CCleaner Was Hacked: What You Need to Know

CCleaner, the incredibly popular PC maintenance utility, has been hacked to include malware. Here’s how to tell if you were affected, and what you should do.The attack was discovered by researchers at Cisco Talos, who found that “the legitimate signed version of CCleaner 5.33. . .also contained a multi-stage malware payload that rode on top of the installation of CCleaner.” CCleaner’s parent company, Piriform (who was recently bought by terrible antivirus company Avast), acknowledged the issue shortly thereafter.Since CCleaner claims to have

Read more

How Much Better Is the iPhone X’s Camera?

While the iPhone X’s design is its biggest talking point, the thing that really caught my eye watching the announcement was the new camera.For the past few generations, the camera has been one of the biggest reasons to upgrade your iPhone. Even stuff like 3D Touch, which is surprisingly useful, is a small upgrade compared to the camera improvements each new cycle. Portrait Mode was the main reason I upgraded from a 6S Plus to a 7 Plus.While the iPhone 8’s

Read more

How to Make Sure a File Is Safe Before Downloading It

If you’re concerned a file might be malicious, you don’t need to download it and rely on your antivirus. You can scan the file for malware with over 60 antivirus engines before you download it—all with one single tool.This is no substitute for basic online security practices that can keep you safe from phishing and other threats, but it’s a way to perform a more in-depth check if you’re concerned about a file.To do this, you’ll need to locate a file’s download link.

Read more

How to Use Your Ecobee Smart Thermostat with Alexa

Controlling your smart thermostat remotely from your phone is cool and all, but don’t forget that you can also make it even easier on yourself and control it with your voice using Alexa. Here’s how to set it up.Before you get started, it would be a good idea to learn how to add Alexa skills to your Alexa account, as well as add smarthome devices to your Alexa setup. Once you’re familiar with doing both of these things, this guide

Read more

How to Revoke Third-Party App Permissions From Spotify

Internet music service Spotify offers an API that lets other websites and applications access your music and customer data. That can be a really cool feature if you’re using it to integrate music with other tools, like Shazam or Sonos. But, when you’re finished with whatever you’re doing, it’s probably a good idea to restrict access to only the most essential apps. Here’s how you do it.On a laptop or desktop computer, head to Spotify.com. If you’re not logged in

Read more

How to Make Windows 10’s Taskbar Clock Display Seconds

Windows 10’s taskbar clock can display the precise time down to the second. This feature requires a registry hack to enable, and only works on Windows 10. Windows 7 users will instead need a third-party utility like T-Clock Redux to do this instead.Early beta versions of the taskbar clock did show seconds. However, this caused performance problems in the 90’s, and the feature was removed before the release of Windows 95.Here’s our standard warning: The Registry Editor is a powerful tool and

Read more

How to Save Google’s WEBP Images As JPEG or PNG

Google’s new WEBP image format is pretty cool: its unique compression systems can display images at approximately two thirds the size of the same image rendered in JPEG or PNG format.But despite six years of development and being heavily featured in Google products, it still isn’t supported by some of the most common image tools around, like Microsoft’s default Windows photo viewer. Here’s how to save a WEBP image in a more common format.Open the Chrome or Opera browser on

Read more

6 common myths of VPN debunked

VPN (which stands for Virtual Private Network) is an important and increasingly popular technology that facilitates a connection over the internet between a user and private server. The VPN was originally born out of a need for secure corporate communications and network access. Over time, this technology has become more commonly used by non-corporate users to access the internet away from the prying eyes of ISPs which are eager to sell user browsing data. While VPNs are undoubtedly a powerful

Read more

CCleaner gets hit by a nasty malware infection

Popular system maintenance tool CCleaner has been compromised by a serious malware infection, which is a particularly embarrassing incident given that the app was bought up by antivirus giant Avast back in the summer. According to security outfit Cisco Talos, if you downloaded CCleaner version 5.33 from Avast (or used CCleaner Cloud version 1.07.3191), then it was blighted with a multi-stage malware payload. Fortunately, the Surface Pro 4 has fine alternative solutions built-in The security firm speculates that an external

Read more

The best Samsung Galaxy Note 8 deals in September 2017

What’s that coming over the hill? It’s a big, shiny, brute of a device. Part mobile phone, part tablet, all business. It’s the Samsung Galaxy Note 8, it has a point to prove and it’s now available buy from all major networks and resellers!It might seem a tad unfair, but we can’t not mention the Galaxy Note 7 debacle when talking about its successor. Samsung’s 2016 aborted project due to overheating and fire risks means that we’ve had to wait

Read more
1 57 58 59 60 61 101