More stories

  • in

    Why the road from passwords to passkeys is long, bumpy, and worth it – probably

    JennaWagner/Getty Images Out of the blue, I received a text from my father asking me, “What’s the difference between a password and a passkey?”  Somewhere, in his daily online journey, he was prompted by a website or application — a “relying party” in authentication lingo — to create a passkey. But the benefit wasn’t clear […] More

  • in

    8 simple ways Mac users can better protect their privacy

    Kyle Kucharski/ZDNETMacOS is a solid operating system. But it doesn’t matter how secure an operating system is; it’s vulnerable if connected to a network. As for privacy, if you get online, your privacy is at stake, so you must never assume that you’re safe just because you’re using Apple’s OS.You can always do things to improve the chances that your privacy will not be infringed upon. What are those things?Let’s jump in.1. Use a VPNA VPN is always a good idea. Why? A VPN not only anonymizes your IP address (so it’s much harder to track you), but it will also encrypt your traffic. Individually, those things can help. Together, they are a powerful weapon against those who would disrupt your privacy. There are plenty of VPNs you can use (such as Proton VPN or Nord VPN), but it’s important that you use one that integrates with the operating system, so all of your outgoing traffic is anonymized and encrypted. If you use only a browser extension, then only the traffic leaving your web browser is altered. To get the most security and the fastest speeds, use a paid option. Most free VPNs tend to slow down your network traffic, which negatively impacts your browser’s speed.Also: The best VPN for Mac: Expert tested and reviewed2. Use strong passwordsThis should go without saying, but strong passwords are the easiest method of protecting your accounts (starting with your MacOS user account). If you use weak passwords, someone could break into your desktop and wreak havoc on your privacy.You should also be using a password manager (such as Bitwarden). Not only do password managers do a great job of securing your login credentials, but they also include random password generators capable of creating very strong passwords. If your MacOS account is secured with a weak password, change it immediately in Settings > Login Password.Also: The best password manager for Mac3. Use encrypted storageYour MacOS drive is most likely encrypted, which will protect you if someone steals your computer. With the storage encrypted, they’ll have a harder time accessing the data. But that doesn’t mean you can’t benefit from using encryption tools.Out of the box, your MacOS machine uses FileVault  — enabled by default — to secure the data on your disk. However, you might want to take this a step further by encrypting specific folders in your home directory to give them an extra layer of protection. You can use tools like VeraCrypt (available for free) that feature drag-and-drop AES-256 encryption for files and folders and easy sharing with Windows.  More

  • in

    The 4 VPNs I swear by for Linux – and why I trust them

    Elyse Betters Picaro / ZDNETI know you’ve heard this before, but Linux is a powerful, flexible, and secure operating system. From my experience, it is hands down the most secure OS on the market. That doesn’t mean it couldn’t use a bit of help. Out of the box, most Linux distributions do not anonymize or encrypt your online traffic.Also: The best VPN services: Expert testedSure, you can install the Tor Browser, but that will only affect your web traffic. If you want even more protection against those who would steal your information and use it against you, consider using a VPN, which will anonymize and encrypt all of your outgoing traffic. By anonymizing your traffic, your IP address and location are masked, making it difficult to track you. The encryption provided by VPNs ensures that the data packets leaving your system cannot be easily viewed by a third party. Also: How to use a VPN on Linux – and why you shouldBut are there VPNs that support Linux? Of course. In fact, I have a shortlist of four VPNs, each of which does an excellent job of protecting the network traffic that leaves your system. 1. ProtonVPN ProtonVPN More

  • in

    Best antivirus for Mac in 2025: I tested your top software options

    Macs are not immune to malware, and while it’s not as big a target as Windows, plenty of cybercriminals put their efforts toward cracking Apple’s OS. An infection on your system, whether the result of a phishing attack or other means, can severely compromise your device and your data — which is why your Mac needs antivirus software. Also: The best antivirus software: Expert tested What is the best antivirus for Mac right now? I tested antivirus software for Mac to determine which programs are best at keeping your device safe from threats like ransomware, spyware, and potentially unwanted programs. As a third-party option, Bitdefender Antivirus Plus gets top marks for protecting your Mac in real-time with thorough malware detection and removal that doesn’t bog down your device.Also: The best free antivirus software The best antivirus for Mac in 2025 More

