Skip to main content

Latest by Zak Islam

A MacBook on a table using Google Sheets.

How to convert Excel files to Google Sheets

Google Sheets is known for its versatility, namely its compatibility with Excel files. Here's a guide on how to convert Excel files to Google Sheets.
A depiction of a hacker breaking into a system via the use of code.

Beware, these free Windows apps are hiding a dangerous secret

The installation of malware that is being spread via free software sites has been found to be activated following a month delay, helping it avoid detection.
A Starlink dish next to an RV.

Elon Musk’s SpaceX to reveal ‘something special’ with T-Mobile

Elon Musk’s Starlink will be hosting a live stream today with T-Mobile, with the satellite internet company set to reveal plans to 'increase connectivity.'
A Dell laptop with Windows 10 sitting on a desk.

How to create a system restore point in Windows 10

Creating system restore points in Windows 10 is a utility that can prove to be extremely useful if you're experiencing technical issues. Here's how to use it.
windows 10 october update

How to tag files in Windows 10

One of the most effective ways to optimize your Windows 10 experience is to take advantage of the tag system, helping you identify your files. We show you how.
A digital depiction of a laptop being hacked by a hacker.

Hackers are using fake WordPress DDoS pages to launch malware

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare DDoS protection pages, a new report has found.
A depiction of a hacker breaking into a system via the use of code.

Google just thwarted the largest HTTPS DDoS attack in history

Google has confirmed that one of its cloud customers was targeted with the largest HTTPS distributed denial-of-service (DDoS) attack ever reported.
A package with a fake Microsoft Office USB stick.

Don’t fall for this devious new Microsoft Office scam

With packaging looking legitimate enough at first glance, scammers are sending out fake Microsoft Office USB sticks -- loaded with ransomware -- to individuals.
Graphics card in the Acer Predator Orion 7000.

GPU prices may be about to crash to incredible new lows

Nvidia may be preparing to apply yet another price drop for its RTX 30-series GPUs, according to reports emerging from China.
An individual using a laptop's keyboard.

Top 10 Windows shortcuts everyone should know

You may be satisfied with the Windows shortcuts you already use, but you can enhance your PC experience with these 10 Windows shortcuts everyone should know.
A MacBook with Google Chrome loaded.

How to avoid third-party cookies in every browser

Third-party cookies can track your web activity in general and collect data on you. Here's how to disable and avoid third-party cookies in every browser.
A Starlink dish next to an RV.

Elon Musk’s Starlink satellites hacked by $25 homemade device

A $25 hacking tool that can seemingly breach Starlink’s internet terminals has been revealed by a security researcher.
An individual holding a phone and card.

Selling something online? Watch out for this clever new scam

A credit/debit card stealing scheme that was initially discovered in 2020 has now been detected in Singapore.
A hand on a laptop in a dark surrounding.

North Korean hackers are targeting crypto workers

Hackers believed to be associated with the North Korean group Lazarus have attempted another digital heist by targeting cryptocurrency firm deBridge Finance.
A HP Pro c640 Chromebook Enterprise laptop sitting atop a desk.

How to use Task Manager on a Chromebook

A Chromebook's Task Manager won’t have as many programs running compared to Windows or Mac, but it’s still useful. This guide explains how to use the feature.
A depiction of a hacker breaking into a system via the use of code.

North Korean hackers target huge crypto exchange — are user funds safe?

North Korean hackers are attempting to lure in cryptocurrency experts via bogus job offers for crypto exchange platform Coinbase.
Nvidia RTX 3090 Ti in a PC build.

Nvidia RTX 3090 Ti gets an unprecedented $1,000 price drop

Nvidia board partners are continuing to apply aggressive price cuts to Team Green’s flagship GPU, the GeForce RTX 3090 Ti.
A depiction of a hacker breaking into a system via the use of code.

Hacking-as-a-service lets hackers steal your data for just $10

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage their cyber crimes has been discovered.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to log into your Microsoft email account

Account holders for Microsoft email services are being targeted in a fresh phishing campaign, according to security researchers from Zscaler's ThreatLabz group.
Graphics card inside the Maingear Vybe.

GPU prices have fallen off a cliff in spectacular fashion

Prices for both Nvidia and AMD graphics cards are continuing to drop, with a new report highlighting how they’ve now fallen well below the MSRP.
A large monitor displaying a security hacking breach warning.

U.S. federal court system cyberattack is worse than previously thought

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an incredibly significant and sophisticated attack.
A depiction of a hacker breaking into a system via the use of code.

Europe just suffered its worst DDoS attack ever, but we don’t know why

A record-breaking distributed denial-of-service (DDoS) attack situated within Europe was attempted during July, a new report has confirmed.
A depiction of a hacked computer sitting in an office full of PCs.

Ransomware victims are refusing to pay — but is it working?

A new report has highlighted how ransomware payments to hackers have begun to slow down -- victims are opting to not cave in to demands from threat actors.
EVGA's pre-built Alder Lake gaming PC, the E1.

Say hello to one of the most expensive PC cases in history

The pricing tiers for EVGA’s E1 PC case, which features an open-air design, have been revealed and it’s going to cost a small fortune, to say the least.
Office computer with login asking for password and username.

How to change your PC name

The name assigned to a system when buying a PC is usually a generic one reminiscent of a device ID. We take a look at how to change your PC name.
A depiction of a hacked computer sitting in an office full of PCs.

This anti-hacker group helps you escape ransomware for free

This week marks the sixth anniversary of the No More Ransom project, an initiative aimed at helping ransomware victims.
A depiction of a hacker breaking into a system via the use of code.

Hackers now exploit new vulnerabilities in just 15 minutes

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.
A digital encrypted lock with data multilayers.

This malware infects your motherboard and is almost impossible to remove

Researchers have discovered malware that has been secretly infecting systems featuring ASUS and Gigabyte motherboards for at least six years.
A depiction of a hacker breaking into a system via the use of code.

You’ll never guess what hackers are using Microsoft Calculator for

Hackers have found an unusual and unconventional method to infect PCs with malware: distributing dangerous code with Windows Calculator.
Intel Arc Alchemist reference design render.

Intel’s latest GPUs are bad news for crypto miners

The drivers for Intel’s Arc Alchemist GPUs seemingly do not support the ability to mine crypto currency in any capacity, particularly for Ethereum.
A depiction of a hacker breaking into a system via the use of code.

This dangerous Mac malware can infiltrate your entire system

A newly uncovered malware designed to target Macs has been effective in obtaining access to systems and stealing sensitive data.
Graphics card inside the Maingear Vybe.

Nvidia’s 40-series GPUs could be seriously delayed — here’s why

With an excess of GPU inventory collecting dust in warehouses, it seems that Nvidia could opt to release its next-gen boards later than originally planned.
Coding on a MacBook

These coding languages will land you the best-paying jobs

Stack Overflow has published an in-depth study that details the latest trends in programming, including the most popular and highest-paying coding platforms.
A depiction of a hacker breaking into a system via the use of code.

Hacker steals 1 billion people’s records in unprecedented data breach

A hacker has stated that he has successfully infiltrated a police database, from which he apparently obtained details of one billion Chinese citizens.