CINXE.COM
Security | ZDNET
<!doctype html> <html data-n-head-ssr lang="en" data-edition="us" data-n-head="%7B%22lang%22:%7B%22ssr%22:%22en%22%7D,%22data-edition%22:%7B%22ssr%22:%22us%22%7D%7D"> <head > <!-- running tag = 'zdnet.prod.392fc5' date-timestamp: 1732372335766 --> <meta data-n-head="ssr" charset="utf-8"><meta data-n-head="ssr" name="viewport" content="width=device-width, initial-scale=1"><meta data-n-head="ssr" data-hid="description" name="description" content="ZDNET news and advice keep professionals prepared to embrace innovation and ready to build a better future."><meta data-n-head="ssr" data-hid="og:site_name" property="og:site_name" content="ZDNET"><meta data-n-head="ssr" data-hid="og:description" property="og:description" content="ZDNET news and advice keep professionals prepared to embrace innovation and ready to build a better future."><meta data-n-head="ssr" data-hid="fb:app_id" property="fb:app_id" content="136759700898"><meta data-n-head="ssr" data-hid="twitter:site" name="twitter:site" content="@ZDNET"><meta data-n-head="ssr" data-hid="twitter:creator" name="twitter:creator" content="@ZDNET"><meta data-n-head="ssr" data-hid="twitter:card" name="twitter:card" content="summary_large_image"><meta data-n-head="ssr" data-hid="twitter:description" name="twitter:description" content="ZDNET news and advice keep professionals prepared to embrace innovation and ready to build a better future."><meta data-n-head="ssr" data-hid="theme-color" name="theme-color" content="#080A12"><meta data-n-head="ssr" data-hid="referrer" name="referrer" content="no-referrer-when-downgrade"><script type="application/javascript" charset="UTF-8">window.$neutronWindowPromises = {}; window.$neutronWindowPromises['cohesion'] = new Promise((resolve) => { var value = undefined; Object.defineProperty(window, 'cohesion', { get: function () { return value; }, set: function (newValue) { value = newValue; if (value) resolve(); } }); }); window.$neutronWindowPromises['tagular'] = new Promise((resolve) => { var value = undefined; Object.defineProperty(window, 'tagular', { get: function () { return value; }, set: function (newValue) { value = newValue; if (value) resolve(); } }); }); window.$neutronWindowPromises['_Cohesion'] = new Promise((resolve) => { var value = undefined; Object.defineProperty(window, '_Cohesion', { get: function () { return value; }, set: function (newValue) { value = newValue; if (value) resolve(); } }); }); window.$neutronWindowPromises['gtag'] = new Promise((resolve) => { var value = undefined; Object.defineProperty(window, 'gtag', { get: function () { return value; }, set: function (newValue) { value = newValue; if (value) resolve(); } }); }); </script><script type="application/javascript" charset="UTF-8"> !function(t,e){"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define(e):(t=t||self).uuidv4=e()}(this,(function(){"use strict";var t="undefined"!=typeof crypto&&crypto.getRandomValues&&crypto.getRandomValues.bind(crypto)||"undefined"!=typeof msCrypto&&"function"==typeof msCrypto.getRandomValues&&msCrypto.getRandomValues.bind(msCrypto),e=new Uint8Array(16);function n(){if(!t)throw new Error("crypto.getRandomValues() not supported. See https://github.com/uuidjs/uuid#getrandomvalues-not-supported");return t(e)}for(var o=[],r=0;r<256;++r)o.push((r+256).toString(16).substr(1));return function(t,e,r){"string"==typeof t&&(e="binary"===t?new Uint8Array(16):null,t=null);var u=(t=t||{}).random||(t.rng||n)();if(u[6]=15&u[6]|64,u[8]=63&u[8]|128,e){for(var i=r||0,d=0;d<16;++d)e[i+d]=u[d];return e}return function(t,e){var n=e||0,r=o;return(r[t[n+0]]+r[t[n+1]]+r[t[n+2]]+r[t[n+3]]+"-"+r[t[n+4]]+r[t[n+5]]+"-"+r[t[n+6]]+r[t[n+7]]+"-"+r[t[n+8]]+r[t[n+9]]+"-"+r[t[n+10]]+r[t[n+11]]+r[t[n+12]]+r[t[n+13]]+r[t[n+14]]+r[t[n+15]]).toLowerCase()}(u)}})); window.initialPageViewGuid = window.uuidv4(); </script><script type="application/javascript">window.neutronWaitForService = (serviceName, funcName, resolve, reject) => { var MAX_COUNT = 30, WAIT_TIME = 500; var self = window.neutronWaitForService; var serviceDefined = typeof window[serviceName] !== 'undefined'; if (typeof self.count === 'undefined') { self.count = 1; } if ((!funcName && serviceDefined) || (funcName && serviceDefined && typeof window[serviceName][funcName] === 'function')) { resolve(); } else if (self.count <= MAX_COUNT) { self.count++; setTimeout(() => { window.neutronWaitForService(serviceName, funcName, resolve, reject); }, WAIT_TIME); } else { reject(); } };</script><script type="text/plain" class="optanon-category-C0002" charset="UTF-8"> window.BOOMR_config={autorun:!1,Errors:{enabled:!0,monitorGlobal:!0,monitorNetwork:!1,monitorConsole:!0,monitorEvents:!1,monitorTimeout:!1,maxErrors:10,onError:function(o){var r=o.message||"";return-1!==r.indexOf(".zdnet.com")&&-1===r.indexOf("Script error")&&-1===r.indexOf("Load timeout for modules")}},History:{auto:!0,enabled:!0}}; !function(){if(window.BOOMR&&(window.BOOMR.version||window.BOOMR.snippetExecuted))return;window.BOOMR=window.BOOMR||{},window.BOOMR.snippetStart=(new Date).getTime(),window.BOOMR.snippetExecuted=!0,window.BOOMR.snippetVersion=15,window.BOOMR.url="//c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E";const e=(document.currentScript||document.getElementsByTagName("script")[0]).parentNode;let t=!1;function n(n){let o;t=!0;let i,d,r,a=document,c=window;window.BOOMR.snippetMethod=n?"if":"i",i=function(e,t){const n=a.createElement("script");n.id=t||"boomr-if-as",n.src=window.BOOMR.url,BOOMR_lstart=(new Date).getTime(),(e=e||a.body).appendChild(n)},d=document.createElement("IFRAME"),d.src="about:blank",d.title="",d.role="presentation",d.loading="eager",r=(d.frameElement||d).style,r.width=0,r.height=0,r.border=0,r.display="none",e.appendChild(d);try{c=d.contentWindow,a=c.document.open()}catch(e){o=document.domain,d.src="javascript:var d=document.open();d.domain='"+o+"';void 0;",c=d.contentWindow,a=c.document.open()}c._boomrl=function(){i()},c.addEventListener?c.addEventListener("load",c._boomrl,!1):c.attachEvent&&c.attachEvent("onload",c._boomrl),a.close()}const o=document.createElement("link");function i(e){window.BOOMR_onload=e&&e.timeStamp||(new Date).getTime()}o.relList&&"function"==typeof o.relList.supports&&o.relList.supports("preload")&&"as"in o?(window.BOOMR.snippetMethod="p",o.href=window.BOOMR.url,o.rel="preload",o.as="script",o.addEventListener("load",(function(){if(t)return;const n=document.createElement("script");n.id="boomr-scr-as",n.src=window.BOOMR.url,n.async=!0,e.appendChild(n),t=!0})),o.addEventListener("error",(function(){n(!0)})),setTimeout((function(){t||n(!0)}),3e3),BOOMR_lstart=(new Date).getTime(),e.appendChild(o)):n(!1),window.addEventListener?window.addEventListener("load",i,!1):window.attachEvent&&window.attachEvent("onload",i)}(); </script><script type="application/javascript">window.BidBarrel = window.BidBarrel || {}; window.BidBarrel.queue = window.BidBarrel.queue || [];</script><script type="application/javascript" async src="//at.adtech.redventures.io/lib/dist/prod/bidbarrel-zdnet-rv.min.js?adaptive=true"></script><script type="text/plain" class="optanon-category-C0001" async charset="UTF-8" src="//securepubads.g.doubleclick.net/tag/js/gpt.js"></script><script type="text/plain" class="optanon-category-C0004" async charset="UTF-8" src="//js-sec.indexww.com/ht/p/183728-122510094381206.js"></script><script type="text/plain" class="optanon-category-C0004" async charset="UTF-8" src="//c.aps.amazon-adsystem.com/apstag.js"></script><script type="application/javascript" charset="UTF-8"> new Promise ((resolve, reject) => { window.neutronWaitForService('apstag', 'nativeContent', resolve, reject); }).then(() => { window.apstag.queue.push(function() { window.apstag.nativeContent().registerHook('nativeContent.updateClickUrl', function(url, element) { element.setAttribute('data-nca-url', url); return url; }); window.apstag.nativeContent().enable(); }); }); </script><script type="application/javascript" charset="UTF-8"> (function (G, o, O, g, L, e) { G[g] = G[g] || function () { (G[g]['q'] = G[g]['q'] || []).push(arguments) }, G[g]['t'] = 1 * new Date; })(window, document, 'script', '_googCsa'); </script><script type="application/javascript" charset="UTF-8"> window._mNHandle = window._mNHandle || {}; window._mNHandle.queue = window._mNHandle.queue || []; medianet_versionId = "3121199"; </script><script type="application/javascript" async charset="UTF-8" data-domain-script="01921f60-0c5a-76c0-98fb-30ae9145e17b" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js"></script><link href="https://www.zdnet.com/a/neutron/fonts/SuisseIntl/Semibold.woff2" rel="preload" as="font" type="font/woff2" crossorigin="anonymous"><link href="https://www.zdnet.com/a/neutron/fonts/SuisseIntl/Regular.woff2" rel="preload" as="font" type="font/woff2" crossorigin="anonymous"><script type="text/plain" class="optanon-category-C0004" async src="//tru.am/scripts/custom/cbsinteractive.df89ec.js"></script><script type="application/javascript" charset="UTF-8"> window.utag_data = {"pageNumber":1,"_pageComponents":"","pageType":"category_door","collectionId":[""],"contentId":"security","contentType":"content_feature","siteEdition":"us","siteSection":"","tagSlugs":[],"topicId":[],"topicName":[],"topicSlugs":[],"articleId":"113c25b6-ec91-11e3-95d2-02911863765e","brand":"zdnet","_collectionPrimaryId":[""],"deviceType":"desktop","edition":"us","error":"prod","isDev":false,"limit":4,"pageViewGuid":null,"reportSuiteId":"cnetzdnetglobalsite","siteName":"zdnet","siteType":"responsive web","soastaBucket":"","soastaPageType":"","testGroup":"","testName":"","testVersion":"","traffic_source":"cloud"}; window.utag_data.pageViewGuid = window.initialPageViewGuid; </script><script type="text/plain" class="optanon-category-C0004" charset="UTF-8"> document.addEventListener("DOMContentLoaded", function () { var element = document.createElement("script"); element.src = "https://znboeraj5ckzy50mq-redventures.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_bOErAJ5ckzy50mq&Q_LOC=" + encodeURIComponent(window.location.href); document.body.appendChild(element); }); </script><script type="application/javascript" charset="UTF-8"> window.chsn_ad_id = window.initialPageViewGuid; window.chsn_pageType = "category_door"; window.chsn_post_id = "113c25b6-ec91-11e3-95d2-02911863765e"; !(function (co, h, e, s, i, o, n) { var d = "documentElement"; var a = "className"; h[d][a] += " preampjs fusejs"; n.k = e; co._Cohesion = n; co._Preamp = { k: s, start: new Date() }; co._Fuse = { k: i }; co._Tagular = { k: o }; [e, s, i, o].map(function (x) { co[x] = co[x] || function () { (co[x].q = co[x].q || []).push([].slice.call(arguments)); }; }); h.addEventListener("DOMContentLoaded", function () { co.setTimeout(function () { var u = h[d][a]; h[d][a] = u.replace(/ ?preampjs| ?fusejs/g, ""); }, 3e3); co._Preamp.docReady = co._Fuse.docReady = !0; }); var z = h.createElement("script"); z.async = 1; z.src = "https://cdn.cohesionapps.com/cohesion/cohesion-latest.min.js"; h.head.appendChild(z); })(window, document, "cohesion", "preamp", "fuse", "tagular", {"consent": {"onetrust": {"enabled": true,"optIn": true},"required": true},"tagular": {"writeKey": "wk_1kYsAdHsx1XVwT5EbX9OQYl4nJM","sourceKey": "src_1kYsAcdpfzbZ8UlNLYht1RPg3m2","apiVersion": "v2/t","taggy": {"enabled": true},"beamHook": function (event) { if (false) {} },"cookieDomain": ".zdnet.com"},"monarch": {"token": "216e3432-947e-4868-acd4-32f9cb9ffdb9","sourceId": "898423bf-f046-40ab-933c-5c7c7f6067c7"},"preamp": {"siteId": "22EmoWhqjmBRrnjnuNano1","hooks": {"beforeRun": (config, done) => { if (!window.preampArticleMetadata) { window.preampArticleMetadata = {}; } config.custom = window.preampArticleMetadata; done(); }}}}); </script><script type="application/javascript" charset="UTF-8"> (function () { window.dataLayer = window.dataLayer || []; if (typeof window.gtag !== 'function') { function gtag() { window.dataLayer.push(arguments); } window.gtag = gtag; } window.gtag('js', new Date()); window.gtag('config', 'G-1Q25KQB2WE', { 'send_page_view': false }); })(); </script><script type="text/plain" class="optanon-category-C0004" charset="UTF-8" async src="https://www.googletagmanager.com/gtag/js?id=G-1Q25KQB2WE"></script><script type="text/plain" class="optanon-category-C0002" async src="//static.chartbeat.com/js/chartbeat_mab.js"></script><script type="text/plain" class="optanon-category-C0004"> !function(f,b,e,v,n,t,s) {if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window, document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('set', 'autoConfig', false, '789754228632403'); fbq('init', '789754228632403'); </script><script type="text/plain" class="optanon-category-C0004" async src="https://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js"></script><meta data-n-head="ssr" data-hid="og:image" property="og:image" content="https://www.zdnet.com/a/neutron/images/logos/logo.png"><meta data-n-head="ssr" data-hid="twitter:image" name="twitter:image" content="https://www.zdnet.com/a/neutron/images/logos/logo.png"><meta data-n-head="ssr" property="og:type" content="website" data-hid="og:type"><meta data-n-head="ssr" name="nuxtstatus" content="loaded" data-hid="nuxtstatus"><meta data-n-head="ssr" property="article:content_tier" content="free" data-hid="article:content_tier"><meta data-n-head="ssr" property="article:publisher" content="https://www.facebook.com/ZDNET.official" data-hid="article:publisher"><meta data-n-head="ssr" property="og:title" content="Security" data-hid="og:title"><meta data-n-head="ssr" property="og:url" content="https://www.zdnet.com/topic/security/" data-hid="og:url"><meta data-n-head="ssr" name="twitter:title" content="Security" data-hid="twitter:title"><meta data-n-head="ssr" name="twitter:url" content="https://www.zdnet.com/topic/security/" data-hid="twitter:url"><title>Security | ZDNET</title><link data-n-head="ssr" data-hid="publisher" rel="publisher" href="https://plus.google.com/105074359186426139750/"><link data-n-head="ssr" data-hid="icon" rel="shortcut icon" type="image/png" href="https://www.zdnet.com/a/neutron/images/logos/logo.png"><link data-n-head="ssr" rel="canonical" href="https://www.zdnet.com/topic/security/" data-hid="canonical"><script data-n-head="ssr" charset="UTF-8" type="application/ld+json" data-hid="ld+json">[]</script><script data-n-head="ssr" charset="UTF-8" type="application/javascript" data-hid="chartbeat/config"> var _sf_async_config = _sf_async_config || {}; _sf_async_config.uid = 66142; _sf_async_config.domain = "zdnet.com"; _sf_async_config.flickerControl = false; _sf_async_config.useCanonical = true; _sf_async_config.useCanonicalDomain = true; _sf_async_config.autoDetect = false; _sf_async_config.sections = ""; _sf_async_config.authors = ""; _sf_async_config.contentType = "undefined"; var _sf_startpt = 1732372335571; window._cbq = (window._cbq || []); </script><script data-n-head="ssr"></script><style data-vue-ssr-id="f1847de4:0 3383f5a2:0 12f5cd94:0 cfb5d6b2:0 b9db6b2c:0 0c51e314:0 47ca5d4c:0 eb86ee40:0 5309f1ee:0 1b4d0e46:0 90834cbe:0 ea6b71c4:0 c6c1d790:0 a1459ff6:0 05c63453:0 3890d3ea:0 248d98fe:0 0c6ad2b4:0 3e84d380:0 1e499b28:0 b2456540:0 37c97c99:0 3fb890bc:0 c03ce42a:0 4d138ec9:0 6f7c6c9e:0 32cc4ae4:0 ace3079e:0 517d5238:0 10883194:0 5cd2438e:0 94367f20:0 4569ff88:0 69b7947e:0 575e13cc:0 4d007e28:0 2586f68f:0 602612d4:0">article,aside,details,figcaption,figure,footer,header,hgroup,main,nav,section,summary{display:block}audio,canvas,video{display:inline-block}audio:not([controls]){display:none}[hidden]{display:none}*,*::before,*::after{box-sizing:border-box;outline:0}html{font-size:100%;text-size-adjust:100%}body{margin:0}iframe{border:0;max-width:100%}a,.no-touch a:hover,a:active{outline:0}abbr[title]{border-bottom:1px dotted}dfn{font-style:italic}abbr[title],dfn[title]{cursor:help}b,strong{font-weight:bold}blockquote{margin:0}hr{display:block;height:1px;border:0;border-top:1px solid #ccc;margin:1em 0;padding:0}ins{background:#ff9;color:#000;text-decoration:none}mark{background:#ff0;color:#000;font-style:italic;font-weight:bold}pre,code,kbd,samp{font-family:monospace,serif;_font-family:"courier new",monospace;font-size:1em}pre{white-space:pre;white-space:pre-wrap;word-wrap:break-word}q{quotes:none}q::before,q::after{content:"";content:none}small{font-size:85%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sup{top:-0.5em}sub{bottom:-0.25em}ul,ol,dl{list-style:none;list-style-image:none}li{list-style:none}dd{margin:0}img{border:0;vertical-align:middle;max-width:100%}svg:not(:root){overflow:hidden}figure{margin:0}form{margin:0}fieldset{border:0;margin:0;padding:0}label{cursor:pointer}legend{border:0;padding:0;white-space:normal}button,input,select,textarea{font-size:100%;margin:0;vertical-align:baseline}button,input{line-height:normal}button,input[type=button],input[type=reset],input[type=submit]{cursor:pointer;appearance:button}button[disabled],input[disabled]{cursor:default}input[type=checkbox],input[type=radio]{box-sizing:border-box;padding:0}input[type=search]{appearance:textfield;box-sizing:content-box}input[type=search]::-webkit-search-decoration,input[type=search]::-webkit-search-cancel-button{appearance:none}input[type=text]:active,input[type=text]:focus,textarea:active,textarea:focus{cursor:text;outline:none}label,input,textarea,select,option{cursor:pointer}button::-moz-focus-inner,input::-moz-focus-inner{border:0;padding:0}textarea{overflow:auto;vertical-align:top;resize:vertical}table{border-collapse:collapse;border-spacing:0}td{vertical-align:top}h1,h2,h3,h4,h5,h6,p,blockquote,pre,dl,dd,form,fieldset,legend,table,th,td,caption,ul,ol{margin:0;padding:0}@media print{*{background:rgba(0,0,0,0) !important;color:#000 !important;box-shadow:none !important;text-shadow:none !important;filter:none !important}a,a:visited{text-decoration:underline}abbr[title]::after{content:" (" attr(title) ")"}.ir a::after,a[href^="javascript:"]::after,a[href^="#"]::after{content:""}pre,blockquote{border:1px solid #999;page-break-inside:avoid}thead{display:table-header-group}tr,img{page-break-inside:avoid}img{max-width:100% !important}@page{margin:1cm}p,h2,h3{orphans:3;widows:3}h2,h3{page-break-after:avoid}}button,[type=button],[type=submit]{background:#080a12;border:0;color:#fff;font-family:suisseintl,helvetica,sans-serif;font-size:1rem;font-weight:600;height:3rem;text-transform:uppercase}[type=checkbox]{appearance:none;border:1px solid #d8d8d8;height:2rem;vertical-align:top;width:2rem}[type=checkbox]:active,[type=checkbox]:focus{border:1px solid unset}[type=checkbox]:checked{background:#080a12;background-image:url('data:image/svg+xml;utf8,<svg width="12" height="10" viewBox="0 0 12 10" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M10.1425 0L4.5 5.7835L1.857 3.278L0 5.136L4.5 9.5L12 1.8575L10.1425 0Z" fill="white"/></svg>');background-position-x:50%;background-position-y:50%;background-repeat:no-repeat;border:0}[type=radio]{appearance:none;border:1px solid #d8d8d8;border-radius:50%;height:2rem;vertical-align:top;width:2rem}[type=radio]:active,[type=radio]:focus{border:1px solid unset}[type=radio]:checked{background:#080a12;background-image:url('data:image/svg+xml;utf8,<svg width="8" height="8" viewBox="0 0 8 8" fill="none" xmlns="http://www.w3.org/2000/svg"><circle cx="4" cy="4" r="4" fill="white"/></svg>');background-position-x:50%;background-position-y:50%;background-repeat:no-repeat;border:0}[type=text],select,textarea{border:1px solid var(--border-color, rgb(216, 216, 216));color:var(--color, rgb(38, 38, 38))}select{appearance:none;background:rgba(0,0,0,0);background-image:url('data:image/svg+xml;utf8,<svg width="10" height="5" viewBox="0 0 10 5" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 0L5.05077 5L10 0.100515L0 0Z" fill="black"/></svg>');background-position-x:calc(100% - 1.4375rem);background-position-y:50%;background-repeat:no-repeat;padding-right:3.5rem}textarea{font-family:suisseintl,helvetica,sans-serif}[type=text]::placeholder,select::placeholder,textarea::placeholder{color:gray;opacity:1}[type=text]:active,select:active,textarea:active,[type=text]:focus,select:focus,textarea:focus{border:1px solid unset}[type=text]:invalid,select:invalid,textarea:invalid{border:1px solid #eb0036;color:#eb0036}html{font-family:suisseintl,helvetica,sans-serif;font-size:16px;color:#080a12}body{font-size:1rem;line-height:1.625rem}h1{font-size:3rem;line-height:3.25rem}@media(min-width: 768px){h1{font-size:calc(48px + 88*(100vw - 768px)/672);line-height:calc(52px + 92*(100vw - 768px)/672)}}@media(min-width: 1440px){h1{font-size:8.5rem;line-height:9rem}}h2{font-size:2.25rem;line-height:2.75rem}@media(min-width: 768px){h2{font-size:calc(36px + 12*(100vw - 768px)/672);line-height:calc(44px + 8*(100vw - 768px)/672)}}@media(min-width: 1440px){h2{font-size:3rem;line-height:3.25rem}}h3{font-size:1.375rem;line-height:1.875rem}@media(min-width: 768px){h3{font-size:calc(22px + 14*(100vw - 768px)/672);line-height:calc(30px + 14*(100vw - 768px)/672)}}@media(min-width: 1440px){h3{font-size:2.25rem;line-height:2.75rem}}h4{font-size:1.125rem;line-height:1.75rem}@media(min-width: 768px){h4{font-size:calc(18px + 4*(100vw - 768px)/672);line-height:calc(28px + 2*(100vw - 768px)/672)}}@media(min-width: 1440px){h4{font-size:1.375rem;line-height:1.875rem}}h5{font-size:1.125rem;line-height:1.75rem}h6{font-size:1rem;line-height:1.375rem}a{color:#006dff;text-decoration:none}a:hover{color:#080a12;text-decoration:none}p{font-size:1.125rem;line-height:1.75rem}.g-border-thin-light-top{border-top:1px solid #f1f0f3}.g-border-thin-dark-top,.c-sectionHeading{border-top:1px solid #080a12}.g-border-thick-light-top{border-top:5px solid #f1f0f3}.g-border-thick-dark-top{border-top:1px solid #080a12}.g-border-thin-primary-top{border-top:1px solid #080a12}.g-border-thick-primary-top{border-top:5px solid #080a12}.g-border-thin-light-right{border-right:1px solid #f1f0f3}.g-border-thin-dark-right{border-right:1px solid #080a12}.g-border-thick-light-right{border-right:5px solid #f1f0f3}.g-border-thick-dark-right{border-right:1px solid #080a12}.g-border-thin-primary-right{border-right:1px solid #080a12}.g-border-thick-primary-right{border-right:5px solid #080a12}.g-border-thin-light-bottom{border-bottom:1px solid #f1f0f3}.g-border-thin-dark-bottom{border-bottom:1px solid #080a12}.g-border-thick-light-bottom{border-bottom:5px solid #f1f0f3}.g-border-thick-dark-bottom{border-bottom:1px solid #080a12}.g-border-thin-primary-bottom{border-bottom:1px solid #080a12}.g-border-thick-primary-bottom{border-bottom:5px solid #080a12}.g-border-thin-light-left{border-left:1px solid #f1f0f3}.g-border-thin-dark-left{border-left:1px solid #080a12}.g-border-thick-light-left{border-left:5px solid #f1f0f3}.g-border-thick-dark-left{border-left:1px solid #080a12}.g-border-thin-primary-left{border-left:1px solid #080a12}.g-border-thick-primary-left{border-left:5px solid #080a12}.g-border-thin-light{border:1px solid #f1f0f3}.g-border-thin-dark{border:1px solid #080a12}.g-border-thick-light{border:5px solid #f1f0f3}.g-border-thick-dark{border:5px solid #080a12}.g-border-thin-primary{border:1px solid #080a12}.g-border-thick-primary{border:5px solid #080a12}.g-bg-primary{background-color:#080a12}.g-color-primary{color:#080a12}.g-color-primary-dark{color:unset}.g-border-primary{border-color:#080a12}.g-bg-secondary{background-color:unset}.g-color-secondary{color:unset}.g-border-secondary{color:unset}.g-bg-tertiary{background-color:#eb0e33}.g-color-tertiary{color:#eb0e33}.g-bg-brand{background-color:#d0ff4b}.g-color-brand{color:#d0ff4b}.g-color-text-meta{color:#505259}.g-bg-black{background-color:#000}.g-color-black{color:#000}.g-fill-black{fill:#000}.g-bg-black-alpha25{background-color:rgba(0,0,0,.25)}.g-color-black-alpha25{color:rgba(0,0,0,.25)}.g-fill-black-alpha25{fill:rgba(0,0,0,.25)}.g-bg-white{background-color:#fff}.g-color-white{color:#fff}.g-fill-white{fill:#fff}.g-bg-white-alpha25{background-color:rgba(255,255,255,.25)}.g-color-white-alpha25{color:rgba(255,255,255,.25)}.g-fill-white-alpha25{fill:rgba(255,255,255,.25)}.g-bg-facebook{background-color:#3b5998}.g-color-facebook{color:#3b5998}.g-fill-facebook{fill:#3b5998}.g-bg-twitter{background-color:#1da1f2}.g-color-twitter{color:#1da1f2}.g-fill-twitter{fill:#1da1f2}.g-bg-linkedin{background-color:#0073b2}.g-color-linkedin{color:#0073b2}.g-fill-linkedin{fill:#0073b2}.g-bg-flipboard{background-color:#e12828}.g-color-flipboard{color:#e12828}.g-fill-flipboard{fill:#e12828}.g-bg-reddit{background-color:#ff4500}.g-color-reddit{color:#ff4500}.g-fill-reddit{fill:#ff4500}.g-bg-pinterest{background-color:#e60023}.g-color-pinterest{color:#e60023}.g-fill-pinterest{fill:#e60023}.g-grid-container{width:calc(100vw - 2*1rem);min-width:288px;margin-left:auto;margin-right:auto}@media(min-width: 768px){.g-grid-container{width:calc(100vw - 2*2rem)}}@media(min-width: 1440px){.g-grid-container{width:calc(1440px - 144px);max-width:1440px}}.g-container-square{border-radius:0}.g-container-rounded-small{border-radius:.25rem}.g-container-rounded-medium{border-radius:.5rem}.g-container-rounded-large{border-radius:1rem}.g-container-round{border-radius:50%}.g-dropShadow-default{box-shadow:0 2px 16px 0 rgba(0,0,0,.08)}.g-dropShadow-default-plusHover{box-shadow:0 2px 16px 0 rgba(0,0,0,.08)}.g-dropShadow-default-plusHover:hover{box-shadow:0 8px 16px 0 rgba(0,0,0,.16)}.g-dropShadow-hover{box-shadow:0 8px 16px 0 rgba(0,0,0,.16)}.g-dropShadow-modal{box-shadow:0 24px 32px 0 rgba(0,0,0,.16),0 2px 16px 0 rgba(0,0,0,.08)}.g-outer-spacing-xxlarge{margin:3rem}.g-outer-spacing-xlarge{margin:2.5rem}.g-outer-spacing-large{margin:2rem}.g-outer-spacing-medium{margin:1.5rem}.g-outer-spacing-small{margin:1rem}.g-outer-spacing-xsmall{margin:.5rem}.g-outer-spacing-top-xxlarge{margin-top:3rem}.g-outer-spacing-top-xxlarge-fluid{margin-top:2.5rem}@media(min-width: 768px){.g-outer-spacing-top-xxlarge-fluid{margin-top:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-top-xxlarge-fluid{margin-top:3rem}}.g-outer-spacing-bottom-xxlarge,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{margin-bottom:3rem}.g-outer-spacing-bottom-xxlarge-fluid{margin-bottom:2.5rem}@media(min-width: 768px){.g-outer-spacing-bottom-xxlarge-fluid{margin-bottom:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-bottom-xxlarge-fluid{margin-bottom:3rem}}.g-outer-spacing-top-xlarge{margin-top:2.5rem}.g-outer-spacing-top-xlarge-fluid{margin-top:2rem}@media(min-width: 768px){.g-outer-spacing-top-xlarge-fluid{margin-top:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-top-xlarge-fluid{margin-top:2.5rem}}.g-outer-spacing-bottom-xlarge{margin-bottom:2.5rem}.g-outer-spacing-bottom-xlarge-fluid,p{margin-bottom:2rem}@media(min-width: 768px){.g-outer-spacing-bottom-xlarge-fluid,p{margin-bottom:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-bottom-xlarge-fluid,p{margin-bottom:2.5rem}}.g-outer-spacing-top-large{margin-top:2rem}.g-outer-spacing-top-large-fluid{margin-top:1.5rem}@media(min-width: 768px){.g-outer-spacing-top-large-fluid{margin-top:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-top-large-fluid{margin-top:2rem}}.g-outer-spacing-bottom-large{margin-bottom:2rem}.g-outer-spacing-bottom-large-fluid{margin-bottom:1.5rem}@media(min-width: 768px){.g-outer-spacing-bottom-large-fluid{margin-bottom:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-bottom-large-fluid{margin-bottom:2rem}}.g-outer-spacing-top-medium{margin-top:1.5rem}.g-outer-spacing-top-medium-fluid{margin-top:1rem}@media(min-width: 768px){.g-outer-spacing-top-medium-fluid{margin-top:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-top-medium-fluid{margin-top:1.5rem}}.g-outer-spacing-bottom-medium,.c-sectionHeading{margin-bottom:1.5rem}.g-outer-spacing-bottom-medium-fluid,p{margin-bottom:1rem}@media(min-width: 768px){.g-outer-spacing-bottom-medium-fluid,p{margin-bottom:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-bottom-medium-fluid,p{margin-bottom:1.5rem}}.g-outer-spacing-top-small{margin-top:1rem}.g-outer-spacing-bottom-small{margin-bottom:1rem}.g-outer-spacing-top-xsmall{margin-top:.5rem}.g-outer-spacing-bottom-xsmall{margin-bottom:.5rem}.g-outer-spacing-left-xxlarge{margin-left:3rem}.g-outer-spacing-left-xxlarge-fluid{margin-left:2.5rem}@media(min-width: 768px){.g-outer-spacing-left-xxlarge-fluid{margin-left:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-left-xxlarge-fluid{margin-left:3rem}}.g-outer-spacing-right-xxlarge{margin-right:3rem}.g-outer-spacing-right-xxlarge-fluid{margin-right:2.5rem}@media(min-width: 768px){.g-outer-spacing-right-xxlarge-fluid{margin-right:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-right-xxlarge-fluid{margin-right:3rem}}.g-outer-spacing-left-xlarge{margin-left:2.5rem}.g-outer-spacing-left-xlarge-fluid{margin-left:2rem}@media(min-width: 768px){.g-outer-spacing-left-xlarge-fluid{margin-left:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-left-xlarge-fluid{margin-left:2.5rem}}.g-outer-spacing-right-xlarge{margin-right:2.5rem}.g-outer-spacing-right-xlarge-fluid{margin-right:2rem}@media(min-width: 768px){.g-outer-spacing-right-xlarge-fluid{margin-right:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-right-xlarge-fluid{margin-right:2.5rem}}.g-outer-spacing-left-large{margin-left:2rem}.g-outer-spacing-left-large-fluid{margin-left:1.5rem}@media(min-width: 768px){.g-outer-spacing-left-large-fluid{margin-left:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-left-large-fluid{margin-left:2rem}}.g-outer-spacing-right-large{margin-right:2rem}.g-outer-spacing-right-large-fluid{margin-right:1.5rem}@media(min-width: 768px){.g-outer-spacing-right-large-fluid{margin-right:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-right-large-fluid{margin-right:2rem}}.g-outer-spacing-left-medium{margin-left:1.5rem}.g-outer-spacing-left-medium-fluid{margin-left:1rem}@media(min-width: 768px){.g-outer-spacing-left-medium-fluid{margin-left:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-left-medium-fluid{margin-left:1.5rem}}.g-outer-spacing-right-medium{margin-right:1.5rem}.g-outer-spacing-right-medium-fluid{margin-right:1rem}@media(min-width: 768px){.g-outer-spacing-right-medium-fluid{margin-right:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-outer-spacing-right-medium-fluid{margin-right:1.5rem}}.g-outer-spacing-left-small{margin-left:1rem}.g-outer-spacing-right-small{margin-right:1rem}.g-outer-spacing-left-xsmall{margin-left:.5rem}.g-outer-spacing-right-xsmall{margin-right:.5rem}.g-outer-spacing-top-none{margin-top:0}.g-outer-spacing-right-none{margin-right:0}.g-outer-spacing-bottom-none{margin-bottom:0}.g-outer-spacing-left-none{margin-left:0}.g-inner-spacing-xxlarge{padding:3rem}.g-inner-spacing-xlarge{padding:2.5rem}.g-inner-spacing-large{padding:2rem}.g-inner-spacing-medium{padding:1.5rem}.g-inner-spacing-small{padding:1rem}.g-inner-spacing-xsmall{padding:.5rem}.g-inner-spacing-top-xxlarge{padding-top:3rem}.g-inner-spacing-top-xxlarge-fluid{padding-top:2.5rem}@media(min-width: 768px){.g-inner-spacing-top-xxlarge-fluid{padding-top:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-top-xxlarge-fluid{padding-top:3rem}}.g-inner-spacing-bottom-xxlarge{padding-bottom:3rem}.g-inner-spacing-bottom-xxlarge-fluid{padding-bottom:2.5rem}@media(min-width: 768px){.g-inner-spacing-bottom-xxlarge-fluid{padding-bottom:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-bottom-xxlarge-fluid{padding-bottom:3rem}}.g-inner-spacing-top-xlarge{padding-top:2.5rem}.g-inner-spacing-top-xlarge-fluid{padding-top:2rem}@media(min-width: 768px){.g-inner-spacing-top-xlarge-fluid{padding-top:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-top-xlarge-fluid{padding-top:2.5rem}}.g-inner-spacing-bottom-xlarge{padding-bottom:2.5rem}.g-inner-spacing-bottom-xlarge-fluid{padding-bottom:2rem}@media(min-width: 768px){.g-inner-spacing-bottom-xlarge-fluid{padding-bottom:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-bottom-xlarge-fluid{padding-bottom:2.5rem}}.g-inner-spacing-top-large{padding-top:2rem}.g-inner-spacing-top-large-fluid{padding-top:1.5rem}@media(min-width: 768px){.g-inner-spacing-top-large-fluid{padding-top:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-top-large-fluid{padding-top:2rem}}.g-inner-spacing-bottom-large{padding-bottom:2rem}.g-inner-spacing-bottom-large-fluid{padding-bottom:1.5rem}@media(min-width: 768px){.g-inner-spacing-bottom-large-fluid{padding-bottom:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-bottom-large-fluid{padding-bottom:2rem}}.g-inner-spacing-top-medium,.c-sectionHeading{padding-top:1.5rem}.g-inner-spacing-top-medium-fluid{padding-top:1rem}@media(min-width: 768px){.g-inner-spacing-top-medium-fluid{padding-top:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-top-medium-fluid{padding-top:1.5rem}}.g-inner-spacing-bottom-medium{padding-bottom:1.5rem}.g-inner-spacing-bottom-medium-fluid{padding-bottom:1rem}@media(min-width: 768px){.g-inner-spacing-bottom-medium-fluid{padding-bottom:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-bottom-medium-fluid{padding-bottom:1.5rem}}.g-inner-spacing-top-small{padding-top:1rem}.g-inner-spacing-bottom-small{padding-bottom:1rem}.g-inner-spacing-top-xsmall{padding-top:.5rem}.g-inner-spacing-bottom-xsmall{padding-bottom:.5rem}.g-inner-spacing-left-xxlarge{padding-left:3rem}.g-inner-spacing-left-xxlarge-fluid{padding-left:2.5rem}@media(min-width: 768px){.g-inner-spacing-left-xxlarge-fluid{padding-left:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-left-xxlarge-fluid{padding-left:3rem}}.g-inner-spacing-right-xxlarge{padding-right:3rem}.g-inner-spacing-right-xxlarge-fluid{padding-right:2.5rem}@media(min-width: 768px){.g-inner-spacing-right-xxlarge-fluid{padding-right:calc(40px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-right-xxlarge-fluid{padding-right:3rem}}.g-inner-spacing-left-xlarge{padding-left:2.5rem}.g-inner-spacing-left-xlarge-fluid{padding-left:2rem}@media(min-width: 768px){.g-inner-spacing-left-xlarge-fluid{padding-left:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-left-xlarge-fluid{padding-left:2.5rem}}.g-inner-spacing-right-xlarge{padding-right:2.5rem}.g-inner-spacing-right-xlarge-fluid{padding-right:2rem}@media(min-width: 768px){.g-inner-spacing-right-xlarge-fluid{padding-right:calc(32px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-right-xlarge-fluid{padding-right:2.5rem}}.g-inner-spacing-left-large{padding-left:2rem}.g-inner-spacing-left-large-fluid{padding-left:1.5rem}@media(min-width: 768px){.g-inner-spacing-left-large-fluid{padding-left:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-left-large-fluid{padding-left:2rem}}.g-inner-spacing-right-large{padding-right:2rem}.g-inner-spacing-right-large-fluid{padding-right:1.5rem}@media(min-width: 768px){.g-inner-spacing-right-large-fluid{padding-right:calc(24px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-right-large-fluid{padding-right:2rem}}.g-inner-spacing-left-medium{padding-left:1.5rem}.g-inner-spacing-left-medium-fluid{padding-left:1rem}@media(min-width: 768px){.g-inner-spacing-left-medium-fluid{padding-left:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-left-medium-fluid{padding-left:1.5rem}}.g-inner-spacing-right-medium{padding-right:1.5rem}.g-inner-spacing-right-medium-fluid{padding-right:1rem}@media(min-width: 768px){.g-inner-spacing-right-medium-fluid{padding-right:calc(16px + 8*(100vw - 768px)/256)}}@media(min-width: 1024px){.g-inner-spacing-right-medium-fluid{padding-right:1.5rem}}.g-inner-spacing-left-small{padding-left:1rem}.g-inner-spacing-right-small{padding-right:1rem}.g-inner-spacing-left-xsmall{padding-left:.5rem}.g-inner-spacing-right-xsmall{padding-right:.5rem}.preampjs [data-preamp],.fusejs [data-fuse]{opacity:0 !important}.g-text-xxxlarge,.g-text-xxxlarge-bold{font-size:3rem;line-height:3.25rem;font-weight:800}@media(min-width: 768px){.g-text-xxxlarge,.g-text-xxxlarge-bold{font-size:calc(48px + 88*(100vw - 768px)/672);line-height:calc(52px + 92*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-xxxlarge,.g-text-xxxlarge-bold{font-size:8.5rem;line-height:9rem}}.g-text-xxlarge,.g-text-xxlarge-bold{font-size:2.25rem;line-height:2.75rem;font-weight:800}@media(min-width: 768px){.g-text-xxlarge,.g-text-xxlarge-bold{font-size:calc(36px + 12*(100vw - 768px)/672);line-height:calc(44px + 8*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-xxlarge,.g-text-xxlarge-bold{font-size:3rem;line-height:3.25rem}}.g-text-xlarge,.g-text-xlarge-bold{font-size:1.375rem;line-height:1.875rem}@media(min-width: 768px){.g-text-xlarge,.g-text-xlarge-bold{font-size:calc(22px + 14*(100vw - 768px)/672);line-height:calc(30px + 14*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-xlarge,.g-text-xlarge-bold{font-size:2.25rem;line-height:2.75rem}}.g-text-large,.g-text-large-bold,.o-texticon-size-large,.o-button-xlarge{font-size:1.125rem;line-height:1.75rem}@media(min-width: 768px){.g-text-large,.g-text-large-bold,.o-texticon-size-large,.o-button-xlarge{font-size:calc(18px + 4*(100vw - 768px)/672);line-height:calc(28px + 2*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-large,.g-text-large-bold,.o-texticon-size-large,.o-button-xlarge{font-size:1.375rem;line-height:1.875rem}}.g-text-medium,.g-text-medium-bold,.o-texticon-size-medium,.o-button-large,.c-button-secondary-large,.c-button-primary-large{font-size:1.125rem;line-height:1.75rem}.g-text-medium-fluid{font-size:1rem;line-height:1.375rem}@media(min-width: 768px){.g-text-medium-fluid{font-size:calc(16px + 2*(100vw - 768px)/672);line-height:calc(22px + 6*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-medium-fluid{font-size:1.125rem;line-height:1.75rem}}.g-text-small,.g-text-small-bold,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large,.o-button-medium,.o-texticon-size-small{font-size:1rem;line-height:1.375rem}.g-text-small-fluid{font-size:.938rem;line-height:1.25rem}@media(min-width: 768px){.g-text-small-fluid{font-size:calc(15.008px + 0.992*(100vw - 768px)/672);line-height:calc(20px + 2*(100vw - 768px)/672)}}@media(min-width: 1440px){.g-text-small-fluid{font-size:1rem;line-height:1.375rem}}.g-text-xsmall,.g-text-xsmall-bold,.o-texticon-size-xsmall,.o-button-small{font-size:.938rem;line-height:1.25rem}.g-text-extrabold{font-weight:800}.g-text-bold{font-weight:600}.g-text-semibold{font-weight:600}.g-text-normal{font-weight:400}.g-text-light{font-weight:300}.g-text-extralight{font-weight:200}.g-text-link{text-decoration:underline}.o-texticon{display:flex;flex-direction:row}.o-texticon-alignment-right{flex-direction:row-reverse}.o-texticon-size-xsmall:first-child,.o-button-small:first-child{margin-right:.25rem}.o-texticon-size-small:first-child{margin-right:.5rem}.o-texticon-size-medium:first-child,.o-button-large:first-child,.c-button-secondary-large:first-child,.c-button-primary-large:first-child{margin-right:1rem}.o-texticon-size-large:first-child,.o-button-xlarge:first-child{margin-right:1.5rem}.o-omnibar-bottom{bottom:0;left:50%;position:fixed;transform:translateX(-50%);z-index:5999899}.o-omnibar-bottom-close{cursor:pointer;display:flex;position:absolute;right:0;bottom:100%;background:#20222a;color:#fff;align-items:center;border-top-left-radius:.25rem;border-top-right-radius:.25rem}.o-omnibar-bottom-close svg{height:.938rem;width:.938rem}.o-omnibar-hide{display:none}.o-omnibar-top{background:#fff;position:fixed;top:0;width:100%;z-index:5999897}.o-omnibar-hide-6x6-iframe iframe{display:none}.o-border-thin{border-width:1px;border-style:solid}.o-border-thin-top{border-top-width:1px;border-top-style:solid}.o-border-thin-right{border-right-width:1px;border-right-style:solid}.o-border-thin-bottom{border-bottom-width:1px;border-bottom-style:solid}.o-border-thin-left{border-left-width:1px;border-left-style:solid}.o-border-thick{border-width:5px;border-style:solid}.o-border-thick-top{border-top-width:5px;border-top-style:solid}.o-border-thick-right{border-right-width:5px;border-right-style:solid}.o-border-thick-bottom{border-bottom-width:5px;border-bottom-style:solid}.o-border-thick-left{border-left-width:5px;border-left-style:solid}.o-box{display:block;padding:1.5rem}.o-box::after{content:"" !important;display:block !important;clear:both !important}.o-box>:last-child{margin-bottom:0}.o-box-flush{padding:0}.o-box-xsmall{padding:.5rem}.o-box-small{padding:1rem}.o-box-large{padding:2rem}.o-box-xlarge{padding:2.5rem}.o-box-xxlarge{padding:3rem}.o-button,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{display:inline-block;text-decoration:none;transition:border .175s ease-out,background-color .175s ease-out,color .175s ease-out;text-align:center}.o-button:not(.o-button-disabled):hover,.c-button:not(.o-button-disabled):hover,.c-button-secondary:not(.o-button-disabled):hover,.c-button-secondary-large:not(.o-button-disabled):hover,.c-button-secondary-medium:not(.o-button-disabled):hover,.c-button-primary:not(.o-button-disabled):hover,.c-button-primary-medium:not(.o-button-disabled):hover,.c-button-primary-large:not(.o-button-disabled):hover{cursor:pointer}.o-button-xlarge{padding-left:1rem;padding-right:1rem;height:3rem;line-height:2.4}.o-button-large,.c-button-secondary-large,.c-button-primary-large{padding-left:28px;padding-right:28px;height:64px;line-height:2.4}.o-button-medium,.c-button-secondary-medium,.c-button-primary-medium{padding-left:17px;padding-right:17px;height:48px;line-height:2.4}.o-button-small{padding-left:.75rem;padding-right:.75rem;height:1.5rem;line-height:2.4}.o-button-primary,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{border:1px solid #44d8ff;background-color:#44d8ff;background-image:none;color:#080a12}.o-button-primary:not(.o-button-disabled):hover,.c-button-primary:not(.o-button-disabled):hover,.c-button-primary-medium:not(.o-button-disabled):hover,.c-button-primary-large:not(.o-button-disabled):hover{border:1px solid #39d2ff;background-color:#39d2ff;background-image:none;color:#080a12}.o-button-primary.o-button-loading::after,.o-button-loading.c-button-primary::after,.o-button-loading.c-button-primary-medium::after,.o-button-loading.c-button-primary-large::after{border-color:#080a12}.o-button-secondary,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium{border:1px solid #d8d8d8;background-color:#f5f4f7;color:#080a12}.o-button-secondary:not(.o-button-disabled):hover,.c-button-secondary:not(.o-button-disabled):hover,.c-button-secondary-large:not(.o-button-disabled):hover,.c-button-secondary-medium:not(.o-button-disabled):hover{border:1px solid #39d2ff;background-color:#39d2ff;color:#080a12}.o-button-ghost{border:1px solid rgba(0,0,0,0);background-color:rgba(0,0,0,0);color:#080a12}.o-button-ghost:not(.o-button-disabled):hover{border:1px solid #e6e6e6;background-color:#e6e6e6}.o-button-smallRound,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{border-radius:3px}.o-button-largeRound{border-radius:1rem}.o-button-circle{border-radius:50%}.o-button-loading::after{display:inline-block;animation:1s linear infinite button-loading;border-top:2px solid #080a12;border-radius:50%;content:"";height:10px;margin-left:10px;width:10px}@keyframes button-loading{from{transform:rotate(0deg)}to{transform:rotate(360deg)}}.o-gridListVertical{--cmg-gridListVertical_rows: 11;display:grid;grid-auto-flow:column;grid-template-rows:repeat(var(--cmg-gridListVertical_rows), auto)}.o-linkOverlay{position:absolute;width:100%;height:100%;z-index:3;font:0/0 serif;text-shadow:none;color:rgba(0,0,0,0);top:0;left:0}.o-media{display:block}.o-media::after{content:"" !important;display:block !important;clear:both !important}.o-media_img{float:left;margin-right:1.5rem}.o-media_img>img{display:block}.o-media_body{overflow:hidden;display:block}.o-media_body,.o-media_body>:last-child{margin-bottom:0}.o-media-flush>.o-media_img{margin-right:0;margin-left:0}.o-media-reverse>.o-media_img{float:right;margin-right:0;margin-left:1.5rem}.o-media-xsmall>.o-media_img{margin-right:.5rem}.o-media-xsmall.o-media-reverse>.o-media_img{margin-right:0;margin-left:.5rem}.o-media-small>.o-media_img{margin-right:1rem}.o-media-small.o-media-reverse>.o-media_img{margin-right:0;margin-left:1rem}.o-media-large>.o-media_img{margin-right:2rem}.o-media-large.o-media-reverse>.o-media_img{margin-right:0;margin-left:2rem}.o-media-xlarge>.o-media_img{margin-right:2.5rem}.o-media-xlarge.o-media-reverse>.o-media_img{margin-right:0;margin-left:2.5rem}.o-media-xxlarge>.o-media_img{margin-right:3rem}.o-media-xxlarge.o-media-reverse>.o-media_img{margin-right:0;margin-left:3rem}.o-ratio{position:relative;display:block}.o-ratio::before{content:"";display:block;width:100%;padding-bottom:100%}.o-ratio_content,.o-ratio>iframe,.o-ratio>embed,.o-ratio>object{position:absolute;top:0;bottom:0;left:0;right:0;height:100%;width:100%}.o-ratio-imgContain>.o-ratio_content{height:auto;margin:auto;max-height:100%;max-width:100%;width:auto}.o-ratio-2\:1:before{padding-bottom:50%}.o-ratio-full:before{padding-bottom:75%}.o-ratio-tall:before{padding-bottom:133.3333333333%}.o-ratio-wide:before{padding-bottom:56.25%}.o-ratio-cardImage:before{padding-bottom:150%}.u-screenReaderOnly{clip:rect(0 0 0 0);clip-path:inset(100%);height:1px;overflow:hidden;position:absolute;white-space:nowrap;width:1px}.u-float-right{float:right}.u-float-left{float:left}.u-horizontal-center{margin-left:auto;margin-right:auto}.u-block{display:block}.u-inline-block{display:inline-block}.u-inline{display:inline}.u-clearfix::after{content:"" !important;display:block !important;clear:both !important}.u-line-clamp-container{position:relative;line-height:1rem}.u-line-clamp{-webkit-line-clamp:2;display:-webkit-box;-webkit-box-orient:vertical;overflow:hidden}.u-hidden{display:none !important}@media(max-width: 767px){.sm\:u-hidden{display:none !important}}@media(min-width: 768px)and (max-width: 1023px){.md\:u-hidden{display:none !important}}@media(min-width: 1024px){.lg\:u-hidden{display:none !important}}.u-flexbox{display:flex}.u-flexbox-column{display:flex;flex-direction:column}.u-flexbox-columnReverse{display:flex;flex-direction:column-reverse}.u-flexbox-row{display:flex;flex-direction:row}.u-flexbox-wrap{flex-wrap:wrap}.u-flexbox-nowrap{flex-wrap:nowrap}.u-flexbox-justifyBetween{justify-content:space-between}.u-flexbox-justifyAround{justify-content:space-around}.u-flexbox-justifyCenter{justify-content:center}.u-flexbox-justifyFlexEnd{justify-content:flex-end}.u-flexbox-alignFlexStart{align-items:flex-start}.u-flexbox-alignCenter,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{align-items:center}.u-flexbox-alignFlexEnd{align-items:flex-end}.u-flexbox-alignStretch{align-items:stretch}.u-flexbox-alignBaseline{align-items:baseline}.u-flexbox-alignSelfFlexStart{align-self:flex-start}.u-flexbox-alignSelfCenter{align-self:center}.u-flexbox-alignSelfFlexEnd{align-self:flex-end}.u-flexbox-flexEven{flex:1 1 100%}.u-flex-grow{flex-grow:1}.u-grid{display:grid;grid-gap:var(--grid-gap, 0)}.u-grid-auto-cols{grid-template-columns:repeat(auto-fit, minmax(0, 1fr))}.u-grid-full-row{grid-column:1/-1}.u-grid-2column{display:grid;grid-template:auto/repeat(2, 1fr)}.u-grid-3column{display:grid;grid-template:auto/repeat(3, 1fr)}.u-grid-gap-small{--grid-gap: 0.25rem}.u-grid-gap-medium{--grid-gap: 0.5rem}.u-grid-gap-large{--grid-gap: 1rem}.u-grid-position_self-center{align-self:center}.u-grid-columns{--grid-cols: 2;display:grid;gap:var(--grid-gap, 1rem);grid-template-columns:repeat(var(--grid-cols), 1fr)}@media(min-width: 768px){.u-grid-columns{--grid-gap: 1.5rem;--grid-cols: 6}}@media(min-width: 1024px){.u-grid-columns{--grid-cols: 12}}.sm\:u-col-1{grid-column-end:span 1}.sm\:u-col-start-1{grid-column-start:1}.sm\:u-col-end-2{grid-column-end:2}.sm\:u-col-2{grid-column-end:span 2}.sm\:u-col-start-2{grid-column-start:2}.sm\:u-col-end-3{grid-column-end:3}@media(max-width: 767px){.sm\:u-col-hide{display:none}}@media(min-width: 768px){.md\:u-col-1{grid-column-end:span 1}.md\:u-col-start-1{grid-column-start:1}.md\:u-col-end-2{grid-column-end:2}.md\:u-col-2{grid-column-end:span 2}.md\:u-col-start-2{grid-column-start:2}.md\:u-col-end-3{grid-column-end:3}.md\:u-col-3{grid-column-end:span 3}.md\:u-col-start-3{grid-column-start:3}.md\:u-col-end-4{grid-column-end:4}.md\:u-col-4{grid-column-end:span 4}.md\:u-col-start-4{grid-column-start:4}.md\:u-col-end-5{grid-column-end:5}.md\:u-col-5{grid-column-end:span 5}.md\:u-col-start-5{grid-column-start:5}.md\:u-col-end-6{grid-column-end:6}.md\:u-col-6{grid-column-end:span 6}.md\:u-col-start-6{grid-column-start:6}.md\:u-col-end-7{grid-column-end:7}}@media(min-width: 768px)and (max-width: 1023px){.md\:u-col-hide{display:none}}@media(min-width: 1024px){.lg\:u-col-1{grid-column-end:span 1}.lg\:u-col-start-1{grid-column-start:1}.lg\:u-col-end-2{grid-column-end:2}.lg\:u-col-2{grid-column-end:span 2}.lg\:u-col-start-2{grid-column-start:2}.lg\:u-col-end-3{grid-column-end:3}.lg\:u-col-3{grid-column-end:span 3}.lg\:u-col-start-3{grid-column-start:3}.lg\:u-col-end-4{grid-column-end:4}.lg\:u-col-4{grid-column-end:span 4}.lg\:u-col-start-4{grid-column-start:4}.lg\:u-col-end-5{grid-column-end:5}.lg\:u-col-5{grid-column-end:span 5}.lg\:u-col-start-5{grid-column-start:5}.lg\:u-col-end-6{grid-column-end:6}.lg\:u-col-6{grid-column-end:span 6}.lg\:u-col-start-6{grid-column-start:6}.lg\:u-col-end-7{grid-column-end:7}.lg\:u-col-7{grid-column-end:span 7}.lg\:u-col-start-7{grid-column-start:7}.lg\:u-col-end-8{grid-column-end:8}.lg\:u-col-8{grid-column-end:span 8}.lg\:u-col-start-8{grid-column-start:8}.lg\:u-col-end-9{grid-column-end:9}.lg\:u-col-9{grid-column-end:span 9}.lg\:u-col-start-9{grid-column-start:9}.lg\:u-col-end-10{grid-column-end:10}.lg\:u-col-10{grid-column-end:span 10}.lg\:u-col-start-10{grid-column-start:10}.lg\:u-col-end-11{grid-column-end:11}.lg\:u-col-11{grid-column-end:span 11}.lg\:u-col-start-11{grid-column-start:11}.lg\:u-col-end-12{grid-column-end:12}.lg\:u-col-12{grid-column-end:span 12}.lg\:u-col-start-12{grid-column-start:12}.lg\:u-col-end-13{grid-column-end:13}.lg\:u-col-hide{display:none}}@media(min-width: 1440px){.xl\:u-col-1{grid-column-end:span 1}.xl\:u-col-start-1{grid-column-start:1}.xl\:u-col-end-2{grid-column-end:2}.xl\:u-col-2{grid-column-end:span 2}.xl\:u-col-start-2{grid-column-start:2}.xl\:u-col-end-3{grid-column-end:3}.xl\:u-col-3{grid-column-end:span 3}.xl\:u-col-start-3{grid-column-start:3}.xl\:u-col-end-4{grid-column-end:4}.xl\:u-col-4{grid-column-end:span 4}.xl\:u-col-start-4{grid-column-start:4}.xl\:u-col-end-5{grid-column-end:5}.xl\:u-col-5{grid-column-end:span 5}.xl\:u-col-start-5{grid-column-start:5}.xl\:u-col-end-6{grid-column-end:6}.xl\:u-col-6{grid-column-end:span 6}.xl\:u-col-start-6{grid-column-start:6}.xl\:u-col-end-7{grid-column-end:7}.xl\:u-col-7{grid-column-end:span 7}.xl\:u-col-start-7{grid-column-start:7}.xl\:u-col-end-8{grid-column-end:8}.xl\:u-col-8{grid-column-end:span 8}.xl\:u-col-start-8{grid-column-start:8}.xl\:u-col-end-9{grid-column-end:9}.xl\:u-col-9{grid-column-end:span 9}.xl\:u-col-start-9{grid-column-start:9}.xl\:u-col-end-10{grid-column-end:10}.xl\:u-col-10{grid-column-end:span 10}.xl\:u-col-start-10{grid-column-start:10}.xl\:u-col-end-11{grid-column-end:11}.xl\:u-col-11{grid-column-end:span 11}.xl\:u-col-start-11{grid-column-start:11}.xl\:u-col-end-12{grid-column-end:12}.xl\:u-col-12{grid-column-end:span 12}.xl\:u-col-start-12{grid-column-start:12}.xl\:u-col-end-13{grid-column-end:13}.xl\:u-col-hide{display:none}}.u-col-start{grid-column-start:1}.u-col-end{grid-column-end:-1}.u-overflow-auto{overflow:auto}.u-overflow-initial{overflow:initial}.u-overflow-hidden{overflow:hidden}.u-overflow-scroll{overflow:scroll}.u-overflow-y-auto{overflow-y:auto}.u-overflow-y-initial{overflow-y:initial}.u-overflow-y-hidden{overflow-y:hidden}.u-overflow-y-scroll{overflow-y:scroll}.u-overflow-x-auto{overflow-x:auto}.u-overflow-x-initial{overflow-x:initial}.u-overflow-x-hidden{overflow-x:hidden}.u-overflow-x-scroll{overflow-x:scroll}.u-text-uppercase{text-transform:uppercase}.u-text-lowercase{text-transform:lowercase}.u-text-capitalize{text-transform:capitalize}.u-text-left{text-align:left}.u-text-center{text-align:center}.u-text-right{text-align:right}.u-text-underline{text-decoration:underline}.u-text-italic{font-style:italic}.u-p-small-space{margin:0 0 .22em}.u-no-space{margin:0}@font-face{font-family:SuisseIntl;font-weight:400;font-style:normal;font-display:swap;src:url(https://www.zdnet.com/a/neutron/fonts/SuisseIntl/Regular.woff2) format("woff2")}@font-face{font-family:SuisseIntl;font-weight:600;font-style:normal;font-display:swap;src:url(https://www.zdnet.com/a/neutron/fonts/SuisseIntl/Semibold.woff2) format("woff2")}table{width:auto;font-size:16px;line-height:1.875rem}table th,table td{padding:5px 20px;border-left:1px solid #f1f0f3;border-right:1px solid #f1f0f3}table table{text-align:left;width:100%;clear:both}table tr{border-bottom:1px solid #f1f0f3}table thead{border-bottom:1px solid #d1d0d3}table thead tr{border-bottom:none}table thead th,table tfoot th{font-weight:600;vertical-align:top}table tbody th{color:#080a12;font-weight:normal;text-align:left}table tbody tr:hover{background-color:#f1f0f3}table tbody tr:last-child{border-bottom:none}table th:first-child,table td:first-child{border-left:none}table th:last-child,table td:last-child{border-right:none}table th[colspan],table td[colspan]{text-align:center}@keyframes g-fadeMenuInUp{0%{opacity:0;top:20px;visibility:hidden}1%{opacity:0;top:20px;visibility:visible}100%{opacity:1;top:0;visibility:visible}}@keyframes g-fadeMenuOutDown{0%{left:auto;opacity:1;top:0;visibility:visible}99%{left:auto;opacity:0;top:20px;visibility:visible}100%{left:auto;opacity:0;top:20px;visibility:hidden}}@keyframes g-fadeMenuInLeft{0%{opacity:0;left:20px;visibility:hidden}1%{opacity:0;left:20px;visibility:visible}100%{opacity:1;left:0;visibility:visible}}@keyframes g-fadeMenuOutRight{0%{opacity:1;left:0;visibility:visible}99%{opacity:0;left:20px;visibility:visible}100%{opacity:0;left:20px;visibility:hidden}}@keyframes g-fadeTriInUp{0%{bottom:-28px;opacity:0;visibility:hidden}1%{bottom:-28px;opacity:0;visibility:visible}100%{bottom:-9px;opacity:1;visibility:visible}}@keyframes g-fadeTriOutDown{0%{bottom:-9px;opacity:1;visibility:visible}99%{bottom:-28px;opacity:0;visibility:visible}100%{bottom:-28px;opacity:0;visibility:hidden}}body>img:not([style],[class]),body>span>img:not([style],[class]),body>img{display:block;height:0}[id=ot-sdk-btn]{display:none !important}div#onetrust-consent-sdk #onetrust-banner-sdk{box-sizing:border-box;width:90%;padding:1.5rem;background-color:#fff;max-width:684px;top:50%;left:50%;bottom:auto !important;right:auto;transform:translate(-50%, -50%);outline:none;font-size:1rem}div#onetrust-consent-sdk #onetrust-banner-sdk a[href]{color:#006dff;text-decoration:none;font-weight:inherit}div#onetrust-consent-sdk #onetrust-banner-sdk a[href]:hover{color:#0058d5}div#onetrust-consent-sdk #onetrust-policy{margin:0}div#onetrust-consent-sdk #onetrust-policy-text{color:#080a12;font-size:inherit;margin:0}div#onetrust-consent-sdk #onetrust-group-container{float:none;width:auto}div#onetrust-consent-sdk .ot-sdk-container{padding:0;width:100%}div#onetrust-consent-sdk .ot-sdk-container .ot-sdk-row #onetrust-button-group-parent{position:static;width:100%;padding:0;margin:0}div#onetrust-consent-sdk .ot-sdk-container .ot-sdk-row #onetrust-button-group-parent #onetrust-button-group{margin:0;display:flex;justify-content:space-between;flex-direction:column;width:100%}@media(min-width: 768px){div#onetrust-consent-sdk .ot-sdk-container .ot-sdk-row #onetrust-button-group-parent #onetrust-button-group{margin:1.5rem 0 0 0;flex-direction:row}div#onetrust-consent-sdk .ot-sdk-container .ot-sdk-row #onetrust-button-group-parent #onetrust-button-group button{width:30%;margin-top:0}}div#onetrust-consent-sdk .onetrust-pc-dark-filter{background:rgba(0,0,0,.3)}p{font-size:inherit}.g-text-xxxlarge,.g-text-xxxlarge-bold{font-size:3rem;line-height:3.25rem;font-weight:400}@media(min-width: 1230px){.g-text-xxxlarge,.g-text-xxxlarge-bold{font-size:8.5rem;line-height:9rem}}.g-text-xxxlarge-bold{font-weight:600}.g-text-xxlarge,.g-text-xxlarge-bold{font-size:2.25rem;line-height:2.75rem;font-weight:400}@media(min-width: 768px){.g-text-xxlarge,.g-text-xxlarge-bold{font-size:3rem;line-height:3.25rem}}.g-text-xxlarge-bold{font-weight:600}.g-text-xlarge,.g-text-xlarge-bold{font-size:1.375rem;line-height:1.875rem;font-weight:400}@media(min-width: 768px){.g-text-xlarge,.g-text-xlarge-bold{font-size:2.25rem;line-height:2.75rem}}.g-text-xlarge-bold{font-weight:600}.g-text-large,.g-text-large-bold,.o-texticon-size-large,.o-button-xlarge{font-size:1.25rem;line-height:1.75rem;font-weight:400}@media(min-width: 768px){.g-text-large,.g-text-large-bold,.o-texticon-size-large,.o-button-xlarge{font-size:1.375rem;line-height:1.875rem}}.g-text-large-bold{font-weight:600}.g-text-medium,.g-text-medium-bold,.o-texticon-size-medium,.o-button-large,.c-button-secondary-large,.c-button-primary-large{font-size:1.125rem;line-height:1.75rem;font-weight:400}.g-text-medium-bold{font-weight:600}.g-text-small,.g-text-small-bold,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large,.o-texticon-size-small,.o-button-medium{font-size:1rem;line-height:1.375rem;font-weight:400}.g-text-small-bold,.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{font-weight:600}.g-text-xsmall,.g-text-xsmall-bold,.o-texticon-size-xsmall,.o-button-small{font-size:.938rem;line-height:1.25rem;font-weight:400}.g-text-xsmall-bold{font-weight:600}.g-text-xxsmall,.g-text-xxsmall-bold{font-size:.813rem;line-height:1.125rem;font-weight:400}.g-text-xxsmall-bold{font-weight:600}.g-text-xxxsmall,.g-text-xxxsmall-bold{font-size:.75rem;line-height:1rem}.g-text-xxxsmall-bold{font-weight:600}.c-sectionHeading{line-height:1.7;font-size:1.125rem;font-weight:600;text-transform:lowercase}.c-sectionHeading::before{display:inline-block;width:.452em;margin-right:.5rem;vertical-align:middle;content:url("data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%208%2014%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cpath%20d%3D%22M3.32541%2013.2021L8%200.000375748L5.15459%200.000375623L0.48%2013.2021L3.32541%2013.2021Z%22%20fill%3D%22%23080A12%22%20%2F%3E%3C%2Fsvg%3E")}.c-sectionHeading-invert{border-top-color:#fff;color:#fff}.c-sectionHeading-invert::before{content:url("data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%208%2014%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cpath%20d%3D%22M3.32541%2013.2021L8%200.000375748L5.15459%200.000375623L0.48%2013.2021L3.32541%2013.2021Z%22%20fill%3D%22%23ffffff%22%20%2F%3E%3C%2Fsvg%3E")}.c-sectionHeading-large{padding-top:0;font-size:2.25rem;line-height:1.25;border-top:none}.c-sectionHeading>strong{text-transform:none}.c-button,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium,.c-button-primary,.c-button-primary-medium,.c-button-primary-large{display:inline-flex;justify-content:center;margin-bottom:0}.c-button-primary,.c-button-primary-medium,.c-button-primary-large{color:#080a12}.c-button-primary svg,.c-button-primary-medium svg,.c-button-primary-large svg{fill:#080a12}.c-button-primary:hover,.c-button-primary-medium:hover,.c-button-primary-large:hover{color:#080a12}.c-button-secondary-large svg,.c-button-secondary-medium svg{fill:#080a12}.c-button-secondary-large:not(.o-button-disabled):hover{color:#080a12;border:1px solid #39d2ff;background-color:#39d2ff}.c-button-secondary-large:not(.o-button-disabled):hover svg{fill:#080a12}.c-button-secondary-medium:not(.o-button-disabled):hover{color:#080a12;border:1px solid #39d2ff;background-color:#39d2ff}.c-button-secondary-medium:not(.o-button-disabled):hover svg{fill:#080a12}.c-button:first-child,.c-button-primary:first-child,.c-button-primary-large:first-child,.c-button-primary-medium:first-child,.c-button-secondary:first-child,.c-button-secondary-large:first-child,.c-button-secondary-medium:first-child{margin-right:0}.o-button,.c-button,.c-button-primary,.c-button-primary-large,.c-button-primary-medium,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium{transition:unset;text-transform:lowercase;font-weight:600;font-size:.938rem}.o-button-secondary,.c-button-secondary,.c-button-secondary-large,.c-button-secondary-medium{border:1px solid #f5f4f7;background-color:#f5f4f7;color:#080a12}.o-button-secondary>svg,.c-button-secondary>svg,.c-button-secondary-large>svg,.c-button-secondary-medium>svg{fill:#080a12}.o-button-secondary-invert{border:1px solid #20222a;background-color:#20222a;color:#fff}.o-button-secondary-invert>svg{fill:#fff}.o-button-brand{border:none;background:#d0ff4b;color:#080a12}.o-button-brand>svg{fill:#080a12}.o-button-brand:hover{background:#e7ff6e}.o-button-block{display:flex;align-items:center;justify-content:center}.o-button-square{vertical-align:baseline}.o-button-square-large{width:86px;height:86px}.o-button-square-large svg{display:inline-block;width:41px;height:13px;vertical-align:middle}.o-button-square-medium{width:64px;height:64px}.o-button-square-medium svg{display:inline-block;width:13px;height:13px;vertical-align:middle}.o-button-square-small{width:48px;height:48px}.o-button-square-small svg{display:inline-block;width:13px;height:13px;vertical-align:middle}.o-button-secondary:hover,.c-button-secondary:hover,.c-button-secondary-large:hover,.c-button-secondary-medium:hover{background-color:#39d2ff;color:#080a12;border-color:#39d2ff}.o-button-secondary:hover>svg,.c-button-secondary:hover>svg,.c-button-secondary-large:hover>svg,.c-button-secondary-medium:hover>svg{fill:#080a12}.o-button-secondary-invert:hover{background-color:#39d2ff;color:#080a12;border-color:#39d2ff}.o-button-secondary-invert:hover>svg{fill:#080a12} .nuxt-progress { position: fixed; top: 0px; left: 0px; right: 0px; height: 2px; width: 0%; opacity: 1; transition: width 0.1s, opacity 0.4s; background-color: #fff; z-index: 999999; } .nuxt-progress.nuxt-progress-notransition { transition: none; } .nuxt-progress-failed { background-color: red; } .c-layoutDefault_page[data-v-60affc28]{position:relative} .c-globalSvgs{height:0;overflow:hidden;position:absolute;width:0}#galleryOverlay{fill:rgba(0,0,0,.3)}#galleryOverlay .overlayBorder{fill:rgba(255,255,255,.5)}#galleryOverlay .overlayIcon{fill:#fff}#facebook g,#twitter path:first-child{fill:none} .c-globalSvgs{height:0;overflow:hidden;position:absolute;width:0} .c-globalSvgs{height:0;overflow:hidden;position:absolute;width:0} .c-adDisplay_container.spaced{margin-bottom:1.5rem}.c-adDisplay{margin:0 auto;justify-content:center}.c-adDisplay iframe{max-width:none}@media(min-width: 768px){.c-adDisplay-viewportCenter:not(.skybox-loaded-slot){margin-left:calc(50% - 50vw);margin-right:calc(50% - 50vw)}}@media(min-width: 768px){.c-adDisplay-viewportCenter:not(.skybox-loaded-slot).power-bar{clear:both}}.c-adDisplay_container.collapsed{min-height:0}.c-adDisplay_container_mobile-incontent-ad-plus{min-height:250px}.c-adDisplay_container_leaderboard-middle{min-height:66px}.c-adDisplay_container_mpu-top{min-height:250px}.c-adDisplay_container_leader-middle{min-height:90px} .c-adDisplay.skybox-inContent{margin-left:calc(50% - 50vw + .5*var(--scroll-bar-width));margin-right:calc(50% - 50vw + .5*var(--scroll-bar-width));width:100vw}@media(min-width: 1024px){.c-pageArticleSingle-review .c-adDisplay.skybox-inContent{width:calc(100vw - .5*var(--scroll-bar-width));margin-right:0;margin-left:calc(50% - 50vw + .5*var(--scroll-bar-width) - (100% - 8*var(--grid-gap))*.2222222222)}}.c-adDisplay.rendered{min-height:0}.c-adDisplay_container{display:flex;align-items:center;justify-content:center}.c-adDisplay_container.collapsed{transition:min-height .3s ease;min-height:0}.c-adDisplay_container.rendered{min-height:0}.c-adDisplay_container_mobile-incontent-ad-plus-1,.c-adDisplay_container_mobile-incontent-ad-plus,.c-adDisplay_container_mobile-mpu{min-height:250px}.c-adDisplay_container__mobile-sharethrough-top{min-height:255px}.c-adDisplay_container_mobile-nav-ad-plus-banner{min-height:50px}.c-adDisplay_container_mobile-incontent-banner-bottom{min-height:130px}.c-adDisplay_container_mobile-incontent-all-1,.c-adDisplay_container_mobile-incontent-all,.c-adDisplay_container_mobile-incontent-plus{display:block;min-height:154px}.c-adDisplay_container_leaderboard-middle{min-height:66px}.c-adDisplay_container_incontent-narrow-all-top,.c-adDisplay_container_incontent-leaderboard-middle{display:block;min-height:273px}.c-adDisplay_container_mpu-top,.c-adDisplay_container_mpu-plus-top,.c-adDisplay_container_mpu-middle{min-height:250px}.c-adDisplay_container_leader-top,.c-adDisplay_container_leader-plus-top,.c-adDisplay_container_leader-middle,.c-adDisplay_container_leader-plus-middle{min-height:90px}.c-adDisplay_container_incontent-ad-plus-bottom{min-height:200px}.c-adDisplay_container_leader-bottom{min-height:90px}.c-adDisplay_container_leaderboard-bottom{min-height:90px}.c-adDisplay_container_mobile-mpu-bottom{min-height:250px}.c-adDisplay_container_incontent-all-top,.c-adDisplay_container_incontent-ad-plus-billboard-middle,.c-adDisplay_container_incontent-plus-billboard-middle,.c-adDisplay_container_incontent-all-middle{display:block;min-height:211px;clear:both}.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-top>[data-ad],.c-pageArticleSingle-toc .c-adDisplay_container_incontent-ad-plus-billboard-middle>[data-ad],.c-pageArticleSingle-toc .c-adDisplay_container_incontent-plus-billboard-middle>[data-ad],.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-middle>[data-ad]{background:#f5f4f7;padding:32px 0 12px;z-index:500;position:relative}.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-top>[data-ad].skybox-loaded-slot,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-ad-plus-billboard-middle>[data-ad].skybox-loaded-slot,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-plus-billboard-middle>[data-ad].skybox-loaded-slot,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-middle>[data-ad].skybox-loaded-slot{padding-bottom:0}.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-top>[data-ad]::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-ad-plus-billboard-middle>[data-ad]::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-plus-billboard-middle>[data-ad]::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-middle>[data-ad]::before{content:"Advertisement";color:#080a12;font-size:12px;line-height:16px;display:block;position:absolute;left:50%;transform:translate(-50%, -25px)}.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-top.rendered:not(.blank)::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-ad-plus-billboard-middle.rendered:not(.blank)::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-plus-billboard-middle.rendered:not(.blank)::before,.c-pageArticleSingle-toc .c-adDisplay_container_incontent-all-middle.rendered:not(.blank)::before{content:" ";position:absolute;height:600px;width:25%;left:0;margin-top:-150px;z-index:20;background:linear-gradient(rgba(255, 255, 255, 0), white 10%, white 90%, rgba(255, 255, 255, 0))} .c-adSkyBox{min-height:max(18vw,50px)}.c-adSkyBox.collapsed{display:none}.c-adSkyBox_stickyContainer{width:100%;position:fixed;top:0;z-index:5200000}.rendered .c-adSkyBox_closeButton{display:flex;position:absolute;top:2px;right:3px;width:15px;height:15px;font-size:13px;border:1px solid #f1f0f3;border-radius:100%}.c-adSkyBox_hideButton{display:none}@media(min-width: 768px){.c-adSkyBox{min-height:max(6.5vw,90px)}}@media(min-width: 1024px)and (max-width: 1293px){.c-adSkyBox{min-height:9.7vw}}.c-adSkyBox .c-adDisplay_container{align-items:center;display:flex;justify-content:center;width:100%;min-height:max(18vw,50px)}@media(min-width: 768px){.c-adSkyBox .c-adDisplay_container{min-height:max(6.5vw,90px)}}@media(min-width: 1024px)and (max-width: 1293px){.c-adSkyBox .c-adDisplay_container{min-height:9.7vw}}.c-adSkyBox.fixed .c-adDisplay_container{position:fixed;top:0;left:0}.skybox-closed .c-adSkyBox.rendered{min-height:0}.skybox-closed .c-adSkyBox.rendered .c-adDisplay_container{min-height:0} .c-adSkyBox{align-items:center;background-color:#080a12;display:flex;justify-content:center;transition:min-height .3s ease}.c-adSkyBox.rendered:not(.fixed){min-height:0}.c-adSkyBox.leader{min-height:50px}@media(min-width: 768px){.c-adSkyBox.leader{min-height:90px}}.c-adSkyBox.empty.rendered{aspect-ratio:unset}@media(max-width: 287px){.c-adSkyBox .skybox-closed,.c-adSkyBox.rendered{min-height:0}.c-adSkyBox .skybox-closed .c-adDisplay_container,.c-adSkyBox.rendered .c-adDisplay_container{min-height:0}}.c-adSkyBox-stickyContainer{width:100%;transition:transform .5s ease;transform:translate3d(0, 0, 0);background:inherit}.c-adSkyBox-stickyContainer_animate{transform:translate3d(0, -120px, 0)}.c-adSkyBox-stickyContainer_sticky{width:100%;position:fixed;top:0;z-index:5500000;aspect-ratio:inherit}.c-adSkyBox-stickyContainer .c-adDisplay_container{background:inherit}.c-adSkyBox_closeButton{display:none;background-color:#eee;z-index:1}.c-adSkyBox .c-adDisplay_container{aspect-ratio:inherit}body.skybox-hidden .c-adSkyBox{display:none}@media(min-width: 1024px){body.ccad-skybox-manualexpand .c-adDisplay_container_nav-ad-plus,body.ccad-skybox-manualcollapse .c-adDisplay_container_nav-ad-plus{min-height:unset}}.c-adSkyBox,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container{height:unset !important;max-width:calc(100vw - var(--scroll-bar-width));aspect-ratio:2280/150}@media(orientation: portrait){.c-adSkyBox,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container{aspect-ratio:1520/150}}@media(orientation: portrait)and (max-width: 768px)and (any-pointer: coarse){.c-adSkyBox,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container{aspect-ratio:800/150}}.c-adSkyBox.expanded,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container.expanded{aspect-ratio:2280/450}@media(orientation: portrait){.c-adSkyBox.expanded,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container.expanded{aspect-ratio:1520/450}}@media(orientation: portrait)and (max-width: 768px)and (any-pointer: coarse){.c-adSkyBox.expanded,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container.expanded{aspect-ratio:800/450}}@media(min-width: 768px){.c-adSkyBox.rendered:not(.empty),.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container.rendered:not(.empty){aspect-ratio:unset}}.c-adSkyBox .c-adDisplay_container,.c-adSkyBox.fixed:not(.leader) .c-adDisplay_container .c-adDisplay_container{min-height:unset !important}body.ccad-skybox-manualcollapse .c-adSkyBox,body.ccad-skybox-manualexpand .c-adSkyBox,body.skybox-loaded .c-adSkyBox{aspect-ratio:unset !important}body.ccad-skybox-manualcollapse .c-adSkyBox.rendered,body.ccad-skybox-manualexpand .c-adSkyBox.rendered,body.skybox-loaded .c-adSkyBox.rendered{aspect-ratio:unset !important}body:not(.skybox-frontdoor) .c-adSkyBox.rendered:not(.empty),body:not(.skybox-frontdoor) .c-adSkyBox.fixed:not(.leader) .c-adDisplay_container.rendered:not(.empty){aspect-ratio:unset}body.skybox-closed .c-adSkyBox{aspect-ratio:unset !important;min-height:0 !important}@keyframes slideUp{0%{transform:translateY(0)}100%{transform:translateY(max(-1 * var(--scroll-y), -100%))}} .c-globalOverlay{position:fixed;top:0;left:0;height:100%;width:100%;overflow:auto;z-index:10}.c-globalOverlay::before{content:"";position:absolute;display:block;height:100%;width:100%;top:0;left:0;background-color:rgba(32,34,42,.7)} .c-siteHeader{height:48px;box-sizing:border-box;padding:0;position:relative;background:#d0ff4b;z-index:5200000}@media(min-width: 1230px){.large-header .c-siteHeader{height:auto}} .c-siteHeaderNavigation{height:100%;display:flex;grid-gap:0}.c-siteHeaderNavigation_shelves{flex:1}.c-siteHeaderNavigation_item{display:inline-flex;margin-left:2.5rem}.c-siteHeaderNavigation a{-webkit-tap-highlight-color:rgba(0,0,0,0)}.c-siteHeaderNavigation_loginButton{position:relative;display:flex;height:100%;align-items:center;-webkit-tap-highlight-color:rgba(0,0,0,0);cursor:pointer}.c-siteHeaderNavigation_loginButton svg{display:block;width:20px;height:20px;fill:#080a12}.c-siteHeaderNavigation_loginButton:hover svg{fill:#0058d5}.c-siteHeaderNavigation .c-siteHeaderNavigation_logo{height:100%;display:flex;align-items:center;-webkit-tap-highlight-color:rgba(0,0,0,0)}.c-siteHeaderNavigation .c-siteHeaderNavigation_logo svg{transition:fill .5s ease}.c-siteHeaderNavigation .c-siteHeaderNavigation_logo-vertical{display:none}.c-siteHeaderNavigation .c-siteHeaderNavigation_logo-horizontal>svg{width:86px;height:16px}.c-siteHeaderNavigation .c-siteHeaderNavigation_logo:hover svg{transition:none;fill:#0058d5}.c-siteHeaderNavigation-login{display:flex;align-items:center}.c-siteHeaderNavigation_buttonShelf,.c-siteHeaderNavigation_topicShelf{height:100%}.c-siteHeaderNavigation_buttonShelf{display:flex;justify-content:flex-end}.c-siteHeaderNavigation_topicShelf{display:none}.c-siteHeaderNavigation_sloganWrapper{flex-grow:1;display:flex;align-items:center}.c-siteHeaderNavigation_slogan{color:#080a12}.c-siteHeaderNavigation_slogan:hover{color:#0058d5}.c-siteHeaderNavigation-removeShelf{padding:16px 0}@media(min-width: 1230px){.c-siteHeaderNavigation-removeShelf{padding-top:24px;padding-bottom:0}}.c-siteHeaderNavigation .c-siteHeaderNavigation_item-more{display:none}@media(max-width: 767px){.c-siteHeaderNavigation_sloganWrapper{display:none}}@media(min-width: 768px){.c-siteHeaderNavigation_slogan{margin-left:2rem}}@media(min-width: 1230px){header:not(.large-header) .c-siteHeaderNavigation{max-width:initial;width:auto;margin:0 1.5rem}header:not(.large-header) .c-siteHeaderNavigation .c-siteHeaderNavigation_item{margin-left:108px}header:not(.large-header) .c-siteHeaderNavigation .c-smartSearch-grid{display:block;max-width:966px}}@media(min-width: 1230px){header.large-header .c-siteHeaderNavigation{display:grid;grid-gap:var(--grid-gap)}header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_logo{align-items:flex-end;position:relative;z-index:4}header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_logo-vertical{display:block}header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_logo-vertical>svg{width:220px;height:144px}header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_logo-horizontal{display:none}header.large-header .c-siteHeaderNavigation .c-sitePrimaryMenu_subNav{left:0}header.large-header .c-siteHeaderNavigation_shelves{flex:initial;display:flex;flex-direction:column-reverse}header.large-header .c-siteHeaderNavigation_buttonShelf{height:107px}header.large-header .c-siteHeaderNavigation_buttonShelf .c-sitePrimaryMenu_subNav{top:0;padding-top:70px}header.large-header .c-siteHeaderNavigation_topicShelf{display:flex;justify-content:space-between;height:70px}header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_item-more{display:inline-flex}header.large-header .c-siteHeaderNavigation_buttonShelf .c-siteHeaderNavigation_item{margin-left:0}header.large-header .c-siteHeaderNavigation_buttonShelf .c-siteHeaderNavigation_item>div{margin-left:110px}header.large-header .c-siteHeaderNavigation_item-accordion{display:none}header.large-header .c-siteHeaderNavigation_slogan{margin-left:0;position:relative;z-index:4;transition:color .5s ease}header.large-header .c-siteHeaderNavigation_slogan span{display:block}header.large-header .c-siteHeaderNavigation_slogan:hover{transition:none}header.large-header .c-siteHeaderNavigation_loginButton svg{width:24px;height:24px;z-index:4}header.large-header .c-siteHeaderNavigation .c-sitePrimaryMenu_itemIcon svg,header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_loginButton svg{transition:fill .5s ease;z-index:4}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-sitePrimaryMenu_itemIcon svg,header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation-login svg{fill:#d0ff4b}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_logo svg{fill:#d0ff4b}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_logo svg:hover{fill:#3f8eff}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_slogan{color:#d0ff4b}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_slogan:hover{color:#3f8eff}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-sitePrimaryMenu_item::after{display:none}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_loginButton:hover svg{fill:#3f8eff}header.large-header .c-siteHeaderNavigation .c-sitePrimaryMenu_itemIcon:hover svg,header.large-header .c-siteHeaderNavigation .c-siteHeaderNavigation_loginButton:hover svg{transition:none}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-siteHeaderNavigation_logo:hover svg{transition:none}header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-sitePrimaryMenu:hover .c-sitePrimaryMenu_itemIcon svg,header.large-header .c-siteHeaderNavigation_iconMenuOpen .c-sitePrimaryMenu.is-expanded .c-sitePrimaryMenu_itemIcon svg{fill:#3f8eff}} .c-siteLogo_image{width:100%;height:100%;display:block}.c-siteLogo_image-color-brand{fill:#d0ff4b}.c-siteLogo_image-color-text{fill:#080a12}.c-siteLogo_image-normal,.c-siteLogo_image-footer{width:66px;height:42px}@media(min-width: 1230px){.c-siteLogo_image-normal,.c-siteLogo_image-footer{height:64px;width:100px}}.c-siteLogo_image-small{height:32px;width:50px}.c-siteLogo_image-amp{width:107px;height:70px}.c-siteLogo_image-header{width:107px;height:70px} .c-sitePrimaryMenu{align-items:center;display:flex}.c-sitePrimaryMenu_text{font-weight:600;color:#080a12;font-size:18px;margin-top:-32px}.c-sitePrimaryMenu_item{background:none;padding:0;text-transform:lowercase;cursor:default}.c-sitePrimaryMenu_item>svg{display:block;width:20px;height:20px;fill:#080a12}.c-sitePrimaryMenu_itemLink{cursor:pointer;-webkit-tap-highlight-color:rgba(0,0,0,0)}.c-sitePrimaryMenu_item:hover{color:#0058d5}.c-sitePrimaryMenu_item:hover svg{fill:#0058d5}.c-sitePrimaryMenu_subNav{background-color:#20222a;color:#fff;position:absolute;top:100%;left:0;right:0;visibility:hidden;z-index:2;overflow:auto;max-height:100vh}@media(min-width: 768px){.c-sitePrimaryMenu_subNav{left:auto}}.c-sitePrimaryMenu_subNav-search{overflow:visible}.c-sitePrimaryMenu_hasSubNav .c-sitePrimaryMenu_item{position:relative;display:flex;height:100%;align-items:center}.c-sitePrimaryMenu_hasSubNav .c-sitePrimaryMenu_item::after{position:absolute;content:"";bottom:0;left:0;right:0;height:3px;background:#20222a;z-index:1;visibility:hidden;transform:scaleX(0) translateZ(0);transition:transform .1s ease,visibility 0s .1s}.c-sitePrimaryMenu_hasSubNav.is-expanded .c-sitePrimaryMenu_text{color:#0058d5}.c-sitePrimaryMenu_hasSubNav.is-expanded .c-sitePrimaryMenu_item svg{fill:#0058d5}.c-sitePrimaryMenu_hasSubNav.is-expanded .c-sitePrimaryMenu_item a::before{content:"";position:absolute;top:0;left:-20px;right:-20px;bottom:0}.c-sitePrimaryMenu_hasSubNav.is-expanded .c-sitePrimaryMenu_item::after{visibility:visible;transform:scaleX(1) translateZ(0);transition:transform .1s ease}.c-sitePrimaryMenu_hasSubNav.is-expanded .c-sitePrimaryMenu_subNav{visibility:visible;clip:rect(0, 200vw, 100vh, 0);transition:clip .4s linear;z-index:3}.c-sitePrimaryMenu_hasSubNav .c-sitePrimaryMenu_subNav{visibility:hidden;clip:rect(0, 200vw, 0, 0);transition:clip .3s linear,visibility 0s .3s;transform:translateZ(0)}@media(min-width: 1230px){.c-sitePrimaryMenu_item>svg{width:24px;height:24px}} .c-siteMenuList{position:relative;font-weight:600;padding:16px 0;line-height:22px;display:block}.c-siteMenuList_item{color:#fff;margin:32px 16px 32px 0}.c-siteMenuList_item small{font-size:inherit;font-weight:400}.c-siteMenuList_item small::before{content:" | "}.c-siteMenuList_label{color:#fff;opacity:.5}.c-siteMenuList_label:hover{color:#fff}.c-siteMenuList_link{display:block;color:inherit;cursor:pointer}.c-siteMenuList_link:hover{color:#3f8eff}.c-siteMenuList_link:hover>svg{fill:#3f8eff}.c-siteMenuList_linkIcon{width:14px;height:12px;vertical-align:middle;margin-left:5px;fill:#fff}@media(min-width: 768px){.c-siteMenuList{max-width:420px;margin:0 1.5rem}}@media(min-width: 1230px){.large-header .c-siteMenuList{display:grid;max-width:initial;margin:auto}.large-header .c-siteMenuList_column{grid-column-end:span 2;position:relative}.large-header .c-siteMenuList_column-size-small{grid-column-end:span 1}.large-header .c-siteMenuList_column-size-large{grid-column-end:span 3}.large-header .c-siteMenuList_divider{position:absolute;top:32px;right:0;width:1px;bottom:32px;background:#383a42}} @media(min-width: 768px){.c-searchBar{width:100%}}@media(max-width: 1229px){.c-searchBar-grid{display:block}} .c-searchAutosuggest{position:relative;display:grid;grid-template-rows:repeat(2, auto);grid-template-columns:1fr auto;grid-gap:0 1rem;margin:1.5rem 0}@media(min-width: 768px){.c-searchAutosuggest{margin:2rem 0 2rem}}.c-searchAutosuggest input[type=text],.c-searchAutosuggest button[type=submit]{height:56px;line-height:54px;border-radius:3px;box-sizing:border-box;outline:none;-webkit-tap-highlight-color:rgba(0,0,0,0);appearance:none !important}@media(min-width: 768px){.c-searchAutosuggest input[type=text],.c-searchAutosuggest button[type=submit]{height:54px;line-height:52px}}.c-searchAutosuggest button[type=submit]{flex-grow:0;background-color:#44d8ff;color:#080a12;border:none;padding:0 16px;font-weight:600;text-transform:lowercase}.c-searchAutosuggest button[type=submit] svg{width:16px;height:16px;fill:#080a12;vertical-align:middle;margin-left:.5rem}.c-searchAutosuggest button[type=submit]:hover{background-color:#39d2ff}.c-searchAutosuggest button[type=submit]:active{background-color:#39d2ff}@media(min-width: 768px){.c-searchAutosuggest button[type=submit]{padding:0 77px}}.c-searchAutosuggest_input{background:rgba(0,0,0,0);color:#fff;border-radius:.25rem;display:block;outline:none;padding:.5rem 3rem .5rem 1rem;width:100%}.c-searchAutosuggest_input::placeholder{text-transform:lowercase;color:#fff}.c-searchAutosuggest_input.c-searchAutosuggest__input--open{border-bottom-left-radius:0;border-bottom-right-radius:0}.c-searchAutosuggest_searchIcon{position:absolute;top:1rem;right:1rem;fill:#fff;width:24px;aspect-ratio:1}.c-searchAutosuggest__results{background-color:#fff;color:#080a12;box-shadow:0 8px 16px rgba(0,0,0,.16);border-top:none;border-radius:0 0 .25rem .25rem;position:absolute;left:0;top:100%;width:100%;z-index:1}.c-searchAutosuggest__results-container{position:relative}.c-searchAutosuggest__results-item{cursor:pointer;padding:.5rem 1rem}.c-searchAutosuggest__results-item:hover,.c-searchAutosuggest__results-item--highlighted{color:#0058d5}.c-searchAutosuggest__results>ul:last-child .c-searchAutosuggest__results-item:last-child{border-radius:0 0 .25rem .25rem} .c-siteAccordionMenu{border-top:1px solid #383a42;line-height:80px;position:relative;z-index:2;font-weight:600}.c-siteAccordionMenu.c-sitePrimaryMenu_subNav{position:fixed;top:0;bottom:0}.c-siteAccordionMenu_content{width:100%;max-height:100%;overflow:auto}.c-siteAccordionMenu_content::after{content:"";padding-bottom:2rem;display:block}.c-siteAccordionMenu_section .c-siteAccordionMenu_item{opacity:0;visibility:hidden;max-height:0;line-height:20px;margin:0;transition:opacity .3s ease,max-height .3s .3s ease,margin .3s .3s ease,visibility 0s .3s}.c-siteAccordionMenu_section.is-expanded{border-bottom:1px solid #383a42}.c-siteAccordionMenu_section.is-expanded .c-siteAccordionMenu_sectionToggle>svg{transform:rotateX(180deg)}.c-siteAccordionMenu_section.is-expanded .c-siteAccordionMenu_item{visibility:visible;max-height:80px;margin:2rem 0;opacity:1;transition:opacity .3s .3s ease,max-height .3s ease,margin .3s ease}.c-siteAccordionMenu_item{color:#fff;font-size:13px;padding:0 calc(2rem/2)}.c-siteAccordionMenu_item small{font-size:inherit;font-weight:400}.c-siteAccordionMenu_item small::before{content:" | "}.c-siteAccordionMenu_itemArrowIcon{width:15px;height:13px;vertical-align:middle;margin-left:5px;fill:#fff}.c-siteAccordionMenu_item:hover{color:#3f8eff}.c-siteAccordionMenu_item:hover svg{fill:#3f8eff}.c-siteAccordionMenu_link{-webkit-tap-highlight-color:rgba(0,0,0,0);display:block;color:inherit}.c-siteAccordionMenu_link:hover{color:#3f8eff}.c-siteAccordionMenu_closeButton{border-bottom:1px solid #383a42;line-height:46px;padding:0 calc(2rem/2);cursor:pointer;display:block;text-align:right;box-sizing:border-box;-webkit-tap-highlight-color:rgba(0,0,0,0)}.c-siteAccordionMenu_closeButton>svg{width:17px;height:17px;fill:#fff;vertical-align:middle}.c-siteAccordionMenu_closeButton:hover>svg{fill:#3f8eff}.c-siteAccordionMenu_sectionToggle{position:relative;border-bottom:1px solid #383a42;padding:0 calc(2rem/2);font-size:18px;text-transform:lowercase;cursor:pointer;-webkit-tap-highlight-color:rgba(0,0,0,0)}.c-siteAccordionMenu_sectionToggle>svg{width:13px;height:7px;position:absolute;fill:#fff;top:35px;right:calc(2rem/2);transition:transform .3s ease}.c-siteAccordionMenu_sectionToggle:hover>svg{fill:#3f8eff}@media(min-width: 768px){.c-siteAccordionMenu{width:468px}.c-siteAccordionMenu_sectionToggle,.c-siteAccordionMenu_closeButton,.c-siteAccordionMenu_item{padding:0 2rem}.c-siteAccordionMenu_sectionToggle>svg{right:2rem}} .c-scrollPercent{position:relative}.c-scrollPercent_marker{height:0;position:absolute;width:100%} .c-pageTopic_description{font-size:1.375rem;font-weight:600}.c-pageTopic_header{width:65%}.c-pageTopic_title{font-size:3rem;border-top:none}.c-pageTopic .c-listingLatest{border-top:solid 1px #000}.c-pageTopic .c-listingLatest_heading{font-size:1.125rem}.c-pageTopic .c-listingLatest_item{border-bottom:none} .c-dynamicHeader_title{font-size:3rem;line-height:3.25rem;margin:0;padding:0;text-transform:initial;border:none}@media(max-width: 767px){.c-dynamicHeader_title{font-size:2.25rem;line-height:2.75rem}}.c-dynamicHeader_desc{width:65%}@media(max-width: 767px){.c-dynamicHeader_desc{width:100%}} .c-listingCarouselHorizontal{border-top:1px solid #080a12}@media(min-width: 1024px){.c-listingCarouselHorizontal{width:100%}}@media(min-width: 768px){.c-listingCarouselHorizontal_loadingIndicator{width:100%;height:4.8px;display:block;position:relative;background:#fff;overflow:hidden}}.c-listingCarouselHorizontal_loadingIndicator::after{content:""}@media(min-width: 768px){.c-listingCarouselHorizontal_loadingIndicator::after{box-sizing:border-box;width:0;height:4.8px;background:#d0ff4b;position:absolute;top:0;left:0;animation:animFw 10s linear infinite}}@keyframes animFw{0%{width:0}100%{width:100%}}.c-listingCarouselHorizontal .c-sectionHeading{display:inline-block;border-top:none}.c-listingCarouselHorizontal_subhead{display:none}@media(min-width: 1024px){.c-listingCarouselHorizontal_subhead{display:inline-block;margin-left:.5rem}}.c-listingCarouselHorizontal_item{display:block}.c-listingCarouselHorizontal_item.item-no-margin{margin-right:0}.c-listingCarouselHorizontal_itemLink{display:block;color:#080a12}.c-listingCarouselHorizontal_itemLink:hover{color:#0058d5}.c-listingCarouselHorizontal_mobile{width:100%;display:flex;overflow:auto;position:relative}.c-listingCarouselHorizontal_mobile ul{display:flex;gap:20px}.c-listingCarouselHorizontal_mobile ul li{width:306px}.c-listingCarouselHorizontal_mobile ul li:last-of-type .c-listingCarouselHorizontal_item{margin-right:0}.c-listingCarouselHorizontal_mobile ul li a{text-decoration:none}.c-listingCarouselHorizontal .c-listingCarouselHorizontal_desktop{display:none}@media(min-width: 1024px){.c-listingCarouselHorizontal_mobile{display:none}.c-listingCarouselHorizontal .c-listingCarouselHorizontal_desktop{display:flex;position:relative}}.c-listingCarouselHorizontal .VueCarousel-slide{padding:0 10px}.c-listingCarouselHorizontal .VueCarousel-inner{justify-content:space-between}@media(min-width: 1024px){.c-listingCarouselHorizontal .VueCarousel-inner{margin-left:-10px}}.c-listingCarouselHorizontal .VueCarousel-inner .VueCarousel-slide-active .c-listingCarouselHorizontal_item{margin-right:0}.c-listingCarouselHorizontal .VueCarousel-inner>div:first-child.VueCarousel-slide-active .c-listingCarouselHorizontal_item{margin-left:0}.c-listingCarouselHorizontal .VueCarousel-navigation{position:absolute;right:8px}.c-listingCarouselHorizontal .VueCarousel-navigation button:focus{outline:none !important}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-prev{left:45px}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-prev.hide{display:none}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-next{padding-left:5px;right:48px}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-button{top:80px;width:48px;height:48px;background:#44d8ff;border-radius:.25rem;position:relative}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-button:hover{background-color:#39d2ff}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-button svg{width:13px;height:13px;fill:#080a12}.c-listingCarouselHorizontal .VueCarousel-navigation .VueCarousel-navigation-button.VueCarousel-navigation--disabled{display:none} .VueCarousel { display: flex; flex-direction: column; position: relative; } .VueCarousel--reverse { flex-direction: column-reverse; } .VueCarousel-wrapper { width: 100%; position: relative; overflow: hidden; } .VueCarousel-inner { display: flex; flex-direction: row; backface-visibility: hidden; } .VueCarousel-inner--center { justify-content: center; } .VueCarousel-slide { flex-basis: inherit; flex-grow: 0; flex-shrink: 0; user-select: none; backface-visibility: hidden; -webkit-touch-callout: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0); outline: none; } .VueCarousel-slide-adjustableHeight { display: table; flex-basis: auto; width: 100%; } .c-cmsImage{display:block;width:100%;background:rgba(0,0,0,.05)}.c-cmsImage img{display:block;width:100%;height:auto}.c-cmsImage img[src=""]{visibility:hidden} .c-dynamicListing_listing h3{margin:0}@media(min-width: 1024px){.c-dynamicListing_listing h3{margin:0 0 1.5rem}} .c-listingLatest{position:relative}.c-listingLatest_heading{margin:.5rem 0 0 0}.c-listingLatest_item{padding:1rem 0;border-bottom:1px solid #e1e0e3}.c-listingLatest_item:nth-child(9){border-bottom:none}.c-listingLatest_itemLink{display:block;font-size:1rem;line-height:1.375rem;color:#080a12;font-weight:600}.c-listingLatest_itemLink:hover{color:#0058d5}.c-listingLatest_pubDate{font-size:.813rem;color:#505259}.c-listingLatest .c-listingLatest_showAll{margin-bottom:1.5rem;margin-right:0}.c-listingLatest .c-listingLatest_showAll svg{display:inline-block;width:15px;height:13px;vertical-align:middle;margin-left:10px}@media(min-width: 1024px){.c-listingLatest_heading{margin:1.5rem 0}.c-listingLatest_item{padding:1.5rem 0}.c-listingLatest_item:nth-child(1){padding-top:0}} .c-listingFiveStory_heading{grid-gap:1.25rem}.c-listingFiveStory_heading .c-sectionHeading{border:none;margin-bottom:.5rem}@media(min-width: 1024px){.c-listingFiveStory_heading .c-sectionHeading{margin-bottom:1.5rem}}.c-listingFiveStory_titleWrapper{grid-gap:0;margin-bottom:1.5rem}@media(min-width: 1024px){.c-listingFiveStory_titleWrapper{flex-direction:row;align-items:center;grid-gap:1.25rem;margin-bottom:0}}.c-listingFiveStory_seeAll{margin-left:auto;font-size:.813rem;font-weight:400;color:#080a12;grid-gap:.25rem}.c-listingFiveStory_seeAll-topic{display:none}@media(min-width: 1024px){.c-listingFiveStory_seeAll-topic{display:inline}}.c-listingFiveStory_seeAll svg{width:1rem;aspect-ratio:1}.c-listingFiveStory_seeAll:hover{color:#0058d5}.c-listingFiveStory_seeAll:hover svg{fill:#0058d5}.c-listingFiveStory_container{margin-bottom:1.5rem}@media(min-width: 768px){.c-listingFiveStory_container{flex-direction:row;gap:0 1.5rem;margin-bottom:2rem}}.c-listingFiveStory_first-item-container,.c-listingFiveStory_additional-items-container{width:100%}@media(min-width: 768px){.c-listingFiveStory_first-item-container,.c-listingFiveStory_additional-items-container{width:50%}}.c-listingFiveStory_additional-items-container{display:grid;gap:1rem;grid-template-columns:1fr 1fr}@media(min-width: 768px){.c-listingFiveStory_additional-items-container{gap:1.5rem}}.c-listingFiveStory_image{display:block;width:100%}.c-listingFiveStory_item{position:relative;color:#080a12;flex-direction:column}.c-listingFiveStory_item span{color:inherit;font-size:1rem;line-height:1.375rem;margin-bottom:0}.c-listingFiveStory_item--first span{margin-bottom:.5rem}@media(min-width: 768px){.c-listingFiveStory_item--first span{font-size:2.25rem;line-height:2.275rem}}.c-listingFiveStory_item:hover{color:#0058d5}.c-listingFiveStory_item:hover