X
Trending
After years with Windows, I used the MacBook Air M4 for one week
Finally, a Bluetooth speaker that rivals my Bose SoundLink Max
I spent hours testing Samsung's new flagship soundbar
This Linux distro has the most refreshing take on OS design
This gadget gave my Android thermal vision superpowers
Oura Ring 3 vs Oura Ring 4
Best CRM software of 2025
Best small business CRM software of 2025
Best free website builders of 2025
Best website builders of 2025
Best free web hosting services of 2025
Best malware removal software of 2025
Best remote access software of 2025
Best password managers for families in 2025
Best password managers for businesses of 2025
Best VPNs for school of 2025
Best business VoIP providers of 2025
Best data removal services: Delete yourself from the internet
Best email hosting service
Best VPS hosting service
How to clear the cache on your Windows 11 PC
Finally, a Windows 11 tablet I'd recommend to both business and professional users
NEO QLED vs OLED: Which TV tech is right for you?
ZDNET Recommends
Tech
Gaming
Headphones
Laptops
Mobile Accessories
Networking
PCs
Printers
Smartphones
Smart Watches
Speakers
Streaming Devices
Streaming Services
Tablets
TVs
Wearables
Kitchen & Household
Office Furniture
Office Hardware & Appliances
Smart Home
Smart Lighting
Yard & Outdoors
Innovation
Artificial Intelligence
AR + VR
Cloud
Digital Transformation
Energy
Robotics
Sustainability
Transportation
Work Life
Accelerate your tech game
Paid Content
How the New Space Race Will Drive Innovation
How the metaverse will change the future of work and society
Managing the Multicloud
The Future of the Internet
The New Rules of Work
The Tech Trends to Watch in 2023
Business
See all Business
Amazon
Apple
Developer
E-Commerce
Edge Computing
Enterprise Software
Executive
Google
Microsoft
Professional Development
Social Media
SMB
Windows
How AI is transforming organizations everywhere
The intersection of generative AI and engineering
Software development: Emerging trends and changing roles
Security
See all Security
Cyber Threats
Password Manager
Ransomware
VPN
Cybersecurity: Let's get tactical
Securing the Cloud
Advice
Deals
How-to
Product Comparisons
Product Spotlights
Reviews
Buying Guides
See all Buying Guides
Best Samsung phones
Best Android phones
Best smart rings
Best blood pressure watches
Best headphones for sleeping
Best robot vacuum mops
Best web hosting services
Best travel VPNs
Best VPNs
Best AI image generators
Best AI chatbots
Best 75-inch TVs
Best smartphones
Best iPhones
Best MagSafe battery packs
Best digital notebooks
Best TV antennas
Best TVs
Best laptops
Best tablets
Best smartwatches
Best headphones
Best live TV streaming services
tomorrow
belongs to those who embrace it
today
ZDNET France
ZDNET Germany
ZDNET Korea
ZDNET Japan
Go
See all Topics
Finance
Education
Health
Special Features
ZDNET In Depth
ZDNET Recommends
Newsletters
Videos
Editorial Guidelines
Trending
After years with Windows, I used the MacBook Air M4 for one week
Finally, a Bluetooth speaker that rivals my Bose SoundLink Max
I spent hours testing Samsung's new flagship soundbar
This Linux distro has the most refreshing take on OS design
This gadget gave my Android thermal vision superpowers
Oura Ring 3 vs Oura Ring 4
Best CRM software of 2025
Best small business CRM software of 2025
Best free website builders of 2025
Best website builders of 2025
Best free web hosting services of 2025
Best malware removal software of 2025
Best remote access software of 2025
Best password managers for families in 2025
Best password managers for businesses of 2025
Best VPNs for school of 2025
Best business VoIP providers of 2025
Best data removal services: Delete yourself from the internet
Best email hosting service
Best VPS hosting service
How to clear the cache on your Windows 11 PC
Finally, a Windows 11 tablet I'd recommend to both business and professional users
NEO QLED vs OLED: Which TV tech is right for you?
