More stories

  • in

    How to find your BitLocker recovery key – and save a secure backup copy before it’s too late

    JuSun/Getty Images Windows 11, like its predecessor, includes easy options to encrypt your system drive. With BitLocker device encryption turned on for your PC’s system drive, your personal data is safe if your laptop is lost or stolen.  Also: How to upgrade your ‘incompatible’ Windows 10 PC to Windows 11 If Windows determines that boot integrity has been […] More

  • in

    I tested 10 AI content detectors – and these 3 correctly identified AI text every time

    diyun Zhu/Getty Images When I first examined whether it’s possible to fight back against AI-generated plagiarism, and how that approach might work, it was January 2023, just a few months into the world’s exploding awareness of generative AI.  This is an updated version of that original January 2023 article. When I first tested GPT detectors, […] More

  • in

    Don’t ignore Microsoft’s February Patch Tuesday – it’s a big one for all Windows 11 users

    ZDNETMicrosoft’s Patch Tuesday rollout for February is a big one, not simply in size but in scope. Rolled out on February 11, the latest updates not only add a few new features but squash several bugs, including a few critical security vulnerabilities.Let’s start with the new features. The latest round of patches, available as KB5051987 for Windows 11 24H2 and KB5051989 for Windows 11 23H2, enhances built-in tools such as the Taskbar and File Explorer.Also: Windows 11’s bug-fixing update is making things worseAccording to its changelog, Microsoft says the update improves the previews and animations that appear when your cursor hovers over Taskbar icons. Next, a new icon appears in the System Tray when you use an app that supports Windows Studio Effects, which can display special effects through the front-facing camera on your PC or monitor. The update also adds a new simplified Chinese font called Simsun-ExtG.There’s one more. Windows can now automatically restart certain apps when you exit and then sign back in. To enable this option, go to Settings, select Accounts, and then click Sign in options. Turn on the switch for “Automatically save my restartable apps and restart them when I sign back in.” More

  • in

    Google Family Link now limits who can contact your child’s device

    Google Google Family Link, the parental control app that lets you keep an eye on your child’s digital activity, is rolling out some new features designed to help you keep your kids safer.  In today’s announcement, Google detailed several changes coming to the app, including a redesigned interface, improved scheduling controls, and the ability to […] More

  • in

    How Chrome’s enhanced protection tries to keep you safe from online dangers

    Google/ZDNETWith all the hazards lurking online, your browser is your first line of defense against malicious websites and other threats. To try to keep you safe and secure, Google bakes into Chrome a feature known as Safe Browsing, which offers an Enhanced Protection level. In a blog post published Tuesday to mark Safer Internet Day, Google explains how Enhanced Protection works and why you should enable it in Chrome.Introduced in 2005, Google Safe Browsing looks out for malware, phishing scams, and other online threats that aim to attack you in real-time. Available on desktops and mobile devices (both Android and iOS), Safe Browsing works across Google products, including Chrome, Search, Gmail, and Google Ads. At Google’s Safe Browsing website, you can even enter the URL for a specific site or page to see if it’s been flagged as malicious or suspicious.Also: 5 browser extension rules to live by to keep your system safe in 2025To give you a choice, Safe Browsing offers two levels of protection — Standard Protection and Enhanced Protection.Standard Protection warns you about sites, downloads, and extensions already known to be malicious. This mode also alerts you if one of your accounts may have been compromised in a breach. More

  • in

    I found the most private and secure way to browse the web – and it isn’t incognito mode

    ZDNETA while ago, I wrote a piece on the best way to ensure your privacy with a web browser. Part of that advice was to use the Tor browser. In simplest terms, you cannot get more privacy and security from a web browser than when using Tor. And given how important privacy and security are now, Tor should be on your radar.Also: How to turn on Private DNS Mode on Android – and why it’s a must for securityThe Tor browser uses the Onion network to ensure privacy and security. What is the Onion network? First off, Tor is short for “The Onion Router.” When using the Onion network, all traffic is encapsulated in layers of encryption, which are transmitted through a series of nodes called “onion routers.” As the traffic passes through a node, it peels away a single layer that reveals the next destination for the data. This makes it very difficult for a third party to trace your internet activity (more so than any other browser).Now that you know what Tor is, let me show you how easy it is to use.How to connect Tor to the Onion networkWhat you’ll need: The only thing you’ll need is Tor Browser installed on your desktop or mobile device. I’ll demonstrate Tor Browser on Linux, but the platform you use won’t matter. You can download the Tor Browser for your desktop from the official download page. The link for the Android version will take you to a page with downloads for .apk files. On that same page, you’ll find a link to the Google Play Store Tor entry. I suggest installing Tor on Android from the Google Play Store because sideloading .apk files can lead to security issues.Also: For anonymous browsing, these extensions are the next best thing to TorWhen using Linux, you can also install Tor from the standard repositories, which means it should be available to install from your desktop app store. For example, installing on an Ubuntu-based distribution is as simple as running the following command: sudo apt-get install torbrowser-launcher -yOnce you have Tor installed, proceed to step one. More

  • in

    Serious about online privacy? This ‘live’ Linux OS is for you

    ZDNETTails stands for “The Amnesic Incognito Live System,” and the operating system certainly lives up to that name.But what is Tails?Tails is a live operating system, which means it’s not installed. Instead, it runs completely from your system’s RAM. Because of this, you can run your usual operating system and, when you need serious privacy, insert a bootable USB drive (with Tails on it), boot your computer, and enjoy all the privacy you need.Also: How to use Tor to privately browse the web – it’s easier than you thinkAs soon as you boot Tails, you’ll be greeted by a Tor connection window, which allows you to enable an automatic Tor connection and even hide the fact that you’re connecting to Tor from your local area network. More

  • in

    Your Netgear Wi-Fi router could be wide open to hackers – install the fix now

    ZDNETNetgear has resolved a couple of critical security vulnerabilities affecting several of its products. With the fixes in place, the company is advising affected customers to update their devices ASAP.Also: Bye bye, Wi-Fi: This low-cost adapter lets you set up a wired network without running ethernetOne set of fixes patches an unauthenticated RCE (Remote Code Execution) security vulnerability, which could allow an attacker to remotely run malicious code on a targeted device without permission or authentication.The Wi-Fi routers and access points affectedThis issue affects three Wi-Fi routers: Nighthawk Pro Gaming WiFi 6 Router model XR1000, the Nighthawk WiFi 6 Pro Gaming Router model XR1000v2, and the Nighthawk Pro Gaming Router model XR500. The bug addressed here was rated Critical with a CVSS (Common Vulnerabilities Scoring System) score of 9.8.The other set of fixes addresses an authentication bypass security vulnerability, which could let an attacker remotely access a device without authentication.Also: I turned my Starlink Mini into a near-perfect off-grid internet solution. Here’s howThis bug affects three wireless access points: the WiFi 6 AX3200 Dual Band Wireless Access Point model WAX206, the WiFi 6 AX4200 Dual-band Multi-Gig PoE Access Point model WAX220, and the WiFi 6 AX1800 Dual-band PoE Wireless Access Point model WAX214 v2. This flaw was rated Critical with a CVSS score of 9.6. More