img{opacity:.8} .c-listingDefault_itemLink{color:#080a12}.c-listingDefault_author,.c-listingDefault_topic{color:#080a12}.c-listingDefault_author:hover,.c-listingDefault_topic:hover{color:#0058d5}.c-listingDefault .u-grid-columns{grid-template-columns:1fr 4fr}@media(min-width: 768px){.c-listingDefault .u-grid-columns{grid-template-columns:2fr 4fr}}@media(min-width: 768px){.c-listingDefault_title{font-size:1.375rem;line-height:1.75rem;padding-top:5px}}.c-listingDefault_description{display:none;-webkit-line-clamp:3;-webkit-box-orient:vertical;overflow:hidden;color:#080a12}@media(min-width: 768px){.c-listingDefault_description{display:-webkit-box}}.c-listingDefault_itemImage{margin-top:5px}.c-listingDefault_item:hover .c-listingDefault_itemImage{opacity:.9}.c-listingDefault_item:hover .c-listingDefault_title{color:#0058d5}.c-listingDefault_pubDate:hover{color:#080a12} .c-loadMoreButton_svg{display:inline-block}.c-loadMoreButton_svg svg{display:inline-block;width:15px;height:13px;vertical-align:middle;margin-left:10px;transform:rotate(90deg)}.c-loadMoreButton_link{height:64px;display:flex;justify-content:center;align-items:center;margin:auto;max-width:416px;width:100%}.c-loadMoreButton_text{display:inline-block} .c-globalSticky{display:initial;overflow:initial;flex:1;margin-bottom:calc(var(--mpu-margin-bottom, 0)*1px)}.c-globalSticky:last-child{margin-bottom:0}.c-globalSticky:nth-child(1 of .c-globalSticky){padding-top:calc(var(--first-elem-padding-top, 0)*1px)}.c-globalSticky_element{position:sticky;top:calc(var(--toc-height, 200px) + var(--toc-top-margin-sticky, 0px) + 32px)} .c-siteFooter{z-index:1;position:relative;background:#20222a;overflow:hidden}.c-siteFooter .c-siteFooter_background{width:0}.c-siteFooter .c-siteFooter_background img[src=""]{opacity:0}.c-siteFooter .c-siteFooter_background img{transition:opacity 1s ease;opacity:1;object-fit:cover;position:absolute;width:100%;height:100%;left:0;top:0}@media(min-width: 1024px){.c-siteFooter{padding:0 3rem 3rem 3rem}}.c-siteFooter_container{position:relative}.c-siteFooter_logoLink{display:block}.c-siteFooter_logo{left:50%;margin-left:-50vw;right:50%;margin-right:-50vw;max-width:100vw;position:relative;width:100vw;fill:#fff;aspect-ratio:814/150}@media(min-width: 1024px){.c-siteFooter_logo{margin-bottom:2rem}}.c-siteFooter_site-name{visibility:hidden;height:0}.c-siteFooter_slogan{display:block;margin-top:1.5rem;margin-bottom:1rem;font-size:2.25rem;line-height:2.75rem;color:#fff;font-weight:600}.c-siteFooter_logo-connect-grid{--grid-cols: 2;grid-row-gap:1rem}@media(min-width: 768px){.c-siteFooter_logo-connect-grid{--grid-cols: 6}}@media(min-width: 1024px){.c-siteFooter_logo-connect-grid{--grid-cols: 6;grid-row-gap:2rem}}.c-siteFooter_connect-column{display:block}.c-siteFooter_connect-grid{--grid-cols: 2;margin:auto}@media(min-width: 768px){.c-siteFooter_connect-grid{--grid-cols: 6}}@media(min-width: 1024px){.c-siteFooter_connect-grid{--grid-cols: 5;margin-top:1rem;margin-right:3rem;grid-row-gap:2rem}}@media(min-width: 1230px){.c-siteFooter_connect-grid{--grid-cols: 7;margin:0}}.c-siteFooter_social-links-wrapper{margin:1.5rem 0 1.5rem 0}.c-siteFooter_social-links-wrapper .c-socialSharebar_container{justify-content:space-between}@media(min-width: 1024px){.c-siteFooter_social-links-wrapper .c-socialSharebar_container{justify-content:flex-start}}.c-siteFooter_social-links-wrapper .c-socialSharebar_container .c-socialSharebar_icon{width:fit-content;height:fit-content}@media(min-width: 1024px){.c-siteFooter_social-links-wrapper .c-socialSharebar_container .c-socialSharebar_icon{flex-grow:1;margin-right:0}}.c-siteFooter_social-links-wrapper .c-socialSharebar_container .c-socialSharebar_icon svg{height:24px;width:24px;fill:#fff}.c-siteFooter_copyright-policies{--grid-cols: 2}@media(min-width: 768px){.c-siteFooter_copyright-policies{--grid-cols: 6}}@media(min-width: 1024px){.c-siteFooter_copyright-policies{--grid-cols: 6;text-align:initial;margin-top:1.5rem}}.c-siteFooter_column-links-grid{--grid-cols: 2}@media(min-width: 768px){.c-siteFooter_column-links-grid{--grid-cols: 6}}@media(min-width: 1024px){.c-siteFooter_column-links-grid{--grid-cols: 6;margin-top:.5rem}}@media(min-width: 1024px){.c-siteFooter_slogan{margin:0;font-size:3rem;line-height:3.25rem;padding-right:3rem}}@media(min-width: 2000px){.c-siteFooter_logo{left:0;margin:0 auto;display:block;max-width:1296px;position:relative;right:0;width:1296px}} .c-siteFooterColumnLinks{margin-top:1.5rem}.c-siteFooterColumnLinks:first-child{margin-top:0}@media(min-width: 768px){.c-siteFooterColumnLinks{margin-top:0}}.c-siteFooterColumnLinks a{color:#fff;text-transform:lowercase;display:inline-block}.c-siteFooterColumnLinks a:hover{color:#3f8eff;cursor:pointer}.c-siteFooterColumnLinks a:hover svg{fill:#ff435a}.c-siteFooterColumnLinks_beta li:first-child a{text-transform:none}.c-siteFooterColumnLinks_charlie .loggedin,.c-siteFooterColumnLinks_charlie .hide{display:none}@media(min-width: 1024px){.c-siteFooterColumnLinks_charlie{text-align:left}}.c-siteFooterColumnLinks ul>li{transform:translateZ(0)}.c-siteFooterColumnLinks ul>li:last-child{margin-bottom:0}.c-siteFooterColumnLinks .c-siteFooter_link{margin-bottom:1.5rem;color:#fff}.c-siteFooterColumnLinks .c-siteFooter_link-userIcon{width:16px;height:16px;fill:#fff;margin-left:calc(0.5rem/2);vertical-align:middle} .c-siteFooterUserMenu_authLinks{color:#fff;text-transform:lowercase;display:inline-block}.c-siteFooterUserMenu_authLinks:hover{color:#3f8eff;cursor:pointer}.c-siteFooterUserMenu_authLinks:hover svg{fill:#ff435a} .c-socialSharebar{position:relative;font-size:1.375rem}.c-socialSharebar_container{display:flex;padding:0;user-select:none}.c-socialSharebar_container-dropdown{visibility:hidden;position:absolute;bottom:2.5rem;padding:1.5rem;background:#fff;box-shadow:0 4px 16px rgba(8,10,18,.05);z-index:1;opacity:0;transform:translateY(10px);transition:opacity .4s,transform .4s,visibility 0s .4s}.c-socialSharebar_container-dropdownOpen{transform:none;transition:opacity .4s,transform .4s;opacity:1;visibility:visible}.c-socialSharebar_container-dropdown .c-socialSharebar_button-comments{display:none}.c-socialSharebar_button{cursor:pointer;display:flex;justify-content:center;align-items:center}.c-socialSharebar_button:not(:last-child){margin-right:2rem}.c-socialSharebar_button:hover{opacity:.7}.c-socialSharebar_button-active svg{fill:#0058d5}.c-socialSharebar_icon{display:block;width:18px;height:18px} .c-siteFooterCopyright{margin:0;color:#fff;font-size:.938rem;line-height:1.25rem}@media(min-width: 1024px){.c-siteFooterCopyright{display:inline-block;text-align:left}} .c-siteFooterPolicies{display:inline;color:#fff;font-size:.938rem;line-height:1.25rem;font-weight:600}.c-siteFooterPolicies div{display:inline}.c-siteFooterPolicies a,.c-siteFooterPolicies div{color:#fff;margin:0 .5rem}.c-siteFooterPolicies a:hover,.c-siteFooterPolicies div:hover{color:#3f8eff;cursor:pointer}.c-siteFooterPolicies a:first-child,.c-siteFooterPolicies div:first-child{margin:0 .5rem 0 0}</style> </head> <body > <div data-server-rendered="true" id="__nuxt"><!----><div id="__layout"><div class="c-layoutDefault" data-v-60affc28><svg class="c-globalSvgs" data-v-60affc28=""><symbol id="android" viewBox="0 0 24 24"><path d="M15.9591 0.697571L15.1162 2.66445C16.832 3.5964 17.999 5.41526 17.999 7.5011C17.999 7.77708 17.775 8.00108 17.499 8.00108H7.49974C7.22376 8.00108 6.99976 7.77708 6.99976 7.5011C6.99976 5.41526 8.16667 3.5964 9.88354 2.66445L9.0406 0.697571C8.93157 0.444558 9.04857 0.150578 9.30256 0.0416011C9.55356 -0.0693912 9.85054 0.0496162 9.95853 0.304599L10.8034 2.27246C11.3384 2.09847 11.9084 2.0015 12.5003 2.0015C13.0923 2.0015 13.6622 2.09847 14.1972 2.27246L15.0401 0.304599C15.1481 0.0496162 15.4451 -0.0684069 15.6961 0.0416011C15.9501 0.150625 16.0681 0.443573 15.9591 0.697571ZM9.9995 5.50122C9.9995 5.7772 10.2235 6.0012 10.4995 6.0012C10.7755 6.0012 10.9995 5.7772 10.9995 5.50122C10.9995 5.22524 10.7755 5.00124 10.4995 5.00124C10.2235 5.00124 9.9995 5.22524 9.9995 5.50122ZM13.9993 5.50122C13.9993 5.7772 14.2233 6.0012 14.4992 6.0012C14.7752 6.0012 14.9992 5.7772 14.9992 5.50122C14.9992 5.22524 14.7752 5.00124 14.4992 5.00124C14.2233 5.00124 13.9993 5.22524 13.9993 5.50122ZM7.49969 9.00073H17.499C17.775 9.00073 17.999 9.22375 17.999 9.50071V17.5002C17.999 18.7081 17.139 19.7181 15.9991 19.95V22.4998C15.9991 23.3268 15.3261 23.9997 14.4992 23.9997C13.6722 23.9997 12.9993 23.3268 12.9993 22.4998V20H11.9994V22.4998C11.9994 23.3268 11.3264 23.9997 10.4995 23.9997C9.67252 23.9997 8.99959 23.3268 8.99959 22.4998V19.95C7.85967 19.717 6.99971 18.7081 6.99971 17.5002V9.50071C6.99971 9.22473 7.22371 9.00073 7.49969 9.00073ZM20.4988 9.00073C19.6719 9.00073 18.9989 9.67367 18.9989 10.5006V15.5003C18.9989 16.3273 19.6719 17.0002 20.4988 17.0002C21.3258 17.0002 21.9987 16.3273 21.9987 15.5003V10.5006C21.9987 9.67372 21.3258 9.00073 20.4988 9.00073ZM3 10.5006C3 9.67367 3.67294 9.00073 4.4999 9.00073C5.32685 9.00073 5.99979 9.67372 5.99979 10.5006V15.5003C5.99979 16.3273 5.32685 17.0002 4.4999 17.0002C3.67294 17.0002 3 16.3273 3 15.5003V10.5006Z"/></symbol> <symbol id="arrow-back" viewBox="0 0 24 24" fill="white"><path d="M16 4L8 12L16 20" stroke="black" stroke-width="2" stroke-linecap="round"/></symbol> <symbol id="avatar" viewBox="0 0 200 200"><rect fill="#efefef" width="200" height="200"/><path fill="#bdbdbd" d="M167,199.87H32.76q-1-8.77-2-17.64c-.22-1.95-.42-3.9-.66-5.85A42.19,42.19,0,0,1,32.45,156c.67-1.76,2.15-3.23,3.25-4.88.3.1.75.38.89.28,4.45-3.66,9.75-5.13,15.25-6.55a48.58,48.58,0,0,0,23.42-13.9c.92-1,2.64-1.82,1.26-3.65-.06-18.16,0-18.16-8.09-33.51-.3-.58-.57-1.35-1.06-1.63-4.88-2.73-4.88-8-6.38-12.4A4.07,4.07,0,0,1,62.24,76c2.08-1.1,1.56-2.48,1.46-4.15-.45-7.24-1.16-14.5-1-21.74.16-8.67,2.84-16.59,9.86-22.33,1-.19,2.26,0,2.92-.61,6-5.29,13.1-8.13,20.83-9.56,2.07-.38,4.32-.87,6.31-.44,10.85,2.32,20.63,6.68,27.62,15.86.37.46,1.34.45,2,.66a24.32,24.32,0,0,1,4.88,15.2c.06,7-.54,14.09-.83,21.12-.07,1.81,0,3.62,0,5.42-.47,2.35,2.06,2.54,2.84,4a36.83,36.83,0,0,1-1.06,5.3c-.69,2-1.29,4.45-2.77,5.65-6.51,5.28-8.07,13.25-11.37,20.2-1.24,2.6-.53,6.14-.63,9.25-.08,2.47,0,5,0,7.42-1.47,1.78.29,2.59,1.15,3.62,4.28,5.11,10.11,8.1,15.76,11.31,3.58,1.13,7.1,2.48,10.74,3.35,4.7,1.12,9,2.71,12.45,6.3.33.34,1.13.21,1.69.31,5.31,7.52,5.48,16,4.54,24.65C168.78,184.51,167.88,192.2,167,199.87Z"/><path fill="#b1b1b1" d="M132.27,33.72c-.69-.21-1.67-.2-2-.67-7-9.17-16.77-13.53-27.63-15.85-2-.43-4.23.06-6.3.44-7.73,1.43-14.83,4.27-20.83,9.56-.64.57-2,.42-2.92.6C77.24,23.15,83,20.11,89,17.67a29.22,29.22,0,0,1,20.93-.39A46.29,46.29,0,0,1,127,27.17C129,29.08,130.53,31.52,132.27,33.72Z"/><path fill="#b2b2b2" d="M76.57,127.31c1.38,1.83-.35,2.67-1.26,3.65a48.63,48.63,0,0,1-23.42,13.9c-5.46,1.42-10.8,2.93-15.26,6.54-.13.11-.58-.17-.88-.27,3.21-4.13,7.64-5.85,12.6-7C59.51,141.52,69.27,136.48,76.57,127.31Z"/><path fill="#b1b1b1" d="M165.08,152.2c-.56-.1-1.36,0-1.68-.31-3.43-3.59-7.76-5.18-12.46-6.3-3.63-.87-7.15-2.22-10.74-3.36l1.07-1c4.08,1.11,8.17,2.19,12.25,3.35C158.18,145.83,162.28,148,165.08,152.2Z"/><path fill="#b4b4b4" d="M141.28,141.16l-1.07,1c-5.65-3.2-11.48-6.19-15.76-11.3-.86-1-2.62-1.84-1.15-3.62,3.54,5.08,8.61,8.3,13.82,11.36Z"/><path fill="#b1b1b1" d="M139.14,79.45c-.78-1.45-3.31-1.65-2.84-4C138.6,75.82,139.33,77.32,139.14,79.45Z"/></symbol> <symbol id="carat" viewBox="0 0 4 8"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 8L4 3.95939L0.0804124 0L0 8Z"/></symbol> <symbol id="caret" viewBox="0 0 16 28"><path d="M0.6,27.4c0.8,0.8,2,0.8,2.8,0l12-12c0.8-0.8,0.8-2,0-2.8l-12-12C3,0.2,2.5,0,2,0C1.5,0,1,0.2,0.6,0.6 c-0.8,0.8-0.8,2,0,2.8L11.2,14L0.6,24.6C-0.2,25.4-0.2,26.6,0.6,27.4z"/></symbol> <symbol id="close" viewBox="0 0 224.512 224.512"><g><polygon points="224.507,6.997 217.521,0 112.256,105.258 6.998,0 0.005,6.997 105.263,112.254 0.005,217.512 6.998,224.512 112.256,119.24 217.521,224.512 224.507,217.512 119.249,112.254"/></g></symbol> <symbol id="minus" viewBox="0 0 13 1"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 0.5C0 0.223858 0.223858 0 0.5 0H12.5C12.7761 0 13 0.223858 13 0.5C13 0.776143 12.7761 1 12.5 1H0.5C0.223858 1 0 0.776143 0 0.5Z" fill="#080A12"/></symbol> <symbol id="plus" viewBox="0 0 13 13"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 6.5C0 6.22386 0.223858 6 0.5 6H12.5C12.7761 6 13 6.22386 13 6.5C13 6.77614 12.7761 7 12.5 7H0.5C0.223858 7 0 6.77614 0 6.5Z" fill="#080A12"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M6.5 13C6.22386 13 6 12.7761 6 12.5V0.5C6 0.223858 6.22386 0 6.5 0C6.77614 0 7 0.223858 7 0.5V12.5C7 12.7761 6.77614 13 6.5 13Z" fill="#080A12"/></symbol> <symbol id="arrowNavigation" viewBox="0 0 12 21"><g stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><path id="next-arrow" d="M-5.88468462,4.30628135 L-5.88468462,3.33793528 L8.61614419,3.33793528 L8.61614419,5.27462742 L-3.95902124,5.27462742 L-3.95902124,17.8776664 L-5.88468462,17.8776664 L-5.88468462,4.30628135 Z" fill="#000" transform="translate(1.365730, 10.607801) rotate(-225.000000) translate(-1.365730, -10.607801) "/></g></symbol> <symbol id="cnet" viewBox="0 0 67 48"><path fill-rule="evenodd" clip-rule="evenodd" d="M19.3711 0H16.3711V48H19.3711V0ZM4.11172 17.4843C4.14876 14.4547 9.48203 14.3452 9.48203 17.3383L9.51907 19.9299H13.5931V17.5208C13.8524 9.49041 -0.11045 9.49041 0.000659638 17.3383V31.1725C-0.11045 39.0204 13.8894 39.2029 13.6301 31.1725V28.2889H9.48203V31.3915C9.48203 34.3847 4.1858 34.4577 4.11172 31.3915V17.4843ZM29.8891 12.3012C28.0373 13.3233 27.3336 14.3453 27.3336 14.3453V12.1187H21.5188V15.1119L23.7781 15.1484V33.5088H21.8522V36.502H27.8891V17.083C27.9262 14.1628 32.815 14.0898 32.815 16.937V36.502H39.5557V33.5088H36.9261V17.1195C36.778 14.9309 36.0753 12.9611 34.2265 12.157C34.5364 12.2905 32.2495 11.029 29.8891 12.3012ZM57.815 31.0998C57.9628 33.2849 58.6637 35.252 60.506 36.0585C60.2195 35.9347 61.4617 36.5381 62.7039 36.5021H66.6668V33.5089C66.6668 33.5089 65.0001 33.4724 64.1113 33.5089C63.0002 33.5089 62.0372 32.9979 61.9631 31.4283V15.185V15.1485H65.9261V12.1918H61.9631V12.1553V5.84048H57.815V31.0998ZM50.3336 31.355V28.2889H54.4817V31.1725C54.741 39.2029 40.7411 39.0204 40.8522 31.1725V17.3383C40.7411 9.49041 54.7039 9.49041 54.4447 17.5208V24.1642C54.4447 24.5657 54.1113 24.8942 53.7039 24.8942H44.9633V31.355C45.0003 34.4212 50.3336 34.3482 50.3336 31.355ZM50.3336 17.3383C50.3336 14.3087 45.0374 14.3087 44.9633 17.3018H45.0003V21.8645H50.3336V17.3383Z" fill="black"/></symbol> <symbol id="bell" viewBox="0 0 24 24"><g><path d="M15.137 3.945c-.644-.374-1.042-1.07-1.041-1.82v-.003c.001-1.172-.938-2.122-2.096-2.122s-2.097.95-2.097 2.122v.003c.001.751-.396 1.446-1.041 1.82-4.667 2.712-1.985 11.715-6.862 13.306v1.749h20v-1.749c-4.877-1.591-2.195-10.594-6.863-13.306zm-3.137-2.945c.552 0 1 .449 1 1 0 .552-.448 1-1 1s-1-.448-1-1c0-.551.448-1 1-1zm3 20c0 1.598-1.392 3-2.971 3s-3.029-1.402-3.029-3h6z"/></g></symbol> <symbol id="closed-captions" viewBox="0 0 17 12"><path d="M8.08596 4.47399C7.49663 3.75465 6.76863 3.39499 5.90196 3.39499C5.52063 3.39499 5.16529 3.46432 4.83596 3.60299C4.51529 3.74165 4.23796 3.93232 4.00396 4.17499C3.76996 4.40899 3.58363 4.69065 3.44496 5.01999C3.31496 5.34932 3.24996 5.70465 3.24996 6.08599C3.24996 6.47599 3.31496 6.83565 3.44496 7.16499C3.58363 7.49432 3.76996 7.78032 4.00396 8.02299C4.24663 8.26565 4.52829 8.45632 4.84896 8.59499C5.16963 8.73365 5.51629 8.80299 5.88896 8.80299C6.70363 8.80299 7.43596 8.45632 8.08596 7.76299V10.779L7.82596 10.87C7.43596 11.0087 7.07196 11.1083 6.73396 11.169C6.39596 11.2383 6.06229 11.273 5.73296 11.273C5.05696 11.273 4.40696 11.1473 3.78296 10.896C3.16763 10.636 2.62163 10.2763 2.14496 9.81699C1.67696 9.34899 1.29996 8.79865 1.01396 8.16599C0.727961 7.52465 0.584961 6.82699 0.584961 6.07299C0.584961 5.31899 0.723628 4.62999 1.00096 4.00599C1.28696 3.37332 1.66396 2.83165 2.13196 2.38099C2.60863 1.92165 3.15896 1.56632 3.78296 1.31499C4.40696 1.05499 5.06129 0.924988 5.74596 0.924988C6.13596 0.924988 6.51729 0.968321 6.88996 1.05499C7.27129 1.13299 7.66996 1.25865 8.08596 1.43199V4.47399Z" fill="white"/> <path d="M16.7569 4.47399C16.1675 3.75465 15.4395 3.39499 14.5729 3.39499C14.1915 3.39499 13.8362 3.46432 13.5069 3.60299C13.1862 3.74165 12.9089 3.93232 12.6749 4.17499C12.4409 4.40899 12.2545 4.69065 12.1159 5.01999C11.9859 5.34932 11.9209 5.70465 11.9209 6.08599C11.9209 6.47599 11.9859 6.83565 12.1159 7.16499C12.2545 7.49432 12.4409 7.78032 12.6749 8.02299C12.9175 8.26565 13.1992 8.45632 13.5199 8.59499C13.8405 8.73365 14.1872 8.80299 14.5599 8.80299C15.3745 8.80299 16.1069 8.45632 16.7569 7.76299V10.779L16.4969 10.87C16.1069 11.0087 15.7429 11.1083 15.4049 11.169C15.0669 11.2383 14.7332 11.273 14.4039 11.273C13.7279 11.273 13.0779 11.1473 12.4539 10.896C11.8385 10.636 11.2925 10.2763 10.8159 9.81699C10.3479 9.34899 9.97086 8.79865 9.68486 8.16599C9.39886 7.52465 9.25586 6.82699 9.25586 6.07299C9.25586 5.31899 9.39453 4.62999 9.67186 4.00599C9.95786 3.37332 10.3349 2.83165 10.8029 2.38099C11.2795 1.92165 11.8299 1.56632 12.4539 1.31499C13.0779 1.05499 13.7322 0.924988 14.4169 0.924988C14.8069 0.924988 15.1882 0.968321 15.5609 1.05499C15.9422 1.13299 16.3409 1.25865 16.7569 1.43199V4.47399Z" fill="white"/></symbol> <symbol id="comments" viewBox="0 0 21.5 24"><path d="M18.2 0h-15C1.5 0 0 1.5 0 3.3v11c0 1.8 1.5 3.3 3.3 3.3h1.9l.7 5.4.1 1 .7-.8 4.9-5.7h6.6c1.8 0 3.3-1.5 3.3-3.3v-11C21.5 1.5 20 0 18.2 0zm2.4 14.2c0 1.3-1 2.3-2.3 2.3h-7l-.3.2-4.3 5.1-.6-4.8-.1-.4H3.3c-1.3 0-2.3-1-2.3-2.3v-11C1 2 2 1 3.3 1h15c1.3 0 2.3 1 2.3 2.3v10.9z"/></symbol> <symbol id="comment-bubble" viewBox="0 0 15 13"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.349 1C3.77 1 1.09 3.248 1.09 5.78c0 .845.289 1.645.808 2.345.205.277.276.656.133 1.004l-1.028 2.507 3.602-1.334c.205-.075.423-.08.624-.024a7.969 7.969 0 0 0 2.12.282c3.578 0 6.258-2.248 6.258-4.78S10.927 1 7.35 1zM.09 5.78C.09 2.48 3.462 0 7.35 0c3.887 0 7.258 2.48 7.258 5.78 0 3.3-3.371 5.78-7.258 5.78a8.97 8.97 0 0 1-2.387-.319h-.01L1.35 12.572c-.817.303-1.603-.511-1.273-1.317l1.029-2.507v-.004a.055.055 0 0 0-.01-.024C.461 7.867.09 6.861.09 5.78z"/></symbol> <symbol id="copy" viewBox="0 0 16 16"><path fill-rule="evenodd" clip-rule="evenodd" d="M2.75 1.25C1.92157 1.25 1.25 1.92157 1.25 2.75V9.5C1.25 10.1904 1.80964 10.75 2.5 10.75C2.77614 10.75 3 10.9739 3 11.25C3 11.5261 2.77614 11.75 2.5 11.75C1.25736 11.75 0.25 10.7426 0.25 9.5V2.75C0.25 1.36929 1.36929 0.25 2.75 0.25H9.5C10.7426 0.25 11.75 1.25736 11.75 2.5C11.75 2.77614 11.5261 3 11.25 3C10.9739 3 10.75 2.77614 10.75 2.5C10.75 1.80964 10.1904 1.25 9.5 1.25H2.75Z" fill="white"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M6.75 5.25C5.92157 5.25 5.25 5.92157 5.25 6.75V13.25C5.25 14.0784 5.92157 14.75 6.75 14.75H13.25C14.0784 14.75 14.75 14.0784 14.75 13.25V6.75C14.75 5.92157 14.0784 5.25 13.25 5.25H6.75ZM4.25 6.75C4.25 5.36929 5.36929 4.25 6.75 4.25H13.25C14.6307 4.25 15.75 5.36929 15.75 6.75V13.25C15.75 14.6307 14.6307 15.75 13.25 15.75H6.75C5.36929 15.75 4.25 14.6307 4.25 13.25V6.75Z" fill="white"/></symbol> <symbol id="email" viewBox="0 0 24 24"><g fill="none" fill-rule="evenodd"><path d="M0 0h24v24H0z"/><path d="M20.242 4H3.758A1.76 1.76 0 002 5.758v11.719a1.76 1.76 0 001.758 1.757h16.484A1.76 1.76 0 0022 17.477V5.757A1.76 1.76 0 0020.242 4zM20 5.172l-7.962 7.962-8.03-7.962h15.992zM3.172 17.234V5.994l5.644 5.596-5.644 5.644zm.829.829l5.647-5.648 1.979 1.962c.229.227.598.226.826-.002l1.93-1.93 5.616 5.618H4.001zm16.827-.83l-5.617-5.616L20.828 6v11.234z" fill="#000" fill-rule="nonzero"/></g></symbol> <symbol id="embed" viewBox="0 0 18 14"><g clip-path="url(#clip0_284:1096)"><path fill-rule="evenodd" clip-rule="evenodd" d="M10.6464 0.646447C10.8417 0.451184 11.1583 0.451184 11.3536 0.646447L17.3536 6.64645C17.5488 6.84171 17.5488 7.15829 17.3536 7.35355L11.3536 13.3536C11.1583 13.5488 10.8417 13.5488 10.6464 13.3536C10.4512 13.1583 10.4512 12.8417 10.6464 12.6464L16.2929 7L10.6464 1.35355C10.4512 1.15829 10.4512 0.841709 10.6464 0.646447Z" fill="white"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M7.35355 0.646447C7.15829 0.451184 6.84171 0.451184 6.64645 0.646447L0.646446 6.64645C0.451184 6.84171 0.451184 7.15829 0.646446 7.35355L6.64645 13.3536C6.84171 13.5488 7.15829 13.5488 7.35355 13.3536C7.54882 13.1583 7.54882 12.8417 7.35355 12.6464L1.70711 7L7.35355 1.35355C7.54882 1.15829 7.54882 0.841709 7.35355 0.646447Z" fill="white"/></g> <defs><clipPath id="clip0_284:1096"><rect width="14" height="18" fill="white" transform="translate(18) rotate(90)"/></clipPath></defs></symbol> <symbol id="facebook" viewBox="0 0 12 24"><path d="M3 8H0V12H3V24H8V12H11.642L12 8H8V6.333C8 5.378 8.192 5 9.115 5H12V0H8.192C4.596 0 3 1.583 3 4.615V8Z"/></symbol> <symbol id="gallery" viewBox="0 0 36 22"><g fill="none" fill-rule="evenodd"><path d="M0 29h36V-7H0z"/> <g fill="#000"><path d="M34 3H5c-1.104 0-2 .896-2 2v15c0 1.104.896 2 2 2h29c1.104 0 2-.896 2-2V5c0-1.104-.896-2-2-2m0 1c.551 0 1 .449 1 1v15c0 .551-.449 1-1 1H5c-.551 0-1-.449-1-1V5c0-.551.449-1 1-1h29"/> <path d="M.5 20c-.276 0-.5-.224-.5-.5v-17C0 1.122 1.122 0 2.5 0h31c.276 0 .5.224.5.5s-.224.5-.5.5h-31C1.673 1 1 1.673 1 2.5v17c0 .276-.224.5-.5.5"/> <path d="M32.5 19c-.128 0-.256-.049-.354-.146l-7.585-7.586c-.567-.567-1.555-.567-2.122 0l-4.171 4.171c-.975.975-2.561.975-3.536 0l-1.171-1.171c-.567-.567-1.555-.567-2.122 0l-4.585 4.586c-.196.195-.512.195-.708 0-.195-.196-.195-.512 0-.708l4.586-4.585c.945-.945 2.591-.945 3.536 0l1.171 1.171c.567.567 1.555.567 2.122 0l4.171-4.171c.945-.945 2.591-.945 3.536 0l7.586 7.585c.195.196.195.512 0 .708-.098.097-.226.146-.354.146M10 7c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2m0 1c.551 0 1 .449 1 1 0 .551-.449 1-1 1-.551 0-1-.449-1-1 0-.551.449-1 1-1"/></g></g></symbol> <symbol id="file" viewBox="0 0 14 16"><path fill-rule="evenodd" clip-rule="evenodd" d="M2.5 0C1.11929 0 0 1.11929 0 2.5V13C0 14.3807 1.11929 15.5 2.5 15.5H11C12.3807 15.5 13.5 14.3807 13.5 13V4.75C13.5 4.61739 13.4473 4.49021 13.3536 4.39645L9.10355 0.146447C9.00979 0.0526784 8.88261 0 8.75 0H2.5ZM1 2.5C1 1.67157 1.67157 1 2.5 1H8V5C8 5.27614 8.22386 5.5 8.5 5.5H12.5V13C12.5 13.8285 11.8285 14.5 11 14.5H2.5C1.67157 14.5 1 13.8285 1 13V2.5ZM12.0429 4.5L9 1.45711V4.5H12.0429ZM4 11C4 10.7239 4.22386 10.5 4.5 10.5H9C9.27614 10.5 9.5 10.7239 9.5 11C9.5 11.2761 9.27614 11.5 9 11.5H4.5C4.22386 11.5 4 11.2761 4 11ZM4.5 7.5C4.22386 7.5 4 7.72386 4 8C4 8.27614 4.22386 8.5 4.5 8.5H9C9.27614 8.5 9.5 8.27614 9.5 8C9.5 7.72386 9.27614 7.5 9 7.5H4.5Z" fill="#080A12"/></symbol> <symbol id="flipboard" viewBox="0 0 448 512"><path d="M0 32v448h448V32H0zm358.4 179.2h-89.6v89.6h-89.6v89.6H89.6V121.6h268.8v89.6z"/></symbol> <symbol id="fullscreen" viewBox="0 0 16 16"><path d="M16 6H14.6667V1.33333H10V0H16V6ZM10 16V14.6667H14.6667V10H16V16H10ZM0 10H1.33333V14.6667H6V16H0V10ZM6 0V1.33333H1.33333V6H0V0H6Z" fill="white"/></symbol> <symbol id="galleryIcon" viewBox="0 0 19 12"><path d="M17.9444 1.63636C18.5271 1.63636 19 2.12509 19 2.72727V10.9091C19 11.5113 18.5271 12 17.9444 12H2.63889C2.05622 12 1.58333 11.5113 1.58333 10.9091V2.72727C1.58333 2.12509 2.05622 1.63636 2.63889 1.63636H17.9444ZM17.9444 2.18182H2.63889C2.34808 2.18182 2.11111 2.42673 2.11111 2.72727V10.9091C2.11111 11.2096 2.34808 11.4545 2.63889 11.4545H17.9444C18.2353 11.4545 18.4722 11.2096 18.4722 10.9091V2.72727C18.4722 2.42673 18.2353 2.18182 17.9444 2.18182ZM17.6806 0C17.8262 0 17.9444 0.122182 17.9444 0.272727C17.9444 0.423273 17.8262 0.545455 17.6806 0.545455H1.31944C0.882972 0.545455 0.527778 0.912546 0.527778 1.36364V10.6364C0.527778 10.7869 0.409555 10.9091 0.263889 10.9091C0.118222 10.9091 0 10.7869 0 10.6364V1.36364C0 0.612 0.592167 0 1.31944 0H17.6806ZM13.3359 5.76055L17.3396 9.89782C17.4425 10.0047 17.4425 10.1771 17.3396 10.284C17.2879 10.3369 17.2203 10.3636 17.1528 10.3636C17.0852 10.3636 17.0177 10.3369 16.9659 10.284L12.9628 6.14618C12.6635 5.83691 12.1421 5.83691 11.8428 6.14618L9.64144 8.42127C9.12686 8.95309 8.28981 8.95309 7.77522 8.42127L7.15719 7.78255C6.85794 7.47327 6.3365 7.47327 6.03725 7.78255L3.61739 10.284C3.51394 10.3904 3.34717 10.3904 3.24372 10.284C3.14081 10.1771 3.14081 10.0047 3.24372 9.89782L5.66411 7.39691C6.16286 6.88145 7.03158 6.88145 7.53033 7.39691L8.14836 8.03564C8.44761 8.34491 8.96906 8.34491 9.26831 8.03564L11.4697 5.76055C11.9684 5.24509 12.8371 5.24509 13.3359 5.76055ZM5.27778 3.81818C5.86044 3.81818 6.33333 4.30691 6.33333 4.90909C6.33333 5.51127 5.86044 6 5.27778 6C4.69511 6 4.22222 5.51127 4.22222 4.90909C4.22222 4.30691 4.69511 3.81818 5.27778 3.81818ZM5.27778 4.36364C4.98697 4.36364 4.75 4.60855 4.75 4.90909C4.75 5.20964 4.98697 5.45455 5.27778 5.45455C5.56858 5.45455 5.80556 5.20964 5.80556 4.90909C5.80556 4.60855 5.56858 4.36364 5.27778 4.36364Z" fill="#666666"/></symbol> <symbol id="galleryOverlay" viewBox="0 0 70 70"><circle cx="35" cy="35" r="33"/> <path d="M35,2c18.2,0,33,14.8,33,33S53.2,68,35,68S2,53.2,2,35S16.8,2,35,2 M35,0C15.7,0,0,15.7,0,35s15.7,35,35,35 s35-15.7,35-35S54.3,0,35,0L35,0z" class="overlayBorder"/> <circle cx="30.5" cy="34.2" r="1.8" class="overlayIcon"/> <polygon points="21.2,41.3 19.1,41.3 19.1,22.9 45.5,22.9 45.5,25 21.2,25 " class="overlayIcon"/> <path d="M48.9,30v15.1h-23V30H48.9 M50.9,28h-27v19.1h27V28L50.9,28z" class="overlayIcon"/> <polygon points="29,42.8 33.1,37.5 35.7,40 40.4,33.6 46.6,42.8 " class="overlayIcon"/></symbol> <symbol id="googleplus" viewBox="0 0 32 32"><path d="M18.8,1c1.1-0.6,1.6-1,1.6-1H9.9C7.8,0,2,2.4,2,7.9c0,5.5,6,6.7,8.2,6.6C9,16,10,17.4,10.7,18.1 c0.7,0.7,0.5,0.9-0.3,0.9C9.7,19,0,19.1,0,26s12.8,7.4,17.1,3.7s3.3-8.9,0-11.2c-3.3-2.3-4.5-3.4-2.4-5.3 c2.1-1.8,3.7-3.3,3.7-6.8s-2.8-5.2-2.8-5.2S17.7,1.6,18.8,1z M17.1,25.7c0,3-2.5,4.4-6.8,4.4c-4.3,0-6.6-2.1-6.6-5.4 c0-3.2,3.1-4.8,9-4.8C14.3,21.2,17.1,22.7,17.1,25.7z M10.9,13.2c-5.2,0-7.5-12.1-1.4-12.1C14.2,0.9,17.8,13.2,10.9,13.2z M28.1,4V0.1h-2V4h-4v2h4V10h2V6.1H32V4H28.1z"/></symbol> <symbol id="hamburgerMenu" viewBox="0 0 24 24"><path fill-rule="evenodd" clip-rule="evenodd" d="M4 5C4 4.44772 4.44772 4 5 4H19C19.5523 4 20 4.44772 20 5C20 5.55228 19.5523 6 19 6H5C4.44772 6 4 5.55228 4 5ZM4 12C4 11.4477 4.44772 11 5 11H19C19.5523 11 20 11.4477 20 12C20 12.5523 19.5523 13 19 13H5C4.44772 13 4 12.5523 4 12ZM5 18C4.44772 18 4 18.4477 4 19C4 19.5523 4.44772 20 5 20H19C19.5523 20 20 19.5523 20 19C20 18.4477 19.5523 18 19 18H5Z"/></symbol> <symbol id="hamburgerMenu-closed" viewBox="0 0 24 24"><path fill-rule="evenodd" clip-rule="evenodd" d="M4.70711 18.0208C4.31658 18.4113 4.31658 19.0445 4.70711 19.435C5.09763 19.8256 5.7308 19.8256 6.12132 19.435L11.5 14.0563L17.0208 19.5772C17.4113 19.9677 18.0445 19.9677 18.435 19.5772C18.8256 19.1866 18.8256 18.5535 18.435 18.1629L12.9142 12.6421L18.8492 6.7071C19.2398 6.31658 19.2398 5.68342 18.8492 5.29289C18.4587 4.90237 17.8256 4.90237 17.435 5.29289L11.5 11.2279L5.70711 5.43503C5.31658 5.0445 4.68342 5.0445 4.29289 5.43503C3.90237 5.82555 3.90237 6.45872 4.29289 6.84924L10.0858 12.6421L4.70711 18.0208Z"/></symbol> <symbol id="hamburger" viewBox="0 0 40 36"><rect y="0" width="40" height="4"/> <rect y="16" width="40" height="4"/> <rect y="32" width="40" height="4"/></symbol> <symbol id="instagram" viewBox="0 0 24 24"><path d="M12 2.163C15.204 2.163 15.584 2.175 16.85 2.233C20.102 2.381 21.621 3.924 21.769 7.152C21.827 8.417 21.838 8.797 21.838 12.001C21.838 15.206 21.826 15.585 21.769 16.85C21.62 20.075 20.105 21.621 16.85 21.769C15.584 21.827 15.206 21.839 12 21.839C8.796 21.839 8.416 21.827 7.151 21.769C3.891 21.62 2.38 20.07 2.232 16.849C2.174 15.584 2.162 15.205 2.162 12C2.162 8.796 2.175 8.417 2.232 7.151C2.381 3.924 3.896 2.38 7.151 2.232C8.417 2.175 8.796 2.163 12 2.163ZM12 0C8.741 0 8.333 0.014 7.053 0.072C2.695 0.272 0.273 2.69 0.073 7.052C0.014 8.333 0 8.741 0 12C0 15.259 0.014 15.668 0.072 16.948C0.272 21.306 2.69 23.728 7.052 23.928C8.333 23.986 8.741 24 12 24C15.259 24 15.668 23.986 16.948 23.928C21.302 23.728 23.73 21.31 23.927 16.948C23.986 15.668 24 15.259 24 12C24 8.741 23.986 8.333 23.928 7.053C23.732 2.699 21.311 0.273 16.949 0.073C15.668 0.014 15.259 0 12 0ZM12 5.838C8.597 5.838 5.838 8.597 5.838 12C5.838 15.403 8.597 18.163 12 18.163C15.403 18.163 18.162 15.404 18.162 12C18.162 8.597 15.403 5.838 12 5.838ZM12 16C9.791 16 8 14.21 8 12C8 9.791 9.791 8 12 8C14.209 8 16 9.791 16 12C16 14.21 14.209 16 12 16ZM18.406 4.155C17.61 4.155 16.965 4.8 16.965 5.595C16.965 6.39 17.61 7.035 18.406 7.035C19.201 7.035 19.845 6.39 19.845 5.595C19.845 4.8 19.201 4.155 18.406 4.155Z"/></symbol> <symbol id="ios" viewBox="0 0 24 24"><path d="M6.54545 0C2.93702 0 0 2.93702 0 6.54545V17.4545C0 21.063 2.93702 24 6.54545 24H17.4545C21.063 24 24 21.063 24 17.4545V6.54545C24 2.93702 21.063 0 17.4545 0H6.54545ZM6.54545 1.09091H17.4545C20.4734 1.09091 22.9091 3.52662 22.9091 6.54545V17.4545C22.9091 20.4734 20.4734 22.9091 17.4545 22.9091H6.54545C3.52662 22.9091 1.09091 20.4734 1.09091 17.4545V6.54545C1.09091 3.52662 3.52662 1.09091 6.54545 1.09091ZM4.69922 8.21804C4.31576 8.21804 4.03338 8.4914 4.03338 8.85085C4.03338 9.2054 4.31576 9.47834 4.69922 9.47834C5.08267 9.47834 5.36612 9.2054 5.36612 8.85085C5.36612 8.4914 5.08267 8.21804 4.69922 8.21804ZM10.3839 8.52912C8.39897 8.52912 7.1527 9.91923 7.1527 12.1534C7.1527 14.3827 8.37497 15.782 10.3839 15.782C12.3879 15.782 13.6055 14.3778 13.6055 12.1534C13.6055 9.92414 12.3781 8.52966 10.3839 8.52912ZM17.4364 8.52912C15.9266 8.52912 14.919 9.34878 14.919 10.581C14.919 11.5971 15.4895 12.202 16.7408 12.4943L17.6325 12.7106C18.5483 12.926 18.9513 13.2421 18.9513 13.7695C18.9513 14.3832 18.3185 14.8285 17.4556 14.8285C16.531 14.8285 15.8885 14.4118 15.7969 13.7557H14.7315C14.8084 14.9928 15.8387 15.783 17.3725 15.783C19.0122 15.783 20.038 14.9543 20.038 13.631C20.038 12.5909 19.4534 12.0152 18.0341 11.6847L17.2724 11.4972C16.3713 11.2861 16.0067 11.0032 16.0067 10.5096C16.0067 9.88613 16.5728 9.4794 17.4215 9.4794C18.2272 9.4794 18.7823 9.87621 18.8832 10.5139H19.9283C19.8661 9.34876 18.841 8.52912 17.4364 8.52912ZM10.3839 9.53054C11.6979 9.53054 12.5082 10.5476 12.5082 12.1534C12.5082 13.7494 11.6973 14.7805 10.3839 14.7805C9.05624 14.7805 8.25107 13.75 8.25107 12.1534C8.25107 10.5476 9.0797 9.53109 10.3839 9.53054ZM4.18679 10.3945V15.6147H5.21271V10.3945H4.18679Z"/></symbol> <symbol id="linkedin" viewBox="0 0 17 16"><path d="M3.927 1.667c0 .92-.74 1.666-1.653 1.666A1.66 1.66 0 0 1 .621 1.667C.62.747 1.36 0 2.274 0a1.66 1.66 0 0 1 1.653 1.667zm.014 3H.607v10.666h3.334V4.667zm5.321 0H5.95v10.666h3.313V9.734c0-3.113 4.02-3.368 4.02 0v5.6h3.324V8.578c0-5.253-5.948-5.062-7.345-2.476V4.667z"/></symbol> <symbol id="mac" viewBox="0 0 24 24"><path d="M16.5474 0C16.7021 1.40677 16.1353 2.81875 15.2989 3.83253C14.4624 4.84457 13.0852 5.63577 11.7393 5.52969C11.5585 4.15075 12.2349 2.71616 13.0122 1.81715C13.8799 0.801632 15.3388 0.0486891 16.5474 0ZM20.8926 8.19374C20.6335 8.35506 18.2908 9.81311 18.3211 12.7514C18.353 16.2565 21.2889 17.5009 21.5266 17.6016C21.5351 17.6052 21.5402 17.6074 21.5415 17.6081C21.5394 17.6138 21.5352 17.6272 21.5287 17.6476C21.442 17.9194 20.9545 19.4479 19.8774 21.0216C18.8775 22.4822 17.8429 23.9377 16.2066 23.969C15.4219 23.9834 14.8972 23.7561 14.3516 23.5196C13.7801 23.272 13.1857 23.0143 12.2454 23.0143C11.2601 23.0143 10.6382 23.2796 10.039 23.5352C9.52038 23.7564 9.01887 23.9703 8.31372 23.9986C6.73654 24.0559 5.53322 22.4196 4.52466 20.9624C2.46233 17.9802 0.888628 12.541 3.00487 8.86841C4.05516 7.04604 5.93143 5.89142 7.96942 5.86012C8.8476 5.84435 9.6984 6.1822 10.443 6.47787C11.0121 6.70385 11.5191 6.90519 11.9289 6.90519C12.2978 6.90519 12.7919 6.71039 13.3678 6.48339C14.2739 6.12619 15.3822 5.68925 16.5231 5.80621C17.3073 5.83751 19.5018 6.12095 20.912 8.18154C20.9083 8.18402 20.9017 8.18808 20.8926 8.19374Z"/></symbol> <symbol id="mag" viewBox="0 0 18 18"><path fill-rule="evenodd" clip-rule="evenodd" d="M8.73242 1.23218C4.86643 1.23218 1.73242 4.36618 1.73242 8.23218C1.73242 12.0982 4.86643 15.2322 8.73242 15.2322C12.5984 15.2322 15.7324 12.0982 15.7324 8.23218C15.7324 4.36618 12.5984 1.23218 8.73242 1.23218ZM0.732422 8.23218C0.732422 3.8139 4.31414 0.232178 8.73242 0.232178C13.1507 0.232178 16.7324 3.8139 16.7324 8.23218C16.7324 12.6505 13.1507 16.2322 8.73242 16.2322C4.31414 16.2322 0.732422 12.6505 0.732422 8.23218Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M14.0356 13.5356C14.2309 13.3403 14.5475 13.3403 14.7427 13.5356L17.5711 16.364C17.7664 16.5592 17.7664 16.8758 17.5711 17.0711C17.3759 17.2664 17.0593 17.2664 16.864 17.0711L14.0356 14.2427C13.8403 14.0474 13.8403 13.7308 14.0356 13.5356Z"/></symbol> <symbol id="more" viewBox="0 0 32 7.3"><circle cx="3.7" cy="3.7" r="3.7"/> <circle cx="16" cy="3.7" r="3.7"/> <circle cx="28.3" cy="3.7" r="3.7"/></symbol> <symbol id="pause" viewBox="0 0 26.6 32"><g><polygon points="16,32 26.5,32 26.5,8.8 26.5,0 16,0"/> <rect x="0.1" y="0" width="10.6" height="32"/></g></symbol> <symbol id="phone" viewBox="0 0 17 16"><path d="M15.5813 12.3435L12.3426 10.1836C11.9316 9.91174 11.3806 10.0012 11.0768 10.3892L10.1334 11.6022C10.0122 11.762 9.79177 11.8084 9.61637 11.711L9.43692 11.612C8.84203 11.2878 8.10183 10.8841 6.61048 9.39221C5.11913 7.90033 4.71463 7.15957 4.39037 6.56578L4.29197 6.38632C4.1932 6.21096 4.23869 5.98963 4.39862 5.86742L5.61078 4.92431C5.99862 4.62043 6.08821 4.06966 5.81664 3.65853L3.6568 0.419844C3.37848 0.00118926 2.82008 -0.124489 2.38921 0.134523L1.03491 0.948054C0.60938 1.19822 0.297186 1.60338 0.16379 2.07862C-0.323891 3.85555 0.0429864 6.92225 4.56051 11.4403C8.15411 15.0336 10.8294 16 12.6682 16C13.0914 16.0018 13.5129 15.9467 13.9214 15.8362C14.3968 15.703 14.802 15.3908 15.052 14.9651L15.8663 13.6116C16.1257 13.1807 16.0001 12.6219 15.5813 12.3435ZM15.4069 13.338L14.5944 14.6923C14.4149 14.9996 14.1234 15.2255 13.7811 15.3227C12.1407 15.7731 9.27481 15.4 4.9378 11.063C0.600788 6.72601 0.227785 3.86036 0.678156 2.21971C0.775524 1.87698 1.00169 1.58516 1.3093 1.40536L2.6636 0.592894C2.85055 0.480402 3.09291 0.534929 3.21368 0.716603L4.38693 2.47806L5.37167 3.95501C5.4896 4.13334 5.45085 4.37235 5.28261 4.50431L4.07018 5.44743C3.7012 5.72956 3.59584 6.24005 3.82301 6.64521L3.91928 6.82013C4.26007 7.44515 4.68375 8.22268 6.23057 9.76925C7.77739 11.3158 8.55467 11.7395 9.17941 12.0803L9.35458 12.1768C9.75971 12.4039 10.2702 12.2986 10.5524 11.9296L11.4955 10.7172C11.6275 10.549 11.8664 10.5103 12.0448 10.6281L15.2832 12.788C15.465 12.9086 15.5195 13.1511 15.4069 13.338Z"/></symbol> <symbol id="pinterest" viewBox="0 0 24 24"><g fill="none" fill-rule="evenodd"><path d="M0 0h24v24H0z"/><path d="M11.959 2C6.459 2 2 6.459 2 11.959a9.962 9.962 0 006.328 9.279c-.09-.787-.164-2 .033-2.861.18-.779 1.164-4.95 1.164-4.95s-.295-.6-.295-1.476c0-1.385.803-2.418 1.803-2.418.852 0 1.262.64 1.262 1.401 0 .853-.54 2.132-.828 3.32-.238.992.5 1.803 1.476 1.803 1.77 0 3.13-1.868 3.13-4.557 0-2.385-1.712-4.05-4.163-4.05-2.836 0-4.5 2.124-4.5 4.32 0 .853.328 1.771.738 2.271.082.098.09.188.065.287-.074.311-.246.992-.279 1.131-.04.18-.147.221-.336.131-1.246-.582-2.024-2.393-2.024-3.86 0-3.14 2.278-6.025 6.582-6.025 3.45 0 6.14 2.459 6.14 5.754 0 3.434-2.165 6.197-5.165 6.197-1.008 0-1.959-.525-2.279-1.148l-.623 2.369c-.22.869-.827 1.95-1.237 2.615.934.287 1.918.442 2.95.442 5.5 0 9.96-4.459 9.96-9.959A9.939 9.939 0 0011.959 2z" fill="#000" fill-rule="nonzero"/></g></symbol> <symbol id="play" viewBox="0 0 27 36"><path d="M25.7687 17.1706C26.3571 17.567 26.3571 18.433 25.7687 18.8294L1.55866 35.1367C0.894432 35.5841 -1.66576e-06 35.1081 -1.63075e-06 34.3073L-2.05126e-07 1.69274C-1.7012e-07 0.891883 0.894433 0.415934 1.55866 0.863341L25.7687 17.1706Z"/></symbol> <symbol id="reddit" viewBox="0 0 32 26.7"><path d="M22.9,14.5C23,14.7,23,15,23,15.2c0,0.4-0.2,0.9-0.4,1.2c-0.3,0.3-0.6,0.6-1,0.7h0c0,0,0,0,0,0c0,0,0,0,0,0 c-0.2,0.1-0.4,0.1-0.6,0.1c-0.5,0-0.9-0.2-1.3-0.5c-0.4-0.3-0.6-0.7-0.7-1.2c0,0,0,0,0,0c0,0,0,0,0,0h0c0-0.1,0-0.2,0-0.4 c0-0.4,0.1-0.8,0.4-1.2c0.2-0.3,0.6-0.6,1-0.7c0,0,0,0,0,0c0,0,0,0,0,0c0.2-0.1,0.5-0.1,0.7-0.1c0.4,0,0.8,0.1,1.2,0.4 C22.5,13.8,22.7,14.1,22.9,14.5C22.9,14.5,22.9,14.5,22.9,14.5C22.9,14.5,22.9,14.5,22.9,14.5L22.9,14.5z M21.6,19.7 c-0.2-0.1-0.4-0.2-0.6-0.2c-0.2,0-0.3,0-0.5,0.1c-1.4,0.8-3.1,1.3-4.7,1.3c-1.2,0-2.5-0.3-3.6-0.8l0,0l0,0 c-0.2-0.1-0.4-0.2-0.6-0.4c-0.1-0.1-0.2-0.1-0.3-0.2c-0.1-0.1-0.3-0.1-0.4-0.1c-0.1,0-0.2,0-0.4,0.1c0,0,0,0,0,0 c-0.2,0.1-0.3,0.2-0.4,0.4c-0.1,0.2-0.2,0.4-0.2,0.6c0,0.2,0,0.3,0.1,0.5c0.1,0.1,0.2,0.3,0.4,0.4c1.6,1.1,3.5,1.6,5.4,1.6 c1.7,0,3.4-0.4,4.9-1.1l0,0l0,0c0.2-0.1,0.5-0.2,0.7-0.4c0.1-0.1,0.2-0.2,0.4-0.3c0.1-0.1,0.2-0.3,0.2-0.4c0-0.1,0-0.2,0-0.2 c0-0.1,0-0.3-0.1-0.4C21.9,19.9,21.8,19.8,21.6,19.7L21.6,19.7z M10.4,17.1C10.4,17.1,10.4,17.1,10.4,17.1 c0.2,0.1,0.4,0.1,0.6,0.1c0.5,0,1-0.2,1.4-0.6c0.4-0.3,0.6-0.8,0.6-1.4c0,0,0,0,0,0c0,0,0-0.1,0-0.1c0-0.6-0.3-1-0.6-1.4 c-0.4-0.3-0.9-0.6-1.4-0.6c-0.1,0-0.3,0-0.4,0c0,0,0,0,0,0h0c-0.7,0.1-1.3,0.7-1.5,1.4c0,0,0,0,0,0C9,14.8,9,15,9,15.2 c0,0.4,0.1,0.9,0.4,1.2C9.6,16.7,10,17,10.4,17.1C10.4,17.1,10.4,17.1,10.4,17.1L10.4,17.1z M32,12.1L32,12.1c0,0.1,0,0.1,0,0.2 c0,0.8-0.2,1.5-0.7,2.2c-0.4,0.6-0.9,1.1-1.5,1.4c0,0.3,0.1,0.6,0.1,0.9c0,1.7-0.6,3.3-1.6,4.6v0h0c-1.9,2.5-4.7,3.9-7.6,4.7l0,0 c-1.5,0.4-3.1,0.6-4.7,0.6c-2.4,0-4.7-0.4-6.9-1.3v0h0c-2.3-0.9-4.5-2.4-5.8-4.6c-0.7-1.2-1.1-2.5-1.1-3.9c0-0.3,0-0.6,0.1-0.9 c-0.6-0.3-1.1-0.8-1.5-1.4C0.3,13.9,0,13.2,0,12.4v0c0-1.1,0.5-2.1,1.2-2.8c0.7-0.7,1.7-1.2,2.8-1.2h0c0.1,0,0.2,0,0.3,0 c0.5,0,1.1,0.1,1.6,0.3l0,0h0C6.3,8.8,6.8,9,7.1,9.3c0.1-0.1,0.3-0.1,0.4-0.2c2.3-1.4,5-1.9,7.6-2c0-1.3,0.2-2.7,0.8-3.8 c0.5-1,1.4-1.8,2.5-2l0,0h0c0.4-0.1,0.8-0.1,1.2-0.1c1.1,0,2.2,0.3,3.2,0.7c0.5-0.7,1.1-1.2,1.9-1.5l0,0l0,0 C25.3,0.1,25.8,0,26.2,0c0.5,0,1,0.1,1.5,0.3v0c0,0,0,0,0,0c0,0,0,0,0,0C28.4,0.6,29,1,29.4,1.6C29.8,2.2,30,3,30,3.7 c0,0.1,0,0.3,0,0.4l0,0c0,0,0,0,0,0c-0.1,1-0.6,1.8-1.2,2.4c-0.7,0.6-1.6,1-2.5,1c-0.1,0-0.3,0-0.4,0c-0.9-0.1-1.8-0.5-2.4-1.2 c-0.6-0.7-1-1.5-1-2.5c0,0,0-0.1,0-0.1C21.6,3.3,20.7,3,19.8,3c-0.1,0-0.3,0-0.4,0h0c-0.7,0.1-1.3,0.5-1.6,1.1v0 c-0.5,0.9-0.6,1.9-0.6,3c2.6,0.2,5.2,0.8,7.4,2.1h0l0,0c0,0,0.1,0.1,0.2,0.1C25,9.2,25.2,9,25.4,8.9c0.7-0.5,1.5-0.7,2.3-0.7 c0.4,0,0.7,0,1.1,0.1h0l0,0c0,0,0,0,0,0c0.8,0.2,1.6,0.7,2.2,1.3C31.5,10.4,31.9,11.2,32,12.1L32,12.1L32,12.1z M24.4,3.6 c0,0,0,0.1,0,0.1v0c0,0.4,0.2,0.9,0.6,1.2c0.3,0.3,0.8,0.5,1.2,0.5h0c0,0,0.1,0,0.1,0c0.4,0,0.9-0.2,1.2-0.5 C27.8,4.6,28,4.2,28,3.8v0c0,0,0-0.1,0-0.1c0-0.5-0.2-0.9-0.6-1.2c-0.3-0.3-0.8-0.5-1.2-0.5c-0.1,0-0.3,0-0.4,0.1h0l0,0 c-0.4,0.1-0.7,0.3-1,0.6C24.6,2.9,24.4,3.2,24.4,3.6L24.4,3.6z M5.4,10.5c-0.3-0.2-0.7-0.3-1.1-0.3c-0.1,0-0.1,0-0.2,0h0l0,0 c-0.5,0-1,0.2-1.4,0.6c-0.4,0.4-0.6,0.8-0.7,1.4v0l0,0c0,0,0,0.1,0,0.1c0,0.3,0.1,0.6,0.3,0.9c0.1,0.2,0.3,0.4,0.5,0.6 C3.4,12.6,4.3,11.5,5.4,10.5L5.4,10.5z M27.8,16.9c0-1.2-0.4-2.3-1.1-3.2c-1.3-1.9-3.4-3.1-5.6-3.8l0,0c-0.4-0.1-0.8-0.2-1.3-0.3 c-1.3-0.3-2.6-0.4-3.9-0.4c-1.7,0-3.5,0.3-5.2,0.8c-2.2,0.7-4.3,1.9-5.6,3.8v0c-0.7,0.9-1.1,2.1-1.1,3.3c0,0.4,0.1,0.9,0.2,1.3 l0,0c0.2,0.9,0.7,1.8,1.3,2.5c0.6,0.7,1.4,1.3,2.2,1.8c0.2,0.1,0.4,0.2,0.5,0.3c2.3,1.3,5,1.9,7.6,1.9c0.4,0,0.9,0,1.3,0 c2.7-0.2,5.3-1,7.5-2.6v0c0.7-0.5,1.3-1.1,1.8-1.8c0.5-0.7,0.9-1.5,1-2.3v0C27.8,17.5,27.8,17.2,27.8,16.9L27.8,16.9z M29.9,12.3 c0-0.3-0.1-0.6-0.2-0.8l0,0l0,0c-0.2-0.4-0.5-0.7-0.8-0.9c-0.4-0.2-0.8-0.3-1.2-0.3c-0.4,0-0.7,0.1-1.1,0.3c1.1,0.9,2,2,2.6,3.3 c0.2-0.2,0.4-0.4,0.5-0.6C29.8,13,29.9,12.6,29.9,12.3L29.9,12.3z M29.9,12.3"/></symbol> <symbol id="rss" viewBox="0 0 36 36"><path d="M0 14.4v7.2c8 0 14.4 6.4 14.4 14.4h7.2c0-11.9-9.7-21.6-21.6-21.6z"/> <path d="M0 0v7.2c15.9 0 28.8 12.9 28.8 28.8H36C36 16.1 19.9 0 0 0z"/> <circle cx="3.6" cy="32.4" r="3.6"/></symbol> <symbol id="cc-share" viewBox="0 0 24 24"><path d="M6 17c2.269-9.881 11-11.667 11-11.667v-3.333l7 6.637-7 6.696v-3.333s-6.17-.171-11 5zm12 .145v2.855h-16v-12h6.598c.768-.787 1.561-1.449 2.339-2h-10.937v16h20v-6.769l-2 1.914z"/></symbol> <symbol id="share" viewBox="0 0 18 12"><path d="M10.5 10.5L18 5.184L10.5 0V2.2815C10.5 2.2815 1.7865 4.21875 0 12C3.804 7.92675 10.5 8.0865 10.5 8.0865V10.5Z" fill="white"/></symbol> <symbol id="sms" viewBox="0 0 72 72"><path d="M38,58 L24,72 L24,58 L9.99237268,58 C4.47373763,58 0,53.5215031 0,48.0046567 L0,15.9953433 C0,10.4750676 4.47671884, 6 9.99237268,6 L62.0076273,6 C67.5262624,6 72,10.4784969 72,15.9953433 L72,48.0046567 C72,53.5249324 67.5232812,58 62.0076273, 58 L38,58 Z M9.9,28.475 C9.9,33.075 13.825,33.575 16.825,33.925 C18.675,34.125 20.2,34.475 20.2,35.725 C20.2,37.15 19,37.7 16.875, 37.7 C15.275,37.7 14.15,37.05 13.65,35.975 C13.325,35.225 13.05,35.1 12.325,35.375 L10.5,36.025 C9.8,36.275 9.6,36.6 9.85,37.325 C10.825, 39.95 12.975,41.375 16.875,41.375 C21.475,41.375 24.3,39.075 24.3,35.65 C24.3,31.25 20.75,30.5 17.825,30.15 C15.8,29.925 14.075,29.65 14.075, 28.3 C14.075,27.1 14.975,26.575 17.025,26.575 C18.6,26.575 19.45,27.175 19.975,28.225 C20.35,28.9 20.625,29.025 21.275,28.725 L23.175, 27.9 C23.875,27.6 24.075,27.25 23.725,26.55 C22.575,24.1 20.675,22.875 17.025,22.875 C12.35,22.875 9.9,25.25 9.9,28.475 Z M43.875,23.25 L42.1, 23.25 C41.325,23.25 41.125,23.375 40.75,24.025 L36.15,32.45 L31.575,24 C31.225,23.4 30.975,23.25 30.15,23.25 L28.525,23.25 C27.775,23.25 27.5, 23.5 27.5,24.25 L27.5,40 C27.5,40.75 27.775,41 28.525,41 L30.3,41 C31.05,41 31.3,40.75 31.3,40 L31.3,34.35 C31.3,32.675 31.15,31.25 30.55,28.7 L30.775, 28.7 C31.275,30.525 31.825,32 32.625,33.35 L34.425,36.525 C34.725,37.1 34.95,37.25 35.575,37.25 L36.725,37.25 C37.35,37.25 37.575,37.05 37.85, 36.525 L39.625,33.35 C40.375,32 41.075,30.4 41.6,28.7 L41.825,28.7 C41.2,31.15 41,32.8 41,34.325 L41,40 C41,40.75 41.25,41 42,41 L43.875,41 C44.65, 41 44.9,40.75 44.9,40 L44.9,24.25 C44.9,23.5 44.65,23.25 43.875,23.25 Z M48.325,28.475 C48.325,33.075 52.25,33.575 55.25,33.925 C57.1,34.125 58.625, 34.475 58.625,35.725 C58.625,37.15 57.425,37.7 55.3,37.7 C53.7,37.7 52.575,37.05 52.075,35.975 C51.75,35.225 51.475,35.1 50.75,35.375 L48.925,36.025 C48.225, 36.275 48.025,36.6 48.275,37.325 C49.25,39.95 51.4,41.375 55.3,41.375 C59.9,41.375 62.725,39.075 62.725,35.65 C62.725,31.25 59.175,30.5 56.25, 30.15 C54.225,29.925 52.5,29.65 52.5,28.3 C52.5,27.1 53.4,26.575 55.45,26.575 C57.025,26.575 57.875,27.175 58.4,28.225 C58.775,28.9 59.05, 29.025 59.7,28.725 L61.6,27.9 C62.3,27.6 62.5,27.25 62.15,26.55 C61,24.1 59.1,22.875 55.45,22.875 C50.775,22.875 48.325,25.25 48.325,28.475 Z"/></symbol> <symbol id="stars-full" viewBox="0 0 14 14"><polygon points="7,0 8.8,5.1 14,5.3 9.9,8.7 11.3,14 7,11 2.7,14 4.1,8.7 0,5.3 5.2,5.1"/></symbol> <symbol id="stars-half" viewBox="0 0 14 14"><polygon points="7.1,0 7.1,11 2.7,14 4.1,8.7 0,5.3 5.2,5.1"/></symbol> <symbol id="stumble" viewBox="0 0 32 24"><path d="M17.8,8.6l2.1,1.5l3.3-1.5l0-1.6C23,3.3,19.9,0,16,0c-3.8,0-7,3.2-7.1,6.9v9.9c0,0.9-0.8,1.6-1.7,1.6 c-0.9,0-1.9-0.4-1.9-1.3V12H0c0,0,0,5.1,0,5.1C0,20.9,3.2,24,7.1,24c3.9,0,7.1-3.1,7.1-6.9V6.9c0-0.9,0.8-1.7,1.8-1.7 c0.9,0,1.8,0.8,1.8,1.7V8.6z M26.7,12v5.1c0,0.9-1,1.5-1.9,1.5c-0.9,0-1.7-0.7-1.7-1.6l0-5l-3.3,1.6L17.8,12v5.1 c0,3.8,3.2,6.9,7.1,6.9c3.9,0,7.1-3.1,7.1-6.9c0,0,0-5.1,0-5.1H26.7z"/></symbol> <symbol id="tumblr" viewBox="0 0 24 24"><g fill="none" fill-rule="evenodd"><path d="M0 0h24v24H0z"/><path d="M13.32 15.984c0 1.547.758 2.082 1.966 2.082H17V22h-3.245c-2.922 0-5.1-1.548-5.1-5.25v-5.929H6v-3.21C8.922 6.83 10.144 4.241 10.285 2h3.034v5.09h3.54v3.731h-3.54v5.163z" fill="#000"/></g></symbol> <symbol id="twitter" viewBox="0 0 24 24"><g fill-rule="evenodd"><path d="M0 0h24v24H0z"/><path d="M8.275 20c7.552 0 11.682-6.157 11.682-11.493 0-.176 0-.352-.009-.52A8.337 8.337 0 0022 5.893a8.44 8.44 0 01-2.358.637 4.05 4.05 0 001.805-2.237 8.398 8.398 0 01-2.606.98A4.117 4.117 0 0015.844 4C13.58 4 11.74 5.81 11.74 8.038c0 .318.034.628.111.921a11.711 11.711 0 01-8.463-4.222 4.002 4.002 0 00-.554 2.027c0 1.4.724 2.64 1.831 3.36a4.084 4.084 0 01-1.856-.503v.05c0 1.96 1.413 3.586 3.295 3.963a4.153 4.153 0 01-1.856.066c.52 1.609 2.035 2.773 3.831 2.807A8.34 8.34 0 012 18.174 11.574 11.574 0 008.275 20z" fill-rule="nonzero"/></g></symbol> <symbol id="tiktok" viewBox="0 0 22 24" xmlns="http://www.w3.org/2000/svg"><path d="M7.32 24c-.533-.078-1.075-.121-1.598-.24-2.964-.676-5.278-3.244-5.648-6.244-.493-4 2.224-7.61 6.232-8.272.796-.131 1.839-.125 2.346.01v3.927c-.2-.038-.387-.083-.577-.11-2.239-.317-4.162 1.398-4.089 3.643.059 1.774 1.49 3.236 3.315 3.385 1.74.143 3.405-1.118 3.724-2.836.051-.3.076-.604.072-.908.007-5.333.01-10.668.012-16.005 0-.117.011-.233.017-.35h3.9c.086 3.323 2.566 5.864 5.87 6.004.203.01.225.09.224.255-.004 1.132 0 2.265 0 3.397v.25c-2.263-.01-4.261-.702-6.086-2.05v.29c.008 2.742.014 5.484.02 8.226 0 .382-.022.765-.068 1.144-.369 3.072-2.802 5.688-5.85 6.292-.444.088-.896.129-1.344.191L7.319 24Z"/></symbol> <symbol id="videoIcon" viewBox="0 0 14 16"><path fill-rule="evenodd" clip-rule="evenodd" d="M1.43996 0.135134C0.803637 -0.244871 0 0.221801 0 0.971144V8.00057V15.03C0 15.7793 0.803637 16.2447 1.43996 15.8647L13.2422 8.83525C13.8717 8.46191 13.8717 7.53923 13.2422 7.16456L1.43996 0.135134Z" fill="#666666"/></symbol> <symbol id="website" viewBox="0 0 16 16"><path d="M13.6556 2.34442C10.53 -0.781222 5.4705 -0.781722 2.34443 2.34442C-0.781242 5.47005 -0.78171 10.5295 2.34443 13.6556C5.47 16.7812 10.5295 16.7817 13.6556 13.6556C16.7812 10.53 16.7817 5.47052 13.6556 2.34442ZM13.3213 12.5155C12.9476 12.1813 12.5479 11.8856 12.1265 11.6307C12.405 10.6687 12.57 9.61012 12.609 8.5097H14.9605C14.8542 9.99296 14.2843 11.3844 13.3213 12.5155ZM1.03949 8.5097H3.39098C3.42998 9.61012 3.59497 10.6687 3.87346 11.6307C3.45212 11.8856 3.05238 12.1813 2.67869 12.5155C1.71572 11.3844 1.14584 9.99296 1.03949 8.5097ZM2.67872 3.48455C3.05241 3.81871 3.45215 4.11444 3.87349 4.3693C3.595 5.33129 3.43001 6.3899 3.39101 7.49031H1.03949C1.14584 6.00708 1.71572 4.61569 2.67872 3.48455ZM7.49032 4.47465C6.65906 4.4152 5.85756 4.21046 5.11451 3.8727C5.54666 2.75989 6.34332 1.4252 7.49032 1.09444V4.47465ZM7.49032 5.49594V7.49034H4.4108C4.44609 6.55948 4.57798 5.66561 4.79733 4.84775C5.64174 5.21689 6.54987 5.43733 7.49032 5.49594ZM7.49032 8.5097V10.5041C6.54987 10.5627 5.64174 10.7832 4.79733 11.1523C4.57798 10.3344 