How to Set Up an Apple Recovery Key on Your iPhone, iPad, or Mac
Add even more protection to your Apple ID account by creating a recovery key to use with it.
How to Secure Your iPhone SIM Card With a SIM PIN
Keep your SIM card secure by setting up a PIN code to use with it.
How to Set Up Two-Factor Authentication in Slack
You can add an extra layer of security to your Slack account by setting up two-factor authentication. Here's how to enable 2FA in Slack.
How to Catch and Remove Hidden LaunchDaemons and LaunchAgents on Mac
LaunchDaemons and LaunchAgents can have a dark side. Here's how to monitor them and keep your Mac safe.
How to Protect Your Coinbase Account With Two-Step Verification
Love Bitcoin? Use Coinbase? Take a moment to switch two-factor authentication on. Go on.
How to Enable Two-Factor Authentication in Asana
Protect yourself from hackers by setting up two-factor authentication in Asana, so you can work with peace of mind.
How to Set Up Two-Step Login in Wise
It's vital you protect your account on Wise (formerly TransferWise). Here's how to do that using Two-Factor Authentication.
7 Things You Should Never Do on Your Work Computer
Your work computer may not be as private as you think, and it could be monitoring all your online activity. Here's what you shouldn't do on it!
What Every Parent With a Connected Child Should Know
If your children go online regularly, you need to look after them, but how do you actually do that? Here are some security tips to remember.
How to Change Your iPhone Passcode
Keep your iPhone secure by changing your passcode every now and then.
What Is a Chip Card and Why Did My Bank Send One?
Has your bank sent you a new card without you requesting one? It might be a chip card, which offers better security for you and your bank.
10 Steps to Take When You Discover Malware on Your Computer
Getting malware on your computer is a huge risk to your security. Here's what you can do to limit the damage if this happens.
How to Identify Stimulus Check Scams and How to Protect Yourself
Stimulus check scams are a big source of revenue for scammers, so here's what you need to look out for.
How to Check if a Second-Hand iPhone Was Stolen Before Buying
Thinking of buying a second-hand iPhone? You need to make sure it's not been reported as stolen or lost first.
How to Prevent Your Home Router From Being Targeted by Hackers
Even your router can be a security risk. Here's how you can tell if your router's been hacked and what to do about it.
What Are Card Skimmers and How Do You Spot Them?
Here's why you might be risking your privacy and financial security when you swipe your credit or debit card.
6 Things to Update to Keep Your Smartphone Secure
Want to make sure your Android or iOS device is secure? Here's what you need to keep up-to-date.
Is AirDrop Secure or Is It a Security Risk?
You can use Apple's AirDrop facility to share files including photos between devices, but is AirDrop safe to use?
10 Ways to Protect Against Doxxing
Doxxing involves cybercriminals posting personal information online. Here's how to defend yourself from being doxxed.
5 Ways Hackers Bypass Fingerprint Scanners (How to Protect Yourself)
Are fingerprint readers safe and secure? Think again! Learn how fingerprint scanners can be hacked and bypassed.