Android: An inquiry from Quartz revealed that Google's been spying on some of its users. The search giant has been collecting location data from Android smartphone owners, whether or not they have location services enabled. Though Android users can't disable it, it looks like they won't have to worry about it for much longer.
When Apple first announced Face ID for the iPhone X, it claimed the new feature was significantly more secure than Touch ID and couldn't be fooled by even the most realistic of masks. But it turns out that might not be the case.
Getting an apartment in San Francisco is a competitive nightmare, which is why I was excited to find that the landlord I had been texting with to set up an apartment viewing just happened to be friends with another good friend of mine. She didn't tell me, and we aren't Facebook friends: I found out because she has her phone number stored on the social network. When we started coordinating apartment viewing times, my phone automatically pulled in her profile pic and linked to her account.
Hi Lifehacker. When I was looking for browsers I discounted a lot because I didn't know who made them and what information they collected and how trustworthy they are. Could a dodgy company be selling information I entered into my browser, or my browsing history? Should I reconsider Opera? How do all these companies making browsers make money?
Hopefully you took advantage of Microsoft's free upgrade offer that allowed consumers to update computers running Windows 7 or 8 to Windows 10 (and if you didn't, it isn't too late!). If you did, you should take advantage of one of the most convenient and downright pleasant features in Windows 10: The ability to login by simply looking at your PC, using Windows Hello. It's easy to setup, but may cost you a few bucks depending on the PC and accessories you currently own.
Phishing attacks, wherein scammers pretend to be legitimate companies in order to trick you into handing over sensitive information such as usernames, passwords or credit card information, are getting more difficult to spot. Even Google is susceptible to more sophisticated attacks, which have popped up everywhere from email attachments to shared Google documents.
If the rise of true crime podcasts and TV over the past few years is any indication, we seem to have a macabre fascination with serial killers. There's something deeply unnerving but intriguing about the evil inside other human beings - like staring at a black mirror that reflects a different, disturbed version of ourselves. Australia has been home to some gruesome acts of violence over the past 50 years, but there are some things we can learn from these cases.
Here are five of Australia's worst murderers and some ideas we can learn from their MO's and arrests.
Certain users of the privacy-minded Tor web browser should download the app's latest update, which adds a temporary fix to prevent the browser from leaking identifying information, namely IP addresses. The TorMoil bug, as named by the security research company that discovered the vulnerability, We Are Segment, can take advantage of a flaw in the browser to uncover a user's real IP address, outing anonymous browsers should they click on a particular type of link.
As an anti-theft measure, clothing stores fasten certain items with security tags so you'll set off an alarm when you leave with the tag still on the garment. Some also spill ink from the tag if you try to remove it yourself.
This isn't a problem so long as the tag gets removed before you leave the store, but sometimes a tag will get missed at the checkout. If that's happened to you, here's what you can do about it.
The USB Killer is infamous (but ingenious). Plug it in, and within seconds your computer is dead, motherboard fried thanks to a high voltage dose of electricity, along with any other nearby components. This video shows you how it works, but the takeaway is clear: Never connect random USB devices to your computer.