More stories

  • in

    How Chrome’s enhanced protection tries to keep you safe from online dangers

    Google/ZDNETWith all the hazards lurking online, your browser is your first line of defense against malicious websites and other threats. To try to keep you safe and secure, Google bakes into Chrome a feature known as Safe Browsing, which offers an Enhanced Protection level. In a blog post published Tuesday to mark Safer Internet Day, Google explains how Enhanced Protection works and why you should enable it in Chrome.Introduced in 2005, Google Safe Browsing looks out for malware, phishing scams, and other online threats that aim to attack you in real-time. Available on desktops and mobile devices (both Android and iOS), Safe Browsing works across Google products, including Chrome, Search, Gmail, and Google Ads. At Google’s Safe Browsing website, you can even enter the URL for a specific site or page to see if it’s been flagged as malicious or suspicious.Also: 5 browser extension rules to live by to keep your system safe in 2025To give you a choice, Safe Browsing offers two levels of protection — Standard Protection and Enhanced Protection.Standard Protection warns you about sites, downloads, and extensions already known to be malicious. This mode also alerts you if one of your accounts may have been compromised in a breach. More

  • in

    I found the most private and secure way to browse the web – and it isn’t incognito mode

    ZDNETA while ago, I wrote a piece on the best way to ensure your privacy with a web browser. Part of that advice was to use the Tor browser. In simplest terms, you cannot get more privacy and security from a web browser than when using Tor. And given how important privacy and security are now, Tor should be on your radar.Also: How to turn on Private DNS Mode on Android – and why it’s a must for securityThe Tor browser uses the Onion network to ensure privacy and security. What is the Onion network? First off, Tor is short for “The Onion Router.” When using the Onion network, all traffic is encapsulated in layers of encryption, which are transmitted through a series of nodes called “onion routers.” As the traffic passes through a node, it peels away a single layer that reveals the next destination for the data. This makes it very difficult for a third party to trace your internet activity (more so than any other browser).Now that you know what Tor is, let me show you how easy it is to use.How to connect Tor to the Onion networkWhat you’ll need: The only thing you’ll need is Tor Browser installed on your desktop or mobile device. I’ll demonstrate Tor Browser on Linux, but the platform you use won’t matter. You can download the Tor Browser for your desktop from the official download page. The link for the Android version will take you to a page with downloads for .apk files. On that same page, you’ll find a link to the Google Play Store Tor entry. I suggest installing Tor on Android from the Google Play Store because sideloading .apk files can lead to security issues.Also: For anonymous browsing, these extensions are the next best thing to TorWhen using Linux, you can also install Tor from the standard repositories, which means it should be available to install from your desktop app store. For example, installing on an Ubuntu-based distribution is as simple as running the following command: sudo apt-get install torbrowser-launcher -yOnce you have Tor installed, proceed to step one. More

  • in

    Serious about online privacy? This ‘live’ Linux OS is for you

    ZDNETTails stands for “The Amnesic Incognito Live System,” and the operating system certainly lives up to that name.But what is Tails?Tails is a live operating system, which means it’s not installed. Instead, it runs completely from your system’s RAM. Because of this, you can run your usual operating system and, when you need serious privacy, insert a bootable USB drive (with Tails on it), boot your computer, and enjoy all the privacy you need.Also: How to use Tor to privately browse the web – it’s easier than you thinkAs soon as you boot Tails, you’ll be greeted by a Tor connection window, which allows you to enable an automatic Tor connection and even hide the fact that you’re connecting to Tor from your local area network. More

  • in

    Your Netgear Wi-Fi router could be wide open to hackers – install the fix now

    ZDNETNetgear has resolved a couple of critical security vulnerabilities affecting several of its products. With the fixes in place, the company is advising affected customers to update their devices ASAP.Also: Bye bye, Wi-Fi: This low-cost adapter lets you set up a wired network without running ethernetOne set of fixes patches an unauthenticated RCE (Remote Code Execution) security vulnerability, which could allow an attacker to remotely run malicious code on a targeted device without permission or authentication.The Wi-Fi routers and access points affectedThis issue affects three Wi-Fi routers: Nighthawk Pro Gaming WiFi 6 Router model XR1000, the Nighthawk WiFi 6 Pro Gaming Router model XR1000v2, and the Nighthawk Pro Gaming Router model XR500. The bug addressed here was rated Critical with a CVSS (Common Vulnerabilities Scoring System) score of 9.8.The other set of fixes addresses an authentication bypass security vulnerability, which could let an attacker remotely access a device without authentication.Also: I turned my Starlink Mini into a near-perfect off-grid internet solution. Here’s howThis bug affects three wireless access points: the WiFi 6 AX3200 Dual Band Wireless Access Point model WAX206, the WiFi 6 AX4200 Dual-band Multi-Gig PoE Access Point model WAX220, and the WiFi 6 AX1800 Dual-band PoE Wireless Access Point model WAX214 v2. This flaw was rated Critical with a CVSS score of 9.6. More

  • in

    Grubhub breach exposed customer data. Should you be worried?