4.44609 9.44057 4.4108 8.5097H7.49032ZM7.49032 11.5254V14.9056C6.34338 14.5748 5.54672 13.2403 5.11451 12.1273C5.85756 11.7896 6.65906 11.5848 7.49032 11.5254ZM8.50968 11.5254C9.34094 11.5848 10.1424 11.7896 10.8855 12.1273C10.4533 13.2402 9.65668 14.5748 8.50968 14.9056V11.5254ZM8.50968 10.5041V8.5097H11.5892C11.5539 9.44057 11.422 10.3344 11.2027 11.1523C10.3583 10.7832 9.45013 10.5627 8.50968 10.5041ZM8.50968 7.49034V5.49594C9.45013 5.43733 10.3583 5.21689 11.2027 4.84775C11.422 5.66561 11.5539 6.55948 11.5892 7.49034H8.50968ZM8.50968 4.47465V1.09447C9.65668 1.42523 10.4533 2.75992 10.8855 3.87273C10.1424 4.21046 9.34094 4.4152 8.50968 4.47465ZM10.7991 1.60333C11.4515 1.88904 12.0602 2.27644 12.6058 2.75711C12.3461 2.98611 12.0721 3.19375 11.7859 3.37945C11.5317 2.75021 11.2071 2.13871 10.7991 1.60333ZM4.21409 3.37945C3.92792 3.19375 3.65389 2.98611 3.39413 2.75711C3.93978 2.27644 4.54847 1.88904 5.20091 1.60333C4.79287 2.13877 4.46823 2.75027 4.21409 3.37945ZM4.21412 12.6206C4.46823 13.2498 4.79293 13.8613 5.20094 14.3967C4.5485 14.111 3.93981 13.7236 3.39417 13.2429C3.65389 13.0139 3.92795 12.8063 4.21412 12.6206ZM11.7859 12.6206C12.0721 12.8063 12.3461 13.0139 12.6058 13.2429C12.0602 13.7236 11.4515 14.111 10.7991 14.3967C11.2071 13.8614 11.5317 13.2498 11.7859 12.6206ZM12.609 7.49034C12.57 6.38993 12.405 5.33129 12.1265 4.36933C12.5479 4.11447 12.9476 3.81874 13.3213 3.48458C14.2843 4.61569 14.8542 6.00708 14.9605 7.49034H12.609Z"/></symbol> <symbol id="windows" viewBox="0 0 24 24"><path d="M12 11.5V2.5L24 1V11.5H12ZM0 11.5V4L10.5 2.6875V11.5H0ZM12 13V22L24 23.5V13H12ZM0 20.5V13H10.5V21.8125L0 20.5Z"/></symbol> <symbol id="yahoo" viewBox="-133 141 30.3 20"><path d="M-107.7,146.7c0,0,1.2-0.7,2.1-0.7s2.1,0,2.1,0l0.8-1.9h-12.9l0.1,1.4l0.8,0.4l3.3,0.1c0,0,0.2,0.7-0.3,1.1 c-0.6,0.4-5.4,4.7-5.4,4.7l-6.2-7.5c0,0,0.1-0.2,1-0.2c0.9,0,3.5,0,3.5,0V141H-133v3.1c0,0,1.8,0,2.7,0c0.9,0,1.9,1,2.8,1.8 c0.9,0.9,7.1,7.4,7.1,7.4v5.4c0,0-0.5,0.8-2.2,0.8c-1.8,0-2.5,0.1-2.5,0.1v1.4h14.1v-1c0,0-0.4-0.6-0.8-0.6h-3.4 c-0.4,0-0.5-0.5-0.5-1.1c0-0.6,0-4.7,0-4.7L-107.7,146.7z"/></symbol> <symbol id="youtube" viewBox="0 0 24 24"><path d="M19.615 3.184c-3.604-.246-11.631-.245-15.23 0-3.897.266-4.356 2.62-4.385 8.816.029 6.185.484 8.549 4.385 8.816 3.6.245 11.626.246 15.23 0 3.897-.266 4.356-2.62 4.385-8.816-.029-6.185-.484-8.549-4.385-8.816zm-10.615 12.816v-8l8 3.993-8 4.007z"/></symbol> <symbol id="rightArrow" viewBox="0 0 16 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M8.646.646a.5.5 0 0 1 .708 0l6 6a.5.5 0 0 1 0 .708l-6 6a.5.5 0 0 1-.708-.708L14.293 7 8.646 1.354a.5.5 0 0 1 0-.708z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M.5 7a.5.5 0 0 1 .5-.5h14a.5.5 0 0 1 0 1H1A.5.5 0 0 1 .5 7z"/></symbol> <symbol id="rightArrowAlt" viewBox="0 0 41 13"><path fill-rule="evenodd" clip-rule="evenodd" d="M33.6464 0.146447C33.8417 -0.0488155 34.1583 -0.0488155 34.3536 0.146447L40.3536 6.14645C40.5488 6.34171 40.5488 6.65829 40.3536 6.85355L34.3536 12.8536C34.1583 13.0488 33.8417 13.0488 33.6464 12.8536C33.4512 12.6583 33.4512 12.3417 33.6464 12.1464L39.2929 6.5L33.6464 0.853553C33.4512 0.658291 33.4512 0.341709 33.6464 0.146447Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M0.5 6.5C0.5 6.22386 0.723858 6 1 6H40C40.2761 6 40.5 6.22386 40.5 6.5C40.5 6.77614 40.2761 7 40 7H1C0.723858 7 0.5 6.77614 0.5 6.5Z"/></symbol> <symbol id="leftArrow" viewBox="63 -9 150 150"><path d="M10.3342 1.79974L1.68336 10.4506L10.3342 19.1014" stroke-width="2" stroke-linecap="round"/></symbol> <symbol id="search" viewBox="0 0 16 16"><path fill-rule="evenodd" clip-rule="evenodd" d="M6.71687 11.5313C4.11032 11.5313 2.10529 9.42603 2.10529 6.81948C2.10529 4.21294 4.21058 2.10765 6.71687 2.10765C9.32342 2.10765 11.3285 4.21294 11.3285 6.81948C11.3285 9.42603 9.32342 11.5313 6.71687 11.5313ZM15.94 14.38L12.4312 10.8362C13.133 9.72245 13.534 8.40619 13.534 6.98868C13.534 3.14116 10.5264 0.00238281 6.81712 0.00238281C3.00756 -0.0988679 0 3.03991 0 6.88743C0 10.735 3.00756 13.8737 6.71687 13.8737C8.3209 13.8737 9.72443 13.3675 10.8272 12.355L14.336 15.8987C14.4363 16 14.5365 16 14.6368 16C14.737 16 14.9375 15.8987 14.9375 15.7975L15.7395 14.8862C16.0403 14.8862 16.0403 14.5825 15.94 14.38Z"/></symbol> <symbol id="menu" viewBox="0 0 25 24"><path fill-rule="evenodd" clip-rule="evenodd" d="M23.7368 1H15.7368V9H23.7368V1ZM15.7368 0C15.1845 0 14.7368 0.447716 14.7368 1V9C14.7368 9.55229 15.1845 10 15.7368 10H23.7368C24.2891 10 24.7368 9.55228 24.7368 9V1C24.7368 0.447715 24.2891 0 23.7368 0H15.7368Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M9.73682 1H1.73682V9H9.73682V1ZM1.73682 0C1.18453 0 0.736816 0.447716 0.736816 1V9C0.736816 9.55229 1.18453 10 1.73682 10H9.73682C10.2891 10 10.7368 9.55228 10.7368 9V1C10.7368 0.447715 10.2891 0 9.73682 0H1.73682Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M23.7368 15H15.7368V23H23.7368V15ZM15.7368 14C15.1845 14 14.7368 14.4477 14.7368 15V23C14.7368 23.5523 15.1845 24 15.7368 24H23.7368C24.2891 24 24.7368 23.5523 24.7368 23V15C24.7368 14.4477 24.2891 14 23.7368 14H15.7368Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M9.73682 15H1.73682V23H9.73682V15ZM1.73682 14C1.18453 14 0.736816 14.4477 0.736816 15V23C0.736816 23.5523 1.18453 24 1.73682 24H9.73682C10.2891 24 10.7368 23.5523 10.7368 23V15C10.7368 14.4477 10.2891 14 9.73682 14H1.73682Z"/></symbol> <symbol id="caretdown" viewBox="0 0 16 16"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 0.333332L3.36718 3.66667L6.66667 0.400342L0 0.333332Z"/></symbol> <symbol id="check" viewBox="0 0 24 24"><polygon fill-rule="evenodd" points="9.317 16.622 3.547 10.471 2.453 11.498 9.283 18.778 21.53 6.53 20.47 5.47"/></symbol> <symbol id="location" viewBox="0 0 10 12"><path d="M4.95666 6.00004C5.64822 6.00004 6.20884 5.43942 6.20884 4.74785C6.20884 4.05629 5.64822 3.49567 4.95666 3.49567C4.26509 3.49567 3.70447 4.05629 3.70447 4.74785C3.70447 5.43942 4.26509 6.00004 4.95666 6.00004Z" fill="#262626"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M4.95658 1.56523C3.10008 1.56523 1.56523 3.10939 1.56523 5.05144C1.56523 6.40352 2.43269 7.75624 3.44374 8.84771C3.9343 9.3773 4.42739 9.81182 4.7986 10.1141C4.85429 10.1595 4.90709 10.2017 4.95657 10.2408C5.00606 10.2017 5.05887 10.1595 5.11455 10.1141C5.48576 9.81182 5.97885 9.3773 6.46941 8.84771C7.48046 7.75624 8.34792 6.40352 8.34792 5.05144C8.34792 3.10939 6.81308 1.56523 4.95658 1.56523ZM4.95658 11.2175C4.5157 11.8641 4.51551 11.864 4.51531 11.8639L4.51356 11.8627L4.5099 11.8602L4.49811 11.852L4.45734 11.8234C4.42276 11.7989 4.37371 11.7637 4.31225 11.7183C4.1894 11.6275 4.0165 11.4958 3.81019 11.3278C3.39878 10.9928 2.84838 10.5083 2.29545 9.91139C1.21953 8.74987 0 7.01955 0 5.05144C0 2.27828 2.20265 0 4.95658 0C7.71051 0 9.91315 2.27828 9.91315 5.05144C9.91315 7.01955 8.69363 8.74987 7.6177 9.91139C7.06477 10.5083 6.51437 10.9928 6.10296 11.3278C5.89666 11.4958 5.72376 11.6275 5.60091 11.7183C5.53944 11.7637 5.49039 11.7989 5.45582 11.8234L5.41504 11.852L5.40325 11.8602L5.39959 11.8627L5.39833 11.8635C5.39813 11.8637 5.39745 11.8641 4.95658 11.2175ZM4.95658 11.2175L5.39745 11.8641C5.1315 12.0455 4.78126 12.0452 4.51531 11.8639L4.95658 11.2175Z" fill="#262626"/></symbol> <symbol id="cardLoader" viewBox="0 0 64 64"><rect width="64" height="4"/><rect y="48" width="32" height="4"/><rect y="56" width="32" height="4"/><rect y="8" width="64" height="36"/> <clipPath id="cardClip" clipPathUnits="objectBoundingBox" transform="scale(0.015625 0.015625)"><rect width="64" height="4"/><rect y="48" width="32" height="4"/><rect y="56" width="32" height="4"/><rect y="8" width="64" height="36"/></clipPath></symbol> <symbol id="cardLoaderOneRow" viewBox="0 0 64 30"><rect width="64" height="4"/><rect y="6" width="64" height="4"/><rect y="12" width="64" height="4"/><rect y="20" width="32" height="2"/><rect y="24" width="32" height="2"/> <clipPath id="cardClipRow" clipPathUnits="objectBoundingBox" transform="scale(0.015625 0.03333333333)"><rect width="64" height="4"/><rect y="6" width="64" height="4"/><rect y="12" width="64" height="4"/><rect y="20" width="32" height="2"/><rect y="24" width="32" height="2"/></clipPath></symbol> <symbol id="media-gallery-icon" viewBox="0 0 36 22"><g fill="none" fill-rule="evenodd"><path d="M0 29h36V-7H0z"/> <g fill="#000"><path d="M34 3H5c-1.104 0-2 .896-2 2v15c0 1.104.896 2 2 2h29c1.104 0 2-.896 2-2V5c0-1.104-.896-2-2-2m0 1c.551 0 1 .449 1 1v15c0 .551-.449 1-1 1H5c-.551 0-1-.449-1-1V5c0-.551.449-1 1-1h29"/> <path d="M.5 20c-.276 0-.5-.224-.5-.5v-17C0 1.122 1.122 0 2.5 0h31c.276 0 .5.224.5.5s-.224.5-.5.5h-31C1.673 1 1 1.673 1 2.5v17c0 .276-.224.5-.5.5"/> <path d="M32.5 19c-.128 0-.256-.049-.354-.146l-7.585-7.586c-.567-.567-1.555-.567-2.122 0l-4.171 4.171c-.975.975-2.561.975-3.536 0l-1.171-1.171c-.567-.567-1.555-.567-2.122 0l-4.585 4.586c-.196.195-.512.195-.708 0-.195-.196-.195-.512 0-.708l4.586-4.585c.945-.945 2.591-.945 3.536 0l1.171 1.171c.567.567 1.555.567 2.122 0l4.171-4.171c.945-.945 2.591-.945 3.536 0l7.586 7.585c.195.196.195.512 0 .708-.098.097-.226.146-.354.146M10 7c-1.104 0-2 .896-2 2s.896 2 2 2 2-.896 2-2-.896-2-2-2m0 1c.551 0 1 .449 1 1 0 .551-.449 1-1 1-.551 0-1-.449-1-1 0-.551.449-1 1-1"/></g></g></symbol> <symbol id="thumb" viewBox="0 0 15 18"><path d="M10.0725 6.6105C10.6785 4.14825 11.0115 0 8.42475 0C7.029 0 6.66225 1.251 6.3 2.49675C4.82175 7.58775 2.3145 8.00325 0 8.304V15.75C2.62725 15.75 4.188 16.2967 6.12675 17.1315C7.0695 17.5372 8.4165 18 10.1288 18C12.0323 18 13.35 17.2522 13.8855 15.2355C14.2605 13.8277 15 9.798 15 9.048C15 7.81125 14.124 7.2135 13.0545 7.16775C12.147 7.1295 10.902 6.96 10.0725 6.6105V6.6105ZM12.861 9.85125L11.8155 9.9765C11.8155 9.9765 11.3588 10.8082 11.9213 10.8127C11.9213 10.8127 12.072 10.8203 12.723 10.7925C13.5345 10.758 13.5113 11.8943 12.726 11.9648L11.4053 12.039C10.8548 12.1095 10.9133 12.9413 11.511 12.918C11.511 12.918 12.0255 12.9053 12.3683 12.8873C13.1693 12.8453 13.1303 13.959 12.3983 14.0505C12.0803 14.0902 11.0895 14.1368 11.0895 14.1368C10.4813 14.1908 10.56 15.063 11.1713 14.9925L11.7495 14.9692C12.366 14.9137 12.5018 15.588 11.5305 16.215C10.3553 16.8758 8.01675 16.3133 6.7185 15.7545C5.04 15.0308 3.39075 14.304 1.5 14.25V9.75C3.94725 9.18825 6.24675 8.0595 7.74075 2.91525C8.41425 0.59625 9 1.467 9 3.34575C9 4.899 8.6325 6.18525 8.30925 7.4955C9.105 7.90275 10.8375 8.547 12.8993 8.6625C13.6905 8.70675 13.668 9.75375 12.861 9.85125V9.85125Z"/></symbol> <symbol id="expand" viewBox="0 0 16 16"><path d="M4.79245 0H0.603774C0.269811 0 0 0.269811 0 0.603774V4.83019C0 4.99623 0.135849 5.13208 0.301887 5.13208H1.20755C1.37358 5.13208 1.50943 4.99623 1.50943 4.83019V1.50943H4.79245C4.95849 1.50943 5.09434 1.37358 5.09434 1.20755V0.301887C5.09434 0.135849 4.95849 0 4.79245 0ZM15.6981 10.8679H14.7925C14.6264 10.8679 14.4906 11.0038 14.4906 11.1698V14.4906H11.2075C11.0415 14.4906 10.9057 14.6264 10.9057 14.7925V15.6981C10.9057 15.8642 11.0415 16 11.2075 16H15.3962C15.7302 16 16 15.7302 16 15.3962V11.1698C16 11.0038 15.8642 10.8679 15.6981 10.8679ZM4.79245 14.4906H1.50943V11.1698C1.50943 11.0038 1.37358 10.8679 1.20755 10.8679H0.301887C0.135849 10.8679 0 11.0038 0 11.1698V15.3962C0 15.7302 0.269811 16 0.603774 16H4.79245C4.95849 16 5.09434 15.8642 5.09434 15.6981V14.7925C5.09434 14.6264 4.95849 14.4906 4.79245 14.4906ZM15.3962 0H11.2075C11.0415 0 10.9057 0.135849 10.9057 0.301887V1.20755C10.9057 1.37358 11.0415 1.50943 11.2075 1.50943H14.4906V4.83019C14.4906 4.99623 14.6264 5.13208 14.7925 5.13208H15.6981C15.8642 5.13208 16 4.99623 16 4.83019V0.603774C16 0.269811 15.7302 0 15.3962 0Z"/></symbol></svg> <svg class="c-globalSvgs c-siteSvgs" data-v-60affc28=""><symbol id="logo" viewBox="0 0 1042 682"><g><path d="M359.25 358V430V483.54V555.54V610V682H431.25H683.25V610H431.25V555.54H629.17V483.54H431.25V430H683.25V358H431.25H359.25Z"/> <path d="M916 358H844H718V430H844V682H916V430H1042V358H916Z"/> <path d="M324 252H11.87L324 143.91V72V67.72V0H0V72H311.64L0 179.91V252V256.11V324H324V252Z"/> <path d="M252.5 670.13L144.41 358H72.5H68.22H0.5V682H72.5V370.36L180.41 682H252.5H256.61H324.5V358H252.5V670.13Z"/> <path d="M682.75 162.2V161.83C682.75 72.6 610.16 -1.52588e-05 520.92 -1.52588e-05H358.75V324H520.96C610.17 324 682.75 251.42 682.75 162.2ZM430.75 72H520.92C544.736 72.0265 567.57 81.4991 584.41 98.3398C601.251 115.18 610.724 138.014 610.75 161.83V162.2C610.726 186.007 601.259 208.833 584.425 225.668C567.592 242.504 544.767 251.974 520.96 252H430.75V72Z"/></g></symbol> <symbol id="logo-horizontal" viewBox="0 0 1759 324" preserveAspectRatio="xMinYMid slice"><g><path d="M1076.25 0V72V125.54V197.54V252V324H1148.25H1400.25V252H1148.25V197.54H1346.17V125.54H1148.25V72H1400.25V0H1148.25H1076.25Z"/> <path d="M1633 0H1561H1435V72H1561V324H1633V72H1759V0H1633Z"/> <path d="M0 72H311.64L0 179.91V252V256.11V324H324V252H11.87L324 143.91V72V67.72V0H0V72Z"/> <path d="M969.5 312.13L861.41 0H789.5H785.22H717.5V324H789.5V12.36L897.41 324H969.5H973.61H1041.5V0H969.5V312.13Z"/> <path d="M520.92 0H358.75V324H520.96C610.17 324 682.75 251.42 682.75 162.2V161.83C682.75 72.6 610.17 0 520.92 0ZM610.75 162.2C610.726 186.007 601.259 208.833 584.425 225.668C567.592 242.504 544.767 251.974 520.96 252H430.75V72H520.92C544.736 72.0265 567.57 81.4992 584.41 98.3398C601.251 115.181 610.724 138.014 610.75 161.83V162.2Z"/></g></symbol> <symbol id="logo-innovation-index" viewBox="0 0 306 53"><path fill-rule="evenodd" clip-rule="evenodd" d="M201.884 8.45246L210.24 0H214.484L222.771 8.45246V21.6142H218.959V15.5465H205.696V21.6142H201.884V8.45246ZM205.696 12.1675H218.959V9.71375L212.33 3.18119L205.696 9.6816V12.1675Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M174.708 16.4443L169.373 21.7799H155.217L149.881 16.4443V5.57046L155.217 0.230182H169.373L174.708 5.57046V16.4443ZM156.906 3.81195L153.859 6.89626L153.877 15.0817L156.957 18.166H167.665L170.717 15.1507V6.92863L167.6 3.81195H156.906Z"/> <path d="M101.754 0.395977L116.703 16.5087V0.395977H120.418V20.5876L117.435 23.138L101.391 5.99862V21.6142H97.6756V0.395977H101.754Z"/> <path d="M90.1855 0.40058H94.0295V21.6142H90.1855V0.40058Z"/> <path d="M127.774 5.99862L143.818 23.138L146.801 20.5876V0.395977H143.086V16.5087L128.138 0.395977H124.059V21.6142H127.774V5.99862Z"/> <path d="M194.698 11.2698L188.266 18.1338L181.835 11.2053V0.395977H177.986V12.5634L188.266 23.1702L198.542 12.5634V0.395977H194.698V11.2698Z"/> <path d="M224.99 0.395977L221.841 3.54948L224.626 6.33008L226.978 3.97762H232.415V21.6142H236.259V3.97762H241.696L244.049 6.33008L246.866 3.54948L243.717 0.395977H224.99Z"/> <path d="M248.422 0.40058H252.266V21.6142H248.422V0.40058Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M260.686 0.230182L255.351 5.57046V16.4443L260.686 21.7799H274.866L280.201 16.4443V5.57046L274.866 0.230182H260.686ZM276.168 15.1507L273.116 18.166H262.436L259.351 15.0817V6.89626L262.399 3.81195H273.075L276.191 6.92863L276.168 15.1507Z"/> <path d="M302.289 16.5087V0.395977H306V20.5876L303.017 23.138L286.973 5.99862V21.6142H283.258V0.395977H287.337L302.289 16.5087Z"/> <path d="M94.0295 29.4036H90.1855V50.6172H94.0295V29.4036Z"/> <path d="M101.754 29.4036L116.703 45.5117V29.4036H120.418V49.5906L117.435 52.141L101.391 35.0016V50.6172H97.6756V29.4036H101.754Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M124.059 29.3991V50.6172H142.28L147.487 45.4105V34.6056L142.28 29.3991H124.059ZM143.353 44.0847L140.434 47.0355H127.903V32.9806H140.402L143.353 35.9638V44.0847Z"/> <path d="M154.356 47.1368H165.823L167.946 45.0468L170.597 47.6985L167.683 50.6172H150.576V29.4036H167.582L170.464 32.3177L167.78 35.0016L165.626 32.8839H154.356V38.1183H166.422V41.8334H154.356V47.1368Z"/> <path d="M191.051 32.6169L185.615 38.1873H182.728L177.125 32.5479V29.4036H173.281V33.9105L179.648 39.9736L173.281 46.0734V50.6172H177.125V47.367L182.627 41.7321H185.513L191.051 47.4361V50.6172H194.928V46.0734L188.598 39.9413L194.928 33.9105V29.4036H191.051V32.6169Z"/> <path d="M26.4986 26.7749H50.3962V32.0875H31.8066V36.0374H46.4048V41.3454H31.8066V45.3644H50.3962V50.6724H26.4986V26.7749Z"/> <path d="M52.9604 26.7749V32.0875H62.2505V50.6724H67.5632V32.0875H76.8579V26.7749H52.9604Z"/> <path d="M0.874693 18.9579H23.8975V24.2705H0V13.6407L22.986 5.68097H0V0.368355H23.8975V10.9844L0.874693 18.9579Z"/> <path d="M18.6218 49.7977L10.6528 26.7749H0.0368292V50.6724H5.34944V27.6864L13.3092 50.6724H23.9344V26.7749H18.6218V49.7977Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M50.3594 12.3055V12.3332C50.3496 15.4957 49.0887 18.526 46.852 20.7618C44.6153 22.9977 41.5846 24.2573 38.422 24.2658H26.4525V0.368427H38.422C41.5854 0.376932 44.6167 1.63716 46.8536 3.87399C49.0904 6.11082 50.3509 9.1422 50.3594 12.3055ZM38.4451 5.68106H31.7928V18.9579H38.4497C40.2055 18.9555 41.8886 18.2566 43.1297 17.0146C44.3708 15.7727 45.0686 14.089 45.0698 12.3332V12.3055C45.0673 10.5493 44.3685 8.86573 43.1267 7.6239C41.8849 6.38206 40.2013 5.68349 38.4451 5.68106Z"/></symbol> <symbol id="logo-boxed" viewBox="0 0 1274 1274"><g><path d="M0 0V1274H1274V0H0ZM116 724.57V648.37L427.64 540.46H116V468.46H440V612.37L127.86 720.46H440V792.46H116V724.57ZM440.5 1150.46H296.41L188.5 838.82V1150.46H116.5V826.46H260.41L368.5 1138.59V826.46H440.5V1150.46ZM474.75 468.46H636.92C726.15 468.46 798.75 541.06 798.75 630.29V630.66C798.75 719.88 726.17 792.46 636.95 792.46H474.75V468.46ZM799.25 898.46H547.25V952H745.16V1024H547.25V1078.46H799.25V1150.46H475.25V826.46H799.25V898.46ZM1158 898.46H1032V1150.46H960V898.46H834V826.46H1158V898.46Z"/> <path d="M726.75 630.66V630.29C726.724 606.474 717.251 583.64 700.41 566.8C683.57 549.959 660.736 540.486 636.92 540.46H546.75V720.46H636.95C660.758 720.433 683.584 710.964 700.419 694.129C717.254 677.294 726.724 654.468 726.75 630.66Z"/></g></symbol> <symbol id="logo-deep-dive-blank" viewBox="0 0 171 86"><path fill-rule="evenodd" clip-rule="evenodd" d="M170 1H86V85H170V1ZM85 0V86H171V0H85Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M85 1H1V85H85V1ZM0 0V86H86V0H0Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M24.4699 39.9765H36.827V42.827H24V40.1393V39.9765V37.1225L36.3377 32.8504H24V30H36.827V32.681V32.8504V35.6973L24.4699 39.9765ZM38.2225 44.173V47.0235V49.1431V51.9935V54.1496V57H41.0729H51.0495V54.1496H41.0729V51.9935H48.9085V49.1431H41.0729V47.0235H51.0495V44.173H41.0729H38.2225ZM60.2639 44.173H57.4135H52.4252V47.0235H57.4135V57H60.2639V47.0235H65.2522V44.173H60.2639ZM33.9963 56.5301L29.7171 44.173H26.8702H26.7008H24.0198V57H26.8702V44.6623L31.1423 57H33.9963H34.159H36.8468V44.173H33.9963V56.5301ZM51.0297 36.4068V36.4214C51.0297 39.9536 48.1563 42.827 44.6245 42.827H38.2027V30H44.6229C48.1559 30 51.0297 32.8742 51.0297 36.4068ZM44.6229 32.8504H41.0532V39.9765H44.6245C45.567 39.9755 46.4707 39.6006 47.1371 38.9341C47.8035 38.2676 48.1783 37.3639 48.1793 36.4214V36.4068C48.1782 35.4639 47.8032 34.5599 47.1365 33.8932C46.4698 33.2265 45.5658 32.8515 44.6229 32.8504Z"/></symbol> <symbol id="logo-deep-dive-in-depth" viewBox="0 0 171 86"><path fill-rule="evenodd" clip-rule="evenodd" d="M171 1H87V85H171V1ZM86 0V86H172V0H86Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M86 0H0V86H86V0ZM37.827 39.9765H25.4699L37.827 35.6973V32.8504V32.681V30H25V32.8504H37.3377L25 37.1225V39.9765V40.1393V42.827H37.827V39.9765ZM39.2225 47.0235V44.173H42.0729H52.0495V47.0235H42.0729V49.1431H49.9085V51.9935H42.0729V54.1496H52.0495V57H42.0729H39.2225V54.1496V51.9935V49.1431V47.0235ZM58.4135 44.173H61.2639H66.2522V47.0235H61.2639V57H58.4135V47.0235H53.4252V44.173H58.4135ZM30.7171 44.173L34.9963 56.5301V44.173H37.8468V57H35.159H34.9963H32.1423L27.8702 44.6623V57H25.0198V44.173H27.7008H27.8702H30.7171ZM52.0297 36.4214V36.4068C52.0297 32.8742 49.1559 30 45.6229 30H39.2027V42.827H45.6245C49.1563 42.827 52.0297 39.9536 52.0297 36.4214ZM42.0532 32.8504H45.6229C46.5658 32.8515 47.4698 33.2265 48.1365 33.8932C48.8032 34.5599 49.1782 35.4639 49.1793 36.4068V36.4214C49.1783 37.3639 48.8035 38.2676 48.1371 38.9341C47.4706 39.6006 46.567 39.9755 45.6245 39.9765H42.0532V32.8504Z"/> <g clip-path="url(#clip0_10038_12573)"><path d="M97 46.2456H106.177L108.73 48.7989V54.4373L106.177 57.0046H97V46.2456ZM98.3443 55.7559H105.537L107.301 53.9916V49.2866L105.537 47.4872H98.3419L98.3443 55.7559Z"/> <path d="M121.11 46.2456L122.555 47.6739L121.622 48.6308L120.455 47.4639H114.067V50.9366H120.856V52.2622H114.067V55.7629H120.513L121.68 54.6217L122.613 55.5553L121.169 56.9999H112.734V46.2456H121.11Z"/> <path d="M125.852 57.0046V46.2456H133.616L135.581 48.178V51.2353L133.616 53.2027H127.196V57.0046H125.852ZM127.196 51.9798H133.012L134.179 50.8129V48.6961L133.012 47.5012H127.196V51.9798Z"/> <path d="M142.539 57.0048V47.4921H139.244L138.018 48.7197L137.043 47.7628L138.539 46.2505H147.874L149.368 47.7628L148.395 48.7197L147.183 47.4921H143.874V57.0048H142.539Z"/> <path d="M160.375 57.0046V52.2319H152.51V57.0046H151.166V46.2456H152.51V50.9506H160.375V46.2456H161.72V57.0046H160.375Z"/> <path d="M98.3423 30V40.7543H96.998V30H98.3423Z"/> <path d="M114.039 30.0002V40.4697L112.93 41.4266L104.108 31.8579V40.7474H102.797V29.9932H104.293L112.73 39.1674V29.9932L114.039 30.0002Z"/></g> <defs><clipPath id="clip0_10038_12573"><rect width="64.7192" height="27" fill="white" transform="translate(97 30)"/></clipPath></defs></symbol> <symbol id="logo-in-depth" viewBox="0 0 306 44" fill="none"><path d="M0 0H306V44H0V0Z" fill="#20222A"/> <path d="M110.5 35.2074V8.15776L107.112 8.13965V31.8489L85.3197 8.13965H81.4545V35.9311H84.8375V12.9635L107.636 37.6857L110.5 35.2074Z" fill="#D0FF4B"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M130.815 8.15776H154.524L161.12 14.7604V29.3464L154.524 35.9492H130.815V8.15776ZM134.288 32.7352H152.872L157.43 28.1767V16.0206L152.872 11.3717H134.288V32.7352Z" fill="#D0FF4B"/> <path d="M193.109 8.15776L196.841 11.8479L194.429 14.3262L191.414 11.3113H174.911V20.2536H192.451V23.6845H174.911V32.7594H191.583L194.598 29.8047L197.01 32.2166L193.277 35.9551H171.443V8.16379L193.109 8.15776Z" fill="#D0FF4B"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M205.355 8.15776V35.9492H208.828V26.1326H225.416L230.493 21.0554V13.1505L225.416 8.15776H205.355ZM223.855 22.967H208.828V11.3957H223.855L226.869 14.477V19.9521L223.855 22.967Z" fill="#D0FF4B"/> <path d="M248.474 35.9492V11.3717H239.96L236.794 14.5434L234.274 12.0651L238.139 8.15776H262.258L266.123 12.0651L263.609 14.5434L260.48 11.3717H251.929V35.9492H248.474Z" fill="#D0FF4B"/> <path d="M294.554 23.6181V35.9492H298.027V8.15776H294.554V20.3198H274.234V8.15776H270.76V35.9492H274.234V23.6181H294.554Z" fill="#D0FF4B"/> <path d="M69.9499 8.15777V35.9492H66.4766V8.15777H69.9499Z" fill="#D0FF4B"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M35.8663 14.7352L35.8663 14.7503C35.8682 18.3947 32.9051 21.3609 29.2612 21.3628L22.6354 21.3663L22.6284 8.13193L29.2526 8.12844C32.8977 8.12652 35.8644 11.0904 35.8663 14.7352ZM29.2541 11.0694L25.571 11.0714L25.5748 18.4238L29.2596 18.4219C30.2321 18.4203 31.1642 18.033 31.8514 17.3449C32.5387 16.6569 32.9249 15.7243 32.9253 14.7519L32.9253 14.7368C32.9237 13.7639 32.5363 12.8315 31.8481 12.144C31.1598 11.4564 30.2269 11.07 29.2541 11.0694Z" fill="#D0FF4B"/> <path d="M8.46488 18.4328L21.2144 18.4261L21.216 21.3671L7.98158 21.374L7.97848 15.4884L20.7057 11.0739L7.97616 11.0806L7.97461 8.13965L21.209 8.13268L21.2121 14.011L8.46488 18.4328Z" fill="#D0FF4B"/> <path d="M22.6566 22.7551L22.6635 35.9895L35.8979 35.9825L35.8964 33.0416L25.603 33.047L25.6018 30.8225L33.6862 30.8182L33.6847 27.8772L25.6002 27.8815L25.5991 25.6945L35.8925 25.6891L35.8909 22.7481L22.6566 22.7551Z" fill="#D0FF4B"/> <path d="M37.3104 22.7474L37.3119 25.6884L42.4586 25.6857L42.4641 35.9791L45.405 35.9775L45.3996 25.6841L50.5463 25.6814L50.5448 22.7404L37.3104 22.7474Z" fill="#D0FF4B"/> <path d="M18.3029 35.5069L13.881 22.7597L8.00273 22.7628L8.0097 35.9972L10.9507 35.9957L10.944 23.2661L15.3585 35.9933L21.2441 35.9902L21.2371 22.7559L18.2962 22.7574L18.3029 35.5069Z" fill="#D0FF4B"/></symbol> <symbol id="logo-longform" width="86" height="86" viewBox="0 0 86 86" fill="none"><g clip-path="url(#clip0_9590_9948)"><rect width="86" height="86" fill="white"/> <rect width="86" height="86" fill="#080A12"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M22.5221 39.0847H36.2518V42.2518H22V39.2655V39.0847V35.9137L35.7081 31.1671H22V28H36.2518V30.9788V31.1671V34.3302L22.5221 39.0847ZM62.2927 43.7461H59.1256H53.5833V46.9131H59.1256V57.9978H62.2927V46.9131H67.835V43.7461H62.2927ZM37.8025 43.7482V46.9153V49.2703V52.4374V54.8329V58H40.9695H52.0543V54.8329H40.9695V52.4374H49.6754V49.2703H40.9695V46.9153H52.0543V43.7482H40.9695H37.8025ZM33.1064 57.4757L28.3519 43.7461H25.1888H25.0005H22.0217V57.9978H25.1888V44.2897L29.9354 57.9978H33.1064H33.2872H36.2735V43.7461H33.1064V57.4757ZM52.0325 35.1184V35.1347C52.0325 39.0592 48.84 42.2518 44.9159 42.2518H37.7808V28H44.9141C48.8395 28 52.0325 31.1935 52.0325 35.1184ZM44.9141 31.1671H40.9478V39.0847H44.9159C45.9631 39.0835 46.9671 38.667 47.7076 37.9265C48.448 37.1859 48.8644 36.1819 48.8655 35.1347V35.1184C48.8643 34.0708 48.4477 33.0664 47.7069 32.3257C46.9661 31.5849 45.9617 31.1682 44.9141 31.1671Z" fill="white"/></g> <defs><clipPath id="clip0_9590_9948"><rect width="86" height="86" fill="white"/></clipPath></defs></symbol> <symbol id="logo-deep-dive-special-feature" viewBox="0 0 700 351"><path fill-rule="evenodd" clip-rule="evenodd" d="M0 350.499V0H700V350.499H0ZM103.657 162.927H153.947V174.544H101.744V151.296L151.956 133.884H101.744V122.267H153.947V145.487L103.657 162.927ZM211.829 180.03H159.626V232.308H211.829V220.691H171.227V211.903H203.116V200.286H171.227V191.648H211.829V180.03ZM269.631 191.648V180.03H217.428V191.648H237.729V232.308H249.33V191.648H269.631ZM142.427 230.392L125.011 180.03H101.825V232.308H113.425V182.025L130.812 232.308H154.028V180.03H142.427V230.392ZM211.749 148.378V148.438C211.749 162.834 200.055 174.545 185.681 174.545H159.546V122.267H185.675C200.053 122.267 211.749 133.981 211.749 148.378ZM354.07 4.07557H695.93V346.424H354.07V4.07557ZM185.675 133.884H171.147V162.927H185.681C189.517 162.923 193.195 161.395 195.907 158.679C198.619 155.962 200.144 152.279 200.148 148.438V148.378C200.144 144.536 198.618 140.852 195.904 138.134C193.191 135.417 189.512 133.889 185.675 133.884ZM493.578 216.692H560.477V206.406H509.069L562.556 153.046L543.558 133H505.942L492.53 146.539L499.814 153.823L510.75 142.888H537.177L548.113 154.077L493.578 208.232V216.692ZM480.438 147.19L466.646 133.398H400V216.71H467.152L481.215 202.52V187.156L468.851 174.918L480.438 163.205V147.19ZM470.026 151.492V159.952V159.97L459.741 170.381H410.665V142.779H461.314L470.026 151.492ZM471.075 198.345L461.964 207.329L461.946 207.311H410.665V179.727H459.759L471.075 190.789V198.345ZM640.122 133.398L653.914 147.19V163.205L642.328 174.918L654.691 187.156V202.52L640.628 216.71H573.458V133.398H640.104H640.122ZM643.503 159.952V151.492L634.772 142.779H584.141V170.381H633.217L643.503 159.97V159.952ZM635.441 207.329L644.551 198.345V190.789L633.235 179.727H584.159V207.311H635.441V207.329Z"/></symbol> <symbol id="globe" viewBox="0 0 24 24"><path fill-rule="evenodd" clip-rule="evenodd" d="M10.1166 22.4959C10.2925 22.6549 10.4742 22.7975 10.6597 22.9192C5.21675 22.258 1 17.6214 1 12C1 12.2761 1.22386 12.5 1.5 12.5H6.63043C6.70062 15.7182 7.44359 18.3424 8.42097 20.2014C8.93405 21.1773 9.51853 21.9552 10.1166 22.4959ZM6.63043 11.5H1.5C1.22386 11.5 1 11.7239 1 12C1 6.37856 5.21675 1.742 10.6597 1.08083C10.4742 1.20254 10.2925 1.34509 10.1166 1.50411C9.51853 2.04484 8.93405 2.82266 8.42097 3.79858C7.44359 5.65764 6.70062 8.28181 6.63043 11.5ZM7.63068 11.5C7.7007 8.43016 8.41024 5.96793 9.3061 4.26392C9.77879 3.36484 10.2966 2.68953 10.7873 2.24589C11.2882 1.79305 11.7105 1.625 12 1.625C12.2895 1.625 12.7118 1.79305 13.2127 2.24589C13.7034 2.68953 14.2212 3.36484 14.6939 4.26392C15.5898 5.96793 16.2993 8.43016 16.3693 11.5H12H7.63068ZM7.63068 12.5H12H16.3693C16.2993 15.5698 15.5898 18.0321 14.6939 19.7361C14.2212 20.6352 13.7034 21.3105 13.2127 21.7541C12.7118 22.207 12.2895 22.375 12 22.375C11.7105 22.375 11.2882 22.207 10.7873 21.7541C10.2966 21.3105 9.77879 20.6352 9.3061 19.7361C8.41024 18.0321 7.7007 15.5698 7.63068 12.5ZM17.3696 12.5C17.2994 15.7182 16.5564 18.3424 15.579 20.2014C15.0659 21.1773 14.4815 21.9552 13.8834 22.4959C13.7075 22.6549 13.5258 22.7975 13.3403 22.9192C18.7832 22.258 23 17.6214 23 12C23 6.37856 18.7832 1.742 13.3403 1.08083C13.5258 1.20254 13.7075 1.34509 13.8834 1.50411C14.4815 2.04484 15.0659 2.82266 15.579 3.79858C16.5564 5.65764 17.2994 8.28181 17.3696 11.5H22.5C22.7761 11.5 23 11.7239 23 12C23 12.2761 22.7761 12.5 22.5 12.5H17.3696ZM24 12C24 18.6274 18.6274 24 12 24C5.37258 24 0 18.6274 0 12C0 5.37258 5.37258 0 12 0C18.6274 0 24 5.37258 24 12Z"/></symbol> <symbol id="user" viewBox="0 0 18 19"><path fill-rule="evenodd" clip-rule="evenodd" d="M9 2.5a3.5 3.5 0 1 0 0 7 3.5 3.5 0 0 0 0-7zM4.5 6a4.5 4.5 0 1 1 9 0 4.5 4.5 0 0 1-9 0zM3.395 12.793C4.723 12.023 6.535 11.5 9 11.5c2.465 0 4.277.522 5.605 1.293a6.902 6.902 0 0 1 2.646 2.692c.418.767.28 1.555-.189 2.127-.453.553-1.196.888-2 .888H2.938c-.805 0-1.548-.335-2.001-.888-.469-.572-.606-1.36-.19-2.127l.44.239-.44-.239a6.902 6.902 0 0 1 2.647-2.692zm.501.865c-1.149.666-1.845 1.525-2.269 2.305-.21.386-.144.737.084 1.015.243.296.69.522 1.228.522H15.06c.54 0 .985-.226 1.228-.522.228-.278.294-.629.084-1.015-.424-.78-1.12-1.639-2.27-2.305C12.954 12.99 11.322 12.5 9 12.5c-2.32 0-3.953.49-5.104 1.158z"/></symbol> <symbol id="user-filled" viewBox="0 0 18 19"><path d="M9 10a4 4 0 1 0 0-8 4 4 0 0 0 0 8zM2.939 18H15.06c1.344 0 2.378-1.122 1.751-2.276C15.89 14.026 13.785 12 9 12c-4.786 0-6.89 2.026-7.812 3.724C.56 16.878 1.595 18 2.938 18z" stroke-linecap="round" stroke-linejoin="round"/></symbol> <symbol id="arrow-dropdown" width="13" height="7" viewBox="0 0 13 7"><path fill-rule="evenodd" clip-rule="evenodd" d="M12.854.146a.5.5 0 0 1 0 .708l-6 6a.5.5 0 0 1-.708 0l-6-6A.5.5 0 0 1 .854.146L6.5 5.793 12.146.146a.5.5 0 0 1 .708 0z"/></symbol> <symbol id="arrow-thin" viewBox="0 0 14 13"><path fill-rule="evenodd" clip-rule="evenodd" d="M6.64645 0.146447C6.84171 -0.0488155 7.15829 -0.0488155 7.35355 0.146447L13.3536 6.14645C13.5488 6.34171 13.5488 6.65829 13.3536 6.85355L7.35355 12.8536C7.15829 13.0488 6.84171 13.0488 6.64645 12.8536C6.45118 12.6583 6.45118 12.3417 6.64645 12.1464L12.2929 6.5L6.64645 0.853553C6.45118 0.658291 6.45118 0.341709 6.64645 0.146447Z"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M0.5 6.5C0.5 6.22386 0.723858 6 1 6H13C13.2761 6 13.5 6.22386 13.5 6.5C13.5 6.77614 13.2761 7 13 7H1C0.723858 7 0.5 6.77614 0.5 6.5Z"/></symbol> <symbol id="about-values-icon-1" width="60" height="45"><g fill="#080A12"><path d="M.885706 13.0888C6.2542 8.60369 17.1732 1.08003 30.0096 1.08003c12.8363 0 23.7456 7.52366 29.1238 12.00877.1103.086.2498.1258.389.1109.1391-.0149.267-.0834.3565-.1909.0896-.1075.1338-.2457.1233-.3852-.0105-.1395-.0749-.2695-.1795-.3625C54.3426 7.68142 43.1833 0 30.0168 0 16.8504 0 5.69114 7.68142.210996 12.2611a.541129.541129 0 0 0-.132015.1639.539712.539712 0 0 0-.059252.2019c-.00631.0706.001292.1416.022457.2092.021164.0676.05543.1304.100848.1847.045417.0543.101137.0992.163892.132.062756.0329.131334.053.201874.0593.07054.0063.141636-.0013.209221-.0225.067585-.0212.130349-.0554.184691-.1008H.885706Z"/><path d="M59.8566 20.0421c-.1311-.1384-12.7126-13.42616-28.323-14.27075a14.727413 14.727413 0 0 0-3.0677 0C12.8556 6.61594.274003 19.9037.145373 20.0421a.536122.536122 0 0 0-.142443.364c0 .1349.050847.2649.142443.364.12863.1384 12.710227 13.4237 28.320527 14.2683 1.0198.1068 2.0479.1068 3.0677 0 15.6104-.8446 28.1919-14.1299 28.323-14.2683.0905-.0996.1407-.2294.1407-.364s-.0502-.2644-.1407-.364Zm-58.56327.3664C3.10387 18.5956 11.5741 10.5962 22.4955 7.77118c-2.1968 1.29764-4.0173 3.14562-5.282 5.36152-1.2647 2.2159-1.9298 4.7232-1.9298 7.2746s.6651 5.0588 1.9298 7.2747c1.2647 2.2159 3.0852 4.0638 5.282 5.3614C11.5765 30.216 3.10387 22.2215 1.29333 20.4085ZM29.9998 6.76884c2.6976 0 5.3347.79996 7.5778 2.2987 2.243 1.49876 3.9912 3.62896 5.0236 6.12126 1.0323 2.4924 1.3024 5.2348.7761 7.8807-.5262 2.6458-1.8253 5.0762-3.7328 6.9837-1.9076 1.9076-4.3379 3.2066-6.9838 3.7329-2.6458.5263-5.3883.2562-7.8806-.7762-2.4924-1.0323-4.6226-2.7806-6.1213-5.0236-1.4987-2.243-2.2987-4.8801-2.2987-7.5778.0064-3.6146 1.4458-7.0792 4.0026-9.6342 2.5568-2.55496 6.0225-3.9919 9.6371-3.99574v-.00972Zm7.5091 26.27696c2.1967-1.2979 4.0172-3.1461 5.2818-5.3622 1.2646-2.2161 1.9297-4.7235 1.9297-7.2751 0-2.5515-.6651-5.059-1.9297-7.2751s-3.0851-4.06426-5.2818-5.36222C48.4303 10.5986 56.8981 18.5956 58.7086 20.4085c-1.813 1.8154-10.2855 9.8099-21.1997 12.6373Z"/><path d="M20.4595 24.4956c.05.05.1094.0898.1748.1168.0653.0271.1354.041.2062.041.0707 0 .1408-.0139.2062-.041.0654-.027.1248-.0668.1748-.1168l5.0069-5.0044 5.053 5.0481c.0498.05.109.0896.1742.1167.0651.027.135.0409.2056.0409.0705 0 .1405-.0139.2056-.0409.0652-.0271.1244-.0667.1742-.1167l6.582-6.5796v2.2426c0 .1429.0568.2799.1578.3809.1011.1011.2381.1579.381.1579s.2799-.0568.381-.1579c.101-.101.1578-.238.1578-.3809v-3.5435c.0003-.0708-.0134-.141-.0404-.2065-.0269-.0655-.0666-.125-.1167-.1751a.53712.53712 0 0 0-.1751-.1168.534446.534446 0 0 0-.2066-.0403h-3.5434c-.1429 0-.2799.0567-.381.1578-.101.101-.1578.238-.1578.3809 0 .1429.0568.28.1578.381.1011.1011.2381.1579.381.1579h2.2426l-6.201 6.1985-5.0506-5.0506c-.1014-.1005-.2383-.1569-.381-.1569s-.2797.0564-.381.1569l-5.3879 5.3904c-.0503.0496-.0902.1087-.1175.1739-.0272.0652-.0412.1352-.0412.2059 0 .0707.014.1406.0412.2058.0273.0652.0672.1243.1175.174ZM20.3548 38.5551h-1.2135c-.1429 0-.2799.0568-.3809.1578-.1011.1011-.1579.2381-.1579.381s.0568.28.1579.381c.101.101.238.1578.3809.1578h1.2135c.1429 0 .28-.0568.381-.1578.1011-.101.1578-.2381.1578-.381s-.0567-.2799-.1578-.381c-.101-.101-.2381-.1578-.381-.1578ZM25.4808 38.5551h-1.2135c-.1429 0-.28.0568-.381.1578-.101.1011-.1578.2381-.1578.381s.0568.28.1578.381c.101.101.2381.1578.381.1578h1.2135c.1429 0 .2799-.0568.381-.1578.101-.101.1578-.2381.1578-.381s-.0568-.2799-.1578-.381c-.1011-.101-.2381-.1578-.381-.1578ZM30.6068 38.5551h-1.2135c-.1429 0-.2799.0568-.381.1578-.101.1011-.1578.2381-.1578.381s.0568.28.1578.381c.1011.101.2381.1578.381.1578h1.2135c.1429 0 .2799-.0568.381-.1578.101-.101.1578-.2381.1578-.381s-.0568-.2799-.1578-.381c-.1011-.101-.2381-.1578-.381-.1578ZM35.7249 38.5551h-1.2135c-.1429 0-.2799.0568-.381.1578a.539.539 0 0 0-.1577.381c0 .1429.0567.28.1577.381.1011.101.2381.1578.381.1578h1.2135c.1429 0 .28-.0568.381-.1578.1011-.101.1578-.2381.1578-.381s-.0567-.2799-.1578-.381c-.101-.101-.2381-.1578-.381-.1578ZM40.8558 38.5551h-1.2135c-.1429 0-.2799.0568-.3809.1578-.1011.1011-.1579.2381-.1579.381s.0568.28.1579.381c.101.101.238.1578.3809.1578h1.2135c.1429 0 .2799-.0568.381-.1578.101-.101.1578-.2381.1578-.381s-.0568-.2799-.1578-.381c-.1011-.101-.2381-.1578-.381-.1578ZM20.3552 43.0596h-1.2135c-.137.0092-.2653.0701-.3591.1703-.0938.1003-.1459.2325-.1459.3697 0 .1373.0521.2694.1459.3697s.2221.1611.3591.1703h1.2135c.0739.005.1481-.0053.218-.0302.0698-.0249.1338-.0638.1879-.1145.0541-.0506.0973-.1118.1268-.1798.0295-.068.0447-.1414.0447-.2155s-.0152-.1474-.0447-.2154-.0727-.1293-.1268-.1799a.541536.541536 0 0 0-.1879-.1145c-.0699-.0248-.1441-.0351-.218-.0302ZM25.4812 43.0596h-1.2135c-.137.0092-.2653.0701-.3591.1703-.0937.1003-.1459.2324-.1459.3697 0 .1373.0522.2694.1459.3697.0938.1003.2221.1611.3591.1703h1.2135c.137-.0092.2653-.07.3591-.1703.0937-.1003.1459-.2324.1459-.3697 0-.1373-.0522-.2694-.1459-.3697-.0938-.1002-.2221-.1611-.3591-.1703ZM30.6063 43.0596h-1.2135c-.0739-.0049-.1481.0054-.2179.0302a.541536.541536 0 0 0-.1879.1145c-.0542.0506-.0973.1119-.1268.1799s-.0448.1413-.0448.2154.0153.1475.0448.2155.0726.1292.1268.1798c.0541.0507.1181.0896.1879.1145.0698.0249.144.0352.2179.0302h1.2135c.137-.0092.2654-.07.3591-.1703.0938-.1003.146-.2324.146-.3697 0-.1372-.0522-.2694-.146-.3697-.0937-.1002-.2221-.1611-.3591-.1703ZM35.7255 43.0596H34.512a.543885.543885 0 0 0-.218.0302.541536.541536 0 0 0-.1879.1145c-.0541.0506-.0973.1119-.1268.1799a.541159.541159 0 0 0-.0447.2154c0 .0741.0152.1475.0447.2155s.0727.1292.1268.1798c.0541.0507.1181.0896.1879.1145.0698.0249.144.0352.218.0302h1.2135c.0739.005.1482-.0053.218-.0302.0698-.0249.1337-.0638.1879-.1145.0541-.0506.0973-.1118.1268-.1798.0295-.068.0447-.1414.0447-.2155s-.0152-.1474-.0447-.2154-.0727-.1293-.1268-.1799c-.0542-.0506-.1181-.0896-.1879-.1145-.0698-.0248-.1441-.0351-.218-.0302ZM40.8563 43.0596h-1.2135c-.0739-.0049-.1481.0054-.2179.0302a.541536.541536 0 0 0-.1879.1145c-.0542.0506-.0973.1119-.1268.1799s-.0448.1413-.0448.2154.0153.1475.0448.2155.0726.1292.1268.1798c.0541.0507.1181.0896.1879.1145.0698.0249.144.0352.2179.0302h1.2135c.074.005.1482-.0053.218-.0302.0699-.0249.1338-.0638.188-.1145.0541-.0506.0973-.1118.1268-.1798.0295-.068.0447-.1414.0447-.2155s-.0152-.1474-.0447-.2154-.0727-.1293-.1268-.1799c-.0542-.0506-.1181-.0896-.188-.1145a.543885.543885 0 0 0-.218-.0302Z"/></g></symbol> <symbol id="about-values-icon-2" width="60" height="61"><g fill="#080A12"><path d="M35.8549 11.172c-.0024-1.1544-.3467-2.28207-.9895-3.24084-.6428-.95877-1.5553-1.70562-2.6222-2.14624-1.0669-.44062-2.2404-.55527-3.3724-.32949-1.132.22579-2.1718.7819-2.988 1.59812-.8162.81622-1.3723 1.85597-1.5981 2.98795-.2258 1.132-.1112 2.3056.3295 3.3725.4406 1.0669 1.1875 1.9793 2.1462 2.6221.9588.6428 2.0865.9872 3.2409.9896 1.5519-.0019 3.0396-.6193 4.137-1.7167 1.0974-1.0973 1.7147-2.5851 1.7166-4.137Zm-10.6267 0c-.0005-.9442.279-1.86722.8032-2.65246.5242-.78524 1.2695-1.39739 2.1416-1.75902.8721-.36163 1.8319-.4565 2.7579-.27261.9261.1839 1.7768.63829 2.4445 1.30571.6678.66743 1.1226 1.5179 1.307 2.44388.1843.9259.09 1.8857-.2712 2.758-.3612.8723-.973 1.6179-1.7579 2.1425-.785.5246-1.7079.8046-2.652.8046-1.2647-.002-2.477-.5052-3.3713-1.3995-.8942-.8942-1.3974-2.1065-1.3994-3.3711h-.0024ZM27.3527 54.6866c.2928-.4357.6886-.7924 1.1523-1.0384.4637-.246.981-.3737 1.5059-.3718.525.002 1.0413.1335 1.5032.3829.4619.2494.8551.6089 1.1447 1.0468.8459-.0013 1.6568-.3379 2.2549-.936.5981-.5982.9347-1.4091.936-2.255V36.4415c1.0384-.1126 1.9989-.6041 2.6977-1.3806.6987-.7764 1.0867-1.7832 1.0896-2.8277v-7.6233c-.002-1.4667-.5855-2.8727-1.6226-3.9098-1.0371-1.0372-2.4432-1.6207-3.9099-1.6226h-8.2098c-1.4667.0019-2.8727.5854-3.9098 1.6226-1.0372 1.0371-1.6207 2.4431-1.6226 3.9098v7.6281c.0036 1.0452.3924 2.0523 1.092 2.8288.6997.7764 1.661 1.2676 2.7002 1.3796v15.0541c.0025.8463.3407 1.6571.9403 2.2544.5996.5973 1.4116.9324 2.2579.9317Zm-5.9073-22.4534v-7.6233c.0013-1.1798.4704-2.311 1.3045-3.1455.834-.8345 1.965-1.3043 3.1448-1.3062h8.2098c1.1801.0019 2.3113.4716 3.1458 1.306.8344.8345 1.3041 1.9657 1.306 3.1457v7.6281c-.0014.759-.2755 1.4921-.7723 2.0658-.4969.5737-1.1834.9497-1.9343 1.0595v-10.488a.542332.542332 0 0 0-.0303-.2187c-.0249-.07-.0641-.1341-.1148-.1884a.543219.543219 0 0 0-.1804-.1272c-.0682-.0296-.1417-.0449-.216-.0449-.0744 0-.1479.0153-.2161.0449a.543219.543219 0 0 0-.1804.1272c-.0508.0543-.0899.1184-.1148.1884a.542332.542332 0 0 0-.0303.2187v26.6398c0 .5604-.2226 1.0977-.6188 1.4939-.3962.3962-.9336.6188-1.4939.6188s-1.0977-.2226-1.4939-.6188c-.3962-.3962-.6188-.9335-.6188-1.4939V34.7207c0-.1433-.057-.2808-.1583-.3821s-.2387-.1583-.382-.1583-.2808.057-.3821.1583-.1583.2388-.1583.3821v16.7944c0 .5604-.2226 1.0977-.6188 1.4939-.3962.3962-.9336.6188-1.4939.6188s-1.0977-.2226-1.4939-.6188c-.3962-.3962-.6188-.9335-.6188-1.4939V24.8533c0-.1433-.0569-.2807-.1582-.382-.1013-.1014-.2388-.1583-.3821-.1583-.1433 0-.2808.0569-.3821.1583-.1013.1013-.1582.2387-.1582.382V35.356c-.751-.1092-1.4378-.4846-1.935-1.0579-.4973-.5732-.7721-1.3061-.7741-2.0649Z"/><path d="M57.8755 39.6154c-.135-.0473-.2832-.0399-.4128.0206-.1297.0605-.2305.1693-.2809.3032-2.0385 5.5692-5.7387 10.3778-10.5998 13.7751-4.8612 3.3972-10.6487 5.2192-16.5793 5.2192s-11.718-1.822-16.5792-5.2192C8.56237 50.317 4.86219 45.5084 2.82371 39.9392c-.05044-.1339-.15126-.2427-.28089-.3032-.12964-.0605-.27776-.0679-.41276-.0206-.06688.0242-.12833.0614-.18082.1094-.05249.048-.09502.1058-.12509.1703a.540047.540047 0 0 0-.05021.2052c-.00306.0711.00796.142.03238.2088 2.11572 5.7768 5.95476 10.7644 10.99778 14.288 5.043 3.5236 11.0466 5.4133 17.1986 5.4133 6.1521 0 12.1557-1.8897 17.1987-5.4133 5.043-3.5236 8.882-8.5112 10.9978-14.288.0486-.1349.0419-.2836-.0188-.4136-.0606-.13-.1703-.2307-.3049-.2801ZM2.13494 20.3919c.13497.0479.28337.0409.41317-.0197.12981-.0606.23057-.1698.28048-.304C4.86944 14.503 8.56987 9.6986 13.4296 6.30456c4.8597-3.39405 10.6444-5.2141 16.572-5.2141s11.7122 1.82005 16.5719 5.2141c4.8597 3.39404 8.5601 8.19844 10.601 13.76364.0383.1041.1076.194.1986.2575.0909.0635.1991.0977.3101.0978.0629-.001.1253-.0117.185-.0316a.538922.538922 0 0 0 .1807-.1094c.0525-.0479.0951-.1058.1251-.1703.0301-.0644.0472-.1342.0502-.2052.0031-.0711-.0079-.142-.0323-.2088-2.1171-5.7738-5.9559-10.75832-10.9976-14.27964C42.1526 1.89723 36.1512.008911 30.0016.008911c-6.1497 0-12.1511 1.888319-17.1928 5.409649C7.76709 8.93988 3.92823 13.9244 1.81121 19.6982c-.02443.0668-.03545.1377-.03239.2088.00306.071.02014.1408.05021.2052.03008.0645.0726.1224.12509.1703.05249.048.11394.0852.18082.1094Z"/><path d="M14.3167 45.6979c-2.4855-2.488-4.34385-5.5314-5.42187-8.8789-1.07802-3.3476-1.34479-6.9035-.77827-10.3744.56652-3.471 1.95004-6.7575 4.03654-9.5886 2.0865-2.831 4.8162-5.1255 7.9638-6.6941.1291-.0646.2273-.17779.2729-.31472.0457-.13694.0351-.2864-.0295-.41551-.0645-.1291-.1778-.22728-.3147-.27293-.1369-.04564-.2864-.03502-.4155.02954-3.8737 1.92922-7.1328 4.90042-9.4108 8.57992-2.27811 3.6794-3.48492 7.9213-3.48492 12.2488 0 4.3276 1.20681 8.5694 3.48492 12.2489 2.278 3.6794 5.5371 6.6507 9.4108 8.5799.1291.0646.2786.0752.4155.0295.1369-.0456.2502-.1438.3147-.2729.0646-.1291.0752-.2786.0295-.4155-.0456-.1369-.1438-.2501-.2729-.3147-2.1469-1.0677-4.1059-2.4775-5.8002-4.1743ZM40.1894 50.8653c.0846-.0002.168-.0202.2434-.0584 3.8572-1.9352 7.1003-4.9051 9.3665-8.5776 2.2663-3.6725 3.4666-7.9029 3.4666-12.2184 0-4.3154-1.2003-8.5459-3.4666-12.2183-2.2662-3.6725-5.5093-6.6424-9.3665-8.57757-.0638-.03249-.1335-.05197-.2049-.05731a.540028.540028 0 0 0-.2111.02624.53905.53905 0 0 0-.1846.1057c-.054.04712-.098.10448-.1296.16877-.0643.12915-.0747.27852-.0291.41539.0456.13688.1436.25008.2725.31478 3.6781 1.8446 6.7706 4.6759 8.9318 8.1774 2.1611 3.5015 3.3056 7.5351 3.3056 11.6498 0 4.1147-1.1445 8.1483-3.3056 11.6498-2.1612 3.5015-5.2537 6.3328-8.9318 8.1774a.542139.542139 0 0 0-.2472.2557c-.0514.1105-.0641.2352-.036.3538.0281.1187.0954.2244.1909.3001.0956.0758.2138.1172.3357.1175v-.0048Z"/><path d="M40.1629 42.8792c.1258.0002.2476-.0447.3431-.1266.4041-.3334.796-.6888 1.1708-1.0661 3.093-3.0985 4.8302-7.2977 4.8302-11.6758 0-4.378-1.7372-8.5772-4.8302-11.6758-.3919-.3918-.7959-.7569-1.217-1.1001-.0548-.0451-.118-.0789-.1859-.0996-.0679-.0206-.1392-.0277-.2098-.0208s-.1392.0276-.2018.061c-.0626.0334-.1181.0788-.1631.1336-.0451.0548-.079.118-.0996.1859a.53952.53952 0 0 0-.0209.2098c.0069.0706.0277.1392.0611.2018.0334.0627.0788.1181.1336.1631.3919.3238.7691.6645 1.1342 1.0272 2.8906 2.8966 4.514 6.8217 4.514 10.9139 0 4.0923-1.6234 8.0173-4.514 10.914-.3521.3537-.7172.6856-1.0953.9955-.0853.0714-.1466.1672-.1756.2746-.029.1073-.0243.221.0134.3256.0377.1047.1066.1952.1975.2593.0908.0642.1992.0989.3104.0995h.0049ZM20.2602 41.9837c-.404-.3245-.7951-.6775-1.1732-1.0588-2.8904-2.8962-4.5138-6.8209-4.5138-10.9127 0-4.0918 1.6234-8.0165 4.5138-10.9128.3627-.3626.7302-.7058 1.1294-1.0247.1107-.091.1807-.2223.1946-.3649.014-.1426-.0293-.285-.1203-.3957-.0911-.1107-.2224-.1807-.365-.1946a.539651.539651 0 0 0-.3957.1204c-.4241.344-.8303.7096-1.2169 1.0953-3.0963 3.0997-4.8356 7.3018-4.8356 11.683 0 4.3813 1.7393 8.5834 4.8356 11.6831.404.4017.8202.7765 1.251 1.1294.055.0451.1183.0789.1863.0995.0681.0206.1395.0276.2102.0206.0708-.007.1394-.0279.2021-.0614a.543834.543834 0 0 0 .1633-.1341c.045-.055.0788-.1183.0994-.1864.0206-.068.0276-.1394.0206-.2102a.540746.540746 0 0 0-.0615-.2021c-.0335-.0626-.079-.1181-.134-.1632l.0097-.0097ZM59.4599 32.8855H55.899c-.1373.0092-.266.0703-.3601.1708-.094.1006-.1463.2331-.1463.3707 0 .1377.0523.2702.1463.3708.0941.1005.2228.1616.3601.1708h3.5537a.54137.54137 0 0 0 .2185-.0303c.0701-.025.1342-.064.1885-.1148a.543219.543219 0 0 0 .1272-.1804c.0296-.0682.0449-.1417.0449-.2161 0-.0743-.0153-.1479-.0449-.216a.543219.543219 0 0 0-.1272-.1804c-.0543-.0508-.1184-.0899-.1885-.1148a.54137.54137 0 0 0-.2185-.0303h.0072ZM59.4599 29.4779H55.899c-.1373.0092-.266.0703-.3601.1708-.094.1006-.1463.2331-.1463.3708 0 .1376.0523.2702.1463.3707.0941.1006.2228.1616.3601.1708h3.5537a.54137.54137 0 0 0 .2185-.0303c.0701-.0249.1342-.064.1885-.1148a.543219.543219 0 0 0 .1272-.1804.542137.542137 0 0 0 .0449-.216c0-.0744-.0153-.1479-.0449-.2161a.543219.543219 0 0 0-.1272-.1804c-.0543-.0507-.1184-.0898-.1885-.1148-.07-.0249-.1444-.0353-.2185-.0303h.0072ZM55.3652 26.6009c0 .1434.0569.2808.1583.3821.1013.1014.2388.1583.3821.1583h3.5535c.1434 0 .2808-.0569.3821-.1583.1014-.1013.1583-.2387.1583-.3821 0-.1433-.0569-.2807-.1583-.382-.1013-.1014-.2387-.1583-.3821-.1583h-3.5608c-.1421.0019-.2777.0597-.3774.1608-.0998.1011-.1557.2375-.1557.3795ZM4.63692 33.421c0-.1433-.05691-.2808-.15825-.3821-.10133-.1014-.23878-.1583-.38209-.1583H.543007a.541821.541821 0 0 0-.218619.0303c-.070021.025-.134135.0641-.188431.1148-.054296.0508-.097631.1122-.127225.1804a.542679.542679 0 0 0-.044865.2161c0 .0743.01527.1479.044865.2161.029594.0681.07293.1295.127225.1803.054296.0508.11841.0899.188431.1148a.541821.541821 0 0 0 .218619.0303H4.09658c.07116 0 .14167-.014.20739-.0413.06571-.0273.12539-.0674.17559-.1178.05021-.0504.08994-.1103.11695-.1761a.540672.540672 0 0 0 .04041-.2075ZM.543007 30.5537H4.09658c.13736-.0092.26607-.0703.3601-.1708.09403-.1006.14636-.2331.14636-.3707 0-.1377-.05233-.2702-.14636-.3708-.09403-.1005-.22274-.1616-.3601-.1708H.543007a.541821.541821 0 0 0-.218619.0303c-.070021.025-.134135.0641-.188431.1148-.054296.0508-.097631.1122-.127225.1804a.542679.542679 0 0 0-.044865.2161c0 .0743.01527.1479.044865.216.029594.0682.07293.1296.127225.1804.054296.0508.11841.0899.188431.1148a.541821.541821 0 0 0 .218619.0303ZM.543266 27.1413H4.09684c.14331 0 .28076-.0569.38209-.1583.10133-.1013.15824-.2387.15824-.3821 0-.1433-.05691-.2807-.15824-.382-.10133-.1014-.23878-.1583-.38209-.1583H.543266c-.143308 0-.280758.0569-.382092.1583-.101334.1013-.158244.2387-.158244.382 0 .1434.05691.2808.158244.3821.101334.1014.238784.1583.382092.1583Z"/></g></symbol> <symbol id="about-values-icon-3" width="54" height="74" viewBox="0 0 54 74"><g><path d="M49.568 28.468C49.0508 28.468 48.5388 28.5707 48.0613 28.7702C47.5838 28.9698 47.1503 29.2621 46.7857 29.6306C46.4212 29.999 46.1327 30.4362 45.937 30.917C45.7413 31.3979 45.6421 31.9128 45.6453 32.4323L45.7201 42.4586C45.7262 43.3829 45.6084 44.3038 45.37 45.1966C45.2281 44.8444 45.0367 44.5144 44.8015 44.2168C44.42 43.7385 43.9396 43.3491 43.3935 43.0756C42.8474 42.8022 42.2487 42.6511 41.6388 42.6329C41.0436 42.598 40.4484 42.7004 39.8986 42.9322C39.3489 43.164 38.8592 43.5192 38.4672 43.9704L30.541 51.0783C28.7859 52.6506 27.4759 54.6611 26.7439 56.906C26.0131 54.6606 24.703 52.6498 22.9469 51.0783L15.0716 44.0244C14.6766 43.5599 14.1805 43.1928 13.6217 42.9515C13.063 42.7103 12.4565 42.6012 11.8491 42.6329C11.2394 42.6499 10.6407 42.8005 10.0949 43.0741C9.54918 43.3477 9.06948 43.7376 8.68937 44.2168C8.45239 44.5137 8.25985 44.8438 8.11787 45.1966C7.87929 44.3038 7.76153 43.3829 7.76779 42.4586L7.84259 32.4323C7.85858 31.906 7.76939 31.3818 7.58029 30.8907C7.3912 30.3996 7.10602 29.9516 6.74163 29.5731C6.37724 29.1946 5.94101 28.8933 5.45873 28.687C4.97645 28.4807 4.45789 28.3735 3.9337 28.3719C3.4095 28.3703 2.8903 28.4743 2.40677 28.6776C1.92324 28.881 1.4852 29.1796 1.11851 29.5558C0.751822 29.9321 0.463935 30.3784 0.271856 30.8683C0.0797769 31.3582 -0.0125971 31.8818 0.000190969 32.4082V45.4941C-0.00720213 49.5283 1.28024 53.4574 3.67155 56.6986L10.5535 66.0637C11.3665 67.1839 11.8064 68.5335 11.8102 69.9197L11.8521 73.2258C11.8536 73.4017 11.9243 73.5699 12.0487 73.6937C12.1731 73.8175 12.3412 73.887 12.5163 73.887C12.6922 73.8838 12.8598 73.811 12.9825 73.6844C13.1052 73.5577 13.1732 73.3875 13.1716 73.2108L13.1327 69.9047C13.1296 68.2355 12.6007 66.6101 11.6217 65.2612L4.73974 55.8901C2.51824 52.8796 1.32302 49.2294 1.33169 45.4821V32.3962C1.32114 32.0472 1.38064 31.6996 1.50662 31.3741C1.6326 31.0486 1.82248 30.7519 2.06499 30.5017C2.30749 30.2515 2.59765 30.0529 2.91817 29.9176C3.23869 29.7824 3.58302 29.7133 3.93067 29.7145C4.27832 29.7157 4.62218 29.7872 4.94176 29.9247C5.26134 30.0621 5.55011 30.2628 5.79088 30.5147C6.03165 30.7666 6.21949 31.0646 6.34322 31.3909C6.46695 31.7173 6.52405 32.0653 6.51109 32.4142L6.43928 42.4375C6.41983 44.8371 7.14569 47.183 8.51582 49.1488C8.64408 49.3515 8.7871 49.5444 8.9437 49.7259C9.08732 49.9092 9.24291 50.0835 9.39252 50.2578L15.0477 56.5694C15.1328 56.6577 15.2393 56.7225 15.3568 56.7572C15.4742 56.792 15.5986 56.7956 15.7179 56.7677C15.831 56.7419 15.9353 56.6866 16.0203 56.6075C16.1054 56.5283 16.1683 56.4281 16.2026 56.3169C16.2378 56.2068 16.2433 56.0892 16.2186 55.9763C16.1939 55.8633 16.1399 55.7589 16.062 55.6737L9.97001 48.8753C9.85032 48.722 9.73363 48.5748 9.62292 48.4065C9.29675 47.9036 9.13217 47.3122 9.15143 46.7124C9.1707 46.1125 9.37287 45.533 9.73063 45.0523C9.99181 44.7198 10.323 44.4494 10.7005 44.2607C11.078 44.0719 11.4924 43.9694 11.914 43.9605C12.3355 43.9516 12.7539 44.0365 13.1389 44.2092C13.524 44.3818 13.8662 44.6379 14.1411 44.9592L22.0702 52.0671C23.3343 53.201 24.3454 54.5904 25.0374 56.1443C25.7294 57.6981 26.0867 59.3814 26.0857 61.0836V73.2138C26.0857 73.3907 26.1557 73.5604 26.2802 73.6856C26.4048 73.8107 26.5738 73.881 26.7499 73.881C26.9261 73.881 27.0951 73.8107 27.2196 73.6856C27.3442 73.5604 27.4142 73.3907 27.4142 73.2138V61.0686C27.4132 59.366 27.7707 57.6825 28.4633 56.1286C29.1558 54.5747 30.1678 53.1854 31.4326 52.0521L39.4097 44.893C39.6832 44.581 40.0225 44.3342 40.4029 44.1704C40.7834 44.0066 41.1953 43.9301 41.6089 43.9463C42.0269 43.9564 42.4375 44.0595 42.811 44.2482C43.1846 44.4368 43.5118 44.7063 43.7692 45.0373C44.1278 45.5177 44.3305 46.0972 44.3497 46.6973C44.369 47.2974 44.2039 47.8888 43.8769 48.3914C43.7662 48.5507 43.6496 48.692 43.5299 48.8603L37.4349 55.6707C37.3588 55.7582 37.307 55.8643 37.285 55.9783C37.2629 56.0923 37.2713 56.2102 37.3092 56.3199C37.3462 56.4317 37.4114 56.5321 37.4984 56.6111C37.5855 56.6901 37.6914 56.7451 37.8059 56.7707C37.9215 56.7988 38.0425 56.7946 38.1559 56.7586C38.2693 56.7226 38.3707 56.6561 38.4492 56.5664L44.1044 50.2548C44.2599 50.0805 44.4036 49.9062 44.5532 49.7259C44.7091 49.5428 44.8521 49.349 44.981 49.1458C46.3561 47.1815 47.0882 44.8358 47.0755 42.4345L47.0007 32.4112C46.9878 32.0623 47.0449 31.7143 47.1686 31.3879C47.2923 31.0616 47.4802 30.7636 47.721 30.5117C47.9617 30.2598 48.2505 30.0591 48.5701 29.9216C48.8897 29.7842 49.2335 29.7127 49.5812 29.7115C49.9288 29.7103 50.2731 29.7794 50.5937 29.9146C50.9142 30.0498 51.2043 30.2485 51.4468 30.4987C51.6893 30.7489 51.8792 31.0456 52.0052 31.3711C52.1312 31.6966 52.1907 32.0442 52.1801 32.3932V45.4791C52.1888 49.2264 50.9936 52.8766 48.7721 55.8871L41.8902 65.2612C40.9131 66.6055 40.3833 68.2253 40.3761 69.8897L40.3372 73.1957C40.3356 73.373 40.404 73.5436 40.5274 73.6704C40.6507 73.7971 40.8191 73.8696 40.9955 73.872C41.1709 73.872 41.3393 73.8026 41.4642 73.6789C41.5891 73.5551 41.6604 73.387 41.6628 73.2108L41.7017 69.8867C41.7055 68.5023 42.1454 67.1546 42.9584 66.0367L49.8403 56.6685C52.2307 53.4271 53.5171 49.4979 53.5087 45.4641V32.3962C53.5067 31.8784 53.4032 31.366 53.2041 30.8883C53.005 30.4107 52.7142 29.9771 52.3483 29.6123C51.9823 29.2476 51.5485 28.9588 51.0714 28.7624C50.5944 28.5661 50.0835 28.466 49.568 28.468Z" fill="#080A12"/> <path d="M19.835 30.8153V35.1372C19.8358 35.3139 19.9061 35.4832 20.0305 35.6081C20.1549 35.7331 20.3234 35.8036 20.4993 35.8044H32.9885C33.0757 35.8044 33.1621 35.7872 33.2427 35.7536C33.3233 35.7201 33.3965 35.6709 33.4582 35.609C33.5199 35.547 33.5688 35.4735 33.6022 35.3925C33.6356 35.3116 33.6527 35.2248 33.6527 35.1372V30.8183C33.6527 28.2456 34.7718 25.6579 36.8035 23.53C39.2712 20.9613 40.6488 17.5301 40.6454 13.9605C40.6491 11.8807 40.1887 9.82647 39.2981 7.94887C38.4075 6.07127 37.1093 4.41803 35.4989 3.11068C33.87 1.79186 31.968 0.85582 29.9323 0.371138C27.8966 -0.113544 25.7787 -0.134588 23.7338 0.309557C21.3297 0.84071 19.1099 2.00539 17.3025 3.68387C15.495 5.36236 14.1653 7.49407 13.4498 9.85984C12.7344 12.2256 12.6592 14.7401 13.2319 17.1448C13.8045 19.5494 15.0044 21.7575 16.7082 23.542C18.719 25.6579 19.835 28.2426 19.835 30.8153ZM14.4043 11.49C14.8723 9.08276 16.0308 6.86554 17.7374 5.11132C19.4439 3.35709 21.624 2.14244 24.0091 1.61694C25.8601 1.21372 27.7774 1.23172 29.6206 1.6696C31.4638 2.10749 33.186 2.95418 34.6611 4.14757C36.118 5.32967 37.2925 6.82483 38.0983 8.52304C38.904 10.2212 39.3204 12.0793 39.3169 13.9605C39.3222 17.1839 38.0822 20.2837 35.858 22.6073C33.5869 24.9846 32.3392 27.9 32.3392 30.8183V34.479H27.4081V20.2841H30.1968C30.3657 20.2727 30.5239 20.1973 30.6395 20.0731C30.7551 19.949 30.8194 19.7853 30.8194 19.6153C30.8194 19.4453 30.7551 19.2817 30.6395 19.1575C30.5239 19.0334 30.3657 18.958 30.1968 18.9466H23.291C23.1998 18.9405 23.1083 18.9532 23.0222 18.984C22.9362 19.0149 22.8573 19.0631 22.7905 19.1258C22.7238 19.1885 22.6706 19.2643 22.6342 19.3485C22.5978 19.4327 22.5791 19.5235 22.5791 19.6153C22.5791 19.7071 22.5978 19.7979 22.6342 19.8821C22.6706 19.9663 22.7238 20.0422 22.7905 20.1049C22.8573 20.1676 22.9362 20.2158 23.0222 20.2466C23.1083 20.2775 23.1998 20.2902 23.291 20.2841H26.0766V34.479H21.1665V30.8153C21.1665 27.894 19.9188 24.9846 17.6538 22.6163C16.2564 21.1642 15.2307 19.3931 14.6647 17.4552C14.0987 15.5172 14.0094 13.4703 14.4043 11.49Z" fill="#080A12"/> <path d="M32.2945 38.5394C32.2945 38.3617 32.2242 38.1912 32.099 38.0655C31.9739 37.9398 31.8042 37.8692 31.6272 37.8692H21.8609C21.692 37.8806 21.5338 37.956 21.4182 38.0801C21.3026 38.2043 21.2383 38.3679 21.2383 38.5379C21.2383 38.7079 21.3026 38.8715 21.4182 38.9957C21.5338 39.1199 21.692 39.1953 21.8609 39.2066H31.6272C31.8037 39.2066 31.9729 39.1364 32.098 39.0114C32.223 38.8864 32.2937 38.7167 32.2945 38.5394Z" fill="#080A12"/> <path d="M31.6124 42.0558C31.6128 41.9681 31.5959 41.8812 31.5627 41.8C31.5294 41.7189 31.4805 41.6452 31.4187 41.5832C31.357 41.5211 31.2836 41.472 31.2028 41.4386C31.1221 41.4052 31.0355 41.3882 30.9482 41.3886H22.5402C22.3641 41.3886 22.1951 41.4589 22.0705 41.584C21.946 41.7092 21.876 41.8789 21.876 42.0558C21.876 42.2328 21.946 42.4025 22.0705 42.5276C22.1951 42.6528 22.3641 42.7231 22.5402 42.7231H30.9482C31.0355 42.7235 31.1221 42.7065 31.2028 42.6731C31.2836 42.6397 31.357 42.5906 31.4187 42.5285C31.4805 42.4665 31.5294 42.3928 31.5627 42.3116C31.5959 42.2305 31.6128 42.1436 31.6124 42.0558Z" fill="#080A12"/> <path d="M29.2329 45.3228C28.9954 45.8014 28.6297 46.2041 28.177 46.4855C27.7243 46.7669 27.2025 46.916 26.6701 46.916C26.1377 46.916 25.6159 46.7669 25.1632 46.4855C24.7105 46.2041 24.3448 45.8014 24.1073 45.3228C24.068 45.2439 24.0136 45.1735 23.9473 45.1157C23.8809 45.0578 23.8038 45.0137 23.7205 44.9858C23.6371 44.9579 23.5491 44.9468 23.4615 44.953C23.3738 44.9593 23.2883 44.9828 23.2097 45.0223C23.1311 45.0618 23.061 45.1164 23.0035 45.183C22.9459 45.2497 22.902 45.3271 22.8742 45.4108C22.8464 45.4946 22.8353 45.583 22.8415 45.671C22.8478 45.7591 22.8712 45.845 22.9105 45.9239C23.2573 46.6257 23.7923 47.2163 24.4552 47.6291C25.1181 48.042 25.8826 48.2607 26.6626 48.2607C27.4426 48.2607 28.2071 48.042 28.87 47.6291C29.533 47.2163 30.068 46.6257 30.4148 45.9239C30.4541 45.845 30.4775 45.7591 30.4837 45.671C30.4899 45.583 30.4789 45.4946 30.4511 45.4108C30.4233 45.3271 30.3794 45.2497 30.3218 45.183C30.2642 45.1164 30.1941 45.0618 30.1156 45.0223C30.037 44.9828 29.9514 44.9593 29.8638 44.953C29.7761 44.9468 29.6881 44.9579 29.6048 44.9858C29.5214 45.0137 29.4443 45.0578 29.378 45.1157C29.3116 45.1735 29.2572 45.2439 29.2179 45.3228H29.2329Z" fill="#080A12"/> <path d="M18.8322 11.3758C18.9115 11.4064 18.9956 11.4227 19.0806 11.4239C19.2134 11.4237 19.3432 11.3835 19.453 11.3085C19.5629 11.2335 19.6479 11.1271 19.6969 11.0031C20.1506 9.86752 20.8725 8.85985 21.8004 8.0671C22.7283 7.27434 23.8343 6.7203 25.023 6.45278C25.1952 6.41293 25.3446 6.30599 25.4383 6.1555C25.532 6.00501 25.5623 5.82329 25.5226 5.65032C25.483 5.47735 25.3765 5.32729 25.2267 5.23316C25.0769 5.13903 24.896 5.10854 24.7237 5.14839C23.3241 5.46285 22.0218 6.11517 20.9295 7.04889C19.8373 7.98262 18.988 9.16962 18.4552 10.5072C18.4228 10.589 18.4069 10.6765 18.4083 10.7646C18.4097 10.8527 18.4285 10.9396 18.4636 11.0204C18.4986 11.1011 18.5492 11.1741 18.6125 11.2351C18.6758 11.2961 18.7505 11.3439 18.8322 11.3758Z" fill="#080A12"/></g></symbol> <symbol id="about-values-icon-4" width="60" height="56" viewBox="0 0 60 56"><g><path d="M45.4677 21.1403C45.3967 21.1399 45.3263 21.1537 45.2606 21.1807C45.195 21.2077 45.1353 21.2475 45.0851 21.2977C45.0349 21.3479 44.9951 21.4076 44.968 21.4733C44.941 21.539 44.9273 21.6094 44.9276 21.6804V53.3092C44.927 53.6069 44.8082 53.8922 44.5975 54.1025C44.3868 54.3128 44.1012 54.4309 43.8036 54.4309H2.19941C1.90171 54.4309 1.61618 54.3128 1.40545 54.1025C1.19472 53.8922 1.076 53.6069 1.07535 53.3092V2.24077C1.076 1.94308 1.19472 1.6578 1.40545 1.44753C1.61618 1.23725 1.90171 1.11917 2.19941 1.11917H43.8036C44.1012 1.11917 44.3868 1.23725 44.5975 1.44753C44.8082 1.6578 44.927 1.94308 44.9276 2.24077V7.35005C44.9276 7.4933 44.9845 7.6307 45.0858 7.73199C45.1871 7.83328 45.3245 7.89017 45.4677 7.89017C45.611 7.89017 45.7483 7.83328 45.8496 7.73199C45.9509 7.6307 46.0078 7.4933 46.0078 7.35005V2.24077C46.0072 1.65636 45.7748 1.09607 45.3615 0.682822C44.9483 0.269577 44.388 0.037143 43.8036 0.036499H2.19941C1.61499 0.037143 1.05468 0.269577 0.64144 0.682822C0.228195 1.09607 -0.00423883 1.65636 -0.00488281 2.24077V53.3092C-0.00423883 53.8937 0.228195 54.454 0.64144 54.8672C1.05468 55.2804 1.61499 55.5129 2.19941 55.5135H43.8036C44.388 55.5129 44.9483 55.2804 45.3615 54.8672C45.7748 54.454 46.0072 53.8937 46.0078 53.3092V21.6804C46.0082 21.6094 45.9944 21.539 45.9674 21.4733C45.9403 21.4076 45.9006 21.3479 45.8504 21.2977C45.8001 21.2475 45.7405 21.2077 45.6748 21.1807C45.6091 21.1537 45.5387 21.1399 45.4677 21.1403Z" fill="#080A12"/> <path d="M38.4895 11.6905C38.4899 11.6195 38.4761 11.5491 38.4491 11.4834C38.4221 11.4178 38.3823 11.3581 38.3321 11.3079C38.2818 11.2577 38.2222 11.2179 38.1565 11.1909C38.0908 11.1638 38.0205 11.1501 37.9494 11.1504H8.05769C7.91445 11.1504 7.77707 11.2073 7.67577 11.3086C7.57448 11.4099 7.51758 11.5473 7.51758 11.6905C7.51758 11.8338 7.57448 11.9712 7.67577 12.0724C7.77707 12.1737 7.91445 12.2307 8.05769 12.2307H37.9421C38.0138 12.232 38.0849 12.2189 38.1514 12.1923C38.218 12.1657 38.2785 12.1261 38.3295 12.0758C38.3805 12.0255 38.4209 11.9655 38.4484 11.8993C38.4759 11.8332 38.4899 11.7622 38.4895 11.6905Z" fill="#080A12"/> <path d="M31.4825 19.7267C31.4829 19.6557 31.4691 19.5853 31.4421 19.5196C31.415 19.454 31.3753 19.3943 31.3251 19.3441C31.2748 19.2938 31.2152 19.2541 31.1495 19.227C31.0838 19.2 31.0134 19.1863 30.9424 19.1866H8.05769C7.91445 19.1866 7.77707 19.2435 7.67577 19.3448C7.57448 19.4461 7.51758 19.5835 7.51758 19.7267C7.51758 19.87 7.57448 20.0074 7.67577 20.1086C7.77707 20.2099 7.91445 20.2669 8.05769 20.2669H30.9424C31.0134 20.2672 31.0838 20.2534 31.1495 20.2264C31.2152 20.1993 31.2748 20.1596 31.3251 20.1094C31.3753 20.0591 31.415 19.9995 31.4421 19.9338C31.4691 19.8681 31.4829 19.7977 31.4825 19.7267Z" fill="#080A12"/> <path d="M22.9963 27.2227H8.0577C7.91445 27.2227 7.77707 27.2796 7.67577 27.3809C7.57448 27.4822 7.51758 27.6196 7.51758 27.7629C7.51758 27.9061 7.57448 28.0435 7.67577 28.1448C7.77707 28.2461 7.91445 28.303 8.0577 28.303H22.9963C23.1395 28.303 23.2769 28.2461 23.3782 28.1448C23.4795 28.0435 23.5364 27.9061 23.5364 27.7629C23.5364 27.6196 23.4795 27.4822 23.3782 27.3809C23.2769 27.2796 23.1395 27.2227 22.9963 27.2227Z" fill="#080A12"/> <path d="M37.9425 36.3391C38.0857 36.3391 38.2231 36.2822 38.3244 36.1809C38.4257 36.0796 38.4826 35.9423 38.4826 35.799C38.4826 35.6558 38.4257 35.5184 38.3244 35.4171C38.2231 35.3158 38.0857 35.2589 37.9425 35.2589H32.2979C32.1547 35.2589 32.0173 35.3158 31.916 35.4171C31.8147 35.5184 31.7578 35.6558 31.7578 35.799C31.7578 35.9423 31.8147 36.0796 31.916 36.1809C32.0173 36.2822 32.1547 36.3391 32.2979 36.3391H37.9425Z" fill="#080A12"/> <path d="M8.0577 36.3391H19.4928C19.636 36.3391 19.7734 36.2822 19.8747 36.1809C19.976 36.0796 20.0329 35.9423 20.0329 35.799C20.0329 35.6558 19.976 35.5184 19.8747 35.4171C19.7734 35.3158 19.636 35.2589 19.4928 35.2589H8.0577C7.91445 35.2589 7.77707 35.3158 7.67577 35.4171C7.57448 35.5184 7.51758 35.6558 7.51758 35.799C7.51758 35.9423 7.57448 36.0796 7.67577 36.1809C7.77707 36.2822 7.91445 36.3391 8.0577 36.3391Z" fill="#080A12"/> <path d="M7.53028 43.8376C7.52996 43.9086 7.54372 43.979 7.57075 44.0447C7.59777 44.1104 7.63754 44.17 7.68776 44.2202C7.73798 44.2705 7.79765 44.3102 7.86333 44.3373C7.92901 44.3643 7.99938 44.3781 8.0704 44.3777H37.9427C38.08 44.3685 38.2086 44.3075 38.3026 44.207C38.3966 44.1065 38.4489 43.974 38.4489 43.8364C38.4489 43.6988 38.3966 43.5663 38.3026 43.4658C38.2086 43.3653 38.08 43.3043 37.9427 43.295H8.05823C7.91668 43.2982 7.78205 43.3569 7.68331 43.4584C7.58456 43.5598 7.52961 43.696 7.53028 43.8376Z" fill="#080A12"/> <path d="M60.0001 2.97798C59.9999 2.38865 59.825 1.81261 59.4975 1.32267C59.17 0.83273 58.7046 0.450889 58.1601 0.225391C57.6156 -0.000106864 57.0165 -0.0591404 56.4385 0.0557767C55.8605 0.170694 55.3295 0.454384 54.9127 0.871001L53.2948 2.49138L28.0233 27.7604C27.4693 28.3161 27.0077 28.9568 26.6559 29.6582L23.7145 35.5582C23.6726 35.6407 23.6527 35.7326 23.6568 35.8251C23.6608 35.9175 23.6886 36.0073 23.7376 36.0858C23.7865 36.1644 23.8549 36.229 23.9361 36.2733C24.0173 36.3177 24.1085 36.3404 24.2011 36.3391C24.2853 36.3386 24.3684 36.3195 24.4444 36.2832L30.3419 33.3417C31.0454 32.9912 31.6872 32.5285 32.2421 31.9719L57.5111 6.7029L59.1291 5.08496C59.4064 4.80882 59.6262 4.48041 59.7757 4.11874C59.9252 3.75707 60.0015 3.36933 60.0001 2.97798ZM29.8553 32.3734L25.403 34.5947L27.6243 30.1423C27.8178 29.7661 28.0493 29.4106 28.3153 29.0815L30.9161 31.6873C30.5872 31.952 30.2317 32.1819 29.8553 32.3734ZM31.7214 30.9598L29.0451 28.2835L53.6767 3.63487L56.353 6.31116L31.7214 30.9598ZM58.3627 4.32099L57.1267 5.55694L54.4504 2.88065L55.6864 1.64471C56.0507 1.34094 56.5153 1.1844 56.9891 1.2058C57.4629 1.22721 57.9116 1.42501 58.247 1.76038C58.5824 2.09576 58.7802 2.54445 58.8016 3.01825C58.823 3.49206 58.6665 3.95674 58.3627 4.32099Z" fill="#080A12"/></g></symbol> <symbol id="padlock" viewBox="0 0 1792 1792"><path d="M640 768h512v-192q0-106-75-181t-181-75-181 75-75 181v192zm832 96v576q0 40-28 68t-68 28h-960q-40 0-68-28t-28-68v-576q0-40 28-68t68-28h32v-192q0-184 132-316t316-132 316 132 132 316v192h32q40 0 68 28t28 68z"/></symbol> <symbol id="envelope-open-outline" viewBox="0 0 24 24"><path d="M11.99 0l-11.99 8.723v15.277h24v-15.277l-12.01-8.723zm.001 2.472l9.793 7.113-6.735 4.588-3.049-2.47-3.049 2.471-6.737-4.589 9.777-7.113zm-9.991 9.386l5.329 3.63-5.329 4.318v-7.948zm.474 10.142l9.526-7.723 9.526 7.723h-19.052zm19.526-2.194l-5.329-4.317 5.329-3.631v7.948z"/></symbol> <symbol id="settings" viewBox="0 0 24 24"><path d="M24 13.616v-3.232c-1.651-.587-2.694-.752-3.219-2.019v-.001c-.527-1.271.1-2.134.847-3.707l-2.285-2.285c-1.561.742-2.433 1.375-3.707.847h-.001c-1.269-.526-1.435-1.576-2.019-3.219h-3.232c-.582 1.635-.749 2.692-2.019 3.219h-.001c-1.271.528-2.132-.098-3.707-.847l-2.285 2.285c.745 1.568 1.375 2.434.847 3.707-.527 1.271-1.584 1.438-3.219 2.02v3.232c1.632.58 2.692.749 3.219 2.019.53 1.282-.114 2.166-.847 3.707l2.285 2.286c1.562-.743 2.434-1.375 3.707-.847h.001c1.27.526 1.436 1.579 2.019 3.219h3.232c.582-1.636.75-2.69 2.027-3.222h.001c1.262-.524 2.12.101 3.698.851l2.285-2.286c-.744-1.563-1.375-2.433-.848-3.706.527-1.271 1.588-1.44 3.221-2.021zm-12 2.384c-2.209 0-4-1.791-4-4s1.791-4 4-4 4 1.791 4 4-1.791 4-4 4z"/></symbol> <symbol id="envelope-open-solid" viewBox="0 0 24 24"><path d="M.026 24l11.974-11.607 11.974 11.607h-23.948zm11.964-23.961l-11.99 8.725v12.476l7.352-7.127-5.653-4.113 10.291-7.488 10.309 7.488-5.655 4.108 7.356 7.132v-12.476l-12.01-8.725z"/></symbol> <symbol id="info" viewBox="0 0 24 24"><path d="M12 2c5.514 0 10 4.486 10 10s-4.486 10-10 10-10-4.486-10-10 4.486-10 10-10zm0-2c-6.627 0-12 5.373-12 12s5.373 12 12 12 12-5.373 12-12-5.373-12-12-12zm-.001 5.75c.69 0 1.251.56 1.251 1.25s-.561 1.25-1.251 1.25-1.249-.56-1.249-1.25.559-1.25 1.249-1.25zm2.001 12.25h-4v-1c.484-.179 1-.201 1-.735v-4.467c0-.534-.516-.618-1-.797v-1h3v6.265c0 .535.517.558 1 .735v.999z"/></symbol> <symbol id="shopping-bag" viewBox="0 0 16 16"><path d="M11.8124 7.875V4.5C11.8124 3.75408 11.5161 3.03871 10.9887 2.51126C10.4612 1.98382 9.74585 1.6875 8.99993 1.6875C8.25401 1.6875 7.53864 1.98382 7.01119 2.51126C6.48374 3.03871 6.18743 3.75408 6.18743 4.5V7.875M14.7044 6.38025L15.6517 15.3802C15.7042 15.879 15.3142 16.3125 14.8124 16.3125H3.18743C3.06908 16.3126 2.95204 16.2879 2.84389 16.2398C2.73574 16.1917 2.63891 16.1215 2.5597 16.0336C2.48048 15.9456 2.42064 15.842 2.38407 15.7295C2.3475 15.6169 2.33501 15.4979 2.34743 15.3802L3.29543 6.38025C3.3173 6.17292 3.41515 5.98103 3.57012 5.84157C3.72508 5.70211 3.9262 5.62496 4.13468 5.625H13.8652C14.2972 5.625 14.6594 5.95125 14.7044 6.38025ZM6.46868 7.875C6.46868 7.94959 6.43905 8.02113 6.3863 8.07387C6.33356 8.12662 6.26202 8.15625 6.18743 8.15625C6.11284 8.15625 6.0413 8.12662 5.98855 8.07387C5.93581 8.02113 5.90618 7.94959 5.90618 7.875C5.90618 7.80041 5.93581 7.72887 5.98855 7.67613C6.0413 7.62338 6.11284 7.59375 6.18743 7.59375C6.26202 7.59375 6.33356 7.62338 6.3863 7.67613C6.43905 7.72887 6.46868 7.80041 6.46868 7.875ZM12.0937 7.875C12.0937 7.94959 12.064 8.02113 12.0113 8.07387C11.9586 8.12662 11.887 8.15625 11.8124 8.15625C11.7378 8.15625 11.6663 8.12662 11.6136 8.07387C11.5608 8.02113 11.5312 7.94959 11.5312 7.875C11.5312 7.80041 11.5608 7.72887 11.6136 7.67613C11.6663 7.62338 11.7378 7.59375 11.8124 7.59375C11.887 7.59375 11.9586 7.62338 12.0113 7.67613C12.064 7.72887 12.0937 7.80041 12.0937 7.875Z" stroke-linecap="round" stroke-linejoin="round"/></symbol> <symbol id="share-arrow" width="18" height="18" viewBox="0 0 18 18"><path d="M11.1992 0.900391C11.1992 0.624248 11.4231 0.400391 11.6992 0.400391H17.0992C17.3754 0.400391 17.5992 0.624248 17.5992 0.900391V6.30039C17.5992 6.57653 17.3754 6.80039 17.0992 6.80039C16.8231 6.80039 16.5992 6.57653 16.5992 6.30039V2.10964L8.45512 10.2537C8.25985 10.449 7.94327 10.449 7.74801 10.2537C7.55275 10.0585 7.55275 9.7419 7.74801 9.54664L15.8943 1.40039H11.6992C11.4231 1.40039 11.1992 1.17653 11.1992 0.900391Z"/> <path d="M0.699219 3.35192C0.699219 1.88741 1.88644 0.700195 3.35094 0.700195H6.0406C6.31674 0.700195 6.5406 0.924053 6.5406 1.2002C6.5406 1.47634 6.31674 1.7002 6.0406 1.7002H3.35094C2.43872 1.7002 1.69922 2.4397 1.69922 3.35192V14.6485C1.69922 15.5607 2.43872 16.3002 3.35094 16.3002H14.6475C15.5597 16.3002 16.2992 15.5607 16.2992 14.6485V11.9588C16.2992 11.6827 16.5231 11.4588 16.7992 11.4588C17.0754 11.4588 17.2992 11.6827 17.2992 11.9588V14.6485C17.2992 16.113 16.112 17.3002 14.6475 17.3002H3.35094C1.88644 17.3002 0.699219 16.113 0.699219 14.6485V3.35192Z"/></symbol> <symbol id="change-arrow" width="8" height="6" viewBox="0 0 8 6"><path d="M4 0L7.4641 6H0.535898L4 0Z"/></symbol> <symbol id="chart" width="24" height="24" viewBox="0 0 24 24"><path d="M4.75 6.75C4.75 5.64543 5.64543 4.75 6.75 4.75H17.25C18.3546 4.75 19.25 5.64543 19.25 6.75V17.25C19.25 18.3546 18.3546 19.25 17.25 19.25H6.75C5.64543 19.25 4.75 18.3546 4.75 17.25V6.75Z" stroke-linecap="round" stroke-linejoin="round"/> <path d="M8.75 15.25V9.75" stroke-linecap="round" stroke-linejoin="round"/> <path d="M15.25 15.25V9.75" stroke-linecap="round" stroke-linejoin="round"/> <path d="M12 15.25V12.75" stroke-linecap="round" stroke-linejoin="round"/></symbol></svg> <svg class="c-globalSvgs c-SiteSvgsNoAmp" data-v-60affc28=""><symbol id="loading-spinner" viewBox="0 0 100 100"><path d="M15 50A35 35 0 0 0 85 50A35 36.8 0 0 1 15 50" fill="#3f8eff" stroke="none"><animateTransform attributeName="transform" type="rotate" dur="1s" repeatCount="indefinite" keyTimes="0;1" values="0 50 50.9;360 50 50.9" data-v-60affc28=""/></path></symbol></svg> <div class="c-adDisplay_container c-adDisplay_container_interstitial blank" data-v-60affc28><!----></div> <div class="c-adSkyBox" data-v-60affc28><div><span class="c-adSkyBox_hideButton u-flexbox-justifyCenter u-flexbox-alignCenter u-text-center">X</span> <div class="c-adDisplay_container c-adDisplay_container_nav-ad-plus-leader blank"><!----></div></div></div> <!----> <div class="c-layoutDefault_page" data-v-60affc28><header role="banner" class="large-header" data-v-60affc28><div class="c-siteHeader"><nav class="c-siteHeaderNavigation g-grid-container u-grid-columns"><div class="md:u-col-1 lg:u-col-3 header-link-tracking-taggy"><a href="/" title="ZDNET" class="c-siteHeaderNavigation_logo nuxt-link-active"><div class="c-siteLogo c-siteHeaderNavigation_logo-vertical"><svg class="c-siteLogo_image c-siteLogo_image-header c-siteLogo_image-color-text"><use xlink:href="#logo"/></svg></div> <div class="c-siteLogo c-siteHeaderNavigation_logo-horizontal"><svg class="c-siteLogo_image c-siteLogo_image-header c-siteLogo_image-color-text"><use xlink:href="#logo-horizontal"/></svg></div></a></div> <div class="c-siteHeaderNavigation_shelves md:u-col-5 lg:u-col-9"><div class="c-siteHeaderNavigation_topicShelf"><div section="Trending" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="trending-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Trending</span></span> <!----></button> <!----> <div id="trending-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="/article/early-black-friday-2024-everything-you-need-to-know-about-holiday-shopping/" rel="follow" class="c-siteMenuList_link"><span>Black Friday 2024: Everything you need to know about holiday shopping</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/best-black-friday-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday deals overall 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-tv-deals-11-18-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday TV deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/best-black-friday-walmart-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Walmart deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-amazon-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Amazon deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/best-black-friday-target-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Target deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/best-black-friday-sams-club-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Sam's Club deals 2024</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-soundbar-and-speaker-deals/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday soundbar deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-phone-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday phone deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-phone-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday AirPods deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-apple-watch-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Apple Watch deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-gaming-pc-deals-11-19-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday gaming PC deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-nintendo-switch-deals-11-19-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday Nintendo deals 2024</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-black-friday-laptop-deals-2024/" rel="follow" class="c-siteMenuList_link"><span>Best Black Friday laptop deals 2024</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/one-of-the-best-cheap-soundbars-ive-tested-performs-as-well-as-models-twice-its-price-and-its-on-sale/" rel="follow" class="c-siteMenuList_link"><span>Vizio 5.1 Soundbar SE is $80 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/kitchen-household/i-tested-a-luxury-nugget-ice-maker-and-its-totally-worth-it-and-its-on-sale-for-black-friday/" rel="follow" class="c-siteMenuList_link"><span>GE Opal 2.0 ice maker is $150 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/hisense-u8n-black-friday-deal-11-20-2024/" rel="follow" class="c-siteMenuList_link"><span>Hisense U8N TV is up to $1,100 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/how-to-use-bluesky-social-everything-to-know-about-the-popular-x-alternative/" rel="follow" class="c-siteMenuList_link"><span>How to use Bluesky Social</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/how-to-download-youtube-videos-for-free-2-ways/" rel="follow" class="c-siteMenuList_link"><span>How to download YouTube videos for free</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/zdnet-recommends/" rel="follow" class="c-siteMenuList_link"><span>ZDNET Recommends</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Tech" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="tech-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Tech</span></span> <!----></button> <!----> <div id="tech-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/gaming/" class="c-siteMenuList_link"><span>Gaming</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/headphones/" class="c-siteMenuList_link"><span>Headphones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/laptops/" class="c-siteMenuList_link"><span>Laptops</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/mobile-accessories/" class="c-siteMenuList_link"><span>Mobile Accessories</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/networking/" class="c-siteMenuList_link"><span>Networking</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/pcs/" class="c-siteMenuList_link"><span>PCs</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/printers/" class="c-siteMenuList_link"><span>Printers</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/smartphones/" class="c-siteMenuList_link"><span>Smartphones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/smart-watches/" class="c-siteMenuList_link"><span>Smart Watches</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/speakers/" class="c-siteMenuList_link"><span>Speakers</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/streaming-devices/" class="c-siteMenuList_link"><span>Streaming Devices</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/video-streaming-services/" class="c-siteMenuList_link"><span>Streaming Services</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/tablets/" class="c-siteMenuList_link"><span>Tablets</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/tvs/" class="c-siteMenuList_link"><span>TVs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/wearables/" class="c-siteMenuList_link"><span>Wearables</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="/topic/kitchen-household/" class="c-siteMenuList_link"><span>Kitchen & Household</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/office-furniture/" class="c-siteMenuList_link"><span>Office Furniture</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/office-hardware-appliances/" class="c-siteMenuList_link"><span>Office Hardware & Appliances</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/smart-home/" class="c-siteMenuList_link"><span>Smart Home</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/smart-lighting/" class="c-siteMenuList_link"><span>Smart Lighting</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/yard-outdoors/" class="c-siteMenuList_link"><span>Yard & Outdoors</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Innovation" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="innovation-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Innovation</span></span> <!----></button> <!----> <div id="innovation-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/artificial-intelligence/" class="c-siteMenuList_link"><span>Artificial Intelligence</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/ar-vr/" class="c-siteMenuList_link"><span>AR + VR</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/cloud/" class="c-siteMenuList_link"><span>Cloud</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/digital-transformation/" class="c-siteMenuList_link"><span>Digital Transformation</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/energy/" class="c-siteMenuList_link"><span>Energy</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/robotics/" class="c-siteMenuList_link"><span>Robotics</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/sustainability/" class="c-siteMenuList_link"><span>Sustainability</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/transportation/" class="c-siteMenuList_link"><span>Transportation</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/work-life/" class="c-siteMenuList_link"><span>Work Life</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/accelerate-your-tech-game/" rel="follow" class="c-siteMenuList_link"><span>Accelerate your tech game <small>Paid Content</small></span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/how-the-new-space-race-will-drive-innovation/" rel="follow" class="c-siteMenuList_link"><span>How the New Space Race Will Drive Innovation</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/how-the-metaverse-will-change-the-future-of-work-and-society/" rel="follow" class="c-siteMenuList_link"><span>How the metaverse will change the future of work and society</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/managing-the-multicloud/" rel="follow" class="c-siteMenuList_link"><span>Managing the Multicloud</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/the-future-of-the-internet/" rel="follow" class="c-siteMenuList_link"><span>The Future of the Internet</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/the-new-rules-of-work/" rel="follow" class="c-siteMenuList_link"><span>The New Rules of Work</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/the-tech-trends-to-watch-in-2023/" rel="follow" class="c-siteMenuList_link"><span>The Tech Trends to Watch in 2023</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Business" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="business-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Business</span></span> <!----></button> <!----> <div id="business-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/business/" class="c-siteMenuList_link"><span>See all Business</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/amazon/" class="c-siteMenuList_link"><span>Amazon</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/apple/" class="c-siteMenuList_link"><span>Apple</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/developer/" class="c-siteMenuList_link"><span>Developer</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/e-commerce/" class="c-siteMenuList_link"><span>E-Commerce</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/edge-computing/" class="c-siteMenuList_link"><span>Edge Computing</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/enterprise-software/" class="c-siteMenuList_link"><span>Enterprise Software</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/executive/" class="c-siteMenuList_link"><span>Executive</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/google/" class="c-siteMenuList_link"><span>Google</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/microsoft/" class="c-siteMenuList_link"><span>Microsoft</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/professional-development/" class="c-siteMenuList_link"><span>Professional Development</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/social-media/" class="c-siteMenuList_link"><span>Social Media</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/smb/" class="c-siteMenuList_link"><span>SMB</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/windows/" class="c-siteMenuList_link"><span>Windows</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/how-ai-is-transforming-organizations-everywhere/" rel="follow" class="c-siteMenuList_link"><span>How AI is transforming organizations everywhere</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/the-intersection-of-generative-ai-and-engineering/" rel="follow" class="c-siteMenuList_link"><span>The intersection of generative AI and engineering</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/software-development-emerging-trends-and-changing-roles/" rel="follow" class="c-siteMenuList_link"><span>Software development: Emerging trends and changing roles</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Security" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="security-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Security</span></span> <!----></button> <!----> <div id="security-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column"> <!----></ul><ul class="c-siteMenuList_column"> <!----></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/security/" aria-current="page" class="c-siteMenuList_link nuxt-link-exact-active nuxt-link-active"><span>See all Security</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/cyber-threats/" class="c-siteMenuList_link"><span>Cyber Threats</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/password-manager/" class="c-siteMenuList_link"><span>Password Manager</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/ransomware/" class="c-siteMenuList_link"><span>Ransomware</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/vpn/" class="c-siteMenuList_link"><span>VPN</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/cybersecurity-lets-get-tactical/" rel="follow" class="c-siteMenuList_link"><span>Cybersecurity: Let's get tactical</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/cybersecurity-lets-get-tactical/" rel="follow" class="c-siteMenuList_link"><span>Securing the Cloud</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Advice" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="advice-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Advice</span></span> <!----></button> <!----> <div id="advice-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column c-siteMenuList_column-size-large"> <!----></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"> <!----></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/deals/" rel="follow" class="c-siteMenuList_link"><span>Deals</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/how-to/" rel="follow" class="c-siteMenuList_link"><span>How-to</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/product-comparisons/" rel="follow" class="c-siteMenuList_link"><span>Product Comparisons</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/product-spotlights/" rel="follow" class="c-siteMenuList_link"><span>Product Spotlights</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/reviews/" rel="follow" class="c-siteMenuList_link"><span>Reviews</span> <!----></a></span></li> <!----></ul></div></div></div><div section="Buying Guides" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-topic c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="buying-guides-menu" class="c-sitePrimaryMenu_item"><span class="c-sitePrimaryMenu_text"><span>Buying Guides</span></span> <!----></button> <!----> <div id="buying-guides-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/best-products/" rel="follow" class="c-siteMenuList_link"><span>See all Buying Guides</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-samsung-phone/" rel="follow" class="c-siteMenuList_link"><span>Best Samsung phones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-android-phone/" rel="follow" class="c-siteMenuList_link"><span>Best Android phones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-smart-ring/" rel="follow" class="c-siteMenuList_link"><span>Best smart rings</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-blood-pressure-watch/" rel="follow" class="c-siteMenuList_link"><span>Best blood pressure watches</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-headphones-for-sleeping/" rel="follow" class="c-siteMenuList_link"><span>Best headphones for sleeping</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/home-and-office/kitchen-household/best-robot-vacuum-mop/" rel="follow" class="c-siteMenuList_link"><span>Best robot vacuum mops</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-web-hosting/" rel="follow" class="c-siteMenuList_link"><span>Best web hosting services</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-travel-vpn/" rel="follow" class="c-siteMenuList_link"><span>Best travel VPNs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-vpn/" rel="follow" class="c-siteMenuList_link"><span>Best VPNs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-ai-image-generator/" rel="follow" class="c-siteMenuList_link"><span>Best AI image generators</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-ai-chatbot/" rel="follow" class="c-siteMenuList_link"><span>Best AI chatbots</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-75-inch-tv/" rel="follow" class="c-siteMenuList_link"><span>Best 75-inch TVs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-phone/" rel="follow" class="c-siteMenuList_link"><span>Best smartphones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-iphone/" rel="follow" class="c-siteMenuList_link"><span>Best iPhones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-magsafe-battery/" rel="follow" class="c-siteMenuList_link"><span>Best MagSafe battery packs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-smart-notebook/" rel="follow" class="c-siteMenuList_link"><span>Best digital notebooks</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-tv-antenna/" rel="follow" class="c-siteMenuList_link"><span>Best TV antennas</span> <!----></a></span></li> <li class="c-siteMenuList_divider"></li></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-large"><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-tv/" rel="follow" class="c-siteMenuList_link"><span>Best TVs</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-laptop/" rel="follow" class="c-siteMenuList_link"><span>Best laptops</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-tablet/" rel="follow" class="c-siteMenuList_link"><span>Best tablets</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-smartwatch/" rel="follow" class="c-siteMenuList_link"><span>Best smartwatches</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/article/best-headphones/" rel="follow" class="c-siteMenuList_link"><span>Best headphones</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/home-and-office/home-entertainment/best-live-tv-streaming-service/" rel="follow" class="c-siteMenuList_link"><span>Best live TV streaming services</span> <!----></a></span></li> <!----></ul></div></div></div></div> <div class="c-siteHeaderNavigation_buttonShelf"><span class="c-siteHeaderNavigation_sloganWrapper g-text-xxsmall-bold"><a href="/about/" class="c-siteHeaderNavigation_slogan"><span><span>tomorrow</span> <span>belongs to those who embrace it</span> <span>today</span></span></a></span> <div class="c-siteHeaderNavigation_item"><div section="Editions" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-edition c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="editions-menu" class="c-sitePrimaryMenu_item c-sitePrimaryMenu_itemLink c-sitePrimaryMenu_itemIcon"><!----> <svg aria-label="Editions" class="c-sitePrimaryMenu_globeIcon"><use xlink:href="#globe" aria-hidden="false"/></svg></button> <!----> <div id="editions-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column c-siteMenuList_column-size-large"> <!----></ul><ul class="c-siteMenuList_column c-siteMenuList_column-size-small"> <!----></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.fr/" rel="follow" class="c-siteMenuList_link"><span>ZDNET France</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.de/" rel="follow" class="c-siteMenuList_link"><span>ZDNET Germany</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.co.kr/" rel="follow" class="c-siteMenuList_link"><span>ZDNET Korea</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://japan.zdnet.com/" rel="follow" class="c-siteMenuList_link"><span>ZDNET Japan</span> <!----></a></span></li> <!----></ul></div></div></div></div> <div class="c-siteHeaderNavigation_item"><div section="Search" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="search-menu" class="c-sitePrimaryMenu_item c-sitePrimaryMenu_itemLink c-sitePrimaryMenu_itemIcon"><!----> <svg aria-label="Search" class="c-sitePrimaryMenu_magIcon"><use xlink:href="#mag" aria-hidden="false"/></svg></button> <!----> <div id="search-menu" class="c-searchBar c-sitePrimaryMenu_subNav c-sitePrimaryMenu_subNav-search"><div class="g-grid-container u-grid-columns c-searchBar-grid"><div class="sm:u-col-hide md:u-col-hide lg:u-col-3"></div> <div class="sm:u-col-2 md:u-col-6 lg:u-col-9"><div id="c-searchAutosuggest" class="c-searchAutosuggest"><div role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-owns="c-searchAutosuggest-c-searchAutosuggest__results"><input type="text" autocomplete="off" aria-autocomplete="list" aria-activedescendant aria-controls="c-searchAutosuggest-c-searchAutosuggest__results" id="c-searchAutosuggest_input" placeholder="What are you looking for?" name="search" value class="c-searchAutosuggest_input"></div><button type="submit"><span class="search-go">Go</span> <svg><use xlink:href="#arrow-thin" aria-hidden="false"/></svg></button> <div id="c-searchAutosuggest-c-searchAutosuggest__results" class="c-searchAutosuggest__results-container"><!----> </div></div></div></div></div></div></div> <!----> <div role="dialog" aria-label="Popup to register or sign in to your ZDNET account" class="c-siteHeaderNavigation_item c-siteHeaderNavigation-login"><div title="Join / Log In" class="c-siteHeaderNavigation_loginButton header-link-tracking-taggy"><svg><use xlink:href="#user" aria-hidden="false"/></svg></div></div> <div class="c-siteHeaderNavigation_item c-siteHeaderNavigation_item-more"><div section="More" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu-more c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="more-menu" class="c-sitePrimaryMenu_item c-sitePrimaryMenu_itemLink c-sitePrimaryMenu_itemIcon"><!----> <svg aria-label="More" class="c-sitePrimaryMenu_menuIcon"><use xlink:href="#menu" aria-hidden="false"/></svg></button> <!----> <div id="more-menu" data-item="navMenu" class="c-sitePrimaryMenu_subNav"><div class="c-siteMenuList g-grid-container u-grid-columns"><div class="lg:u-col-3"></div> <ul class="c-siteMenuList_column c-siteMenuList_column-size-large"> <!----></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/topic/" rel="follow" class="c-siteMenuList_link"><span>See all Topics</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/finance/" class="c-siteMenuList_link"><span>Finance</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/education/" class="c-siteMenuList_link"><span>Education</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/topic/health/" class="c-siteMenuList_link"><span>Health</span> <!----></a></span></li> <!----></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/topic/?filter=special-features" rel="follow" class="c-siteMenuList_link"><span>Special Features</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/in-depth/" class="c-siteMenuList_link"><span>ZDNET In Depth</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="https://www.zdnet.com/zdnet-recommends/" rel="follow" class="c-siteMenuList_link"><span>ZDNET Recommends</span> <!----></a></span></li> <!----></ul><ul class="c-siteMenuList_column"><li class="c-siteMenuList_item"><span><a href="/newsletters/" class="c-siteMenuList_link"><span>Newsletters</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/video/" class="c-siteMenuList_link"><span>Videos</span> <!