Loading page

What You Should Know About US Congress' Latest Attempt To Criminalise Encryption

A new draft bill in US Congress will force tech companies to undermine or break their own security features and encryption any time law enforcement asks them to. Sound terrible? It is. Here’s what the bill says.


How To Password Protect Apple Notes

Mac/iOS: Apple rolled out a handy new password protection feature for its Notes app on iOS and OS X in recent updates, but it’s not super obvious how to actually use it. Here’s how to lock those notes.


WhatsApp Turns On End-to-End Encryption For Every Message

WhatsApp, the popular messaging app, has rolled out encrypted messages for its entire service. The encryption now protects texts, voice calls video and chat rooms.


1Password For Mac Makes Switching From Other Password Managers Easier

Mac: 1Password was updated today with a couple of new features that provide some speed boosts and make importing your passwords from another service a lot easier.


Build A Motion Sensing Security Camera With A Raspberry Pi And Windows IoT

Turning a Raspberry Pi into a motion sensing security camera is a classic Pi project, but Microsoft’s put together a bit of a spin on the classic by showing off how to build one using Windows IoT.


The American Gun Debate In Graphs And Numbers

All sides in the debate on gun control in the United States are quick to point to numbers they say back their arguments. But are they playing fair with those figures?


Ask LH: What's The Best Way To Destroy A Hard Drive?

Dear Lifehacker, What’s the best way to dispose of a used hard drive? I’ve knocked a hole through using a crowbar and hammer near the spindle and through the circuit board. Is that sufficient to prevent any data recovery? Is there an easier way to destroy the hard drive?


MyPermissions Gives You Total Control Over Which Apps Can Access Your Data

Android/iOS: The apps on your smartphone each have a ton of permissions, some of which are necessary, others not so much — MyPermissions helps you manage them all, and cut off the ones that like to snoop where they don’t belong.


Top 10 Tech Security Basics Every Person Should Follow

We talk a lot about computer security and data security here at Lifehacker, but you can never have too many reminders of the basics. Here, in a nutshell, are the security tips and habits every computer user should know. Consider it a quick way to audit your own security.


Hide Your Login Information On Windows 10 With This Tool

When you log in to Windows 10, your email address and possibly your picture is visible to anyone with physical access to your computer. If you’d rather that not happen, this handy tool can help.


Loading page