How to secure cloud storage from providers, hackers, and surveillance

We all know the critique that has followed cloud storage around since it was first conceived: is our stuff safe when it’s stored on the web? The truth of the matter is fairly mixed. Generally speaking, your cloud-based files are not just up for grabs. On the other hand, all prominent cloud storage providers have been hacked or have turned over user data to authorities.
Read moreVideo: How to set up Firefox to protect your privacy and security
Our latest video tutorial is all about how to configure a browser that many of you already are familiar with and use in a way that makes you safer online.
Read moreHow to secure your passwords with LastPass

A lot of our privacy and security content makes an important assumption. That assumption is that nobody can get into your account without breaking through some sort of protective measures, meaning you are only vulnerable due to either your activities or security holes on the web. The truth is, though, bad passwords are much more often your personal security’s weakest link.
Read moreA beginner’s guide to rooting on Android: A glossary

One of the hardest things to do when learning how to root your Android device is figuring out the meanings of many of the terms used in whichever directions you’re using. Our guide to rooting wants to make sure you aren’t confused about terminology when you start going through the rooting process.
Read moreA beginner’s guide to rooting on Android: What is rooting?

We talk a lot about things you can do with a rooted device on Getting Things Tech, but we tend to assume that you know what that means and how to root an Android device. In reality, only a small subset of Android users even know what rooting means. Let’s change that!
Read more