----></a></span></li><li class="c-siteMenuList_item"><span><a href="/editorial-guidelines/" rel="follow" class="c-siteMenuList_link"><span>Editorial Guidelines</span> <!----></a></span></li> <!----></ul></div></div></div></div> <div class="c-siteHeaderNavigation_item c-siteHeaderNavigation_item-accordion"><div section="Accordion" aria-haspopup="true" class="c-sitePrimaryMenu header-link-tracking-taggy c-sitePrimaryMenu_accordion c-sitePrimaryMenu_hasSubNav"><button type="button" aria-controls="accordion-menu" class="c-sitePrimaryMenu_item c-sitePrimaryMenu_itemLink c-sitePrimaryMenu_itemIcon"><!----> <svg aria-label="Accordion" class="c-sitePrimaryMenu_menuIcon"><use xlink:href="#menu" aria-hidden="false"/></svg></button> <!----> <div id="accordion-menu" class="c-siteAccordionMenu c-sitePrimaryMenu_subNav"><!----> <div class="c-siteAccordionMenu_content"><div role="button" class="c-siteAccordionMenu_closeButton"><svg><use xlink:href="#close" aria-hidden="false"/></svg></div> <ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Trending</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div><li class="c-siteAccordionMenu_item"><span><a href="/article/early-black-friday-2024-everything-you-need-to-know-about-holiday-shopping/" rel="follow" aria-label="Black Friday 2024: Everything you need to know about holiday shopping" class="c-siteAccordionMenu_link"><span>Black Friday 2024: Everything you need to know about holiday shopping</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/best-black-friday-deals-2024/" rel="follow" aria-label="Best Black Friday deals overall 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday deals overall 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-tv-deals-11-18-2024/" rel="follow" aria-label="Best Black Friday TV deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday TV deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/best-black-friday-walmart-deals-2024/" rel="follow" aria-label="Best Black Friday Walmart deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Walmart deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-amazon-deals-2024/" rel="follow" aria-label="Best Black Friday Amazon deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Amazon deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/best-black-friday-target-deals-2024/" rel="follow" aria-label="Best Black Friday Target deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Target deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/best-black-friday-sams-club-deals-2024/" rel="follow" aria-label="Best Black Friday Sam's Club deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Sam's Club deals 2024</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-soundbar-and-speaker-deals/" rel="follow" aria-label="Best Black Friday soundbar deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday soundbar deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-phone-deals-2024/" rel="follow" aria-label="Best Black Friday phone deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday phone deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-phone-deals-2024/" rel="follow" aria-label="Best Black Friday AirPods deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday AirPods deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-apple-watch-deals-2024/" rel="follow" aria-label="Best Black Friday Apple Watch deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Apple Watch deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-gaming-pc-deals-11-19-2024/" rel="follow" aria-label="Best Black Friday gaming PC deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday gaming PC deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-black-friday-nintendo-switch-deals-11-19-2024/" rel="follow" aria-label="Best Black Friday Nintendo deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday Nintendo deals 2024</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-black-friday-laptop-deals-2024/" rel="follow" aria-label="Best Black Friday laptop deals 2024" class="c-siteAccordionMenu_link"><span>Best Black Friday laptop deals 2024</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/one-of-the-best-cheap-soundbars-ive-tested-performs-as-well-as-models-twice-its-price-and-its-on-sale/" rel="follow" aria-label="Vizio 5.1 Soundbar SE is $80 off ahead of Black Friday" class="c-siteAccordionMenu_link"><span>Vizio 5.1 Soundbar SE is $80 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/kitchen-household/i-tested-a-luxury-nugget-ice-maker-and-its-totally-worth-it-and-its-on-sale-for-black-friday/" rel="follow" aria-label="GE Opal 2.0 ice maker is $150 off ahead of Black Friday" class="c-siteAccordionMenu_link"><span>GE Opal 2.0 ice maker is $150 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/hisense-u8n-black-friday-deal-11-20-2024/" rel="follow" aria-label="Hisense U8N TV is up to $1,100 off ahead of Black Friday" class="c-siteAccordionMenu_link"><span>Hisense U8N TV is up to $1,100 off ahead of Black Friday</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/how-to-use-bluesky-social-everything-to-know-about-the-popular-x-alternative/" rel="follow" aria-label="How to use Bluesky Social" class="c-siteAccordionMenu_link"><span>How to use Bluesky Social</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/how-to-download-youtube-videos-for-free-2-ways/" rel="follow" aria-label="How to download YouTube videos for free" class="c-siteAccordionMenu_link"><span>How to download YouTube videos for free</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/zdnet-recommends/" rel="follow" aria-label="ZDNET Recommends" class="c-siteAccordionMenu_link"><span>ZDNET Recommends</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Tech</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div><li class="c-siteAccordionMenu_item"><span><a href="/topic/gaming/" aria-label="Gaming" class="c-siteAccordionMenu_link"><span>Gaming</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/headphones/" aria-label="Headphones" class="c-siteAccordionMenu_link"><span>Headphones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/laptops/" aria-label="Laptops" class="c-siteAccordionMenu_link"><span>Laptops</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/mobile-accessories/" aria-label="Mobile Accessories" class="c-siteAccordionMenu_link"><span>Mobile Accessories</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/networking/" aria-label="Networking" class="c-siteAccordionMenu_link"><span>Networking</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/pcs/" aria-label="PCs" class="c-siteAccordionMenu_link"><span>PCs</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/printers/" aria-label="Printers" class="c-siteAccordionMenu_link"><span>Printers</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/smartphones/" aria-label="Smartphones" class="c-siteAccordionMenu_link"><span>Smartphones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/smart-watches/" aria-label="Smart Watches" class="c-siteAccordionMenu_link"><span>Smart Watches</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/speakers/" aria-label="Speakers" class="c-siteAccordionMenu_link"><span>Speakers</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/streaming-devices/" aria-label="Streaming Devices" class="c-siteAccordionMenu_link"><span>Streaming Devices</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/video-streaming-services/" aria-label="Streaming Services" class="c-siteAccordionMenu_link"><span>Streaming Services</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/tablets/" aria-label="Tablets" class="c-siteAccordionMenu_link"><span>Tablets</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/tvs/" aria-label="TVs" class="c-siteAccordionMenu_link"><span>TVs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/wearables/" aria-label="Wearables" class="c-siteAccordionMenu_link"><span>Wearables</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/kitchen-household/" aria-label="Kitchen & Household" class="c-siteAccordionMenu_link"><span>Kitchen & Household</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/office-furniture/" aria-label="Office Furniture" class="c-siteAccordionMenu_link"><span>Office Furniture</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/office-hardware-appliances/" aria-label="Office Hardware & Appliances" class="c-siteAccordionMenu_link"><span>Office Hardware & Appliances</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/smart-home/" aria-label="Smart Home" class="c-siteAccordionMenu_link"><span>Smart Home</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/smart-lighting/" aria-label="Smart Lighting" class="c-siteAccordionMenu_link"><span>Smart Lighting</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/yard-outdoors/" aria-label="Yard & Outdoors" class="c-siteAccordionMenu_link"><span>Yard & Outdoors</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Innovation</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div><li class="c-siteAccordionMenu_item"><span><a href="/topic/artificial-intelligence/" aria-label="Artificial Intelligence" class="c-siteAccordionMenu_link"><span>Artificial Intelligence</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/ar-vr/" aria-label="AR + VR" class="c-siteAccordionMenu_link"><span>AR + VR</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/cloud/" aria-label="Cloud" class="c-siteAccordionMenu_link"><span>Cloud</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/digital-transformation/" aria-label="Digital Transformation" class="c-siteAccordionMenu_link"><span>Digital Transformation</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/energy/" aria-label="Energy" class="c-siteAccordionMenu_link"><span>Energy</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/robotics/" aria-label="Robotics" class="c-siteAccordionMenu_link"><span>Robotics</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/sustainability/" aria-label="Sustainability" class="c-siteAccordionMenu_link"><span>Sustainability</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/transportation/" aria-label="Transportation" class="c-siteAccordionMenu_link"><span>Transportation</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/work-life/" aria-label="Work Life" class="c-siteAccordionMenu_link"><span>Work Life</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/accelerate-your-tech-game/" rel="follow" aria-label="Accelerate your tech game <small>Paid Content</small>" class="c-siteAccordionMenu_link"><span>Accelerate your tech game <small>Paid Content</small></span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/how-the-new-space-race-will-drive-innovation/" rel="follow" aria-label="How the New Space Race Will Drive Innovation" class="c-siteAccordionMenu_link"><span>How the New Space Race Will Drive Innovation</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/how-the-metaverse-will-change-the-future-of-work-and-society/" rel="follow" aria-label="How the metaverse will change the future of work and society" class="c-siteAccordionMenu_link"><span>How the metaverse will change the future of work and society</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/managing-the-multicloud/" rel="follow" aria-label="Managing the Multicloud" class="c-siteAccordionMenu_link"><span>Managing the Multicloud</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/the-future-of-the-internet/" rel="follow" aria-label="The Future of the Internet" class="c-siteAccordionMenu_link"><span>The Future of the Internet</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/the-new-rules-of-work/" rel="follow" aria-label="The New Rules of Work" class="c-siteAccordionMenu_link"><span>The New Rules of Work</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/the-tech-trends-to-watch-in-2023/" rel="follow" aria-label="The Tech Trends to Watch in 2023" class="c-siteAccordionMenu_link"><span>The Tech Trends to Watch in 2023</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Business</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div><li class="c-siteAccordionMenu_item"><span><a href="/topic/business/" aria-label="See all Business" class="c-siteAccordionMenu_link"><span>See all Business</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/amazon/" aria-label="Amazon" class="c-siteAccordionMenu_link"><span>Amazon</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/apple/" aria-label="Apple" class="c-siteAccordionMenu_link"><span>Apple</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/developer/" aria-label="Developer" class="c-siteAccordionMenu_link"><span>Developer</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/e-commerce/" aria-label="E-Commerce" class="c-siteAccordionMenu_link"><span>E-Commerce</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/edge-computing/" aria-label="Edge Computing" class="c-siteAccordionMenu_link"><span>Edge Computing</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/enterprise-software/" aria-label="Enterprise Software" class="c-siteAccordionMenu_link"><span>Enterprise Software</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/executive/" aria-label="Executive" class="c-siteAccordionMenu_link"><span>Executive</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/google/" aria-label="Google" class="c-siteAccordionMenu_link"><span>Google</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/microsoft/" aria-label="Microsoft" class="c-siteAccordionMenu_link"><span>Microsoft</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/professional-development/" aria-label="Professional Development" class="c-siteAccordionMenu_link"><span>Professional Development</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/social-media/" aria-label="Social Media" class="c-siteAccordionMenu_link"><span>Social Media</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/smb/" aria-label="SMB" class="c-siteAccordionMenu_link"><span>SMB</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/windows/" aria-label="Windows" class="c-siteAccordionMenu_link"><span>Windows</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/how-ai-is-transforming-organizations-everywhere/" rel="follow" aria-label="How AI is transforming organizations everywhere" class="c-siteAccordionMenu_link"><span>How AI is transforming organizations everywhere</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/the-intersection-of-generative-ai-and-engineering/" rel="follow" aria-label="The intersection of generative AI and engineering" class="c-siteAccordionMenu_link"><span>The intersection of generative AI and engineering</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/software-development-emerging-trends-and-changing-roles/" rel="follow" aria-label="Software development: Emerging trends and changing roles" class="c-siteAccordionMenu_link"><span>Software development: Emerging trends and changing roles</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Security</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div></div><div></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/security/" aria-current="page" aria-label="See all Security" class="c-siteAccordionMenu_link nuxt-link-exact-active nuxt-link-active"><span>See all Security</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/cyber-threats/" aria-label="Cyber Threats" class="c-siteAccordionMenu_link"><span>Cyber Threats</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/password-manager/" aria-label="Password Manager" class="c-siteAccordionMenu_link"><span>Password Manager</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/ransomware/" aria-label="Ransomware" class="c-siteAccordionMenu_link"><span>Ransomware</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/vpn/" aria-label="VPN" class="c-siteAccordionMenu_link"><span>VPN</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/cybersecurity-lets-get-tactical/" rel="follow" aria-label="Cybersecurity: Let's get tactical" class="c-siteAccordionMenu_link"><span>Cybersecurity: Let's get tactical</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/cybersecurity-lets-get-tactical/" rel="follow" aria-label="Securing the Cloud" class="c-siteAccordionMenu_link"><span>Securing the Cloud</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Advice</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div></div><div></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/deals/" rel="follow" aria-label="Deals" class="c-siteAccordionMenu_link"><span>Deals</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/how-to/" rel="follow" aria-label="How-to" class="c-siteAccordionMenu_link"><span>How-to</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/product-comparisons/" rel="follow" aria-label="Product Comparisons" class="c-siteAccordionMenu_link"><span>Product Comparisons</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/product-spotlights/" rel="follow" aria-label="Product Spotlights" class="c-siteAccordionMenu_link"><span>Product Spotlights</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/reviews/" rel="follow" aria-label="Reviews" class="c-siteAccordionMenu_link"><span>Reviews</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>Buying Guides</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div><li class="c-siteAccordionMenu_item"><span><a href="/best-products/" rel="follow" aria-label="See all Buying Guides" class="c-siteAccordionMenu_link"><span>See all Buying Guides</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-samsung-phone/" rel="follow" aria-label="Best Samsung phones" class="c-siteAccordionMenu_link"><span>Best Samsung phones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-android-phone/" rel="follow" aria-label="Best Android phones" class="c-siteAccordionMenu_link"><span>Best Android phones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-smart-ring/" rel="follow" aria-label="Best smart rings" class="c-siteAccordionMenu_link"><span>Best smart rings</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-blood-pressure-watch/" rel="follow" aria-label="Best blood pressure watches" class="c-siteAccordionMenu_link"><span>Best blood pressure watches</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-headphones-for-sleeping/" rel="follow" aria-label="Best headphones for sleeping" class="c-siteAccordionMenu_link"><span>Best headphones for sleeping</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/kitchen-household/best-robot-vacuum-mop/" rel="follow" aria-label="Best robot vacuum mops" class="c-siteAccordionMenu_link"><span>Best robot vacuum mops</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-web-hosting/" rel="follow" aria-label="Best web hosting services" class="c-siteAccordionMenu_link"><span>Best web hosting services</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-travel-vpn/" rel="follow" aria-label="Best travel VPNs" class="c-siteAccordionMenu_link"><span>Best travel VPNs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-vpn/" rel="follow" aria-label="Best VPNs" class="c-siteAccordionMenu_link"><span>Best VPNs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-ai-image-generator/" rel="follow" aria-label="Best AI image generators" class="c-siteAccordionMenu_link"><span>Best AI image generators</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-ai-chatbot/" rel="follow" aria-label="Best AI chatbots" class="c-siteAccordionMenu_link"><span>Best AI chatbots</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-75-inch-tv/" rel="follow" aria-label="Best 75-inch TVs" class="c-siteAccordionMenu_link"><span>Best 75-inch TVs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-phone/" rel="follow" aria-label="Best smartphones" class="c-siteAccordionMenu_link"><span>Best smartphones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-iphone/" rel="follow" aria-label="Best iPhones" class="c-siteAccordionMenu_link"><span>Best iPhones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-magsafe-battery/" rel="follow" aria-label="Best MagSafe battery packs" class="c-siteAccordionMenu_link"><span>Best MagSafe battery packs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-smart-notebook/" rel="follow" aria-label="Best digital notebooks" class="c-siteAccordionMenu_link"><span>Best digital notebooks</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-tv-antenna/" rel="follow" aria-label="Best TV antennas" class="c-siteAccordionMenu_link"><span>Best TV antennas</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-tv/" rel="follow" aria-label="Best TVs" class="c-siteAccordionMenu_link"><span>Best TVs</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-laptop/" rel="follow" aria-label="Best laptops" class="c-siteAccordionMenu_link"><span>Best laptops</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-tablet/" rel="follow" aria-label="Best tablets" class="c-siteAccordionMenu_link"><span>Best tablets</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-smartwatch/" rel="follow" aria-label="Best smartwatches" class="c-siteAccordionMenu_link"><span>Best smartwatches</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/article/best-headphones/" rel="follow" aria-label="Best headphones" class="c-siteAccordionMenu_link"><span>Best headphones</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/home-and-office/home-entertainment/best-live-tv-streaming-service/" rel="follow" aria-label="Best live TV streaming services" class="c-siteAccordionMenu_link"><span>Best live TV streaming services</span> <!----></a></span></li></div></ul><ul class="c-siteAccordionMenu_section header-link-tracking-taggy"><li class="c-siteAccordionMenu_sectionToggle"><span>More</span> <svg><use xlink:href="#arrow-dropdown" aria-hidden="false"/></svg></li> <div></div><div><li class="c-siteAccordionMenu_item"><span><a href="/topic/" rel="follow" aria-label="See all Topics" class="c-siteAccordionMenu_link"><span>See all Topics</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/finance/" aria-label="Finance" class="c-siteAccordionMenu_link"><span>Finance</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/education/" aria-label="Education" class="c-siteAccordionMenu_link"><span>Education</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/topic/health/" aria-label="Health" class="c-siteAccordionMenu_link"><span>Health</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/topic/?filter=special-features" rel="follow" aria-label="Special Features" class="c-siteAccordionMenu_link"><span>Special Features</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/in-depth/" aria-label="ZDNET In Depth" class="c-siteAccordionMenu_link"><span>ZDNET In Depth</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="https://www.zdnet.com/zdnet-recommends/" rel="follow" aria-label="ZDNET Recommends" class="c-siteAccordionMenu_link"><span>ZDNET Recommends</span> <!----></a></span></li></div><div><li class="c-siteAccordionMenu_item"><span><a href="/newsletters/" aria-label="Newsletters" class="c-siteAccordionMenu_link"><span>Newsletters</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/video/" aria-label="Videos" class="c-siteAccordionMenu_link"><span>Videos</span> <!----></a></span></li><li class="c-siteAccordionMenu_item"><span><a href="/editorial-guidelines/" rel="follow" aria-label="Editorial Guidelines" class="c-siteAccordionMenu_link"><span>Editorial Guidelines</span> <!----></a></span></li></div></ul></div></div></div></div></div></div></nav></div></header> <main data-v-60affc28><div class="c-seamlessListing" data-v-60affc28><div class="c-scrollPercent"><div class="c-scrollPercent" data-v-60affc28><div class="c-pageTopic g-grid-container" data-v-60affc28><header class="c-pageTopic_header"><h1 class="c-sectionHeading c-pageTopic_title">Security</h1> <div class="c-pageTopic_description">Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.</div></header> <div class="g-grid-container u-grid-columns"><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><!----></div><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div section="dynamic-topic-4-story-carousel-product-research" class="c-dynamicCarousel" style="grid-column:span 12;"><div class="c-listingCarouselHorizontal"><h4 class="c-sectionHeading">Product Research</h4> <span class="c-listingCarouselHorizontal_subhead g-color-text-meta g-text-xxsmall">Deep-dive, compare, decide</span> <span class="c-listingCarouselHorizontal_loadingIndicator"></span> <div class="VueCarousel c-listingCarouselHorizontal_desktop g-outer-spacing-bottom-small" style="display:none;"><div class="VueCarousel-wrapper"><div class="VueCarousel-inner" style="transform:translate(0px, 0);transition:0.5s ease transform;ms-flex-preferred-size:5px;webkit-flex-basis:5px;flex-basis:5px;visibility:visible;height:auto;padding-left:falsepx;padding-right:falsepx;"><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-airtag-wallet/" title="The best AirTag wallets of 2024: Expert tested" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="airtag-wallets" width="459" height="238.5" fetchpriority="low"></picture></div> The best AirTag wallets of 2024: Expert tested </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/bitdefender-vs-malwarebytes-which-antivirus-is-best/" title="Bitdefender vs. Malwarebytes: Which antivirus is best?" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="2022-ipad-air-fifth-generation-1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Bitdefender vs. Malwarebytes: Which antivirus is best? </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/flipper-zero-can-you-really-hack-wi-fi-networks-and-other-questions-answered/" title="Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now/" title="Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now)" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Blink Mini 2" width="459" height="238.5" fetchpriority="low"></picture></div> Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now) </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-no-log-vpns/" title="The best no-log VPNs of 2024: Expert tested and reviewed" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="ExpressVPN Web" width="459" height="238.5" fetchpriority="low"></picture></div> The best no-log VPNs of 2024: Expert tested and reviewed </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" title="One year later: 7 useful things the Flipper Zero can do that still blows my mind" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> One year later: 7 useful things the Flipper Zero can do that still blows my mind </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-home-security-system-in-dallas/" title="The best home security system in Dallas" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="replace-this-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> The best home security system in Dallas </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-encryption-software/" title="Best encryption software 2022: Protect your data" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screenshot-2020-04-15-at-15-34-00.png" width="459" height="238.5" fetchpriority="low"></picture></div> Best encryption software 2022: Protect your data </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/lose-your-keys-to-your-phantom-crypto-wallet-1password-has-you-covered/" title="Lose your keys to your Phantom crypto wallet? 1Password has you covered" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="shutterstock-1854624547.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Lose your keys to your Phantom crypto wallet? 1Password has you covered </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/she-didnt-trust-her-movers-a-single-apple-airtag-showed-she-was-right/" title="She didn't trust her movers. A single Apple AirTag proved she was right" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screenshot-2022-01-18-at-15-40-39.png" width="459" height="238.5" fetchpriority="low"></picture></div> She didn't trust her movers. A single Apple AirTag proved she was right </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-crypto-exchange/" title="Top crypto exchange 2022: The exchanges to know" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="crytpo-exchanges.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Top crypto exchange 2022: The exchanges to know </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/secure-your-data-like-james-bond-with-the-kingston-ironkey-vault-privacy-80/" title="Secure your data like James Bond with the Kingston IronKey Vault Privacy 80" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="img-6637" width="459" height="238.5" fetchpriority="low"></picture></div> Secure your data like James Bond with the Kingston IronKey Vault Privacy 80 </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/nortons-cynical-crypto-ploy-a-dark-harbinger-of-crapware-to-come/" title="Norton's cynical crypto ploy: A dark harbinger of crapware to come?" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="abstract highway path through digital binary towers in city." width="459" height="238.5" fetchpriority="low"></picture></div> Norton's cynical crypto ploy: A dark harbinger of crapware to come? </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/vmwares-carbon-black-offers-more-analyst-assistance-to-respond-to-attacks/" title="VMware's Carbon Black offers more analyst assistance to respond to attacks" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="vmware-using-carbon-black-to-secure-the-5f7fbaf893eaa218d73901d1-1-oct-09-2020-4-42-50-poster.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> VMware's Carbon Black offers more analyst assistance to respond to attacks </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-mac-cleaner/" title="Best Mac cleaner 2022: Our favorite optimization apps" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="mac-in-action.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Best Mac cleaner 2022: Our favorite optimization apps </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/panasonic-confirms-cyberattack-and-data-breach/" title="Panasonic confirms cyberattack and data breach" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="how-panasonic-watches-hackers-to-help-bo-5dee24fb9184870001a151ea-1-dec-10-2019-12-54-11-poster.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Panasonic confirms cyberattack and data breach </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/google-chrome-os-flex-supporting-macs-that-apple-has-long-forgotten/" title="Google's Chrome OS Flex supporting Macs that Apple has long forgotten" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="2022-02-16-12-06-14.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Google's Chrome OS Flex supporting Macs that Apple has long forgotten </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-cybersecurity-certification/" title="7 best cybersecurity certifications of 2022" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="replace-this-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> 7 best cybersecurity certifications of 2022 </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/ethical-hacking-book-review-a-hands-on-guide-for-would-be-security-professionals/" title="Ethical Hacking, book review: A hands-on guide for would-be security professionals" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="ethical-hacking-book-thumb.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Ethical Hacking, book review: A hands-on guide for would-be security professionals </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/firewalla-starts-taking-preorders-for-2-5-gigabit-gold-plus-firewall/" title="Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="firewalla-gold-plus" width="459" height="238.5" fetchpriority="low"></picture></div> Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/best-crypto-wallet/" title="Best crypto wallet 2022: Secure your cryptocurrency" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screen-shot-2021-04-06-at-11-18-37-am.png" width="459" height="238.5" fetchpriority="low"></picture></div> Best crypto wallet 2022: Secure your cryptocurrency </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/winkeo-c-fido2-hands-on/" title="Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Winkeo-C FIDO2" width="459" height="238.5" fetchpriority="low"></picture></div> Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/this-flash-drive-will-self-destruct-if-you-want-it-to/" title="This flash drive will self-destruct (if you want it to)" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> This flash drive will self-destruct (if you want it to) </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/blink-has-a-new-wired-floodlight-camera-and-blink-mini-pan-tilt/" title="Blink has a new floodlight camera and Blink Mini Pan-Tilt mount" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="blink-superior-lifestyles-patio-shot3" width="459" height="238.5" fetchpriority="low"></picture></div> Blink has a new floodlight camera and Blink Mini Pan-Tilt mount </a></div></div></div></div> <!----> <!----></div> <div class="c-listingCarouselHorizontal_mobile g-outer-spacing-bottom-small"><ul class="g-inner-spacing-bottom-medium"><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-airtag-wallet/" title="The best AirTag wallets of 2024: Expert tested" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="airtag-wallets" width="459" height="238.5" fetchpriority="low"></picture></div> The best AirTag wallets of 2024: Expert tested </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/bitdefender-vs-malwarebytes-which-antivirus-is-best/" title="Bitdefender vs. Malwarebytes: Which antivirus is best?" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="2022-ipad-air-fifth-generation-1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Bitdefender vs. Malwarebytes: Which antivirus is best? </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/flipper-zero-can-you-really-hack-wi-fi-networks-and-other-questions-answered/" title="Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now/" title="Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now)" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Blink Mini 2" width="459" height="238.5" fetchpriority="low"></picture></div> Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now) </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-no-log-vpns/" title="The best no-log VPNs of 2024: Expert tested and reviewed" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="ExpressVPN Web" width="459" height="238.5" fetchpriority="low"></picture></div> The best no-log VPNs of 2024: Expert tested and reviewed </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" title="One year later: 7 useful things the Flipper Zero can do that still blows my mind" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> One year later: 7 useful things the Flipper Zero can do that still blows my mind </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-home-security-system-in-dallas/" title="The best home security system in Dallas" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="replace-this-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> The best home security system in Dallas </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-encryption-software/" title="Best encryption software 2022: Protect your data" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screenshot-2020-04-15-at-15-34-00.png" width="459" height="238.5" fetchpriority="low"></picture></div> Best encryption software 2022: Protect your data </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/lose-your-keys-to-your-phantom-crypto-wallet-1password-has-you-covered/" title="Lose your keys to your Phantom crypto wallet? 1Password has you covered" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="shutterstock-1854624547.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Lose your keys to your Phantom crypto wallet? 1Password has you covered </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/she-didnt-trust-her-movers-a-single-apple-airtag-showed-she-was-right/" title="She didn't trust her movers. A single Apple AirTag proved she was right" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screenshot-2022-01-18-at-15-40-39.png" width="459" height="238.5" fetchpriority="low"></picture></div> She didn't trust her movers. A single Apple AirTag proved she was right </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-crypto-exchange/" title="Top crypto exchange 2022: The exchanges to know" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="crytpo-exchanges.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Top crypto exchange 2022: The exchanges to know </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/secure-your-data-like-james-bond-with-the-kingston-ironkey-vault-privacy-80/" title="Secure your data like James Bond with the Kingston IronKey Vault Privacy 80" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="img-6637" width="459" height="238.5" fetchpriority="low"></picture></div> Secure your data like James Bond with the Kingston IronKey Vault Privacy 80 </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/nortons-cynical-crypto-ploy-a-dark-harbinger-of-crapware-to-come/" title="Norton's cynical crypto ploy: A dark harbinger of crapware to come?" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="abstract highway path through digital binary towers in city." width="459" height="238.5" fetchpriority="low"></picture></div> Norton's cynical crypto ploy: A dark harbinger of crapware to come? </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/vmwares-carbon-black-offers-more-analyst-assistance-to-respond-to-attacks/" title="VMware's Carbon Black offers more analyst assistance to respond to attacks" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="vmware-using-carbon-black-to-secure-the-5f7fbaf893eaa218d73901d1-1-oct-09-2020-4-42-50-poster.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> VMware's Carbon Black offers more analyst assistance to respond to attacks </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-mac-cleaner/" title="Best Mac cleaner 2022: Our favorite optimization apps" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="mac-in-action.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Best Mac cleaner 2022: Our favorite optimization apps </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/panasonic-confirms-cyberattack-and-data-breach/" title="Panasonic confirms cyberattack and data breach" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="how-panasonic-watches-hackers-to-help-bo-5dee24fb9184870001a151ea-1-dec-10-2019-12-54-11-poster.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Panasonic confirms cyberattack and data breach </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/google-chrome-os-flex-supporting-macs-that-apple-has-long-forgotten/" title="Google's Chrome OS Flex supporting Macs that Apple has long forgotten" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="2022-02-16-12-06-14.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Google's Chrome OS Flex supporting Macs that Apple has long forgotten </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-cybersecurity-certification/" title="7 best cybersecurity certifications of 2022" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="replace-this-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> 7 best cybersecurity certifications of 2022 </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/ethical-hacking-book-review-a-hands-on-guide-for-would-be-security-professionals/" title="Ethical Hacking, book review: A hands-on guide for would-be security professionals" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="ethical-hacking-book-thumb.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Ethical Hacking, book review: A hands-on guide for would-be security professionals </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/firewalla-starts-taking-preorders-for-2-5-gigabit-gold-plus-firewall/" title="Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="firewalla-gold-plus" width="459" height="238.5" fetchpriority="low"></picture></div> Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/best-crypto-wallet/" title="Best crypto wallet 2022: Secure your cryptocurrency" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="screen-shot-2021-04-06-at-11-18-37-am.png" width="459" height="238.5" fetchpriority="low"></picture></div> Best crypto wallet 2022: Secure your cryptocurrency </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/winkeo-c-fido2-hands-on/" title="Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Winkeo-C FIDO2" width="459" height="238.5" fetchpriority="low"></picture></div> Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/this-flash-drive-will-self-destruct-if-you-want-it-to/" title="This flash drive will self-destruct (if you want it to)" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="GOTRAX 4 electric scooter" width="459" height="238.5" fetchpriority="low"></picture></div> This flash drive will self-destruct (if you want it to) </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/blink-has-a-new-wired-floodlight-camera-and-blink-mini-pan-tilt/" title="Blink has a new floodlight camera and Blink Mini Pan-Tilt mount" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="blink-superior-lifestyles-patio-shot3" width="459" height="238.5" fetchpriority="low"></picture></div> Blink has a new floodlight camera and Blink Mini Pan-Tilt mount </a></div></li></ul></div></div></div></div><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div class="g-grid-container u-grid-columns"><div class="lg:u-col-9 md:u-col-6 sm:u-col-2"><div section="dynamic-topic-3-story-carousel-how-to" class="c-dynamicCarousel" style="grid-column:span 9;"><div class="c-listingCarouselHorizontal"><h4 class="c-sectionHeading">How-to Guides</h4> <span class="c-listingCarouselHorizontal_subhead g-color-text-meta g-text-xxsmall">Practical tips, tricks, and advice for getting things done</span> <span class="c-listingCarouselHorizontal_loadingIndicator"></span> <div class="VueCarousel c-listingCarouselHorizontal_desktop g-outer-spacing-bottom-small" style="display:none;"><div class="VueCarousel-wrapper"><div class="VueCarousel-inner" style="transform:translate(0px, 0);transition:0.5s ease transform;ms-flex-preferred-size:6.666666666666667px;webkit-flex-basis:6.666666666666667px;flex-basis:6.666666666666667px;visibility:visible;height:auto;padding-left:falsepx;padding-right:falsepx;"><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-find-out-if-an-airtag-is-tracking-you/" title="How to find out if an AirTag is tracking you" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="AirTag notification on iPhone" width="459" height="238.5" fetchpriority="low"></picture></div> How to find out if an AirTag is tracking you </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-locate-a-password-with-the-macos-keychain/" title="How to locate a password with the macOS Keychain" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="keychain1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to locate a password with the macOS Keychain </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-manage-your-security-questions-for-a-local-windows-account/" title="How to manage your security questions for a local Windows account" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Update security questions and answers for a local Windows account" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage your security questions for a local Windows account </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-manage-ssh-connections-on-macos-with-termius/" title="How to manage SSH connections on MacOS with Termius" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Female professional student using laptop at desk, close up view" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage SSH connections on MacOS with Termius </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/small-business-cybersecurity-avoid-these-8-basic-mistakes-that-could-let-hackers-in/" title="Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="istock-two-people-at-a-computer.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/tired-of-being-tracked-online-duckduckgos-email-protection-can-help/" title="Tired of being tracked online? DuckDuckGo's Email Protection can help" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Get Started button for DuckDuckGo's email protection service." width="459" height="238.5" fetchpriority="low"></picture></div> Tired of being tracked online? DuckDuckGo's Email Protection can help </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-use-the-handy-ssh-management-tool-in-chrome-os/" title="How to use the handy SSH management tool in Chrome OS" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Terminal entry in the Chrome OS launcher." width="459" height="238.5" fetchpriority="low"></picture></div> How to use the handy SSH management tool in Chrome OS </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-opt-out-of-t-mobiles-latest-ad-tracking-campaign/" title="How to opt out of T-Mobile's creepy ad tracking campaign" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="t-mobile-ad-opt-out" width="459" height="238.5" fetchpriority="low"></picture></div> How to opt out of T-Mobile's creepy ad tracking campaign </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/the-definition-of-modern-zero-trust/" title="The definition of modern Zero Trust" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="doca-zero-trust-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> The definition of modern Zero Trust </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-require-strong-passwords-on-your-shared-windows-pc/" title="How to require strong passwords on your shared Windows PC" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="sample-image-16-9-red.