    ZDNETGrubhub was hit by a data breach that compromised account information for a certain set of customers. Revealing the breach earlier this week, the food delivery service said that the attacker exploited an account belonging to a third party that provided support for the company. In response, Grubhub deleted the account’s access and removed the provider from its systems.Customer data in breachCaught up in the breach were the names, email addresses, phone numbers, and the card type and last four digits of the payment cards used by Grubhub campus diners, as well as diners, merchants, and drivers who used its customer care service. The campus dining program is one in which students use the service to order food both on and off campus. Grubhub offers dedicated help and support services for different types of users.Also: Proton Pass vs. 1Password: Which password manager is right for you?The attacker also retrieved hashed passwords for certain legacy systems, prompting Grubhub to change any passwords that may have been accessed.However, the company said that no sensitive personal information was compromised in the breach. That includes Grubhub Marketplace customer passwords, merchant login information, full payment card numbers, bank account details, and Social Security or driver’s license numbers. More

  • in

    The best Bluetooth trackers of 2025: Expert tested

    If you’ve ever lost your phone, keys, wallet, or even your dog, you need a Bluetooth tracker. This must-have accessory keeps tabs on the items you can’t live without. These tiny devices attach to almost anything — a keychain, remote, your pet’s collar — so you can see their precise location on your phone at all times.  Also: The best GPS trackers for kids in 2025: Expert recommendedBut which Bluetooth tracker should you buy? With dozens of brands, sizes, and price points available, finding the ideal tracker requires tracking down some pertinent information (no pun intended).What is the best Bluetooth tracker right now?At ZDNET, we’ve reviewed and compared many of the best Bluetooth tracker offerings on the market and rounded up our favorites below. Our pick for the best Bluetooth tracker overall is the Apple AirTag More

  • in

    5 great Chrome browser alternatives that put your privacy first

    ZDNETIn this age of constant digital malice, it’s beyond the point where everyone should be thinking “security first.” All it takes is one momentary lapse of reason, and a bad actor has your information.You don’t want that.Nor do you want third parties to collect your data.With that in mind, Chrome should be considered a problem because it has a constant target on its back and is known to be one of the biggest offenders of data collection, profiling, and fingerprinting.Also: How I made Perplexity AI the default search engine in my browser (and why you should too)What do you do?Fortunately, there are plenty of Chrome-based alternatives that take security up a notch or two.Let me offer you a few suggestions.1. Brave BrowserBrave is one of the most secure Chrome-based browsers on the market. It was created by the creator of JavaScript and is fairly locked down by default. Not only does Brave not store user information, but it also includes built-in blockers for ads, trackers, scripts, fingerprinting, and third-party storage. On top of all the blockers, Brave also includes built-in access to the Tor network and a user-friendly VPN. Oh, did I mention it includes a dedicated, private search engine (Brave Engine), global HTTPS encryption, and a built-in cryptocurrency wallet (which can be disabled)? For those who fear Brave would be too different from Chrome, fear not. Anyone who has used any sort of web browser will feel right at home with Brave. Brave is free and can be installed on Linux, MacOS, Windows, Android, and iOS. Also: The best secure browsers for privacyBest for: Brave is best for those who want all of their browser security baked in (without having to configure a thing) and depend on a VPN for added security. More

  • in

    Proton Pass vs. 1Password: Which password manager is right for you?

    Jada Jones/ZDNETIt’s easy to become overwhelmed by a sea of options when looking for a new password manager. There are various tools to choose from that offer different features, device compatibility, and price points. You want to compare which ones do the basics well and have the extras you need – all in a package that ensures your data is safe and secure. Also: The best password managers: Expert testedIn our head-to-head comparison of Proton Pass and 1Password, Proton Pass gets high marks for its focus on privacy and free plan. On the other hand, 1Password provides a smoother and more consistent user experience with all the features you’d expect from a premium password manager. When deciding between the two, we recommend weighing which features and services you’ll use most and whether you need more than just password management. Here’s how these top password managers stack up so you can determine which one best fits your needs.  Specifications Proton Pass1PasswordKey featuresHide-my-email aliases, dark web monitoring, vault, and record sharingTravel Mode, external credential sharing and guest access, record typesFree version✓14-day trialCompatibilityWindows, macOS, Linux, iOS, Android, Chrome, Firefox, Safari, Edge, and Brave, web appWindows, macOS, Linux, iOS, Android, Chrome, Firefox, Safari, Edge, Brave, web appSecurity featuresAES-256 encryption, open source, 2FAAES-256 encryption, Secret Key, 2FABiometric unlockFace ID and Touch ID (iOS, macOS), Windows HelloFace ID and Touch ID (iOS, macOS); fingerprint, face, and iris  unlock (Android); Windows Hello; Linux system authenticationUnlimited syncing✓✓Passkey support✓✓Multi-factor authentication✓✓Price$36/year More