latest
Google Safe Browsing protects you from malware and other online threats. Here's how to set it up
Turn on Safe Browsing to protect yourself online
As more of our work is done online, safeguarding our digital presence is imperative. Threats loom everywhere in the form of phishing attacks and malware. Over 353 million people in the US were affected by data compromises in 2023 through data breaches and exposure. Passkeys, authenticator apps, 2FA, and other security tools help secure our accounts and make us less vulnerable to malicious actors.
August Wi-Fi Smart Lock (4th Generation) review: Simple, speedy security
It takes almost no time or skill to transform your front door into a smarter, smartphone-friendly setup
The worst part of August's Wi-Fi Smart Lock (4th Generation) is that it reminded me that I have a crooked front door. So much so, that the device's incredibly helpful locking and unlocking functionality, which you can access via a simple smartphone app or trigger on a timer, was less useful for me. But that's the door's fault; the Wi-Fi Smart Lock is as easy to install as it is to configure, and it'll bring you extra security and convenience in less time than it takes to read this review. It's not the most feature-packed lock, but it's a solid addition to your smart home for a reasonable price.
Our favorite open-source 2FA app finally got the Material You redesign we've been waiting for
Aegis hits all the right marks with its new design
There are tons of great 2FA apps to choose from, but if you like an option that is both secure and stylish, Aegis may be the one to consider. The open-source project has started testing a new build in beta that comes with optional Material You theming, making it look more at home on Android than Google’s own Authenticator app.
Best VPNs for remote access in 2024
Take control of your security while working online with these secure VPN solutions
Thanks to an abrupt shift from weekly office life to working from home to hybrid positions, remote working has become the norm. As a result, the need for VPNs has risen. Not just VPNs for streaming, but services that also keep your information, and company data, secure.
What is Samsung Knox?
What makes Samsung Knox the ultimate security solution? Let's dive in and explore its incredible features
When you have a Samsung smartphone, you get access to one of the best hardware-embedded security solutions known as Samsung Knox. Samsung Knox is an advanced and robust security solution that caters to the security needs of individuals and professionals seeking top-notch protection for their device-stored data. The security system is preinstalled on the best Samsung smartphones and is available free of charge.
Free VPNs are an easy way to quickly hide your IP address and jump between locations around the globe without shelling out a few dollars. Yes, they have their fair share of snags, and you may have heard they're more trouble than they're worth. Well, there's some truth to that — unless you use one recommended by a trusted source like Android Police.
How to enable SIM lock on your Android phone
Prevent malicious SIM card use by adding an extra layer of security
Smartphones are already powerful on their own. Throw in a SIM card, and you have a device for communicating with others and accessing the internet. The SIM card gives you a phone number that identifies your phone on the issuing carrier's network. Whether it's a 5G phone or a budget Android phone, you can contact your carrier to lock your SIM card if it's stolen.
How to use your smart display as a security camera
That's right, smart displays can do more than show you the 10-day forecast
Intelligent displays and smart speakers make interactions with smart home devices easier when you use voice commands. In addition, they let you listen to music, place calls, and perform other actions. Some of them, like the Amazon Echo Show smart displays and the Google Nest Hub Max, have built-in cameras to facilitate video calls.
Google is killing an Android security feature you probably weren’t using anyway
Android Protected Confirmation was never widely adopted by OEMs
Android devices are full of security features designed to keep you safe from bad actors. However, not everyone takes advantage of these tools, and some of them fly under the radar altogether. Android Protected Confirmation (APC) is one of these features, which was originally introduced with Android 9. It was aimed at ensuring you were only consenting to transactions with trusted apps, and Google had high hopes for it — APC could even one day be further developed for person-to-person money transactions, for instance. Now, it seems Google’s future plans for APC have fallen by the wayside.
Ring Modes: What the security feature does and how to use it
This handy feature can make your smart home life a lot easier
The demand for home security measures is growing, and people are turning to tech to protect themselves. Smart products like those from Ring offer updated video systems, rich notifications, and reliable recording systems. The Ring Modes feature lets people who own Ring products change, activate, and deactivate security features from the Ring app, adding useful features to one of the best home security systems on the market.
Best VPN for multiple devices in 2024
It only takes one of these VPN subscriptions to cover your whole fleet of computers, mobile devices, and streamers
Whether you're a VPN beginner choosing a provider for the very first time, or an experienced user who's looking for a change, it's inevitable that you'll ultimately want to use the tool across multiple devices. You're never going to get a separate service for each of your laptop, smartphone, tablet, and all the other gadgets you own.
How to change your Hulu password
You can change your Hulu password easily enough if you've forgotten it or need a new one. Here's how
Sometimes, you need to change your password. Maybe you forgot what you entered initially or were alerted about a potential password leak on the internet. Perhaps you're web-savvy and change your password every few months. You can change your password on Hulu, even from one of the most affordable Android phones. Here's how to save your Hulu login credentials.
What is threat modeling and how can it protect me online?
How can threat modeling bulk up your security?
Threat modeling was conceived almost immediately after the invention of computer systems that allowed freely sharable data in response to the threat such a concept created. When a system that can be exploited is left unprotected or unregulated, opportunists seek it out to prey on it. Threat modeling protects those who are targeted.
Android is preparing to add built-in phishing protection
Google is working on a feature that will scan apps for signs of phishing or other deceptive behavior
No matter how technologically savvy you are, you’re not immune to phishing. Phishing, for those of you who aren’t aware, is a type of cyberattack that hackers employ to get users to hand over their sensitive information. Phishing attacks can get really sophisticated, which is why it’s important to always be vigilant and double check that the app or website you’re entering your credentials into is legitimate. To better protect regular users from phishing attacks on Android, Google seems to be preparing a new feature that will automatically detect if apps are fishy.
An 11-year-old bug could render your Android device prone to an attack
A timeline for a patch to fix the Bluetooth bug has not been revealed
If you’re adamant about ensuring all of your devices are as secure as possible, you might assume you’re safe through means, such as two-factor authentication. There are several ways to manage your sensitive information these days, and these precautions can reduce the chances of a breach. However, some of your devices might be flawed through no fault of your own, and it’s these bugs that pose a threat. Now, a bug that has been around since at least 2012 could be rendering your Android device vulnerable.
How to find out if your password has been leaked
Check if your password was compromised in a recent large-scale account breach
How we protect ourselves online keeps evolving, as do the threats to our online safety. Passkeys, 2FA, authenticator apps, and other digital security tools are great for securing our accounts, but passwords remain the number one fan favorite. Even the best and most sophisticated Android phones fall back on simple passwords when biometrics fail. But what happens when those passwords get hacked? Here's how to find out if your password has been leaked online.
How to make your own theft-deterrent system with smart home products
Be safe at home without breaking the bank
It's essential to feel safe at home. An easy way to do so is by installing a security system, which is known to drive intruders away. These are expensive, but other options can achieve home security without the hefty price tag of traditional systems.
Latest Proton Pass enhancement could give it an edge over the competition
Sentinel adds an impressive layer of security, and subscribers no longer need to pay extra
If you’ve ever had your email hacked, you know how frustrating and time-consuming it can be to recover your account. Safeguarding your inbox is a step you can take to prevent a security breach from happening altogether. Now, Proton Pass wants to make it easier for its Plus subscribers to take this step — its high-security Sentinel program is now accessible to members in this tier.
Having a good password manager is more and more important these days. With passkeys on the rise, there is basically no way around a solid way to securely store your credentials. And even if it will still take some time for most services to offer passkeys, you can use a password manager to create unique and strong passwords right now.
Our top 5 passkey tips and tricks to keep you and your data secure
Passkeys are replacing long and complex passwords, and these tips will help you avoid problems and enjoy the benefits of easier logins
Passkeys simplify security with biometric logins, so you don't have to put as much effort into creating, saving, and recovering passwords. You can also bypass warnings about weak passwords and demands for more characters, including a capital letter, a number, and a symbol.