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to require strong passwords on your shared Windows PC </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/break-up-with-lastpass-how-to-use-icloud-as-a-password-manager-on-windows/" title="Break up with LastPass: How to use iCloud as a password manager on Windows" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Businesswoman with smart phone looking at computer monitor. Young female professional is sitting at desk. She is wearing smart casuals at home office." width="459" height="238.5" fetchpriority="low"></picture></div> Break up with LastPass: How to use iCloud as a password manager on Windows </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-check-the-privacy-report-for-website-tracking-in-safari/" title="How to check the Privacy Report for website tracking in Safari" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Safari Privacy Report Shield." width="459" height="238.5" fetchpriority="low"></picture></div> How to check the Privacy Report for website tracking in Safari </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-manage-chome-os-syncing-for-better-portability-and-security/" title="How to manage Chrome OS syncing for better portability and security" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Lenovo Flex 5i 13 Chromebook" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage Chrome OS syncing for better portability and security </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-use-the-opera-vpn-and-why-you-should/" title="How to use the Opera VPN (and why you should)" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="operavpn1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to use the Opera VPN (and why you should) </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/cryptocurrency-101-what-every-business-needs-to-know/" title="What is crypto? A guide for getting started" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="bitcoin.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> What is crypto? A guide for getting started </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/todays-tinder-swindlers-how-scammers-steal-your-heart-then-your-money/" title="Tinder Swindlers: How scammers steal your heart, then your money" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Best dating app" width="459" height="238.5" fetchpriority="low"></picture></div> Tinder Swindlers: How scammers steal your heart, then your money </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/every-google-chrome-user-should-click-this-button/" title="Every Google Chrome user should click this button now" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Google Chrome Safety check" width="459" height="238.5" fetchpriority="low"></picture></div> Every Google Chrome user should click this button now </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-encrypt-email-in-thunderbird-and-why-you-should/" title="How to encrypt email in Thunderbird (and why you should)" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Woman sitting on couch with paper calendar and laptop" width="459" height="238.5" fetchpriority="low"></picture></div> How to encrypt email in Thunderbird (and why you should) </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-view-your-saved-passwords-in-macos/" title="How to view your saved passwords in MacOS" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Apple MacBook Pro 13.3-inch M1 on a table." width="459" height="238.5" fetchpriority="low"></picture></div> How to view your saved passwords in MacOS </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-enable-suspicious-message-alerts-and-protect-yourself-from-spam-in-android-13/" title="How to enable suspicious message alerts and protect yourself from spam in Android 13" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Suspicious Message Alerts entry in Android Settings." width="459" height="238.5" fetchpriority="low"></picture></div> How to enable suspicious message alerts and protect yourself from spam in Android 13 </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-set-up-ssh-key-authentication-in-linux-for-more-secure-logins/" title="How to set up SSH key authentication in Linux for more secure logins" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="remote-worker" width="459" height="238.5" fetchpriority="low"></picture></div> How to set up SSH key authentication in Linux for more secure logins </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/buying-a-second-hand-laptop-heres-how-to-stop-a-bargain-becoming-a-security-disaster/" title="Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Computer user resting head on hand using laptop" width="459" height="238.5" fetchpriority="low"></picture></div> Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-to-lock-active-incognito-tabs-on-android-chrome-for-more-privacy/" title="How to lock active incognito tabs on Android Chrome for more privacy" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Chrome flags window in Android." width="459" height="238.5" fetchpriority="low"></picture></div> How to lock active incognito tabs on Android Chrome for more privacy </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/why-you-should-be-using-secure-dns-on-your-chromebook/" title="Why you should be using secure DNS on your Chromebook" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="securedns1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Why you should be using secure DNS on your Chromebook </a></div></div></div></div> <!----> <!----></div> <div class="c-listingCarouselHorizontal_mobile g-outer-spacing-bottom-small"><ul class="g-inner-spacing-bottom-medium"><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-find-out-if-an-airtag-is-tracking-you/" title="How to find out if an AirTag is tracking you" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="AirTag notification on iPhone" width="459" height="238.5" fetchpriority="low"></picture></div> How to find out if an AirTag is tracking you </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-locate-a-password-with-the-macos-keychain/" title="How to locate a password with the macOS Keychain" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="keychain1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to locate a password with the macOS Keychain </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-manage-your-security-questions-for-a-local-windows-account/" title="How to manage your security questions for a local Windows account" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Update security questions and answers for a local Windows account" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage your security questions for a local Windows account </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-manage-ssh-connections-on-macos-with-termius/" title="How to manage SSH connections on MacOS with Termius" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Female professional student using laptop at desk, close up view" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage SSH connections on MacOS with Termius </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/small-business-cybersecurity-avoid-these-8-basic-mistakes-that-could-let-hackers-in/" title="Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="istock-two-people-at-a-computer.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/tired-of-being-tracked-online-duckduckgos-email-protection-can-help/" title="Tired of being tracked online? DuckDuckGo's Email Protection can help" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Get Started button for DuckDuckGo's email protection service." width="459" height="238.5" fetchpriority="low"></picture></div> Tired of being tracked online? DuckDuckGo's Email Protection can help </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-use-the-handy-ssh-management-tool-in-chrome-os/" title="How to use the handy SSH management tool in Chrome OS" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Terminal entry in the Chrome OS launcher." width="459" height="238.5" fetchpriority="low"></picture></div> How to use the handy SSH management tool in Chrome OS </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-opt-out-of-t-mobiles-latest-ad-tracking-campaign/" title="How to opt out of T-Mobile's creepy ad tracking campaign" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="t-mobile-ad-opt-out" width="459" height="238.5" fetchpriority="low"></picture></div> How to opt out of T-Mobile's creepy ad tracking campaign </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/the-definition-of-modern-zero-trust/" title="The definition of modern Zero Trust" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="doca-zero-trust-image.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> The definition of modern Zero Trust </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-require-strong-passwords-on-your-shared-windows-pc/" title="How to require strong passwords on your shared Windows PC" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="sample-image-16-9-red.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to require strong passwords on your shared Windows PC </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/break-up-with-lastpass-how-to-use-icloud-as-a-password-manager-on-windows/" title="Break up with LastPass: How to use iCloud as a password manager on Windows" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Businesswoman with smart phone looking at computer monitor. Young female professional is sitting at desk. She is wearing smart casuals at home office." width="459" height="238.5" fetchpriority="low"></picture></div> Break up with LastPass: How to use iCloud as a password manager on Windows </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-check-the-privacy-report-for-website-tracking-in-safari/" title="How to check the Privacy Report for website tracking in Safari" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Safari Privacy Report Shield." width="459" height="238.5" fetchpriority="low"></picture></div> How to check the Privacy Report for website tracking in Safari </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-manage-chome-os-syncing-for-better-portability-and-security/" title="How to manage Chrome OS syncing for better portability and security" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Lenovo Flex 5i 13 Chromebook" width="459" height="238.5" fetchpriority="low"></picture></div> How to manage Chrome OS syncing for better portability and security </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-use-the-opera-vpn-and-why-you-should/" title="How to use the Opera VPN (and why you should)" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="operavpn1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> How to use the Opera VPN (and why you should) </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/cryptocurrency-101-what-every-business-needs-to-know/" title="What is crypto? A guide for getting started" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="bitcoin.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> What is crypto? A guide for getting started </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/todays-tinder-swindlers-how-scammers-steal-your-heart-then-your-money/" title="Tinder Swindlers: How scammers steal your heart, then your money" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Best dating app" width="459" height="238.5" fetchpriority="low"></picture></div> Tinder Swindlers: How scammers steal your heart, then your money </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/every-google-chrome-user-should-click-this-button/" title="Every Google Chrome user should click this button now" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Google Chrome Safety check" width="459" height="238.5" fetchpriority="low"></picture></div> Every Google Chrome user should click this button now </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-encrypt-email-in-thunderbird-and-why-you-should/" title="How to encrypt email in Thunderbird (and why you should)" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Woman sitting on couch with paper calendar and laptop" width="459" height="238.5" fetchpriority="low"></picture></div> How to encrypt email in Thunderbird (and why you should) </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-view-your-saved-passwords-in-macos/" title="How to view your saved passwords in MacOS" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Apple MacBook Pro 13.3-inch M1 on a table." width="459" height="238.5" fetchpriority="low"></picture></div> How to view your saved passwords in MacOS </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-enable-suspicious-message-alerts-and-protect-yourself-from-spam-in-android-13/" title="How to enable suspicious message alerts and protect yourself from spam in Android 13" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Suspicious Message Alerts entry in Android Settings." width="459" height="238.5" fetchpriority="low"></picture></div> How to enable suspicious message alerts and protect yourself from spam in Android 13 </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-set-up-ssh-key-authentication-in-linux-for-more-secure-logins/" title="How to set up SSH key authentication in Linux for more secure logins" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="remote-worker" width="459" height="238.5" fetchpriority="low"></picture></div> How to set up SSH key authentication in Linux for more secure logins </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/buying-a-second-hand-laptop-heres-how-to-stop-a-bargain-becoming-a-security-disaster/" title="Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Computer user resting head on hand using laptop" width="459" height="238.5" fetchpriority="low"></picture></div> Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-to-lock-active-incognito-tabs-on-android-chrome-for-more-privacy/" title="How to lock active incognito tabs on Android Chrome for more privacy" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The Chrome flags window in Android." width="459" height="238.5" fetchpriority="low"></picture></div> How to lock active incognito tabs on Android Chrome for more privacy </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/why-you-should-be-using-secure-dns-on-your-chromebook/" title="Why you should be using secure DNS on your Chromebook" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="securedns1.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Why you should be using secure DNS on your Chromebook </a></div></li></ul></div></div></div><div section="dynamic-topic-3-story-carousel-analysis" class="c-dynamicCarousel" style="grid-column:span 9;"><div class="c-listingCarouselHorizontal"><h4 class="c-sectionHeading">Analysis & Opinion</h4> <span class="c-listingCarouselHorizontal_subhead g-color-text-meta g-text-xxsmall">Explore a fresh perspective</span> <span class="c-listingCarouselHorizontal_loadingIndicator"></span> <div class="VueCarousel c-listingCarouselHorizontal_desktop g-outer-spacing-bottom-small" style="display:none;"><div class="VueCarousel-wrapper"><div class="VueCarousel-inner" style="transform:translate(0px, 0);transition:0.5s ease transform;ms-flex-preferred-size:6.666666666666667px;webkit-flex-basis:6.666666666666667px;flex-basis:6.666666666666667px;visibility:visible;height:auto;padding-left:falsepx;padding-right:falsepx;"><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/why-you-dont-need-to-pay-for-antivirus-software-anymore/" title="Why you don't need to pay for antivirus software anymore" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="virus icon" width="459" height="238.5" fetchpriority="low"></picture></div> Why you don't need to pay for antivirus software anymore </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/cant-quit-windows-10-microsoft-will-charge-for-updates-next-year-heres-how-much/" title="Can't quit Windows 10? Microsoft will charge for updates next year. Here's how much" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="money signs" width="459" height="238.5" fetchpriority="low"></picture></div> Can't quit Windows 10? Microsoft will charge for updates next year. Here's how much </a></div></div><div tabindex="0" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/why-windows-11-requires-a-tpm-and-how-to-get-around-that/" title="Why Windows 11 requires a TPM - and how to get around that" tabindex="0" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="TPM chip" width="459" height="238.5" fetchpriority="low"></picture></div> Why Windows 11 requires a TPM - and how to get around that </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/i-tested-7-ai-content-detectors-theyre-getting-dramatically-better-at-identifying-plagiarism/" title="I tested 7 AI content detectors - they're getting dramatically better at identifying plagiarism" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="AI eye concept" width="459" height="238.5" fetchpriority="low"></picture></div> I tested 7 AI content detectors - they're getting dramatically better at identifying plagiarism </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/why-you-should-power-off-your-phone-at-least-once-a-week-according-to-the-nsa/" title="Why you should power off your phone at least once a week - according to the NSA" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="nsa-phone" width="459" height="238.5" fetchpriority="low"></picture></div> Why you should power off your phone at least once a week - according to the NSA </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/its-world-password-day-heres-the-one-simple-tip-you-need-to-keep-your-accounts-secure-online/" title="It's World Password Day! Here's the one simple tip you need to keep your accounts secure online" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="460630045.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> It's World Password Day! Here's the one simple tip you need to keep your accounts secure online </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/the-future-of-work-employee-privacy/" title="The future of work: Employee privacy" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Cybersecurity and data privacy protection concept, lock, binary digits background" width="459" height="238.5" fetchpriority="low"></picture></div> The future of work: Employee privacy </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/ukraine-is-building-an-it-army-of-volunteers-something-thats-never-been-tried-before/" title="Ukraine is building an 'IT army' of volunteers, something that's never been tried before" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept" width="459" height="238.5" fetchpriority="low"></picture></div> Ukraine is building an 'IT army' of volunteers, something that's never been tried before </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/your-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology/" title="Your biggest cyber-crime threat has almost nothing to do with technology" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="a-man-looking-at-a-laptop-in-the-office-at-night" width="459" height="238.5" fetchpriority="low"></picture></div> Your biggest cyber-crime threat has almost nothing to do with technology </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/codenotary-introduces-software-bill-of-materials-service-for-kubernetes/" title="Codenotary introduces Software Bill of Materials service for Kubernetes" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Christian Kotzbauer" width="459" height="238.5" fetchpriority="low"></picture></div> Codenotary introduces Software Bill of Materials service for Kubernetes </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/ukrainian-software-developers-share-their-stories-and-photos-from-the-war-zone/" title="Ukrainian software developers share their stories and photos from the war zone" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="headway-4-thumb.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Ukrainian software developers share their stories and photos from the war zone </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/dont-let-your-cloud-cybersecurity-choices-leave-the-door-open-for-hackers/" title="Don't let your cloud cybersecurity choices leave the door open for hackers" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Don't let your cloud cybersecurity choices leave the door open for hackers </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/the-ransomware-problem-wont-get-better-until-we-change-one-thing/" title="The ransomware problem won't get better until we change one thing" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room" width="459" height="238.5" fetchpriority="low"></picture></div> The ransomware problem won't get better until we change one thing </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/i-need-a-new-iphone-is-last-years-model-good-enough-ask-zdnet/" title="I need a new iPhone. Is last year's model good enough? [Ask ZDNet]" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Upset man fingers on keyboard" width="459" height="238.5" fetchpriority="low"></picture></div> I need a new iPhone. Is last year's model good enough? [Ask ZDNet] </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/want-to-block-third-party-trackers-on-your-android-device-try-duckduckgos-new-feature/" title="Want to block third-party trackers on your Android device? Try DuckDuckGo's new feature" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The App Tracking Protection Waitlist request page." width="459" height="238.5" fetchpriority="low"></picture></div> Want to block third-party trackers on your Android device? Try DuckDuckGo's new feature </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/fraud-protection-efforts-target-fake-corporate-identities-online-and-offline/" title="Fraud protection efforts target fake corporate identities online and offline" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="fraud.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Fraud protection efforts target fake corporate identities online and offline </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-can-i-keep-junk-email-out-of-my-inbox-without-juggling-two-or-more-email-accounts-ask-zdnet/" title="How can I keep junk email out of my inbox without juggling two or more email accounts? [Ask ZDNet]" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="email alias symbol" width="459" height="238.5" fetchpriority="low"></picture></div> How can I keep junk email out of my inbox without juggling two or more email accounts? [Ask ZDNet] </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/the-scary-future-of-the-internet-how-the-tech-of-tomorrow-will-pose-even-bigger-cybersecurity-threats/" title="The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Future Internet cybersecurity" width="459" height="238.5" fetchpriority="low"></picture></div> The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now/" title="Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="critical-infrastructure" width="459" height="238.5" fetchpriority="low"></picture></div> Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/how-do-i-keep-two-pcs-in-sync-when-theyre-in-different-locations-ask-zdnet/" title="How do I keep two PCs in sync when they're in different locations? [Ask ZDNet]" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="apps sync to multiple devices" width="459" height="238.5" fetchpriority="low"></picture></div> How do I keep two PCs in sync when they're in different locations? [Ask ZDNet] </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/the-future-of-the-web-the-good-the-bad-and-the-very-weird/" title="The Future of the Web: The good, the bad and the very weird" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="internet" width="459" height="238.5" fetchpriority="low"></picture></div> The Future of the Web: The good, the bad and the very weird </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/these-are-the-cybersecurity-threats-of-tomorrow-that-you-should-be-thinking-about-today/" title="These are the cybersecurity threats of tomorrow that you should be thinking about today" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="portrait-of-woman-operating-digital-interface-technology" width="459" height="238.5" fetchpriority="low"></picture></div> These are the cybersecurity threats of tomorrow that you should be thinking about today </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/solarwinds-heres-how-were-building-everything-around-this-new-cybersecurity-strategy/" title="SolarWinds: Here's how we're building everything around this new cybersecurity strategy" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="solarwinds-hq-in-austin-texas.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> SolarWinds: Here's how we're building everything around this new cybersecurity strategy </a></div></div><div tabindex="-1" aria-hidden="true" role="tabpanel" class="VueCarousel-slide"><div class="c-listingCarouselHorizontal_item"><a href="/article/is-amazon-about-to-ruin-alexa-answers-with-ads/" title="Is Amazon about to ruin Alexa answers with ads?" tabindex="-1" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Amazon Echo Studio review | Best smart speaker" width="459" height="238.5" fetchpriority="low"></picture></div> Is Amazon about to ruin Alexa answers with ads? </a></div></div></div></div> <!----> <!----></div> <div class="c-listingCarouselHorizontal_mobile g-outer-spacing-bottom-small"><ul class="g-inner-spacing-bottom-medium"><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/why-you-dont-need-to-pay-for-antivirus-software-anymore/" title="Why you don't need to pay for antivirus software anymore" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="virus icon" width="459" height="238.5" fetchpriority="low"></picture></div> Why you don't need to pay for antivirus software anymore </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/cant-quit-windows-10-microsoft-will-charge-for-updates-next-year-heres-how-much/" title="Can't quit Windows 10? Microsoft will charge for updates next year. Here's how much" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="money signs" width="459" height="238.5" fetchpriority="low"></picture></div> Can't quit Windows 10? Microsoft will charge for updates next year. Here's how much </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/why-windows-11-requires-a-tpm-and-how-to-get-around-that/" title="Why Windows 11 requires a TPM - and how to get around that" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="TPM chip" width="459" height="238.5" fetchpriority="low"></picture></div> Why Windows 11 requires a TPM - and how to get around that </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/i-tested-7-ai-content-detectors-theyre-getting-dramatically-better-at-identifying-plagiarism/" title="I tested 7 AI content detectors - they're getting dramatically better at identifying plagiarism" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="AI eye concept" width="459" height="238.5" fetchpriority="low"></picture></div> I tested 7 AI content detectors - they're getting dramatically better at identifying plagiarism </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/why-you-should-power-off-your-phone-at-least-once-a-week-according-to-the-nsa/" title="Why you should power off your phone at least once a week - according to the NSA" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="nsa-phone" width="459" height="238.5" fetchpriority="low"></picture></div> Why you should power off your phone at least once a week - according to the NSA </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/its-world-password-day-heres-the-one-simple-tip-you-need-to-keep-your-accounts-secure-online/" title="It's World Password Day! Here's the one simple tip you need to keep your accounts secure online" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="460630045.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> It's World Password Day! Here's the one simple tip you need to keep your accounts secure online </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/the-future-of-work-employee-privacy/" title="The future of work: Employee privacy" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Cybersecurity and data privacy protection concept, lock, binary digits background" width="459" height="238.5" fetchpriority="low"></picture></div> The future of work: Employee privacy </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/ukraine-is-building-an-it-army-of-volunteers-something-thats-never-been-tried-before/" title="Ukraine is building an 'IT army' of volunteers, something that's never been tried before" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept" width="459" height="238.5" fetchpriority="low"></picture></div> Ukraine is building an 'IT army' of volunteers, something that's never been tried before </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/your-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology/" title="Your biggest cyber-crime threat has almost nothing to do with technology" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="a-man-looking-at-a-laptop-in-the-office-at-night" width="459" height="238.5" fetchpriority="low"></picture></div> Your biggest cyber-crime threat has almost nothing to do with technology </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/codenotary-introduces-software-bill-of-materials-service-for-kubernetes/" title="Codenotary introduces Software Bill of Materials service for Kubernetes" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Christian Kotzbauer" width="459" height="238.5" fetchpriority="low"></picture></div> Codenotary introduces Software Bill of Materials service for Kubernetes </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/ukrainian-software-developers-share-their-stories-and-photos-from-the-war-zone/" title="Ukrainian software developers share their stories and photos from the war zone" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="headway-4-thumb.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Ukrainian software developers share their stories and photos from the war zone </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/dont-let-your-cloud-cybersecurity-choices-leave-the-door-open-for-hackers/" title="Don't let your cloud cybersecurity choices leave the door open for hackers" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Don't let your cloud cybersecurity choices leave the door open for hackers </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/the-ransomware-problem-wont-get-better-until-we-change-one-thing/" title="The ransomware problem won't get better until we change one thing" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room" width="459" height="238.5" fetchpriority="low"></picture></div> The ransomware problem won't get better until we change one thing </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/i-need-a-new-iphone-is-last-years-model-good-enough-ask-zdnet/" title="I need a new iPhone. Is last year's model good enough? [Ask ZDNet]" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Upset man fingers on keyboard" width="459" height="238.5" fetchpriority="low"></picture></div> I need a new iPhone. Is last year's model good enough? [Ask ZDNet] </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/want-to-block-third-party-trackers-on-your-android-device-try-duckduckgos-new-feature/" title="Want to block third-party trackers on your Android device? Try DuckDuckGo's new feature" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="The App Tracking Protection Waitlist request page." width="459" height="238.5" fetchpriority="low"></picture></div> Want to block third-party trackers on your Android device? Try DuckDuckGo's new feature </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/fraud-protection-efforts-target-fake-corporate-identities-online-and-offline/" title="Fraud protection efforts target fake corporate identities online and offline" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="fraud.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> Fraud protection efforts target fake corporate identities online and offline </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-can-i-keep-junk-email-out-of-my-inbox-without-juggling-two-or-more-email-accounts-ask-zdnet/" title="How can I keep junk email out of my inbox without juggling two or more email accounts? [Ask ZDNet]" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="email alias symbol" width="459" height="238.5" fetchpriority="low"></picture></div> How can I keep junk email out of my inbox without juggling two or more email accounts? [Ask ZDNet] </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/the-scary-future-of-the-internet-how-the-tech-of-tomorrow-will-pose-even-bigger-cybersecurity-threats/" title="The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Future Internet cybersecurity" width="459" height="238.5" fetchpriority="low"></picture></div> The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now/" title="Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="critical-infrastructure" width="459" height="238.5" fetchpriority="low"></picture></div> Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/how-do-i-keep-two-pcs-in-sync-when-theyre-in-different-locations-ask-zdnet/" title="How do I keep two PCs in sync when they're in different locations? [Ask ZDNet]" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="apps sync to multiple devices" width="459" height="238.5" fetchpriority="low"></picture></div> How do I keep two PCs in sync when they're in different locations? [Ask ZDNet] </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/the-future-of-the-web-the-good-the-bad-and-the-very-weird/" title="The Future of the Web: The good, the bad and the very weird" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="internet" width="459" height="238.5" fetchpriority="low"></picture></div> The Future of the Web: The good, the bad and the very weird </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/these-are-the-cybersecurity-threats-of-tomorrow-that-you-should-be-thinking-about-today/" title="These are the cybersecurity threats of tomorrow that you should be thinking about today" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="portrait-of-woman-operating-digital-interface-technology" width="459" height="238.5" fetchpriority="low"></picture></div> These are the cybersecurity threats of tomorrow that you should be thinking about today </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/solarwinds-heres-how-were-building-everything-around-this-new-cybersecurity-strategy/" title="SolarWinds: Here's how we're building everything around this new cybersecurity strategy" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="solarwinds-hq-in-austin-texas.jpg" width="459" height="238.5" fetchpriority="low"></picture></div> SolarWinds: Here's how we're building everything around this new cybersecurity strategy </a></div></li><li><div class="c-listingCarouselHorizontal_item g-text-small"><a href="/article/is-amazon-about-to-ruin-alexa-answers-with-ads/" title="Is Amazon about to ruin Alexa answers with ads?" class="c-listingCarouselHorizontal_itemLink g-text-bold"><div class="c-listingCarouselHorizontal_image g-outer-spacing-bottom-small"><picture class="c-cmsImage" style="aspect-ratio:459/238.5;"><!----> <img src alt="Amazon Echo Studio review | Best smart speaker" width="459" height="238.5" fetchpriority="low"></picture></div> Is Amazon about to ruin Alexa answers with ads? </a></div></li></ul></div></div></div></div><div class="lg:u-col-3 md:u-col-6 sm:u-col-2"><div section="dynamic-topic-listing-right-rail-basic-latest" class="c-dynamicListing" style="grid-column:span 3;"><div class="c-listingLatest c-dynamicListing_listing"><h3 class="c-listingLatest_heading c-sectionHeading"> Latest </h3> <div><div class="c-listingLatest_item"><a href="/article/this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service/" class="c-listingLatest_itemLink"> This new wireless carrier promises ultra-secure mobile phone service </a> <span class="c-listingLatest_pubDate">17 hours ago</span></div><div class="c-listingLatest_item"><a href="/article/you-can-finally-test-microsofts-controversial-recall-feature-heres-how/" class="c-listingLatest_itemLink"> You can finally test Microsoft's controversial Recall feature - here's how </a> <span class="c-listingLatest_pubDate">20 hours ago</span></div><div class="c-listingLatest_item"><a href="/article/best-iphone-vpn/" class="c-listingLatest_itemLink"> The best VPNs for iPhone: Expert tested </a> <span class="c-listingLatest_pubDate">20 hours ago</span></div><div class="c-listingLatest_item"><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" class="c-listingLatest_itemLink"> One year later: 7 useful things the Flipper Zero can do that still blows my mind </a> <span class="c-listingLatest_pubDate">20 hours ago</span></div><div class="c-listingLatest_item"><a href="/article/best-vpn-router/" class="c-listingLatest_itemLink"> The best VPN routers you can buy </a> <span class="c-listingLatest_pubDate">21 hours ago</span></div> <!----></div></div></div></div></div><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div class="c-featureDynamicAd" style="grid-column:span 12;"><div class="c-adDisplay_container c-adDisplay_container_incontent-ad-plus spaced blank"><!----></div></div></div><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div class="lg:u-col-12 md:u-col-6 sm:u-col-2"><div section="dynamic-topic-five-story-feature-latest-offset-5" class="c-FiveStoryFeature" style="grid-column:span 12;"><div class="c-listingFiveStory"><div class="c-listingFiveStory_heading g-border-thin-dark-top u-flexbox u-flexbox-alignCenter"><div class="c-listingFiveStory_titleWrapper u-flexbox-column"><!----> <!----></div> <!----></div> <div class="c-listingFiveStory_container u-flexbox-column u-flexbox-justifyBetween u-flexbox-alignFlexStart .g-outer-spacing-bottom-medium"><div class="c-listingFiveStory_first-item-container"><a href="/article/this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service/" class="c-listingFiveStory_item u-flexbox c-listingFiveStory_item--first"><div class="c-listingFiveStory_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:1600/900;"><!----> <img src alt="screenshot-2024-11-22-at-12-18-24pm.png" width="1600" height="900" fetchpriority="low"></picture></div> <span class="g-text-small-bold"> This new wireless carrier promises ultra-secure mobile phone service </span> <p class="c-listingFiveStory_description g-text-xsmall">This mobile provider service was available only to government users but has since expanded. If you fall into these categories, you may be eligible today, but the service will expand to the general public soon, too.</p></a></div> <div class="c-listingFiveStory_additional-items-container"><a href="/article/you-can-finally-test-microsofts-controversial-recall-feature-heres-how/" class="c-listingFiveStory_item u-flexbox c-listingFiveStory_item--additional"><div class="c-listingFiveStory_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:1200/675;"><!----> <img src alt="camera" width="1200" height="675" fetchpriority="low"></picture></div> <span class="g-text-small-bold"> You can finally test Microsoft's controversial Recall feature - here's how </span></a><a href="/article/best-iphone-vpn/" class="c-listingFiveStory_item u-flexbox c-listingFiveStory_item--additional"><div class="c-listingFiveStory_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:1200/675;"><!----> <img src alt="daniel-romero-q-rqba-xcgu-unsplash.jpg" width="1200" height="675" fetchpriority="low"></picture></div> <span class="g-text-small-bold"> The best VPNs for iPhone: Expert tested </span></a><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" class="c-listingFiveStory_item u-flexbox c-listingFiveStory_item--additional"><div class="c-listingFiveStory_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:1200/675;"><!----> <img src alt="GOTRAX 4 electric scooter" width="1200" height="675" fetchpriority="low"></picture></div> <span class="g-text-small-bold"> One year later: 7 useful things the Flipper Zero can do that still blows my mind </span></a><a href="/article/best-vpn-router/" class="c-listingFiveStory_item u-flexbox c-listingFiveStory_item--additional"><div class="c-listingFiveStory_image g-outer-spacing-bottom-xsmall"><picture class="c-cmsImage" style="aspect-ratio:1200/675;"><!----> <img src alt="A black VPN router with its antennas up against an orange background" width="1200" height="675" fetchpriority="low"></picture></div> <span class="g-text-small-bold"> The best VPN routers you can buy </span></a></div></div></div></div></div><div class="g-grid-container u-grid-columns"><div class="lg:u-col-8 md:u-col-6 sm:u-col-2"><div section="dynamic-topic-river-alt-latest-offset-10" class="c-featureDefaultListing" style="grid-column:span 8;"><!----> <div element-type="default-listing" class="c-listingDefault"><!----> <div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage c-cmsImage_loaded" style="aspect-ratio:306/172;"><source media="(max-width: 767px)" srcset="https://www.zdnet.com/a/img/resize/12e42a82500c344a16ddbb35f2a51d2e5404647d/2024/11/22/f002e24f-f493-443b-a2fd-5ff172a5d756/screenshot-2024-11-22-at-12-18-24pm.png?auto=webp&fit=crop&frame=1&height=102&precrop=2486,1397,x0,y0&width=196" alt="screenshot-2024-11-22-at-12-18-24pm.png"><source media="(max-width: 1023px)" srcset="https://www.zdnet.com/a/img/resize/412bb971e73afc23b9a34a3aa8b97c0ccca69f1e/2024/11/22/f002e24f-f493-443b-a2fd-5ff172a5d756/screenshot-2024-11-22-at-12-18-24pm.png?auto=webp&fit=crop&frame=1&height=234&precrop=2486,1397,x0,y0&width=416" alt="screenshot-2024-11-22-at-12-18-24pm.png"><source media="(max-width: 1440px)" srcset="https://www.zdnet.com/a/img/resize/8c21c06fdc8f9b8ce08ce9645ba558d686bb6e9e/2024/11/22/f002e24f-f493-443b-a2fd-5ff172a5d756/screenshot-2024-11-22-at-12-18-24pm.png?auto=webp&fit=crop&frame=1&height=172&precrop=2486,1397,x0,y0&width=306" alt="screenshot-2024-11-22-at-12-18-24pm.png"> <img src="https://www.zdnet.com/a/img/resize/8c21c06fdc8f9b8ce08ce9645ba558d686bb6e9e/2024/11/22/f002e24f-f493-443b-a2fd-5ff172a5d756/screenshot-2024-11-22-at-12-18-24pm.png?auto=webp&fit=crop&frame=1&height=172&precrop=2486,1397,x0,y0&width=306" alt="screenshot-2024-11-22-at-12-18-24pm.png" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> This new wireless carrier promises ultra-secure mobile phone service </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> This mobile provider service was available only to government users but has since expanded. If you fall into these categories, you may be eligible today, but the service will expand to the general public soon, too. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">17 hours ago</span> by <a href="/meet-the-team/lance-whitney/" class="g-text-bold c-listingDefault_author"> Lance Whitney </a> in <a href="/topic/mobile-carriers/" class="g-text-bold c-listingDefault_topic"> Mobile Carriers </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/you-can-finally-test-microsofts-controversial-recall-feature-heres-how/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage c-cmsImage_loaded" style="aspect-ratio:306/172;"><source media="(max-width: 767px)" srcset="https://www.zdnet.com/a/img/resize/6da3221d0478d1bfbce92f5d0f2e72fec1744083/2024/11/22/62ea7721-b57a-4248-8845-0a9fca050277/gettyimages-1394240632.jpg?auto=webp&fit=crop&frame=1&height=102&width=196" alt="camera"><source media="(max-width: 1023px)" srcset="https://www.zdnet.com/a/img/resize/78dfd0a4fb3392c5a1deee86455d0a04793c8239/2024/11/22/62ea7721-b57a-4248-8845-0a9fca050277/gettyimages-1394240632.jpg?auto=webp&fit=crop&frame=1&height=234&width=416" alt="camera"><source media="(max-width: 1440px)" srcset="https://www.zdnet.com/a/img/resize/d1cc38e6cdca7a8839c8715f5e21010e62a5f118/2024/11/22/62ea7721-b57a-4248-8845-0a9fca050277/gettyimages-1394240632.jpg?auto=webp&fit=crop&frame=1&height=172&width=306" alt="camera"> <img src="https://www.zdnet.com/a/img/resize/d1cc38e6cdca7a8839c8715f5e21010e62a5f118/2024/11/22/62ea7721-b57a-4248-8845-0a9fca050277/gettyimages-1394240632.jpg?auto=webp&fit=crop&frame=1&height=172&width=306" alt="camera" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/you-can-finally-test-microsofts-controversial-recall-feature-heres-how/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> You can finally test Microsoft's controversial Recall feature - here's how </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> What was supposed to be a signature feature of the AI-powered Copilot+ PCs for Windows 11 was delayed after a firestorm of privacy and security complaints. But it's ready for testing now, if you have the right hardware. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">20 hours ago</span> by <a href="/meet-the-team/ed-bott/" class="g-text-bold c-listingDefault_author"> Ed Bott </a> in <a href="/topic/windows-11/" class="g-text-bold c-listingDefault_topic"> Windows 11 </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-iphone-vpn/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="daniel-romero-q-rqba-xcgu-unsplash.jpg" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-iphone-vpn/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best VPNs for iPhone: Expert tested </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> We tested and analyzed popular VPNs compatible with Apple's iPhone range and the iOS operating system to find the best options for protecting your privacy, streaming content, and more. