With its Creators Update for Windows 10, Microsoft promised that users would have the option to postpone future updates for a limited period of time, and many rejoiced. But now that the update has started rolling out, it's become apparent that there are still some stability issues and performing a manual installation isn't recommended right now.
Dear Lifehacker, I teach a computer class and last week I had a client with a copy of Win 10 which was installed by a friend and it is weird. For example, it doesn't have MS Office so I used Wordpad to show him creating and saving text files but when he saved as an RTF the file morphed into a spreadsheet. His pictures folder is full of pictures of a red truck. I suspect that he does not have a legal copy although his computer seemed eager to install updates (I only had an hour for the lesson so didn't follow up on that). Is there a quick way of finding out if his copy is legal?
For years now, people have been letting Unroll.me read the contents of their email inboxes, to help them unsubscribe from email spam. The service was endorsed by our sister site Lifehacker in 2011 for its effectiveness in finding and cleaning out unwanted subscriptions (and Gizmodo wrote about its iOS app release last year).
But a New York Times profile of Uber this weekend revealed, in passing, that Unroll.me, which is owned by a company called Slice Intelligence, isn't just in the business of tidying up customers' inboxes. Slice makes money by scanning its users' email for receipts, then packaging that information into intel reports on consumer habits. Uber, for example, was paying Slice to find users' Lyft receipts, so it could see how much they were spending each month, "as a proxy for the health of Lyft's business."
The majority of Australians still suck at password creation. Chances are, you either use a bunch of different passwords that are easy to remember (and therefore, easy to crack) or one "tricky" password that you use for everything. From a security perspective, both are terrible options.
If you fall into one of the flimsy camps above, this in-depth infographic will help turn your email into a digital Fort Knox. It contains a multitude of tips consolidated into one image - including essential dos and dont's.
Users of the newsletter management app Unroll.me have been left outraged after discovering the service was "secretly" mining and selling their data to Uber - specifically, email receipts from rival company Lyft.
Ransomware attacks are getting more and more clever as the public gets wise to them. The latest involves hiding a malicious macro inside a Word document attached to a seemingly harmless PDF file.
Every once in a while, an app like Unroll.me pops into the spotlight to remind us that we all tend to authorise a lot of apps to access our email and social media accounts without much thought. Sometimes, as in the case of Unroll.me, those apps get busy selling off our data. Now's a good time to audit any other third-party apps you've given access to your accounts.
Yesterday, The New York Times went deep into some of Uber's shady business practices. In the article, one small section revealed that one service we've talked about extensively over the years, Unroll.me, has been mining and selling off your email data, and Uber used that data to gain intelligence on Lyft.
Using a password manager is basically internet security 101 these days, but that doesn't make them any less intimidating. If you've never used a password manager, they're annoying, cumbersome to use, and baffling at a glance. 1Password is one of the easiest to use options around, but that doesn't mean you don't need some help setting it up.
The Federal Government's Metadata Retention Scheme has now become compulsory for telcos and internet service providers in Australia. This means your metadata - including text messages, location information and internet connection details - will be stored for two years and available to Government agencies to access on request without a warrant.
If you value your privacy, you're going to need a virtual private network (VPN) to help mask your online activity. Here are some tips from the consumer protection group Electronic Frontiers Australia (EFA), along with the best guides from our archives.
Check the news and you're guaranteed to hear to about conflict in some part of the world. But there are a lot of weapon terms getting thrown around without explanation, and even people in the public eye are totally clueless about what these weapons do. Here's everything you need to know about the MOAB, Tomahawk missiles, barrel bombs, chemical weapons, and more.
As of now, Australia's telecommunications service providers have to store your metadata — records of your phone and internet activity, which can reveal a huge amount of detail — for two years. Approved government agencies can access that data without a warrant. It's not private information, either.
One way to circumvent Australia's draconian metadata retention scheme is to install and use a VPN on your phone and on your PC. Here's what a VPN is, what it does, and why — and how — you should get one.
If you own multiple Apple devices, you've probably signed into all of them with your Apple ID. You've also probably noticed that when you get a Facetime call your computer rings, or when you get an iMessage your iPad beeps. For most of us, this is a small annoyance worth fixing. For others, it's a potential privacy nightmare.
Most amateur photographers know it's perfectly legal to take photos of people in public places. What is less clear, is whether you're allowed to publish those photos against the express wishes of the subjects. Let's take a look at the legalities in Australia.
In a bid to stem the tide of criticism against Windows 10's approach to data collection, Microsoft has published an explanation showing more precisely the kinds of data it collects from users' PCs. Here's the full list.
If you're concerned about your privacy when browsing the internet, a virtual private network (VPN) is the best way to tell any snoopers to shove off. There's a problem though. VPNs are notoriously shady, are more complicated than they look, they're unregulated, and can be more of a security risk than they're worth if you don't set them up correctly.
iOS: Every once in a while, Apple will push out a minor update that fixes some random little problem with its operating systems. This time around, it's the Apple ID page in 10.3, which finally has a more cohesive settings page with access to everything from two-factor authentication to serial numbers on your other devices.