Tech tip: What really happens when you unsend a text on your iPhone

If you have an iPhone 8 or later, you’ve probably already updated to iOS 16. The latest operating system has many new security features you should be using.

A super-secure mode was designed for politicians, activists, and journalists. I think there’s a great case to suggest this iPhone option for the elderly and vulnerable people in your life. Tap or click here for a closer look at Lockdown Mode.

Here’s another buried setting that just got upgraded: Your iPhone’s ability to detect sounds and alert you. Tap or click for steps to set up custom sounds, like your home’s appliances.

One of the most noteworthy features of iOS 16 is the ability to edit and unsend text messages. It’s not as clear-cut as it seems. Here’s the truth.

Myth: When you unsend a text, the recipient will never know.

Reality: Your recipient gets a notification.

Yes, you can take back a message you sent, but there’s more to it. The unsend feature only works with iMessage (iPhone to iPhone), and you and the recipient must be running iOS 16.

If you unsend a message to someone running an older version of iOS, they’ll still see it, and you’ll get a notification reminding you of that.

Here are a few more things to keep in mind when unsending a message:

  • You can only take back a message within two minutes of sending it.
  • The recipient can read your message before you unsend it.
  • If you unsend a message, it will disappear from the recipient’s screen, but they’ll be notified that you unsent it.

Now that you know how it works, here’s how to unsend a message:

  • While in an iMessage conversation, tap and hold the message you want to unsend.
  • Tap Undo Send.

Continue reading

Take a minute to adjust these important Android privacy settings

Security can be complicated with your smartphone, especially for Android users.

What are some of the best ways to keep your device (and yourself!) safe from nefarious actors, illegal surveillance, and malware?

Continue reading

A look inside the FBI’s encryption system

Encryption algorithms are used for security purposes in many facets of today’s world. We can use them to keep our messages private, send photos we want to keep discrete and hide our location. But did you know the FBI has its own encryption system that is virtually uncrackable? This complicated algorithm uses a unique system that no one has ever broken.

Best smartwatches for emergency situations (SOS mode)

Smart home devices offer exceptional accessibility and can help during an emergency. Tap or click here for steps to use an Amazon Echo as an affordable Life Alert alternative.

But not everyone wants a smart assistant listening to every word spoken in their home. There is a solution. Your next best bet is a smartwatch. These smartwatches include SOS features to help in emergencies for everyone, especially seniors.

Continue reading

Google smarts: 5 ways to get more out of Gmail, Maps, Calendar, and Docs

Think Big Tech, and I bet Google comes to mind. They control our inboxes, calendars, document storage, cloud storage, routes, and more. Most of their products are free to use, which means you are the product they are selling.

Continue reading

An ATM glitch that gave one man infinite money

ATMs make getting cold hard cash from your bank account a breeze. Just pop in your card, click a few buttons and the cash is in your hand. But ATMs can make mistakes. Just ask the man who discovered a glitch that allowed him to withdraw a seemingly endless amount of money. So, how did he do it?

Google Chrome is safe but here’s how to make it even safer to use

If I were a betting woman, I’d guess you use Google Chrome. It’s far and away the world’s most popular browser. It’s not my pick if you’re looking for the most privacy. Scan my list of browsers ranked by privacy.

Continue reading

Are hackers in your phone? Here’s how to find out

I’ve heard from many people who have been cyberstalked over the years. Sadly, today’s tech makes it all too easy.

Take Apple AirTags, for example. They’re cheap, small, and easy to hide — and can tell the owner exactly where you are located. Here are six signs to look for if you suspect someone is tracking you this way.

Continue reading

5 ways to think like a hacker, starting today

The more we rely on our devices, the more vulnerable we are to attacks and scams. Your smartphone is a prime target. Tap or click here for three ways to secure it from hackers.

It’s not just passwords and sensitive details you need to protect. Think about all the photos and videos stored on your phone that you would be heartbroken to lose. Tap or click for the best ways to save your phone’s photos before it’s too late.

Continue reading

Have an older iPhone or iPad? You need to update NOW

Zoom became popular during the onset of the pandemic and still has millions of daily users. Are you one of them? A security flaw was recently discovered that could put your computer at risk. Tap or click here for our report on the critical vulnerability and how to avoid it.

Continue reading

5 Microsoft Surface tips that most people don’t know about

Tablets are great for graphic design, art, gaming, and watching your favorite shows and viral video clips. Sure, your phone can do all that, but isn’t it better with a big screen? Tap or click here for the best tablets based on your needs and budget.

Continue reading

Need more storage? SD cards vs. micro SD cards and how to choose one

Memory cards give you extra storage in your phone, DSLR camera, tablet or laptop. They’re versatile, cheap ways to store more photos, videos and music on your device.

SD cards have been around since the 90s. In that time (as with all technology), they have evolved into different formats, memory capacities and designs. Now they fit in your phone and have other formats for different uses.

Continue reading

Best timekeeping, accounting and money-management software

Time is money, and every minute counts. Detailed time tracking and bookkeeping can seem like a hassle if you’re running things independently.

If a skeleton crew operates your business or you’re managing everything on your own, that means relying on the right tech to get the job done. Don’t waste your time and money on software that doesn’t work for your needs.

Continue reading

Money tight? 10 ways you're wasting cash (even when you think you're saving)

You might think, “There’s no bad way to save money.” In reality, there’s a lot you can do wrong — no matter how good your intentions are. Tap or click here for five ways you’re wasting money on tech purchases.

Continue reading

3 work from home mistakes you're making

We’re beyond the two-year mark of working from home here at Komando.com. There’s a good chance you’re not far behind.

All these months later, you might still be making a few mistakes that make getting your job done harder than it needs to be. Hopefully, by this point, you’ve figured out Zoom or whatever video chat program your company uses.

Continue reading

Ways to cool off with tech this summer

In the winter, we share tech tips and gadgets that keep you warm. In the summer, we’ve got you covered — or uncovered, as the case may be. We found some of the best summer safety cooldown tech you can use to survive the heat waves.

Continue reading

5 silly mistakes putting your online privacy and security at huge risk

There are so many online scams and tricks out there I can’t cover them all on my website and national radio show. I make it my duty to inform you of the tactics bad actors use to fool you. 

A great podcast was the episode when I dove into the mind of a hacker. Tap or click to listen to an episode of my podcast, Kim Komando Today, with an IBM social engineer. She spills the secrets hackers use to scare and confuse people.

Continue reading

Using AI to create art with a one-word prompt

Artificial intelligence doesn’t just power our smart assistants and high-tech gadgets. It has all kinds of applications, including the creation of beautiful, original art. This is a fascinating look at how this technology works, and we’re sure AI’s creativity will blow you away.

Looking for a remote job? Use these tips to find a high-quality gig

Remote jobs are a tantalizing prospect: You can work from the comfort of your own home, cutting out traffic, chatter from coworkers and other office distractions. Changing from a traditional job to a remote position can be challenging, especially if you’ve never worked from home. Finding legitimate work-from-home jobs can also be challenging since there are so many fake job scams.

Continue reading

Antivirus vs. VPN: Do you need both for online privacy and security?

You probably know that bad guys lurk within every corner of the internet. You have to watch out for spyware, ransomware, phishing attacks, IoT invasions and more. Oh, and don’t forget “zero-click attacks.” Researchers recently discovered hackers used military-grade spyware to remotely access iPhones and even replicate their data.

Continue reading