top VPN? Learn what you get for the price.

printer on desk by wall 1
Can Your Printer Be Hacked?

Your network is only as secure as its weakest device. So if you have a network-connected printer, you have to keep it protected too.

avatars connected surrounded by red circles 1
What Is the Splinternet and Is It a Concern?

Would you like a filtered version of the internet?

bitcoin grid behind key 1
What Are Crypto Private Keys and Why Are They Important?

Just like paper money, you should protect your cryptocurrency holdings. But to do so, you should know what a crypto private key is and how it works.

vpn diagram photo with red circle surrounding government logo 1
VPN
Can Governments See Who's Using a VPN?

Are VPNs completely safe as advertised? Does the government know you're using a VPN? Here's everything you need to know.

bitcoin stack behind diamond symbol 1
What Is Bitcoin Diamond (BCD)?

Bitcoin Diamond is one of the derivatives of Bitcoin, but how does it stand out? Does it have any future? Here's everything you need to know.

visa and crypto symbols in front of coins 1
Visa vs. Cryptocurrency: Which Is Better?

Visa is one of the most popular payment methods in the world, but cryptocurrency has risen in prominence recently. Which is better?

police car blue top light  1
How to Call Emergency Services Without a Phone

If you're caught in an emergency without a phone, you might still need to call the authorities. Here's how you can do so.

messaging app icons on phone screen 1
The 5 Best Encrypted Messaging Apps for Android and iOS

Several instant messaging apps offer end-to-end encryption these days, but which ones are the best and most popular? Let's find out.

picture of wet phone 1
USB
6 Simple Tips for Drying Your Smartphone USB Port

If your charging port gets wet, don't panic. Just follow these basic tips.

bitcoin going into trouser pocket 1
QuadrigaCX: How One Man Stole Over $200 Million in Crypto

Learn the story of a Bitcoin fraudster who used a crypto exchange to scam users out of millions of dollars.

players using VR headsets 1
The Top 10 Cryptos You'll Use in the Metaverse

As we inch closer to web3, these cryptos are gaining traction to become the leaders in the metaverse.

vpn behind no access logo 1
8 Places Where VPNs Are Illegal or Restricted

If you're travelling abroad, you might not be allowed to use a VPN. Here are some places using such encryption is banned or restricted.

Charging an iPhone 12 with MagSafe 1
7 Ways to Prolong Your Smartphone's Life

Make sure your expensive smartphone lasts you for years with these maintenance tips. Avoid the usual biennial upgrade cycle and save your money.

suspicious man hiding behind white mask 1
What Is a Ransomware Gang and How Dangerous Are They?

Ransomware attacks on large-scale organizations require group effort and months of planning. Here, you'll learn everything about ransomware gangs.

vpn active on tablet screen 1
Single vs. Double vs. Multi-Hop VPNs: Which Is Better?

Most people only use a single VPN, but is that enough to protect your security and privacy? Or are double or multi-hop VPNs better?

21 22 23 24 25
Page 23 / 34