ZDNET Recommends
Tech
Gaming
Headphones
Laptops
Mobile Accessories
Networking
PCs
Printers
Smartphones
Smart Watches
Speakers
Streaming Devices
Streaming Services
Tablets
TVs
Wearables
Kitchen & Household
Office Furniture
Office Hardware & Appliances
Smart Home
Smart Lighting
Yard & Outdoors
Innovation
Artificial Intelligence
AR + VR
Cloud
Digital Transformation
Energy
Robotics
Sustainability
Transportation
Work Life
Accelerate your tech game
Paid Content
How the New Space Race Will Drive Innovation
How the metaverse will change the future of work and society
Managing the Multicloud
The Future of the Internet
The New Rules of Work
The Tech Trends to Watch in 2023
Business
See all Business
Amazon
Apple
Developer
E-Commerce
Edge Computing
Enterprise Software
Executive
Google
Microsoft
Professional Development
Social Media
SMB
Windows
How AI is transforming organizations everywhere
The intersection of generative AI and engineering
Software development: Emerging trends and changing roles
Security
See all Security
Cyber Threats
Password Manager
Ransomware
VPN
Cybersecurity: Let's get tactical
Securing the Cloud
Advice
Deals
How-to
Product Comparisons
Product Spotlights
Reviews
Buying Guides
See all Buying Guides
Best Samsung phones
Best Android phones
Best smart rings
Best blood pressure watches
Best headphones for sleeping
Best robot vacuum mops
Best web hosting services
Best travel VPNs
Best VPNs
Best AI image generators
Best AI chatbots
Best 75-inch TVs
Best smartphones
Best iPhones
Best MagSafe battery packs
Best digital notebooks
Best TV antennas
Best TVs
Best laptops
Best tablets
Best smartwatches
Best headphones
Best live TV streaming services
More
See all Topics
Finance
Education
Health
Special Features
ZDNET In Depth
ZDNET Recommends
Newsletters
Videos
Editorial Guidelines
Security
Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.
Product Research
Deep-dive, compare, decide
The best home security system in Dallas
Lose your keys to your Phantom crypto wallet? 1Password has you covered
She didn't trust her movers. A single Apple AirTag proved she was right
Top crypto exchange 2022: The exchanges to know
Secure your data like James Bond with the Kingston IronKey Vault Privacy 80
Norton's cynical crypto ploy: A dark harbinger of crapware to come?
VMware's Carbon Black offers more analyst assistance to respond to attacks
Panasonic confirms cyberattack and data breach
Google's Chrome OS Flex supporting Macs that Apple has long forgotten
7 best cybersecurity certifications of 2022
Ethical Hacking, book review: A hands-on guide for would-be security professionals
Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall
Best crypto wallet 2022: Secure your cryptocurrency
Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key
This flash drive will self-destruct (if you want it to)
Blink has a new floodlight camera and Blink Mini Pan-Tilt mount
SwitchBot Lock: A potential smart lock solution for renters and HOA residents
Stop using Twitter to log in to other websites
Wireshark creator joins Sysdig to extend it to cloud security
Obsessed with privacy? Keep Tails on a USB drive and secure most any computer
This is the USB flash drive James Bond would use
Bad Santa: Amazon, Facebook top Mozilla's naughty list of privacy-crushing gifts
Google paves way for FIDO2 security keys that can resist quantum computer attacks
Best YubiKey 2022: Each security key compared
The best home security system in Dallas
Lose your keys to your Phantom crypto wallet? 1Password has you covered
She didn't trust her movers. A single Apple AirTag proved she was right
Top crypto exchange 2022: The exchanges to know
Secure your data like James Bond with the Kingston IronKey Vault Privacy 80
Norton's cynical crypto ploy: A dark harbinger of crapware to come?