  • in

    Biometrics vs. passcodes: What lawyers say if you’re worried about warrantless phone searches

    rob dobi/Getty Images Accompanying the rise in detentions and deportations by US Immigration and Customs Enforcement (ICE) and other authorities are increasingly frequent reports of smartphone searches. US authorities allegedly dig through past emails, photos, social network activity, and other content to establish grounds for apprehension or other enforcement decisions. While such intrusions as a […] More

  • in

    Tired of unsolicited nude pics? Google’s new safety feature can help – how it works

    Elyse Betters Picaro / ZDNETA new Google feature designed to prevent you from seeing unwanted nudity is rolling out to Google Messages.First announced last fall, Sensitive Content Warnings is an optional feature that blurs images with nudity before you see them and warns about the dangers of sending nude images if you’re trying to do so.Also: 6 hidden Android features every user should knowand how they make life easierGoogle calls it a “speed bump” designed to keep users safe. How Sensitive Content Warnings workIf you receive a questionable image, not only will Messages blur the image, but you’ll also see a link to resources explaining why nude images can be harmful, as well as an option to block the number. You can tap “Next” if you do want to see the image. If you’re sending an image, you’ll see a reminder about the risks, and you’ll have to click “Confirm to Continue” to prevent accidental sharing. Also: Your Android phone is getting a new security secret weapon – how it worksThe feature does not currently work on videos. Google adds that photo detection happens entirely on the device, so the company does not have access to any images. More

  • in

    New Google email scams are alarmingly convincing – how to spot them

    Kerry Wan/ZDNETA sophisticated phishing scam has been taking advantage of Google security flaws to convince people that the malicious emails and websites are legitimate.In a series of X posts spotted by Android Authority, developer Nick Johnson explained how he was targeted by a phishing attack that exploits flaws in Google’s own infrastructure. In his first post, Johnson includes a screenshot of the scam email claiming that Google had been served a subpoena requiring it to produce a copy of his Google account data.Also: Clicked on a phishing link? 7 steps to take immediately to protect your accountsThe text of the email reads correctly; that is, it uses the right terms and doesn’t contain any typos or broken English. The message itself is considered valid and signed by Google. It’s sent from no-reply@google.com, a legitimate, automated company-used address. The email itself passes the DKIM signature check, which aims to verify the authenticity of a message. No other warnings appear, so this looks completely legitimate.Clicking a Sites link in the email takes you to a support portal that looks like an actual Google page. The page is even hosted on Google Sites, a platform where people can create and run their own websites. Using such a platform adds legitimacy to the scam as people assume it’s the real deal. More

  • in

    This ChatGPT trick can reveal where your photo was taken – and it’s unsettling

    Elyse Betters Picaro / ZDNETPeople have found a new use for ChatGPT: Figuring out locations from photos. OpenAI’s latest AI models, o3 and o4-mini, can analyze images beyond just recognizing objects; they can zoom in, crop, and detect visual clues in photos to help identify places, landmarks, and even specific businesses. This capability is fascinating, but it’s also raised some privacy concerns about how easily people can use AI to reverse-engineer location data from images.Also: ChatGPT just made it easy to find and edit all the AI images you’ve ever generatedTechCrunch reported that people are uploading photos — anything from restaurant menu snapshots to casual selfies — and asking ChatGPT to guess where they were taken. The AI does this by looking at everything in the image: the type of buildings, landscape features, and even subtle hints like the architecture or the layout of a city. It then taps into its knowledge database and sometimes the internet to make an educated guess about the location. The results can be surprisingly accurate, and it’s got people talking. Some users have even tested the AI with blurry photos or images with partial objects, and the model still managed to make a guess. Also: Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plansI love playing GeoGuessr, a game where you’re dropped into a random location on Google Street View and have to guess where you are based on the surroundings. So this ChatGPT capability was super fun to test myself. I uploaded a few photos to see how ChatGPT would handle the challenge. However, as with any AI, the result was not always perfect. More