More stories

  • in

    7 hacking tools that look harmless but can do real damage

    Adrian Kingsley-Hughes/ZDNET One of the best ways to stay safe and secure when using your computers and other electronic devices is to be aware of the risks. For the past decade, that’s precisely what I’ve been doing. Most risks are obvious: use strong passwords, don’t download and install software from untrustworthy websites, or hand your […] More

  • in

    How to enable mouse gestures in Opera (and why you should)

    <!–> Image: Opera Software Opera is my default web browser and has been for a while now. This is partially due to the amazing tab management feature, Workspaces, but also because it’s fast and reliable. Although Opera does have a lot of features that might seem like bloat on another browser, Opera still manages to […] More

  • in

    Apple’s new Stolen Device Protection has a big vulnerability. Here’s how to fix it

    <!–> Getty Images/Boris Zhitkov Last week, Apple released iOS 17.3 with much anticipated updates such as Collaborative Apple Music Playlists and AirPlay hotel support. One of the biggest highlights was a new Stolen Device Protection; however, it’s not as secure as we initially thought.  Stolen Device Protection in iOS 17.3 is meant to add an […] More

  • in

    Finally! This is the Linux email client I’ve been hoping for

    Evolution has all the tools you need in a groupware suite. Jack Wallen/ZDNET ZDNET’s key takeaways Evolution is available to install (for free) from any Linux app store or the command line. It has all the tools needed to manage emails, calendars, tasks, contacts, and memos. The UI has a modern feel and setup is […] More

  • in

    How 5G and XR makes mobile shopping faster, better and so much more fun

    <!–> A young woman checks the phone immersed in an artificial Intelligence.  Francesco Carta/Getty Images Humans have incredible capabilities to advance the technologies around us. We’ve created transformational technologies that save lives, like MRI machines and stoplights, to revolutionary handheld technologies like the iPhone and wireless headphones. But there’s a broader network of technology that […] More

  • in

    How to create a passkey for your Google account (and why you should)

    <!–> Luis Alvarez/Getty Images Passwordless authentication is far more secure than using a traditional username and password. Essentially, passwordless authentication uses an encrypted key on a device – your phone, for example – to log you into an account. By using this method, it is far less likely that your accounts will be hacked by […] More

  • in

    How to get to Inbox Zero in no time at all – and stay there

    <!–> simarik/Getty Images Do you ever find yourself just staring at the number of unread messages in your inbox and wondering where to even start? Are you overwhelmed by email? I feel your pain. In fact, I can quantify it. If you were determined to work through a stack of 100,000 inbox messages, processing each […] More