Combating Unwanted Tracking On Cards For Apple Airtag Update

Apple on Thursday announced its plans to roll out a software update for its AirTag tracking devices following reports of bad actors attempting to misuse AirTag for malicious or criminal purposes. For those unaware, AirTag is a small tracking device designed by Apple to help people locate their personal belongings (e.g. keys, bags, apparel, small electronic devices, vehicles) and not to track people or another person’s property. “We condemn in the strongest possible terms any malicious use of our products....

January 20, 2026 · 3 min · 436 words · Lisa Williams

Disney+ Rolls Out Groupwatch Feature To All U.S. Subscribers

Earlier this month, Disney+ had announced a new co-watching feature called ‘GroupWatch’ that allows users to sync movies and shows from the entire Disney+ library with their family or friends simultaneously from different locations. After testing this feature in Canada, Australia, and New Zealand, the streaming service on Tuesday has started rolling out the GroupWatch feature to users in the U.S. Also Read- Best Ways to Watch Videos Together with Friends...

January 20, 2026 · 2 min · 335 words · Keith Mahaffey

Dji Mini 3 Pro Announced: Specifications And Pricing

After weeks of leaks and rumors, DJI has finally launched the latest generation of its compact camera drone namely the DJI Mini 3 Pro. The third-generation Mini drone from DJI offers numerous improvements like 4K/60fps video recording, improved flight time, a larger image sensor, and built-in obstacle avoidance. Thanks to the newly added features the new drone is now in line with the premium DJI offerings like the DJI Air 2s....

January 20, 2026 · 2 min · 385 words · Sharon Woodard

Doj Seizes $2.8 Million In Crypto Tied To Zeppelin Ransomware

The U.S. Department of Justice (DOJ) on Wednesday unsealed six federal warrants authorizing the seizure of more than $2.8 million in cryptocurrency, along with $70,000 in cash and a luxury vehicle, from a man accused of running the notorious and now-defunct Zeppelin ransomware scheme. According to the DOJ, the suspect, Ianis Aleksandrovich Antropenko, is charged by indictment in the Northern District of Texas for conspiring to commit computer fraud and abuse, computer fraud and abuse, and conspiracy to commit money laundering....

January 20, 2026 · 3 min · 505 words · Lonnie Combs

Dont Like Windows 10, Here Is How To Downgrade To Windows 7 Or 8.1

How to Downgrade Windows 10 to Window 7 or 8.1 Windows 10 has been a successful launch for Microsoft with a million plus users and hoping to reach a billion users in three years. But there are many among you who dont like Windows 10 for various reasons and may want to go back to your old Windows 7/8.1 version. For those wanting to downgrade from Windows 10 to Windows 7/8....

January 20, 2026 · 4 min · 775 words · Janelle Sandlan

Facebook And Instagram Apps Track Users Via In

A majority of apps and services by Meta track users’ activity and personal information. It’s no news for people who keep up with tech news (looking at you techworm readers) . A new report suggests that Meta is now tracking your browsing activity done using the custom in-app browser present on both Facebook and Instagram. Well, these browsers inject a javascript code into each website that you visit. This allows the parent company, Meta, to potentially track you across several websites....

January 20, 2026 · 2 min · 286 words · Shannon Golden

Facebook Messenger Introduces ‘App Lock’ And New Privacy Settings

Facebook on Wednesday announced a new “App Lock” feature and some other settings to add an additional layer of security for Messenger on iOS devices. The new ‘App Lock’ feature on Facebook Messenger will help users prevent others from accessing their private messages. The users will be able to lock the app and their private chats behind Face ID or Touch ID on iPhone or iPad devices. To open the app and access the messages, the user will be required to use either Face ID or Touch ID authentication....

January 20, 2026 · 2 min · 381 words · Geraldine Hatcher

Five Linux Networking Commands To Help With Network Connectivity Issues

These five helpful networking commands to monitor connectivity issues on Linux PCs Linux is everywhere and nearly all Linux distros need network connections to offer their services. Network connection failures is one of the major headaches if you are using a Linux based PC or a system. Because if your network fails, all other services will fail and you will be left with a dud system. For this reason, the administrator must have the appropriate tools and commands to analyze and troubleshoot network connectivity....

January 20, 2026 · 4 min · 717 words · Paul Brown

Google Unveils Ai Mode To Change Search Experience

Google is rolling out a major upgrade to its Search experience with the introduction of “AI Mode,” a feature designed to offer users more conversational and comprehensive search experiences. Unveiled at the Google I/O 2025 conference, the new AI Mode aims to transform traditional search by offering detailed, personalised AI-generated responses to complex queries – all within the Search interface. “AI Mode is our most powerful AI search, with more advanced reasoning and multimodality, and the ability to go deeper through follow-up questions and helpful links to the web,” Elizabeth Reid, VP, Head of Google Search, wrote in a blog post on Wednesday....

January 20, 2026 · 4 min · 762 words · Kathleen Wilson

Google’S Password Manager Gets New Security Features

Google on Thursday announced several upgrades to its in-built Password Manager service that introduces five new features to make the service even more secure, helpful, and easy to use on desktops and other devices. Google Password Manager is known for its ability to create and save strong, unique passwords that one doesn’t have to remember, especially for Google Chrome users. It instantly generates unique passwords and auto-fills them when you log into your Google Account on Chrome from your computer, Android, or iOS device, making it easy to sign into websites....

