MakeUseOf

Katie Rees-Senior Writer for Tech Explained and Security

Katie Rees

Senior Writer for Tech Explained and Security

Page 9

About Katie Rees

Katie has been writing about tech-based topics for two years, with a specific interest in cybersecurity, AI, and cryptocurrency. Katie has covered a variety of topics during her time at MUO, including crypto explainers, cybersecurity guides, VPN reviews, recent hacks, and software tutorials. With a passion for emerging tech, Katie is also excited to see what new devices and digital platforms the coming years will bring. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
laptop half open in dark room  1
8 Underrated Tech Items From the Last Five Years

Are these the most underrated tech items?

black tech products on desk 1
NFT
8 Overrated Tech Items From the Last Five Years

There are so many we could list, but these really take the crown.

black and white shiba inu digital graphic 1
Reddit Users Discover Dangerous Shiba Inu Airdrop Scam

Reddit users have uncovered a cryptocurrency airdrop scam designed to drain wallets.

stablecoin logos standing with black background 1
4 Reasons You Can Trust an Algorithmic Stablecoin

While algorithmic stablecoins are controversial, there are several reasons you can trust them.

t-mobile logo in front of black and white photo of code 1
37 Million Customers' Data Exposed in Huge T-Mobile Breach

T-Mobile has suffered a huge data breach, in which 37 million customers' data was exposed to malicious actors.

paypal logo in front of bitcoins on red background 1
5 Ways to Buy Bitcoin With PayPal

Buying Bitcoin doesn't have to be difficult.

green ev painted icon  1
5 Ways Electric Cars Are Bad for the Environment

EVs are touted as the future, but they're not without issue.

ethereum coin held in hand with computer in background 1
Ethereum Is Now Deflationary—But What Does That Mean?

Since the Ethereum Merge, it's been all change for the Ethereum blockchain.

country road with winter and summer mirror scene 1
How Can You Give Your Smartphone a Security Spring Clean?

Here are eight quick ways you can make sure your iPhone or Android smartphone is secure as we head into a new season.

red flag blowing in wind 1
The Top 7 Malware Warning Signs to Look Out For

Worried your device is infected by malware? Or want to recognize the symptoms of an attack? Here are some red flags you need to know about.

person using contactless payment with smartphone 1
NFC
What Is Near-Field Communication (NFC)? How Does It Work?

You probably use it all the time for contactless payments, but how does NFC actually work?

privacy please sign 1
Can Your Android Phone Be Tracked When It’s Turned Off?

Does powering down your Android phone mean that it can no longer be tracked? Here's what you need to know.

earth surrounded by network web behind pi icon 1
What Is the Pi Network? Is Pi Coin a Scam?

The Pi Network is attracting heaps of investors, but is it worth your time? Is the Pi Coin a scam?

person using virtual reality headset with controllers 1
9 Weird and Wacky Products We Saw At CES 2023

See some of the more unusual products introduced at the show.

pink-code-computer 1
New Dark Pink APT Group Targets Government and Military in Asia Pacific

A new APT group known as Dark Pink is targeting government and military bodies in the Asia-Pacific region.

trio of syringes on pale blue background 1
SQL
What Is an SQL Injection? Is It Dangerous?

SQL injections are a form of cyberattack that have been around since the 1990s. So what are they and how do they work?

finding malware on your smartphone 1
ChatGPT Used By Cybercriminals to Write Malware

OpenAI's ChatGPT chatbot is being leveraged by threat actors to write malware.

red filtered photo of cctv camera mounted on wall 1
What Is Commercial Spyware? Is It Used by Governments?

Spyware, i.e. software used to monitor and track your activities, is more prevalent than you might think. It even has its own commercial variation...

maxthon logo in front of black and white net background  1
Is the Maxthon Web Browser Safe to Use?

The Maxthon browser has a number of great features, but it's suffered some privacy issues in the past. So is Maxthon actually secure and private?

smartwatch on table displaying lock screen 1
What Makes a Password Truly Secure?

Passwords can be easy to crack. So how can you make yours secure? Here's what makes up a safe password that hackers will find difficult to crack.

7 8 9 10 11
Page 9 / 34