Getting Comfortable With The Basics

Apple

Set Up Contactless Payment Now

Set Up Contactless Payment Now to Avoid Coronavirus Exposure at Checkouts – By Jason Fitzpatrick lifesavvy.com

If you have a smartphone or smartwatch that supports contactless payments, there has never been a better time to turn that feature on. Everyone touches the payment terminal at the store, which means it’s the last thing you want your hands near.


How to Set Up and Use Apple Pay on an iPhone – by How-To Geek
There are many reasons to live within Apple’s walled garden, and Apple Pay is one of them. Here we’re going to run through the steps that must be taken to set up, and then use, Apple Pay on an iPhone.


Everything You Can Do With Google Pay – by How-To Geek

Google Pay has really grown over the last several months. It stepped away from the Android-specific branding and has added supported for loyalty cards and boarding passes. So what all can you do with Google Pay?

Before You Buy a Flagship Phone, Here’s What You Can Get for Half the Price

Before You Buy a Flagship Phone, Here’s What You Can Get for Half the Price -By Andrew Heinzman reviewgeek.com

Nobody wants to spend their money on a crappy phone. But to be honest, brand new $1,000 flagship devices are overkill for many people. Phones that cost between $200 and $600 often sport the premium features that actually matter, like fast charging, high-quality displays, long battery life, and powerful cameras.

How Does Grammarly Work?

How Does Grammarly Work? | Grammarly Spotlight – By Grammarly Grammarly.com

Did you know Grammarly has a product for just about every kind of writing you do? We have an online editor for drafting long documents, plus desktop apps and a Microsoft Office add-in if you prefer not to write in your browser. The Grammarly Keyboard for iOS and Android keeps you looking polished even when you’re writing from your phone. And of course, there’s the Grammarly browser extension, which checks your writing on all your favorite websites.

Katherine Johnson, NASA Mathematician Dies

Katherine Johnson, NASA Mathematician And An Inspiration For 'Hidden Figures,' Dies –  By Russell Lewis npr.org

Katherine Johnson, a mathematician who was one of NASA's human "computers" and an unsung hero of the space agency's early days, died Monday. She calculated the flight path for America's first space mission and the first landing on the moon, and was among the women profiled in the book and movie Hidden Figures. She was 101.

How strong is your password, really? 9 rules to make, remember and manage your logins

How strong is your password, really? 9 rules to make, remember and manage your logins – By Sharon ProfisClifford Colby cnet.com

Strong passwords are of course key to your security. The challenge is to create strong passwords you can actually remember, without stumbling into the bad habits that can harm you — like reusing the same password for multiple accounts. But how many passwords can you actually remember? You could easily have 85 passwords for all your accounts, from banking to streaming to social media, according to LogMeIn, which makes the LastPass password manager.

Google Now Lets You Use Your iPhone as a Security Key

Google Now Lets You Use Your iPhone as a Security Key – By Josh Hendrickson reviewgeek.com

Enabling two-step authentication is one of the more essential steps you can take to secure your accounts. And the best way to do that is to skip SMS and go straight to a physical security key. The only problem is remembering to bring the key with you. That’s getting easier every day with Google accounts; your iPhone can now serve as that physical key.


Have an iPhone? Use it to protect your Google Account with the Advanced Protection Program – By security.googleblog.com

Security keys use public-key cryptography to verify your identity and URL of the login page, so that an attacker can’t access your account even if they have your username or password. Unlike other two-factor authentication (2FA) methods that try to verify your sign-in, security keys are built with FIDO standards that provide the strongest protection against automated bots, bulk phishing attacks, and targeted phishing attacks. You can learn more about security keys from our Cloud Next ‘19 presentation.

Edit photos on your smartphone using Google Photos

How to edit photos on your smartphone using Google Photos – By Gadgets Now Bureau gadgetsnow.com

Many people out there run through a couple of images before finally sharing the selected one/s on Instagram, Facebook or other social media platforms. At times, one can’t find any worthy photos and may be compelled to edit before putting them on social platforms. Although, there are many third-party apps — both paid and free — using which one can edit his/her photos. But if you don’t want to install any such app, then Google Photos app has built-in feature to edit photos. Using this feature, one can add filters, crop photos and more. As the Google Photos app is available for both Android and iOS running devices, this tool can be used by both mobile platform users.

Best password managers for 2020

The best password managers for 2020 and how to use them – By Clifford Colby cnet.com

No more struggling to come up with clever, cryptic passwords that you have a hard time remembering. With a secure and easy-to-use password manager, you can manage your login credentials across all your devices, keeping your passwords secure, automatically filling in forms, and syncing your data across MacOS, Windows, Android phones, iPads, iPhones and more.

Here’s how to wrangle your passwords

Here’s how to wrangle your passwords without going crazy – By Sean Captain fastcompany.com

Marriott. Exactis. Under Armour. The list of online breaches marches on. You can’t prevent corporations from bungling security and leaking your data. But taking extra care with your logins can minimize the damage. Some best practices are obvious: For instance, you shouldn’t use the same username and password for multiple sites, lest hackers who break into one account can access others. And if you don’t store information–such as credit card numbers–in the first place, it can’t be breached.


Better password protections in Chrome – How it works – By security.googleblog.com


Don't Wait for Microsoft to Reset Your Account's Password – By lifehacker.com

Microsoft’s decision to reset the passwords of 44 million accounts, is actually a good thing. If your account is affected, thank Father Gates, because Microsoft is alerting you to the fact that it searched a database of more than three billion leaked accounts and found information belonging to yours.

2 Ways Your SIM Card Can Be Hacked

2 Ways Your SIM Card Can Be Hacked (And How to Protect It) – By Mihir Patkar makeuseof.com

You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe.