June 12, 2021 Lock down your phone from snoops and hackers Your phone is full of secrets, whether you think about it that way or not
June 5, 2021 Simple tricks to speed up your smartphone You carry a full-fledged computer everywhere you go.
February 13, 2021 Quick tech fix: Stop annoying notifications for good Remember the days before our gadgets were buzzing and beeping at us all day long? Yeah, me neither. Maybe your issue is email.
January 14, 2021 Best of CES: Smart masks, LG rollable phone, flying Cadillac CES 2021 had the usual high-tech parade of TVs, laptops, phones and robots, but masks made this year’s show different.
January 14, 2021 Want to get away from Big Tech? Here’s how The recent ban of Parler from Apple and Google’s app stores and the Amazon shutdown of the social media app might have you thinking about Big Tech’s power. Add to this news that the messaging service WhatsApp, owned by Facebook, is grabbing more of your personal data.
December 27, 2020 10 smart tech tricks you’ll wish you knew sooner Developers put all kinds of secrets, shortcuts, and hidden tricks into the gadgets you use every day. Here’s one I bet you didn’t know before now.
December 26, 2020 Tech tip: How to record and send audio messages We’ve all been there. You’re 10 minutes into a text conversation and you’re sick of talking with your thumbs. That’s where audio messages come in.
December 17, 2020 Coronavirus causing delivery scams to rise With the surge in home deliveries due to COVID-19 shopping restrictions, delivery scams have become the number-one cellphone fraud, according to new research.
December 14, 2020 Best smartphone cameras of 2020 Cameras have become the marquee feature for smartphones, with the quality getting closer and closer to good standalone digital cameras.Â
December 8, 2020 Millions of smart devices vulnerable to hacking: research BOSTON (AP) — Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices — flaws that could be exploited by hackers to penetrate business and home computer networks and disrupt them.