Best internet browsers: Comparing Chrome, Firefox, Safari, Edge | Digital Life Hack from Kim Komando

Which internet browser should you use? Kim compares well-known and top-used browsers based on safety, privacy, ease of use and personalization. Find out why you may or may not want to use Chrome, Firefox, Safari, Microsoft Edge, Tor and even Internet Explorer.

Nearly half of our readers polled at Komando.com use Google Chrome. What’s your favorite browser? Which will you never use?

Tags: Chrome, Digital Life Hack, ease of use, Firefox, internet browser, Internet Explorer, Kim Komando, Microsoft Edge, personalization, privacy, Safari, safety, Tor


Check your apps! Malicious mobile game caught stealing sensitive data

It’s no secret that Google has had a history of problems when it comes to vetting apps that make their way into the Play Store. Just recently a report said there were potentially thousands of fake apps on the platform, and this newly-discovered app that steals your personal data is the latest case.

Continue reading

3 reasons you should buy a used MacBook instead of a new one

When everyone is jumping out of their seat to buy a new Apple computer deemed better than the one they currently own, they’ll have to figure out what to do with the used technology. Fortunately, this is the perfect time for bargain hunters to buy a ‘new’ computer. If you’re struggling to decide whether to buy a new or used computer, consider these three reasons why buying a used MacBook may be the right decision for you.

Continue reading

Terrifying new ransomware attacks are some of the worst ever

They just don’t quit, do they? Hackers and scammers are continuing to baffle security experts as they antagonize innocent folks across the internet. Recently, however, some of the tactics have gotten a bit more vicious and aggressive. A new set of malware is attacking users the second they visit a compromised website. The worst part: it doesn’t even try to hide it from you! The second the malware installs, it encrypts your files, locks them away, and demands you pay hundreds in bitcoin just to get them back. Here’s what you can do to protect yourself.

Continue reading

Hackers are using Microsoft Word to infiltrate computers

Recently, hackers and scammers have been trying a different angle to get into your system. They’re using modified Microsoft Word documents that unleash havoc upon your hard drive when opened — and worst of all, tons of people online are still falling for it! We’ve got the information you need to avoid this scam and keep your computer safe from harm.

Continue reading

Design your dream home in 3D (for free)

Turn your ideas into 3D reality with this free online home design tool. Build or decorate your home, apartment or, heck, create a virtual castle and fill it with furnishings and decor. See your designs in multiple views and share them with others in this cool site of the day.

Continue reading

Alert! New malicious ransomware that's evil is spreading

The Prince of Darkness is now wreaking havoc on computers running Windows. Yep, a new version of ransomware named after Satan himself is terrorizing systems all over the U.S. We’ll show you how this scary new threat works and how to prevent getting it.

Continue reading

Check your phone now for these data stealing counterfeit apps

One of the most important aspects of owning a smartphone is using apps. These bite-sized programs expand the functions and flexibility of your device far beyond what comes out of the box, and can even unlock some features the manufacturer didn’t intend — such as the flashlight on iPhones before Apple made it a part of iOS.

Continue reading

5 scam emails I found in my inbox last week

Every week my team and I share with you some sort of warning or how-to about how to spot fake, spoofed and garbage emails. I collected a bunch of fake and spammy emails, which you’ll see in the screenshots. Some of them are obvious phishing scams, but others could fool you if you aren’t paying close attention.

Continue reading

US launches cyberattack against Iran, here's what happened

As tensions escalate once again between the United States and Iran, cyberwarfare is a topic that’s back in the spotlight. Instead of a conventional military strike following Iran’s downing of an unmanned drone, the U.S. responded with a cyberattack targeting Iranian military computers.

Continue reading

10 tech gadgets for your next road trip, camping trip or outdoor adventure

It’s official; summer is here! Time for some extraordinary outdoor adventures. Whether your journey takes you to the mountains, beach or countryside, enjoying all that Mother Nature has to offer and creating fond memories along the way is the essence of summertime.

Continue reading