It’s easy enough to delete one Facebook post at a time, but there’s no built in way to delete posts in batch. For that, you’ll need to turn to a browser extension.
The Cambridge Analytica fiasco wasn’t really a data breach. Everything collected was allowed by Facebook’s Terms of Service. So, how can you protect yourself against these sort of things?
AMD has now confirmed that the “AMD Flaws” revealed by CTS-Labs are real. We recommend installing the BIOS update that fixes them when it’s available. But, don’t worry too much. The danger of these flaws has been exaggerated.
Facebook has a lot of information about—every post shared, photo uploaded, message sent, item clicked on, and pretty much every other data point you can imagine. And it’s all in the name of serving you better ads and keeping you on Facebook.
It’s a natural instinct to wonder who is viewing your Twitter profile and your Tweets, but while plenty of services claim to offer this feature, it’s really not possible.
To fully protect your PC against Spectre, you need updated Intel CPU microcode. This is normally provided by your PC manufacturer via a UEFI firmware update, but Microsoft now offers an optional patch with the new microcode.
Not all cloud file storage services are the same. There’s a big difference between file syncing tools like Dropbox and online backup services like Backblaze when it comes to backing up your important files.
If you keep a regular eye on your credit report, you’ll notice when identity thieves open accounts in your name and when errors are listed that might cause you problems in the future. Here’s how to do it for free.
Microsoft is now withholding security updates from Windows 7 users who don’t have an antivirus installed. There’s a way around this limitation, but you have to manually set a registry key.
When you first install Ubuntu or another Linux distribution on Windows 10, you’re asked to create a UNIX username and password. Bash automatically signs into that user account when you launch the shell, but you can change those credentials if you need to.
If you like the idea of blocking overbearing ads, but don’t want to steal revenue from sites you like, you can set AdBlock to allow all ads by default, and then block them as needed.
If you’re anything like me, you’ve downloaded dozens of iOS apps, tried them, and then never used them again. Instead of leaving them to clutter up your home screen, you should get rid of them.
Privacy is a major concern these days, and it’s easy to worry about smartphones that are “always listening.” To combat this, Google is making a major change to how background apps are handled in its upcoming Android P.
Microsoft is finishing work on Windows 10’s next update, which will probably be named the “Spring Creators Update” and was codenamed “Redstone 4”. This is Windows 10 version “1803”, and it will launch sometime in April 2018.
Non-consistent updates on Android devices have plagued the platform since its initial rise to popularity. Project Treble is Google’s plan to help manufacturers streamline the update process for more timely updates.
Touch ID and Face ID have made unlocking iPhones super fast and secure. It’s hard for someone to fake your fingerprint or face. Now, let’s do something about those short passcodes.
If you have Netgear’s Arlo Pro camera system, the fully wireless capabilities are no doubt treating you well. However, there might be some other features that you’re missing out on.
Apple products, with their high sale and resale values, have always been popular targets for thieves—none more so than the iPhone. Let’s look at some of the steps you can take to protect your iPhone from thieves.
Many websites have leaked passwords. Attackers can download databases of usernames and passwords and use them to “hack” your accounts. This is why you shouldn’t reuse passwords for important websites, because a leak by one site can give attackers everything they need to sign into other accounts.
Mozilla Firefox is an open source project, so anyone can take its code, modify it, and release a new browser. That’s what Waterfox, Pale Moon, and Basilisk are—alternative browsers based on the Firefox code. But we recommend against using any of them.
Your kids need internet access to do their homework, but that doesn’t mean you’re comfortable with them accessing everything online. There’s no technological substitute for proper adult supervision, but a free service called OpenDNS Family Shield makes it easy for parents to all block adult content with one simple tweak.
If you’ve been holding off on setting up a Kodi-based media center computer because they’re loud, expensive, don’t fit in your media rack, the Raspberry Pi is your savior. For only $35 (plus a few accessories you may have lying around), you can get a small, efficient computer that can play all your media from one beautiful, couch-friendly interface.
While the HomePod is great for music, it can also do some other neat things, like read your text messages to you. Be careful, though, as anyone within earshot can ask Siri to read your text messages from your phone. Here’s how to disable that feature.
You’d be forgiven if you’ve never heard of a phone “port-out” scam, because up until recently it wasn’t really a widely talked about issue. But it’s gotten serious enough that T-Mobile is sending warnings to many of its customers. Here’s a closer look at what this is and how to protect yourself from it.
If the desktop version of Skype is on your Windows computer, you’re vulnerable to a really nasty exploit. A flaw in Skype’s update tool could give attackers full control over your system, and Microsoft says there isn’t going to be a fix any time soon.