January 20, 2026 · 3 min · 572 words · Zachary Biller

Hacker Puts Up Stolen 290,000 Us Driver’S License Details For Sale On Dark Web

Hacker Puts Up Stolen 290,000 U.S. Driver’s License Records For Sale On The Dark Web NSA is selling stolen U.S. Driver’s License information on the Dark Web! No, its not the actual NSA belonging to government of United States but a hacker who has a handle named NSA. A dataset that contains the personal details and driver’s license information of over 290,000 U.S. citizens compromised from a government-linked databases in Louisiana has been put up for sale on the dark web who goes by the name ‘NSA’....

January 20, 2026 · 3 min · 637 words · Viola Green

Hackers Are Using Fake Windows 10 Update To Install Cyborg Ransomware

Windows users, beware! A fake email claiming to be from Microsoft about a Windows update is being used to infect devices with ransomware. Security researchers at Trustwave’s SpiderLabs who spotted the malicious email campaign discovered that the fake emails are pushing people into installing a Windows 10 “critical update” on their computers. The subject of the email says “Install Latest Microsoft Update now!” or “Critical Microsoft Windows Update!” The message in the email contains only one single line that says, “Please install the latest critical update from Microsoft attached to this mail” and an attached file....

January 20, 2026 · 3 min · 462 words · Tammy Mervis

Hackers Attack Check Point Vpns To Breach Enterprise Networks

Check Point Software Technologies released a new threat advisory on Monday that warns of malicious groups’ increased interest in targeting Remote Access VPN devices as an entry point and attack vector into enterprises. For those unaware, Check Point’s Remote Access VPN (Virtual Private Network) offers users secure, seamless remote access to apps and data that reside in the corporate data center and headquarters when traveling or working remotely. It encrypts all traffic users send and receive....

January 20, 2026 · 3 min · 471 words · Molly Garcia

Hackers Can Hack Facebook Messenger App To Read Or Alter Messages

Security researchers find hacking backdoor to Facebook Messenger App Private messages that you send through your Facebook Messenger can be read by potential hackers using a hacking backdoor in the app. This backdoor vulnerability was found by the security researchers from Check Point , who will demo it at the Infosecurity Conference to be held today afternoon . The security hole if unpatched could put 900 million people who use Facebook Messenger, at risk....

January 20, 2026 · 3 min · 603 words · William Lee

Hackers Stole Customers’ Encrypted Passwords, Says Lastpass

Earlier this month, we reported how a data breach incident in November involving LastPass allowed an unknown threat actor to access its cloud storage through information stolen from its systems in August this year. Back then, LastPass a leading password manager, had only said that the unauthorized party gained access to “certain elements” of customers’ information on the cloud storage service used by the company to store archived backups of production data....

January 20, 2026 · 3 min · 522 words · John Harper

Hackers Using Fake Youtube Apps To Infect Android Devices

The APT36 hacking group, also known as ‘Transparent Tribe,’ has been discovered using malicious Android apps that imitate YouTube to infect their targets’ devices with the mobile remote access trojan (RAT) called ‘CapraRAT’. For those unaware, APT36 (or Transparent Tribe) is a suspected Pakistan-linked hacking group primarily known for using malicious Android apps to attack Indian defense and government agencies, organizations involved with the Kashmir region, as well as human rights activists working on matters related to Pakistan....

January 20, 2026 · 3 min · 504 words · Kevin Smith

How Do Data Governance Applications Prevent Data Breaches?

Companies are responsible for data from the moment they acquire it until the second they dispose of it. Within that data life cycle, organizations are obligated to keep information safe — make sure they’re not compromised in breaches. According to a recent survey, the potential of exposed sensitive data is what worries business leaders the most. With significant data breaches such as T-Mobile, Western Digital, and NextGen in the news, users are acutely aware of the dangers that can occur when they trust businesses with their sensitive information....

January 20, 2026 · 5 min · 976 words · Sadye Poehlman

How To Become A Deep Learning Expert

We always adopt the latest technologies, and so does the industry experts. It becomes necessary for each one of us in the technology field to remain updated with the evolving technologies. Considering it as your to-do task, we are up with a course that can earn you a better salary in 2020. What is Deep Learning? How Deep Learning Works? Deep Learning vs. Machine Learning Why is it essential to learn Deep Learning?...

January 20, 2026 · 5 min · 1000 words · Erwin Collier

Lenovo Launches Leez Single Board Computer To Compete With Raspberry Pi Boards

Specifications of Lenovo Leez P710 SBC

January 20, 2026 · 1 min · 6 words · Cody Wilkins

Make It Rain: Use Your Bandwidth For Passive Income

Many of us are already sharing our bandwidth with the world, but what if you could make money doing it? Sure, you can get free music and movies, but how about some cash flow? So, it begs the question. Is It Possible to Earn Income From Idle Bandwidth? Benefits of Generating Passive Income With Bandwidth Sharing Requirements for Participating in Bandwidth Sharing How to Set up a Bandwidth Sharing Network Tips for Making the Most Out of Bandwidth Sharing Start Earning Passive Income Sharing Your Internet Bandwidth Is It Possible to Earn Income From Idle Bandwidth?...

January 20, 2026 · 5 min · 883 words · April Piper