VMware's Carbon Black offers more analyst assistance to respond to attacks
Panasonic confirms cyberattack and data breach
Google's Chrome OS Flex supporting Macs that Apple has long forgotten
7 best cybersecurity certifications of 2022
Ethical Hacking, book review: A hands-on guide for would-be security professionals
Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall
Best crypto wallet 2022: Secure your cryptocurrency
Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key
This flash drive will self-destruct (if you want it to)
Blink has a new floodlight camera and Blink Mini Pan-Tilt mount
SwitchBot Lock: A potential smart lock solution for renters and HOA residents
Stop using Twitter to log in to other websites
Wireshark creator joins Sysdig to extend it to cloud security
Obsessed with privacy? Keep Tails on a USB drive and secure most any computer
This is the USB flash drive James Bond would use
Bad Santa: Amazon, Facebook top Mozilla's naughty list of privacy-crushing gifts
Google paves way for FIDO2 security keys that can resist quantum computer attacks
Best YubiKey 2022: Each security key compared
How-to Guides
Practical tips, tricks, and advice for getting things done
How to locate a password with the macOS Keychain
Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in
Break up with LastPass: How to use iCloud as a password manager on Windows
What is crypto? A guide for getting started
How you can help Ukraine: Donation sites and resources
Tinder Swindlers: How scammers steal your heart, then your money
Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster
An uncomplicated introduction to Uncomplicated Firewall
Every Google Chrome user should click this button now
How to use the handy SSH management tool in Chrome OS
Why you should be using secure DNS on your Chromebook
How to manage your security questions for a local Windows account
How to opt out of T-Mobile's creepy ad tracking campaign
Tired of being tracked online? DuckDuckGo's Email Protection can help
The definition of modern Zero Trust
How to require strong passwords on your shared Windows PC
How to check the Privacy Report for website tracking in Safari
How to manage SSH connections on MacOS with Termius
Getting military veterans jobs in IT and cybersecurity
How to enable end-to-end encryption for Facebook Messenger chats
How to set up SSH key authentication in Linux for more secure logins
How to set up two-factor authentication for your Facebook account
How to use the Opera VPN (and why you should)
How to view your saved passwords in MacOS
How to locate a password with the macOS Keychain
Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in
Break up with LastPass: How to use iCloud as a password manager on Windows
What is crypto? A guide for getting started
How you can help Ukraine: Donation sites and resources
Tinder Swindlers: How scammers steal your heart, then your money
Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster
An uncomplicated introduction to Uncomplicated Firewall
Every Google Chrome user should click this button now
How to use the handy SSH management tool in Chrome OS
Why you should be using secure DNS on your Chromebook
How to manage your security questions for a local Windows account
How to opt out of T-Mobile's creepy ad tracking campaign
Tired of being tracked online? DuckDuckGo's Email Protection can help
The definition of modern Zero Trust
How to require strong passwords on your shared Windows PC
How to check the Privacy Report for website tracking in Safari
How to manage SSH connections on MacOS with Termius
Getting military veterans jobs in IT and cybersecurity
How to enable end-to-end encryption for Facebook Messenger chats
How to set up SSH key authentication in Linux for more secure logins
How to set up two-factor authentication for your Facebook account
How to use the Opera VPN (and why you should)
How to view your saved passwords in MacOS
Analysis & Opinion
Explore a fresh perspective
Why you can still trust (other) password managers, even after that LastPass mess
Hey Google: If AI is replacing Google Assistant, I have two questions
How Russia's invasion of Ukraine threatens the IT industry
The future may be passwordless, but it's not here yet
Breaches by the numbers: Why adapting to regional challenges is imperative
Big tech is actually doing all this with your personal data. True or false?
Optimize Mac Storage can make your files go poof. Ask me how I know
Hybrid and remote work: The state of play in 2023
4 Zoom alternatives with better video conferencing privacy policies
Banks defending their right to security are missing the point about consumer trust
A simple idea that could make Android more secure
Nasty bug discovered in widely used Linux utility curl, and patches already rolled out
7 things even new Linux users can do to better secure the OS
Ubuntu Linux 23.10 is adding an important new security feature
How long should a password be in 2023? You're asking the wrong question
Now Android and Windows devices aren't safe from Flipper Zero either
iOS 17.1 update still no defense against Flipper Zero iPhone crashes
What AI forgets could kill us, but new research is helping it remember
Linux tries to dump Windows' notoriously insecure RNDIS protocol
Did iOS 17.1.1 fix Flipper Zero attack problem on iPhones? Not according to my tests
Raising cybersecurity awareness is good for everyone - but it needs to be done better
Hate Windows 11? Here's how to make it work more like Windows 10
How to recover data from an old laptop if you've forgotten the password
What's the best way to ensure your privacy with a web browser?
Why you can still trust (other) password managers, even after that LastPass mess
Hey Google: If AI is replacing Google Assistant, I have two questions
How Russia's invasion of Ukraine threatens the IT industry
The future may be passwordless, but it's not here yet
Breaches by the numbers: Why adapting to regional challenges is imperative
Big tech is actually doing all this with your personal data. True or false?
Optimize Mac Storage can make your files go poof. Ask me how I know
Hybrid and remote work: The state of play in 2023
4 Zoom alternatives with better video conferencing privacy policies
Banks defending their right to security are missing the point about consumer trust
A simple idea that could make Android more secure
Nasty bug discovered in widely used Linux utility curl, and patches already rolled out
7 things even new Linux users can do to better secure the OS
Ubuntu Linux 23.10 is adding an important new security feature
How long should a password be in 2023? You're asking the wrong question
Now Android and Windows devices aren't safe from Flipper Zero either
iOS 17.1 update still no defense against Flipper Zero iPhone crashes
What AI forgets could kill us, but new research is helping it remember
Linux tries to dump Windows' notoriously insecure RNDIS protocol
Did iOS 17.1.1 fix Flipper Zero attack problem on iPhones? Not according to my tests
Raising cybersecurity awareness is good for everyone - but it needs to be done better
Hate Windows 11? Here's how to make it work more like Windows 10
How to recover data from an old laptop if you've forgotten the password
What's the best way to ensure your privacy with a web browser?
