More stories

  • in

    How to use Microsoft Authenticator as your password manager

    iStockphoto/Getty Images I use a password manager on my PC and mobile devices. For me, it’s still the best way, and really the only way, to juggle all the unique and complex passwords for my online accounts. I’d advise all website users to adopt a password manager for the same purpose. But if you don’t […] More

  • in

    Bosses spying on you? Here's the most disastrous truth about surveillance software

    Does it actually work? Andrzej Wojcicki/Getty Images It’s easy to feel disturbed these days, even if you’re still working from home. more Technically Incorrect The notifications are constant. The pings ring in your ears, leaving a nasty echo. And then there’s the spying. When the pandemic struck, companies worried that they couldn’t observe their employees […] More

  • in

    Jit and ZAP: Improving programming security

    iStockphoto/Getty Images Jit, a startup programming security company, dreams of being a top security power. To help make those dreams a reality, Jit recently hired Simon Bennetts, the founder of the world’s most popular web app security scanner, Open Web Application Security Project (OWASP) Zed Attack Proxy (ZAP). Simon Bennetts At Jit, Bennetts will continue […] More

  • in

    The 5 best walkie-talkies of 2022

    You may think walkie-talkies are a thing of the past since we have smartphones, but there are always situations where cellular connectivity is limited, or you may not want to buy your kid a smartphone just yet. ZDNET Recommends Walkie-talkies are great for communicating within a specific mile range, and while their primary function is just that, modern-day walkie-talkies have features like smartphone apps, severe weather alerts, flashlights, and more. We’ve rounded up the best walkie-talkies to help you communicate from anywhere easier.  Must read: More

  • in

    Is Amazon about to ruin Alexa answers with ads?

    Amazon Echo Dot (third-gen) Amazon I’m a product guy. Way back in the day I was actually a product marketing executive for a big tech company. I’ve shipped hundreds of products over the years. You always try to marry a need with a solution. Meet enough folks’ needs, and they’ll buy your product. Generally, though, […] More

  • in

    NSA and CISA: Here's how hackers are going after critical systems, and what you need to do about it

    Getty Images The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory explaining how to thwart cyberattacks on operational technology (OT) and industrial control system (ICS) assets.  The new joint advisory outlines what critical infrastructure operators should know about their opponents, citing recent cyber attacks on Ukraine’s energy […] More