More stories

  • in

    The work tasks people use Claude AI for most, according to Anthropic

    gremlin/Getty Images As AI adoption grows, many are wondering how it will impact the labor market long-term (ChatGPT Deep Research has its own predictions). Anthropic is trying to find out. On Monday, the company published its first Economic Index, which investigates what kinds of employees are using Anthropic’s Claude chatbot and for what types of tasks. Taking a different […] More

  • in

    This smart lock is feature-rich, solves a common problem – and it’s 40% off

    <!–> ZDNET’s key takeaways You can buy a Philips Home Access 4000 Series smart lock for the MSRP of $210 This smart lock is very responsive, taking quick action when commanded, and features plenty of unlocking options in the user-friendly app The lock is a bit slow in the process of locking itself and then […] More

  • in

    How Chrome’s enhanced protection tries to keep you safe from online dangers

    Google/ZDNETWith all the hazards lurking online, your browser is your first line of defense against malicious websites and other threats. To try to keep you safe and secure, Google bakes into Chrome a feature known as Safe Browsing, which offers an Enhanced Protection level. In a blog post published Tuesday to mark Safer Internet Day, Google explains how Enhanced Protection works and why you should enable it in Chrome.Introduced in 2005, Google Safe Browsing looks out for malware, phishing scams, and other online threats that aim to attack you in real-time. Available on desktops and mobile devices (both Android and iOS), Safe Browsing works across Google products, including Chrome, Search, Gmail, and Google Ads. At Google’s Safe Browsing website, you can even enter the URL for a specific site or page to see if it’s been flagged as malicious or suspicious.Also: 5 browser extension rules to live by to keep your system safe in 2025To give you a choice, Safe Browsing offers two levels of protection — Standard Protection and Enhanced Protection.Standard Protection warns you about sites, downloads, and extensions already known to be malicious. This mode also alerts you if one of your accounts may have been compromised in a breach. More

  • in

    I found the most private and secure way to browse the web – and it isn’t incognito mode

    ZDNETA while ago, I wrote a piece on the best way to ensure your privacy with a web browser. Part of that advice was to use the Tor browser. In simplest terms, you cannot get more privacy and security from a web browser than when using Tor. And given how important privacy and security are now, Tor should be on your radar.Also: How to turn on Private DNS Mode on Android – and why it’s a must for securityThe Tor browser uses the Onion network to ensure privacy and security. What is the Onion network? First off, Tor is short for “The Onion Router.” When using the Onion network, all traffic is encapsulated in layers of encryption, which are transmitted through a series of nodes called “onion routers.” As the traffic passes through a node, it peels away a single layer that reveals the next destination for the data. This makes it very difficult for a third party to trace your internet activity (more so than any other browser).Now that you know what Tor is, let me show you how easy it is to use.How to connect Tor to the Onion networkWhat you’ll need: The only thing you’ll need is Tor Browser installed on your desktop or mobile device. I’ll demonstrate Tor Browser on Linux, but the platform you use won’t matter. You can download the Tor Browser for your desktop from the official download page. The link for the Android version will take you to a page with downloads for .apk files. On that same page, you’ll find a link to the Google Play Store Tor entry. I suggest installing Tor on Android from the Google Play Store because sideloading .apk files can lead to security issues.Also: For anonymous browsing, these extensions are the next best thing to TorWhen using Linux, you can also install Tor from the standard repositories, which means it should be available to install from your desktop app store. For example, installing on an Ubuntu-based distribution is as simple as running the following command: sudo apt-get install torbrowser-launcher -yOnce you have Tor installed, proceed to step one. More

  • in

    Is a VPN-ready router the ultimate Wi-Fi upgrade? I tested one to find out

    <!–> ZDNET’s key takeaways The Privacy Hero 2, a $199 router available on FlashRouters, supports NordVPN and Surfshark alongside various VPN protocols. It comes with one year of access to Privacy Hero Wireguard VPN and, with a current promotion, one year of NordVPN. The company should improve the build quality and be more generous with […] More

  • in

    iOS 18.3.1 patches an ‘extremely sophisticated attack’ – and more

    Sabrina Ortiz/ZDNETYesterday, iOS 18.3.1 for iPhone dropped, and while the last few updates have been packed with new features — many related to Apple Intelligence — this one seems to be primarily a security update.Also: Just installed iOS 18.3? I’d change these 3 settings first for the best experienceAnd it’s an important one. More

  • in

    7 crucial rules for setting up a home security camera – and risky spots to avoid

    Maria Diaz/ZDNETIf you’re a subscriber to the Nextdoor app, you’ve seen ample footage of prowling ne’er-do-wells caught in the eye of a video doorbell or home security camera. Hopefully, you don’t have your own first-hand experience with suspicious characters milling around your front porch, or far worse.Also: What to expect at Amazon’s February event: Alexa 2.0, new Echos, and Fire TV upgradesFor good reason, security cameras continue to grow in popularity, and we can expect them to become even more reliable and affordable in 2025. While we don’t necessarily require super high-res imagery from these discrete little devices, you can get the most out of them by being mindful of a few factors — especially where you position your camera(s). 1. Avoid obstructions (even future obstructions)Obviously, you won’t be putting a lens behind anything that blocks its view. Sometimes, though, that can include objects that change in size or shape over time, like trees and shrubs. During wintertime, a clear view of your yard may become a different story when branches bloom with new foliage in the spring.The same can apply to interior views, at least with objects that come and go. Will shutting a door somewhere within your camera’s line of sight block out a good percentage of its field of vision? Will your pet cat find a favorite spot to curl up in for hours at a time, right in front of the device? More