Latest
Google Wallet brings digital IDs to more states - how to add yours
9 hours ago
How Malwarebytes' security tools can help companies stop online scams before it's too late
1 day ago
8 ways to protect your privacy on Linux and keep your data safe
1 day ago
If we want a passwordless future, let's get our passkey story straight
3 days ago
Is your Roku TV spying on you? Probably, but here's how to put an end to it
4 days ago
Google Wallet brings digital IDs to more states - how to add yours
Plus, proving your age with your phone is about to get way easier and more private.
How Malwarebytes' security tools can help companies stop online scams before it's too late
8 ways to protect your privacy on Linux and keep your data safe
If we want a passwordless future, let's get our passkey story straight
Is your Roku TV spying on you? Probably, but here's how to put an end to it
Google Wallet brings digital IDs to more states - how to add yours
Plus, proving your age with your phone is about to get way easier and more private.
9 hours ago
by
Artie Beaty
in
Services & Software
How Malwarebytes' security tools can help companies stop online scams before it's too late
Online fraud is costing billions - but Malwarebytes' security tools could be the secret weapon companies need to protect themselves and fight back.
1 day ago
by
Lance Whitney
in
Security
8 ways to protect your privacy on Linux and keep your data safe
Using Linux is a good start - but it is not enough. These easy privacy tricks could mean the difference between secure and sorry.
1 day ago
by
Jack Wallen
in
Linux
If we want a passwordless future, let's get our passkey story straight
Passwords and passkeys each involve a secret. The critical difference: How that secret gets handled.
3 days ago
by
David Berlind
in
Security
Is your Roku TV spying on you? Probably, but here's how to put an end to it
Your Amazon Fire Stick, Chromecast, and other streaming devices collect your personal data for various reasons. If you're uncomfortable with that, here's how to get peace of mind.
4 days ago
by
Chris Bayer
in
TVs
Why the road from passwords to passkeys is long, bumpy, and worth it - probably
The passkey standard has reached a precarious moment. Let's not blow it, OK?
4 days ago
by
David Berlind
in
Security
The best VPNs for streaming: Expert tested
Netflix won't easily block our favorite streaming VPNs, and we've tried and tested the best VPNs for high-speed, reliable streaming.
5 days ago
by
Charlie Osborne
in
VPN
The best Amazon Fire TV Stick VPNs: Expert tested
Combining the Amazon Fire TV Stick with a VPN can bypass smart TV restrictions and access more streaming platforms and libraries. These are ZDNET's top picks.
5 days ago
by
Charlie Osborne
in
VPN
8 simple ways Mac users can better protect their privacy
Just because you're running Apple's rock-solid operating system doesn't mean your privacy is automatically protected. These simple steps will keep you safer.
5 days ago
by
Jack Wallen
in
Mac OS
The 4 VPNs I swear by for Linux - and why I trust them
Looking for the best Linux VPN? Here are my favorites.
6 days ago
by
Jack Wallen
in
VPN
The best antivirus for Mac: Expert tested
Protect yourself and your Mac with the top antivirus software for Mac in the market, tested and recommended by our experts.
6 days ago
by
Emily Long
in
Security
Biometrics vs. passcodes: What lawyers say if you're worried about warrantless phone searches
Do passcodes really protect you more from warrantless phone searches than biometrics? It's complicated.
1 week ago
by
David Berlind
in
Security
Tired of unsolicited nude pics? Google's new safety feature can help - how it works
The Sensitive Content Warnings feature shields you from images in Google Messages that may contain nudity and lets you easily block numbers - but you'll need to enable it.
1 week ago
by
Artie Beaty
in
Android
New Google email scams are alarmingly convincing - how to spot them
Until Google rolls out a fix, you'll have to be on the lookout for this particularly convincing phishing scam.
1 week ago
by
Lance Whitney
in
Security
The best VPNs for Canada: Expert tested
Find the top VPN for Canada, with lightning-fast speeds across major cities and remote provinces, while maintaining impregnable security and online privacy.
1 week ago
by
Kennedy Otieno
in
VPN
Load More