MakeUseOf

Georgina Torbet

  • 83
    articles

Page 2

About Georgina Torbet

Georgina is a science and technology writer who lives in Berlin and has a PhD in psychology. When she's not writing she's usually to be found tinkering with her PC or riding her bicycle, and you can see more of her writing at georginatorbet.com.

Latest Articles

smart-bulbs-risk
How Smart Light Bulbs Can Put Your Home Network at Risk

Smart lighting looks amazing and can be controlled from an app---but did you know smart bulbs pose a risk to your home network?

facial-recognition-legal
Is Facial Recognition Legal in Your Country?

Concerned by the spread of facial recognition surveillance? Here's how the authorities use facial recognition tech where you live.

hack-voting-machines
Here Are All the Ways People Have Found to Hack Voting Machines

Electoral fraud is a concern at any election. Are electronic voting machines secure? Here's how voting machines can be hacked.

cracked-software-security
5 Security Reasons Not to Download Cracked Software

Tempted to download some cracked software and save money? Think again---you risk malware, security issues, and copyright theft.

video-call-security
How Secure Is Skype and Other Video Conferencing Tools?

Think your video conferencing software is secure? Here's how Skype, Zoom, Webex, and others have been hit by vulnerabilities.

google-advanced-protection
Protect Your Google Account Using the Advanced Protection Program

Concerned about online security? So is Google. Here's how to use its Advanced Protection Program to secure your accounts online.

tiktok-threat
Is TikTok Really a National Security Threat?

TikTok security breaches can cause havoc for users. But Chinese ownership makes the social network an even greater security risk.

ring-device-safety
Is Your Ring Device Making Your Home Less Safe?

Ring smart doorbells and cameras have been hacked, but they're not alone. How can you ensure your smart home remains secure?

home-security-safe
Wyze Exposed Customer Data: 6 Ways to Keep Your Home Security System Safe

A data breach hit security cam maker Wyze, leaking the data of millions of users. Here's how to secure your home security cams.

discover-bios
How to Access the BIOS on a Windows 8 Computer

Windows 8 simplified access to the BIOS. Instead of key combos, you can just use the Windows 8 boot options menu.

pc-os
Which Operating System Should You Choose for Your Next PC?

Buying a new PC? You have more operating system choices than ever. Which is the best operating system for your computer?

pc-energy-use
How Much Energy Does Your PC Use? (And 8 Ways to Cut It Down)

Wondering if computers use a lot of power? It's time to learn how much electricity your computer is using and how to reduce it.

game-keys
What to Know Before Buying Discounted Game Keys

There are things you need to know before buying discounted game keys. Heed these tips so you aren't scammed!

uefi-motherboard
What Is UEFI And How Does It Keep You More Secure?

If you've booted your PC recently you might have noticed the acronym "UEFI" instead of BIOS. But what is UEFI?

setup-vpn-android
How to Access Region-Blocked Media on Android

Here are several methods to access region-blocked content on Android, including services like Manga Rock and Webtoon.

unlocked phone showing 5g on homescreen corner
5G
6 5G Security Risks You Need to Know About

5G technology is being rapidly adopted by consumers and businesses across the country. Explore emerging security pitfalls and possible safeguards.

first-gaming-pc
Getting Your First Gaming PC? Follow These 6 Tips

Looking for a gaming PC? Should you buy, or build your own? Here's how to buy a gaming PC to meet your needs, or just build one.

facebook-spying
Can the Facebook App Actually Secretly Spy on You?

Those rumours look like they will never subside. Can Facebook actually secretly spy on you with its smartphone app?

google-store-medical-data
Google Will Store Medical Data in the Cloud: Is That Good or Bad?

Google now stores medical data in the cloud. But is this as safe, secure, and private as you want your medical history to be?

data-breach
What Is a Data Breach and How Can You Protect Yourself?

A data breach can be devastating. Hackers target money and identity. How can you protect yourself from a data breach?

1 2 3 4 5
Page 2 / 5