Starting a podcast? 4 tips that could make or break it

Open/download audio

To make a successful podcast, you need solid storytelling and production skills. That’s why I sat down with audio expert Valerie Geller to break down the biggest mistakes audio pioneers make. We share anecdotes from our own careers, tips that worked for us and the top four ways you can reel in listeners and boost your ratings.

Learn more about your ad choices. Visit megaphone.fm/adchoices


Command Prompt: The secret utility menu hiding in your PC

We all love a good action movie, especially when the plot leaves you hanging on the edge of your seat. Have you ever noticed that one of the bad guys is a genius computer hacker more often than not? Tap or click here for Windows tips the pros are using.

Continue reading

Recall alert: These medical devices could expose users to dangerous toxins

For most of us, a good night’s sleep is crucial to our survival. But what happens when that is interrupted? Tap or click here to find out why sleeping next to your phone is a bad idea.

There are all sorts of reasons you may not get a good night’s sleep, and sleep apnea can be one of them.

Continue reading

Scam callers posing as phone providers - Here's what happens if they trick you

You can never be completely safe from fraud. Online crooks will try anything to trick you into handing over sensitive information they can use to steal money for you. Sometimes their scam involves requesting direct payment into their coffers.

Continue reading

Easy ways to create photo and video tributes, no editing experience required

Photo and video tribunes can be used for many occasions. The more serious ones, like graduations, funerals, and business-related adventures, you need to be sure you’ll get the right result.

But with so many programs out there, how do you choose the right one? Each app offers its own unique features and depending on what you want. For professional videos, you’ll want an app geared towards making more than just random TikTok videos. Tap or click here for our TikTok beginner’s guide.

Continue reading

This Chrome change makes it easier to tell which sites can access your webcam and mic

If you want the most up-to-date security and privacy features, you should check out Chrome’s latest and greatest update. Google Chrome 92 just hit the scene. It introduced fixes for some pretty severe security flaws.

Continue reading

Before your next Google search, beware of these spam ads distributing malware

A preferred method for cybercriminals to deliver malware is through phishing emails and spam messages. It has generally yielded enough victims for them to use those tactics continually. But criminals are also exploring different ways of beating antivirus systems.

Continue reading

2 smartphone screens are cracked every second in the US - How to protect yours

If you’re a smartphone owner, you understand the fear associated with dropping your precious device on the ground. Dropping your phone is one thing — after all, you might crack the screen or lose valuable information — but there’s a special kind of loss you feel when you drop your phone and hear that heartbreaking shatter.

Continue reading

Patch your printer! Millions of devices impacted by 16-year-old flaw

Office equipment and home peripherals are bought and installed daily. New owners blissfully going through the motions recommended by the manufacturer as usually things like printers, webcams, or card readers need software drivers to work. Tap or click here for free programs to keep your computer software up to date.

Continue reading

Retail stores that are using AI to track you and those that refuse [Full list]

There is a line in the theme song lyrics to the sitcom “Cheers” where it says that the bar is “where everybody knows your name.” That might have been a fictional place, but it turns out that some stores are a place where everybody knows your face.

Continue reading

Suspect someone of hacking the US government? There's $10M in reward money on the line

Hackers are a persistent threat to anyone with an internet connection, but some widen their scope to target companies, militaries and governments. When this happens the risk spreads to anyone connected to that network and beyond.

Continue reading