MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 8

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
woman waving hat out of car next to apple and connection symbol 1
7 Fixes for When Apple CarPlay Won't Work

CarPlay not working? Check out these quick fixes.

coinbase logo on smartphone feature 1
Coinbase Employee Targeted in SMS Attack

A Coinbase employee has fallen victim to an SMS-based cyberattack, in which certain data was made vulnerable.

cryptocurrency the graph logo on abstract purple background 1
What Is The Graph AI Cryptocurrency and Why Is Its Price Soaring?

The Graph's price has risen considerably recently, but why?

microsoft outlook logo next to spam mail on smartphone  1
Microsoft Outlook Users Flooded With Spam After Filters Break

Microsoft Outlook users have reported waves of spam mail after the email provider's spam filters seemed to have stopped working.

digital graphic of anonymous hooded figure 1
New Mirai Malware Variant Targets IoT Devices and Linux Servers

A new Mirai malware botnet variant is being used to attack IoT devices and Linux-based servers.

digital graphic of multi-colored spheres and crypto coin symbols 1
What's the Difference Between Web3, Blockchain, and Cryptocurrency?

You've probably encountered all of these terms, but how do they link together, and how do they differ?

hooded person behind discord logo 1
Look Out for These 6 Scams on Discord

Discord is a great place to socialize, but the people you mingle with might be cybercriminals. Here are some of the scams you should watch out for.

person wearing headphones playing game on monitor 1
How Much Can You Make as an Indie Game Developer?

Want to get into game development? This is what you can stand to earn.

man swiping bitcoin through pos machine feature 1
Digital Currency vs. Cryptocurrency: What's the Difference?

Digital currency and cryptocurrency are linked, but are they the same?

malware warning on laptop screen 1
What Kind of Malware Is the Most Dangerous?

There are so many malicious programs now, you might be curious about which is actually the most dangerous. Here's what you should know.

fingerprint sensor on phone 1
6 Fixes For When Your Fingerprint Sensor Isn’t Working

The fingerprint scanner on your phone makes everything much easier, but how do you fix it when it's not working?

close up shot of royal mail logo stamp on paper 1
LockBit Ransomware Gang Claims Royal Mail Attack

The LockBit ransomware gang has claimed the Royal Mail cyberattack and is threatening to leak stolen data.

anonymous figure in hoodie in front of matrix code 1
Unpatched VMWare Vulnerability Used by Hackers to Target Servers and Spread Ransomware

Hackers are exploiting an unpatched VMWare vulnerability to target ESXi servers and spread ransomware.

exodus logo web3 wallet feature 1
How to Set Up and Use the Exodus Web3 Wallet

The Exodus Web3 Wallet is one of the best Web3 wallets around, and this is how you can start using it.

Photo of a person working on their computer 1
The 7 Best Places to Stake Algorand (ALGO)

Cryptocurrency staking is a popular way to invest, but where can you stake Algorand?

person using their phone to pay at nfc terminal 1
NFC
6 NFC Payment Myths Debunked For Good

NFC is great, but you've probably heard some half-truths and even outright falsehoods about what it can and cannot do.

two people using pair of computers on desk 1
Ice Breaker Malware Used to Hack Gaming and Gambling Companies

Hackers are using Ice Breaker malware to attack the gaming and gambling industry.

black and white matrix background and google fi logo 1
Google Fi Suffers a Data Theft After T-Mobile Breach

Google Fi has suffered a data breach and has stated that its partnership with T-Mobile led to the incident.

chrome and safari logos in front of close up shot of fiber optic cables 1
Google Chrome vs. Safari: Which Is the Most Secure macOS Browser?

Whether you've got a Mac or MacBook, you need to know which is the better browse to use. Safari vs. Chrome: which is the best for you?

kitten meowing at flowers in garden 1
The 8 Best Websites to Watch Funny Pet Videos

Funny pet videos are wildly popular online. So, here are eight of the best websites you can use to keep up with hilarious animals.

6 7 8 9 10
Page 8 / 34