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">20 hours ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/vpn/" class="g-text-bold c-listingDefault_topic"> VPN </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="GOTRAX 4 electric scooter" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> One year later: 7 useful things the Flipper Zero can do that still blows my mind </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">20 hours ago</span> by <a href="/meet-the-team/adrian-kingsley-hughes/" class="g-text-bold c-listingDefault_author"> Adrian Kingsley-Hughes </a> in <a href="/topic/security/" aria-current="page" class="g-text-bold c-listingDefault_topic nuxt-link-exact-active nuxt-link-active"> Security </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-vpn-router/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="A black VPN router with its antennas up against an orange background" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-vpn-router/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best VPN routers you can buy </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> Looking for a new router to give your home blanket VPN coverage? These are the best VPN-ready routers that provide secure, fast, and reliable internet connections. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">21 hours ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/vpn/" class="g-text-bold c-listingDefault_topic"> VPN </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-password-manager/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="Password management. Weak and strong password." width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-password-manager/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best password managers: Expert tested </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> Are you tired of remembering complex passwords across all your online services? A good password manager will do this for you. We tested the best password managers of 2024 to keep your credentials safe and simplify your login process. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">21 hours ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/password-manager/" class="g-text-bold c-listingDefault_topic"> Password Manager </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/expressvpn-black-friday-deal-2024/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="prioritize-hands-on-images" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/expressvpn-black-friday-deal-2024/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> ExpressVPN is now under $5 a month in rare Black Friday deal </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> ExpressVPN is one of our favorites with some of the best speeds available -- and it's on sale ahead of Black Friday. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">22 hours ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/vpn/" class="g-text-bold c-listingDefault_topic"> VPN </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/i-deleted-my-personal-info-from-the-internet-with-this-service-and-its-on-sale-for-black-friday/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="holiday-placeholder-image" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/i-deleted-my-personal-info-from-the-internet-with-this-service-and-its-on-sale-for-black-friday/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> I deleted my personal info from the internet with this service (and it's on sale for Black Friday) </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> DeleteMe helps remove your address, phone number, and other personal information from online platforms to protect you from identity theft, robocalls, and data breaches -- and it's 25% off for Black Friday. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">1 day ago</span> by <a href="/meet-the-team/alison-denisco-rayome/" class="g-text-bold c-listingDefault_author"> Alison DeNisco Rayome </a> in <a href="/topic/services-software/" class="g-text-bold c-listingDefault_topic"> Services & Software </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-black-friday-vpn-deals-2024/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="holiday-placeholder-image" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-black-friday-vpn-deals-2024/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best Black Friday VPN deals 2024: Early sales live now </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> Looking for a deal on a VPN before Black Friday? We found the best promotions around for secure, private, and trustworthy VPN solutions that we've tested. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">1 day ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/vpn/" class="g-text-bold c-listingDefault_topic"> VPN </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-airtag-wallet/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="airtag-wallets" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-airtag-wallet/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best AirTag wallets you can buy: Expert tested </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> We tested the best Apple AirTag wallets and tracking accessories from Nomad, ESR, Ridge, and more to help you keep track of your cards and cash. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">1 day ago</span> by <a href="/meet-the-team/kayla-solino/" class="g-text-bold c-listingDefault_author"> Kayla Solino </a> in <a href="/topic/wearables/" class="g-text-bold c-listingDefault_topic"> Wearables </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-no-log-vpns/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="ExpressVPN Web" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-no-log-vpns/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best no-log VPNs of 2024: Expert tested and reviewed </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> No-log VPNs claim to not keep records of their customers' online activities. These are the best no-log VPNs to protect your privacy. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">2 days ago</span> by <a href="/meet-the-team/charlie-osborne/" class="g-text-bold c-listingDefault_author"> Charlie Osborne </a> in <a href="/topic/vpn/" class="g-text-bold c-listingDefault_topic"> VPN </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="Blink Mini 2" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now) </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> The Blink Mini 2 is feature-rich, and it includes a waterproof adapter that makes it that much sweeter. Currently, it's available on Amazon for just $30. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">2 days ago</span> by <a href="/meet-the-team/maria-diaz/" class="g-text-bold c-listingDefault_author"> Maria Diaz </a> in <a href="/topic/home-security/" class="g-text-bold c-listingDefault_topic"> Home Security </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/update-your-iphone-ipad-and-mac-now-to-patch-these-serious-zero-day-security-flaws/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="iOS 18 on iPhone 14 Pro Max" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/update-your-iphone-ipad-and-mac-now-to-patch-these-serious-zero-day-security-flaws/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> Update your iPhone, iPad, and Mac now to patch these serious zero-day security flaws </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> The emergency updates resolve two zero-day flaws that may have already been exploited in the wild. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">3 days ago</span> by <a href="/meet-the-team/lance-whitney/" class="g-text-bold c-listingDefault_author"> Lance Whitney </a> in <a href="/topic/iphone/" class="g-text-bold c-listingDefault_topic"> iPhone </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/best-free-password-manager/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="Placeholder product image alt text" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/best-free-password-manager/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> The best free password managers: Expert tested </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> Discover the best free password managers of 2024, tested for security and ease of use. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">3 days ago</span> by <a href="/" class="g-text-bold c-listingDefault_author nuxt-link-active"> Emily Long </a> in <a href="/topic/password-manager/" class="g-text-bold c-listingDefault_topic"> Password Manager </a></div></div></div> <!----></div><div class="c-listingDefault_item g-outer-spacing-bottom-large"><div class="u-grid-columns"><a href="/article/scam-yourself-attacks-just-increased-over-600-heres-what-to-look-for/" class="c-listingDefault_itemLink"><div class="c-listingDefault_itemImage"><picture class="c-cmsImage" style="aspect-ratio:306/172;"><!----> <img src alt="danger" width="306" height="172" fetchpriority="low"></picture></div></a> <div class="c-listingDefault_itemContent"><a href="/article/scam-yourself-attacks-just-increased-over-600-heres-what-to-look-for/" class="c-listingDefault_itemLink"><h3 class="c-listingDefault_title g-text-small-bold g-outer-spacing-bottom-xsmall"> 'Scam yourself' attacks just increased over 600% - here's what to look for </h3> <span class="c-listingDefault_description g-text-xsmall g-outer-spacing-bottom-small"> Millions of people are falling for these scams, but they're not unavoidable. Here's what you need to know. </span></a> <div class="g-text-xxsmall c-listingDefault_meta"><span class="c-listingDefault_pubDate">3 days ago</span> by <a href="/meet-the-team/artie-beaty/" class="g-text-bold c-listingDefault_author"> Artie Beaty </a> in <a href="/topic/security/" aria-current="page" class="g-text-bold c-listingDefault_topic nuxt-link-exact-active nuxt-link-active"> Security </a></div></div></div> <!----></div></div> <div class="c-loadMoreButton u-grid-columns"><a href="/topic/security/2/" class="c-loadMoreButton_link o-button o-button-large o-button-smallRound lg:u-col-8 lg:u-col-start-3 md:u-col-6 sm:u-col-2 o-button-secondary"><span class="c-loadMoreButton_text">Load More</span> <span class="c-loadMoreButton_svg"><svg><use xlink:href="#rightArrow"/></svg></span></a></div></div></div><div class="lg:u-col-4 md:u-col-6 sm:u-col-2"><div class="c-globalSticky g-outer-spacing-bottom-large" style="grid-column:span 4;"><div class="c-globalSticky_element"><div class="c-adDisplay_container c-adDisplay_container_mpu-bottom blank"><!----></div></div></div></div></div></div></div></div></div></div></div> <div class="c-scrollPercent_marker" style="top:25%;"></div><div class="c-scrollPercent_marker" style="top:50%;"></div><div class="c-scrollPercent_marker" style="top:75%;"></div><div class="c-scrollPercent_marker" style="top:100%;"></div></div> <div class="c-scrollPercent_marker" style="top:25%;"></div><div class="c-scrollPercent_marker" style="top:50%;"></div><div class="c-scrollPercent_marker" style="top:75%;"></div><div class="c-scrollPercent_marker" style="top:100%;"></div></div> <!----> <!----></div></main> <footer class="c-siteFooter g-outer-spacing-top-large g-inner-spacing-bottom-large" data-v-60affc28><div class="c-siteFooter_background"><picture class="c-cmsImage" style="aspect-ratio:3200/1322;"><!----> <img src alt="Footer background image" width="3200" height="1322" fetchpriority="low"></picture></div> <a href="/" aria-label="Go to the home page" class="c-siteFooter_logoLink nuxt-link-active"><svg class="c-siteFooter_logo"><use xlink:href="#logo-horizontal"/></svg> <span class="c-siteFooter_site-name">ZDNET</span></a> <div class="c-siteFooter_container g-grid-container u-grid-columns"><div class="sm:u-col-2 md:u-col-6 lg:u-col-6"><div class="c-siteFooter_logo-connect-grid u-grid-columns"><div class="sm:u-col-2 md:u-col-6 lg:u-col-6"><span class="c-siteFooter_slogan">we equip you to harness the power of disruptive innovation, at work and at home.</span></div></div></div> <div class="sm:u-col-2 md:u-col-6 lg:u-col-6"><div class="c-siteFooter_column-links-grid u-grid-columns"><div class="c-siteFooterColumnLinks c-siteFooterColumnLinks_alpha g-text-small-bold sm:u-col-2 md:u-col-2 lg:u-col-2"><ul><li class="c-siteFooter_link"><a href="/topic/" rel="follow">Topics</a></li><li class="c-siteFooter_link"><a href="/pictures/" rel="follow">Galleries</a></li><li class="c-siteFooter_link"><a href="/video/">Videos</a></li><li class="c-siteFooter_link"><a href="https://www.ziffdavis.com/ztg-privacy-policy/">Do Not Sell or Share My Personal Information</a></li></ul></div> <div class="c-siteFooterColumnLinks c-siteFooterColumnLinks_beta g-text-small-bold sm:u-col-2 md:u-col-2 lg:u-col-2"><ul><li class="c-siteFooter_link"><a href="/about/">about ZDNET</a></li><li class="c-siteFooter_link"><a href="/feature/meet-the-team-us/">Meet The Team</a></li><li class="c-siteFooter_link"><a href="/sitemap/" rel="follow">Sitemap</a></li><li class="c-siteFooter_link"><a href="/reprints/" rel="follow">Reprint Policy</a></li></ul></div> <div class="c-siteFooterColumnLinks c-siteFooterColumnLinks_charlie g-text-small-bold sm:u-col-2 md:u-col-2 lg:u-col-2"><ul><li class="c-siteFooter_link"><span><div role="button" class="c-siteFooterUserMenu_authLinks">Join</div> | <div role="button" class="c-siteFooterUserMenu_authLinks">Log In</div></span></li><li class="c-siteFooter_link"><a href="/newsletters/">Newsletters</a></li><li class="c-siteFooter_link"><a href="https://zdnet.zendesk.com/hc/en-us">Site Assistance</a></li><li class="c-siteFooter_link"><a href="https://info.wrightsmedia.com/zdnet-licensing">Licensing</a></li><li class="c-siteFooter_link"><a href="https://www.ziffdavis.com/accessibility/">Accessibility</a></li></ul></div></div></div> <div class="sm:u-col-2 md:u-col-6 lg:u-col-4"><div class="c-siteFooter_connect-column"><div class="c-siteFooter_social-links-wrapper"><div class="c-socialSharebar"><!----> <ul class="c-socialSharebar_container"><li class="c-socialSharebar_button c-socialSharebar_button-facebook c-socialSharebar_icon"><a href="https://www.facebook.com/ZDNET.official" target="_blank" rel="noopener noreferrer nofollow" aria-label="facebook"><svg class="c-socialSharebar_icon"><use xlink:href="#facebook"/></svg></a></li><li class="c-socialSharebar_button c-socialSharebar_button-twitter c-socialSharebar_icon"><a href="https://www.twitter.com/ZDNET" target="_blank" rel="noopener noreferrer nofollow" aria-label="twitter"><svg class="c-socialSharebar_icon"><use xlink:href="#twitter"/></svg></a></li><li class="c-socialSharebar_button c-socialSharebar_button-linkedin c-socialSharebar_icon"><a href="https://www.linkedin.com/company/zdnet-com" target="_blank" rel="noopener noreferrer nofollow" aria-label="linkedin"><svg class="c-socialSharebar_icon"><use xlink:href="#linkedin"/></svg></a></li><li class="c-socialSharebar_button c-socialSharebar_button-youtube c-socialSharebar_icon"><a href="https://www.youtube.com/channel/UCr9QWb5RKLfaunjKHJZAdQQ" target="_blank" rel="noopener noreferrer nofollow" aria-label="youtube"><svg class="c-socialSharebar_icon"><use xlink:href="#youtube"/></svg></a></li><li class="c-socialSharebar_button c-socialSharebar_button-instagram c-socialSharebar_icon"><a href="https://www.instagram.com/zdnet_official/" target="_blank" rel="noopener noreferrer nofollow" aria-label="instagram"><svg class="c-socialSharebar_icon"><use xlink:href="#instagram"/></svg></a></li><li class="c-socialSharebar_button c-socialSharebar_button-tiktok c-socialSharebar_icon"><a href="https://www.tiktok.com/@zdnet_official" target="_blank" rel="noopener noreferrer nofollow" aria-label="tiktok"><svg class="c-socialSharebar_icon"><use xlink:href="#tiktok"/></svg></a></li></ul> <!----> <!----></div></div></div></div> <div class="sm:u-col-2 md:u-col-6 lg:u-col-8"><div class="c-siteFooter_copyright-policies"><div class="sm:u-col-2 md:u-col-6 lg:u-col-6"><span class="c-siteFooterCopyright u-text-center"> © 2024 ZDNET, A Ziff Davis company. All rights reserved. </span> <span class="c-siteFooterPolicies"><a href="https://www.ziffdavis.com/ztg-privacy-policy/" rel="noopener noreferrer nofollow" target="_blank">Privacy Policy</a> | <!----> | <div role="button" class="ot-sdk-show-settings">Cookie Settings</div> | <a href="https://www.zdnet.com/advertise/" rel="noopener noreferrer nofollow" target="_blank">Advertise</a> | <a href="https://www.ziffdavis.com/terms-of-use/" rel="noopener noreferrer nofollow" target="_blank">Terms of Use</a></span></div></div></div></div></footer></div> <!----> <div class="c-adDisplay_container c-adDisplay_container_video-rectangle blank" data-v-60affc28><!----></div></div></div></div><script>window.__NUXT__=(function(a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p){k.pageType="topic";k.id="security";k.queryParams={};k.meta={edition:f,brand:c,contentType:c,datePublished:c,dateUpdated:c,description:c,displayDatePublished:c,displayDateUpdated:c,id:i,image:c,noIndex:d,pageType:c,primaryCollection:c,publishDate:c,section:b,seoMetaDescription:c,seoOgDescription:c,seoOgImage:c,seoOgTitle:c,seoTwitterCard:c,seoTwitterCreator:c,seoTwitterDescription:c,seoTwitterImage:c,seoTwitterImageAlt:c,seoOgImageHeight:c,seoOgImageWidth:c,seoTwitterTitle:c,seoTwitterSite:c,site:c,slug:c,suppressAds:d,tags:[],title:c,titleTag:c,topics:[],type:c,typeName:"content_topic"};k.components=[{id:"security",meta:{componentName:"topic",componentDisplayName:"Topic",componentType:"Topic"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomposer\u002Fzdnet\u002Fpages\u002Ftopic\u002Fsecurity\u002Fweb?&apiKey=f8e83b7d-21fc-457a-b296-9063f404528b"}},item:{annotations:[],contentPlatform:c,author:c,buyingCycle:c,datePublished:c,dateUpdated:c,displayDatePublished:c,displayDateUpdated:c,edition:f,headline:c,id:i,collections:[],image:c,moreAuthors:c,primaryCollection:c,promoImage:c,section:b,slug:c,subType:c,tags:[],title:"Security",topics:[],typeName:"content_topic",versionId:c,layout:{colspan:12,label:{id:"c5b790da-e000-11e5-bddd-d4ae52e62bcc",name:"grid"},components:[],children:[{colspan:12,label:{id:b,name:b},components:[{id:"aaf901bf-dcce-49e8-b541-0427a824e189",familyName:"zdnet_placeholder",typeName:"topic_header",view:c,slug:c,hidden:d}],children:[]},{colspan:12,label:{id:b,name:b},components:[],children:[{colspan:12,label:{id:b,name:b},components:[{id:"232d4b76-a7b3-43f7-8729-bb376f425c87",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002F232d4b76-a7b3-43f7-8729-bb376f425c87",params:["topic","tag","section","collection","blog"],bender:{id:"232d4b76-a7b3-43f7-8729-bb376f425c87",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F232d4b76-a7b3-43f7-8729-bb376f425c87\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"listing_4_item_carousel",hidden:d,slug:"dynamic-topic-4-story-carousel-product-research"}]},{colspan:12,label:{id:b,name:b},children:[{colspan:12,label:{id:"c5b790da-e000-11e5-bddd-d4ae52e62bcc",name:"grid"},children:[{colspan:9,label:{id:b,name:b},components:[{id:"49cbd472-fb49-40ab-832b-366ddd22eb32",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002F49cbd472-fb49-40ab-832b-366ddd22eb32",params:["topic","tag","section","collection","blog"],bender:{id:"49cbd472-fb49-40ab-832b-366ddd22eb32",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F49cbd472-fb49-40ab-832b-366ddd22eb32\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"listing_3_item_carousel",hidden:d,slug:"dynamic-topic-3-story-carousel-how-to"},{id:"58d3384f-a0d7-4628-acc1-a44626a03c4e",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002F58d3384f-a0d7-4628-acc1-a44626a03c4e",params:["topic","tag","section","collection","blog"],bender:{id:"58d3384f-a0d7-4628-acc1-a44626a03c4e",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F58d3384f-a0d7-4628-acc1-a44626a03c4e\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"listing_3_item_carousel",hidden:d,slug:"dynamic-topic-3-story-carousel-analysis"}]},{colspan:3,label:{id:b,name:b},components:[{id:"ddc9226f-14b1-4a1c-9cfa-46a60a305f1f",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002Fddc9226f-14b1-4a1c-9cfa-46a60a305f1f",params:["topic","tag","section","collection","blog"],bender:{id:"ddc9226f-14b1-4a1c-9cfa-46a60a305f1f",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002Fddc9226f-14b1-4a1c-9cfa-46a60a305f1f\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"listing_right_rail_basic",hidden:d,slug:"dynamic-topic-listing-right-rail-basic-latest"}]}]},{colspan:12,label:{id:b,name:b},children:[{colspan:12,label:{id:b,name:b},components:[{id:"67321c82-3251-4373-a37f-2eb82c23a24c",configuration:{uri:c},familyName:"ad",typeName:"incontent_ad_plus_bottom",view:c,hidden:d,slug:c}]},{colspan:12,label:{id:b,name:b},children:[{colspan:12,label:{id:b,name:b},components:[{id:"2ffa34dd-efe5-440b-bcdf-7eae560bba29",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002F2ffa34dd-efe5-440b-bcdf-7eae560bba29",params:["topic","tag","section","collection","blog"],bender:{id:"2ffa34dd-efe5-440b-bcdf-7eae560bba29",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F2ffa34dd-efe5-440b-bcdf-7eae560bba29\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"five_story_feature",hidden:d,slug:"dynamic-topic-five-story-feature-latest-offset-5"}]},{colspan:12,label:{id:"c5b790da-e000-11e5-bddd-d4ae52e62bcc",name:"grid"},children:[{colspan:8,label:{id:b,name:b},components:[{id:"61aded77-4ad4-412f-850f-e183cdc51b1d",configuration:{uri:"\u002Fapi\u002Fcomponent\u002Flisting\u002F61aded77-4ad4-412f-850f-e183cdc51b1d",params:["topic","tag","section","collection","blog"],bender:{id:"61aded77-4ad4-412f-850f-e183cdc51b1d",typeName:"dynamic_listing",familyName:"listing",brand:e,componentType:"ContentList",fields:c,uri:"\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F61aded77-4ad4-412f-850f-e183cdc51b1d\u002Fweb"}},familyName:"listing",typeName:"dynamic_listing",view:"river_alt",hidden:d,slug:"dynamic-topic-river-alt-latest-offset-10"}]},{colspan:4,label:{id:b,name:b},components:[{id:"f785b6bc-1ccd-47be-8b37-8507783b0bf0",configuration:{uri:c},familyName:"ad",typeName:"scrolling_mpu_bottom",view:c,hidden:d,slug:c}]}]}]}]}]}]}]},viewType:c,description:"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats."}},{id:"232d4b76-a7b3-43f7-8729-bb376f425c87",meta:{componentName:"232d4b76-a7b3-43f7-8729-bb376f425c87",componentDisplayName:"Product Research",componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F232d4b76-a7b3-43f7-8729-bb376f425c87\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=232d4b76-a7b3-43f7-8729-bb376f425c87"}},items:[{author:{id:"ab2ae5cc-62fd-4292-a0b0-fb223738c1de",username:"ksolino",profileUrl:c,email:c,firstName:"Kayla",lastName:"Solino",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"523fff3e-db1c-4997-8e16-2dfa40989bc3",filename:"img-2794.jpg",dateCreated:{created:c,date:"2023-10-02 14:47:16",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F10\u002F02\u002F523fff3e-db1c-4997-8e16-2dfa40989bc3\u002Fimg-2794.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Kayla Solino is a ZDNET Associate Editor based in New York City and New Jersey. She has a master's degree in journalism from the University of Alabama. Some of her past bylines include Inc., Fortune, and The Crimson White. In her spare time, she enjoys keeping up with all things Crimson Tide, binging British Bake Off, and baking.",profile:c,title:"Associate Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EDid you know \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f58c0548-5937-4629-b078-8eb89cbd8deb\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX532AM-A-AirTag\u002Fdp\u002FB0933BVK6T\" data-link-shortcode-text=\"AirTags\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E can be used for more than just locating your keys? \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fapples-airtag-4-pack-is-20-off-with-this-deal-ahead-of-black-friday\u002F\" target=\"_blank\"\u003EAirTags\u003C\u002Fa\u003E are handy for tracking your essentials, and in 2024, there are configurations that allow you to attach them to keys, pets, bags, and even water bottles. Perhaps one of the most useful places for an AirTag, though, is your wallet. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best Bluetooth trackers you can buy: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs with any functional accessory, the market is full of different AirTag wallets, accessories, and more. Keep in mind that what you may actually be looking for is a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-best-airtag-you-can-buy-for-your-wallet-isnt-made-by-apple-and-its-rechargeable\u002F\" target=\"_blank\"\u003EBluetooth tracking card\u003C\u002Fa\u003E or another nifty wallet gadget. That's why we tested plenty of the smart options available to ensure you never lose your wallet again, evaluating capacity, security, and cost. We also combined expert research and analysis to make sure we've considered the most functional AirTag wallets or tracking accessories for you.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EThe best AirTag accessories you can buy\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat's the best AirTag wallet right now?\u003C\u002Fh2\u003E\u003Cp\u003EOur pick for the best AirTag wallet overall is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7a796acb-0200-4998-b80b-adb43a1baa07\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1\" data-link-shortcode-text=\"Ridge Wallet\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, because it offers plenty of room for cards and cash in a stylish and customizable design. It's also durable and offers great value over time. Keep reading to see how our other top AirTag wallets and accessories stack up and find the best option for your lifestyle. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattention-apple-airtag-users-dont-ignore-this-warning\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EAttention Apple AirTag users: Don't ignore this warning\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EThe best AirTag wallets of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d91f856a-a907-4c05-b637-f98b4a639626\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge wallet is a slim RFID-blocking wallet designed to hold up to 12 cards. Cash can be stored via a cash strap or money clip on the outside of the wallet, and the brand offers three AirTag configurations for tracking: an AirTag holder designed to \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BXBL1345" target="_blank"\u003Efit into the cash strap\u003C\u002Fa\u003E or \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BQZCV5HY" target="_blank"\u003Ereplace the money clip\u003C\u002Fa\u003E for $25, or the \u003Ca href="https:\u002F\u002Fridge.com\u002Fproducts\u002Fcarbon-case-for-airtag" target="_blank"\u003EAirTag carbon add-on holder\u003C\u002Fa\u003E that attaches outside any Ridge wallet for $40.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe Ridge offers durability and functionality while also providing top-notch security and smart capabilities. Although it is a bit pricey, it has a lifetime warranty to keep up with your daily use and a risk-free 99-day trial period. All things considered, a quality, traditional leather-style wallet could easily run you over the $100 mark, too, which makes this long-term investment worth it, in my opinion.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EI gifted this wallet to my Dad a year before using one myself, and I can confidently say it's a winner. Prior to gifting him the Ridge, he used several other wallets, including a traditional leather and titanium case style, but none of them fit his needs.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMy Dad is a shove-everything-into-your-pockets-and-go kind of person, and no wallet could ever keep all his cards, cash, and receipts organized until the Ridge. The minimalist design helps ensure he can put what he really needs into his wallet and makes it easy to access cards and cash when he wants.\u003C\u002Fp\u003E\u003Cp\u003EI initially thought the maneuvering to slide the cards in and out would be annoying, but after a little practice, he said it became second nature and is surprisingly easier than opening and removing cards or cash from a traditional wallet. I agree that there's a brief learning curve involved, but once you get it down, it's a non-issue.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe practicality, coupled with the RFID technology, numerous color and metal options, and the addable AirTag tracker, makes the Ridge nearly faultless. Although it can get a little chunky when it's full to the brim with cards (but alas, what wallet doesn't?). This is a great wallet for small handbags, concert or stadium bags, and going out on the town, too.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ridge customers said on the website that they liked the wallet capacity, durability, design, and functionality of the Ridge wallet. The wallet features a 4.8\u002F5 starts online, and 97% of customers said they'd recommend the Ridge wallet to a friend. Several customers said they were repeat purchasers and that their wallets stood the test of time.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: The Ridge wallet is 20% off (save $20) on Amazon in select colors at the time of publication.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERidge Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003EAluminum&nbsp;\u003Cstrong\u003E|\u003C\u002Fstrong\u003E RFID blocking | Accessories and add ons available | Several materials and designs&nbsp;| Cash strap or money clip for cash storage | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;86 x 54 x 6 mm&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ridge Wallet\" data-superlative=\"Best AirTag wallet overall\" data-imagegroup=\"{"alt":"img-0675","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","title":"ridge-wallet","filename":"img-0675.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002Fb5a3a5b6-041b-44b4-b2d1-5028597f10b3\u002Fimg-0675.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1303963,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-08 18:48:12","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 18:48:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"img-0675","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","imageAltText":"img-0675","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-0675.jpg","imageDateCreated":"2024\u002F04\u002F08","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offer=\"{"id":"a164cfc7-0f98-4b47-a698-ad7a30009aff","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","label":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"a164cfc7-0f98-4b47-a698-ad7a30009aff","name":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","productType":"SERIES","updateType":"PRISM","mod":1732026171142,"displayDate":"Tue Nov 19 2024 09:22:51 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Durable ~ RFID-blocking ~ Relatively slim yet multi-functional ~ Minimalist design ~ Unique colors and designs\" data-dislike=\"~ Expensive ~ Must buy AirTag holder components as add-ons ~ Can become bulky for pockets when full ~ Certain finishes may scratch\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e223c11-5dbb-41f5-a4e3-2c83453971fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're not dead set on using an AirTag wallet or \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories" target="_blank"\u003EAirTag accessory\u003C\u002Fa\u003E to track your wallet, it may be worth it to consider a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E equipped with location tracking. The Journey LOC8 is the finder wallet version of our pick for best overall MagSafe wallet, the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Fezmo-magsafe-wallet-phone-stand?" target="_blank"\u003EEzmo wallet\u003C\u002Fa\u003E (pictured above).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EJourney's MagSafe wallet is the perfect balance of style and function with enough space to hold 5 cards. The wallet also doubles as a phone stand, so you can watch your favorite entertainment on the go or keep your phone screen visible at your desk. The stand has adjustable viewing angles in both portrait and landscape modes and features a protective lining to safeguard your cards' information with RFID-blocking technology while preventing them from becoming demagnetized.\u003C\u002Fp\u003E\u003Cp\u003EThe LOC8 takes all the great features of the Ezmo wallet one step further, offering location tracking -- no AirTag needed. It uses Apple's Find My technology for easy integration, is rechargeable, and comes with built-in speakers so you can easily ping the LOC8 wallet to find its location.\u003C\u002Fp\u003E\u003Cp\u003EI tested the Ezmo version of the Journey wallet for several weeks during my commute from New Jersey to New York City, and I like it enough to recommend the LOC8 with built-in tracking confidently. I like the premium feel and how easy the wallet makes it to access my transit cards during my commute. I also like how the wallet provides enough space for 5 cards and folded cash. It's perfect for holding my debit card, work badge, and other incidentals like paper train tickets. The phone stand was nice, too. Although it's one of the pricier options for a MagSafe wallet, I think it's well worth the investment due to its multi-functionality and excellent quality, especially if you use your MagSafe wallet every day.\u003C\u002Fp\u003E\u003Cp\u003ECurrent users on the Journey website said they liked the slim profile, smart design, larger card capacity, and sleek material -- so much so that the wallet has a 5\u002F5 star rating online, with one customer noting that it "does it all really well."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's Note: At the time of publication on Oct. 24, you can save 20% off at Journey's website thanks to a fall sale.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EJourney LOC8 tracking wallet and phone stand features:\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E&nbsp;MagSafe bifold&nbsp;| Multi-functional&nbsp;| RFID protection | Built-in lock to prevent card slippage | Water resistant | Built-in speaker | Apple Find My System compatible | Rechargeable |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;66 mm x 103 mm x 14 mm |&nbsp;\u003Cstrong\u003ECard capacity:\u003C\u002Fstrong\u003E&nbsp;Up to 5 cards&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Journey LOC8 Tracking Wallet and Phone Stand\" data-superlative=\"Best MagSafe tracking wallet\" data-imagegroup=\"{"alt":"journey-magsafe-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","title":"journey-magsafe-wallet","filename":"img-1053.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F12\u002F68736460-4a2c-4d02-aea5-b27ba0b0d87f\u002Fimg-1053.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243587,"width":6000,"height":4000,"dateCreated":{"date":"2024-03-12 14:29:02","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-12 14:30:18","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"journey-magsafe-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","imageAltText":"journey-magsafe-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1053.jpg","imageDateCreated":"2024\u002F03\u002F12","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand","offerMerchant":"Journey","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand"}]\" data-usepricing=\"true\" data-like=\"~ Stylish ~ Sleek design ~ High-quality ~ Multi-functional ~ No AirTag necessary\" data-dislike=\"~ Pricier option ~ Takes time to get used to\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ffa55451-6a2e-4038-b15b-a48a7e99050c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like affordable luxury tech products, don't look any further than Bosca's AirTag wallet for all your card storage needs. Plus, if you're looking for a minimalist option, this could be a great fit for your needs. Part of my job at ZDNET includes testing tons of tech accessories, from MagSafe gear to AirTag accessories and beyond, so needless to say, I have tested a lot of different things, including MagSafe and AirTag wallets. This is the first AirTag wallet I've tested in a while that I was really impressed with, and it took me by surprise.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere's nothing overly unique about the design of this Bosca wallet. In fact, if you went on Amazon, you'd see tons of similar options at varying price points offering similar features: slim design, a few card slots, maybe an ID window, and, of course, that trusty little spot to tuck your AirTag. The hybrid card slot\u002Fwallet combo has become a popular option in 2024, as many people shift to cardless payment options like Apple Pay and Google Pay more and more and carry fewer cards daily.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBut what makes Bosca's stand-out is the craftsmanship and leather used to construct it. I knew right away upon opening up this wallet that it was, what the kids call, legit. The leather is smooth, and the Saddle color has a really striking tone that is not too orange and not too brown. Moreso, it looks like something that didn't fall out of Amazon's massive factory market, and that's thanks to the full grain, Italian, hand-stained leather and intentional construction. It holds cards great, has a dedicated ID slot with a slit to make grabbing your identification easy, and two pockets to hold extra cash, cards, or other incidentals. It's super easy to snap your AirTag in and be on your way, and most importantly, it's the kind of tech accessory that feels like it will withstand the test of time, and will perhaps get better with age. I compared the leather of this wallet to some of my own personal handbags and small goods from various other brands, and there's certainly a similar standard that I was impressed with.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt is certainly pricier than other options on this list (though not as expensive as a Ridge wallet) and I do wish there were perhaps more colored options, but for what is offered I feel that this wallet is a confident balance of affordable luxury that justifies its price tag, and potentially prevents the type of incessant rebuying that can often occur with tech accessories.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: This product is currently unavailable on Amazon at the time of publication on 11\u002F19.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBosca AirTag Wallet features\u003C\u002Fstrong\u003E:&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E Hybrid cardholder design | \u003Cstrong\u003EDimensions\u003C\u002Fstrong\u003E: 4.375 H x 3.00 W x 0.125 D | \u003Cstrong\u003ECard capacity:&nbsp;\u003C\u002Fstrong\u003E3 Card Pockets, 2 card\u002Fcash pockets, 1 ID slot | Cash storage | Full grain, Italian, Hand-stained leather&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Bosca AirTag Wallet\" data-superlative=\"Best leather AirTag wallet\" data-imagegroup=\"{"alt":"bosca-airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"9183531b-994a-46db-a2fb-e002d45fe8c0","title":"bosca-airtag-wallet","filename":"img-2017.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F9183531b-994a-46db-a2fb-e002d45fe8c0\u002Fimg-2017.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3181064,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:30:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:30:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"bosca-airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"9183531b-994a-46db-a2fb-e002d45fe8c0","imageAltText":"bosca-airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2017.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML","url":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bosca","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.bosca.com\u002Fproducts\u002F7-pocket-i-d-card-case-1?","url":""}]\" data-usepricing=\"true\" data-like=\"~ Quality leather ~ Minimalist design ~ Secure AirTag holder ~ ID slot ~Affordable luxury\" data-dislike=\"~ Pricier ~ Not ideal for over 5 cards ~ Only three colors\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c24940fd-c7ec-43c5-8565-91864f17cc70\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Spigen AirTag Wallet S is a more affordable and expandable wallet design. Similar in overall construction and function the the Ridge wallet, the main difference is the material and price point.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDespite its streamlined design, the Spigen AirTag Wallet S holds up to 12 cards. The polycarbonate shell makes for a super-light build, so it won't weigh your purse or pockets down. The nylon elastic cash strap is an extra bonus to stow away your bills. It also incorporates special RFID-blocking protection to prevent RFID card readers from stealing your information.\u003C\u002Fp\u003E\u003Cp\u003E"The Spigen AirTag Wallet S's sleek design and compact form initially drew my attention," says Liz Ho, an experienced camping guide, travel expert, and founder of&nbsp;\u003Ca href="https:\u002F\u002Fcampingguidance.com\u002F"\u003ECamping Guidance\u003C\u002Fa\u003E. "Its built-in AirTag compartment gave me peace of mind, knowing I could easily locate my wallet if it ever went missing."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Amazon customers said they liked that the Spigen S wallet was more affordable, had a dedicated, built-in spot for an AirTag, and held both cash and cards. However, some experienced damage early on and didn't like the plastic material. Overall, customers said they were happy with the appearance and value of the wallet but wished it had some improvements in material and performance.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESpigen AirTag Wallet S specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;| RFID-blocking | Cash strap for cash storage |&nbsp;\u003Cstrong\u003EMaterial:&nbsp;\u003C\u002Fstrong\u003EPolycarbonate&nbsp;| Cash strap for cashe storage |\u003Cstrong\u003E Dimensions:\u003C\u002Fstrong\u003E&nbsp;1.18 x 3.15 x 1.97 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Spigen AirTag Card Holder Wallet S\" data-superlative=\"Best mid-range AirTag wallet\" data-imagegroup=\"{"alt":"spigen-airtag-wallet-s-","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Spigen\u002FZDNET","imageData":{"id":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","title":"spigen-airtag-wallet-s-","filename":"spigen-airtag-wallet-s-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F06\u002F8644ee4e-7ac0-4698-85a7-7919e1ad37a7\u002Fspigen-airtag-wallet-s-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":99656,"width":670,"height":372,"dateCreated":{"date":"2024-02-06 21:17:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-06 21:17:55","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Spigen\u002FZDNET","alt":"spigen-airtag-wallet-s-","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","imageAltText":"spigen-airtag-wallet-s-","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Spigen\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"spigen-airtag-wallet-s-removebg-preview.png","imageDateCreated":"2024\u002F02\u002F06","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Spigen\u002FZDNET\" data-offer=\"{"id":"4304727d-dd37-4970-9617-bf811bde1f17","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","label":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"4304727d-dd37-4970-9617-bf811bde1f17","name":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","productType":"SERIES","updateType":"PRISM","mod":1732130514526,"displayDate":"Wed Nov 20 2024 14:21:54 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Cash strap ~ Lightweight ~ Dedicated AirTag slot ~ Budget friendly\" data-dislike=\"~ Limited colors ~ Not scratch-resistant ~ Cheap material\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f047a9e0-bac2-4c03-8664-247677f447eb\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ekster Wallet for AirTag combines minimalism with affordable luxury functions. It holds up to 12 cards as well as cash. Plus, it features RFID-blocking technology, a dedicated AirTag slot, quick access with a push button, and an easy slide-up function to fan out cards.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt's an AirTag-compatible version of the brand's popular Parliament wallet, and it's slim enough to fit in your front or back pocket. However, it's slightly expensive and lacks color options.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ekster wallet users on the Ekster website said they liked the high-quality construction, overall design, and easy function. One customer said they even upgraded to this AirTag wallet after losing their Parliament wallet on vacation, and another called it perfect. "If you have been looking for a wallet that is high-quality with all the features, this is definitely the wallet for you," one customer wrote in their review.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EEkster Wallet for AirTag specs: Type:\u003C\u002Fstrong\u003E Slide | \u003Cstrong\u003EMaterial: \u003C\u002Fstrong\u003ELeather | Slide-up function to fan cards | RFID-blocking | Minimalist design | AirTag slot | Quick card access with button | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E 4.1 x 2.5 x 0.4 inches&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ekster Wallet for AirTag\" data-superlative=\"Best card slide AirTag wallet\" data-imagegroup=\"{"alt":"Ekster Parliament Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Ekster\u002FZDNET","imageData":{"id":"060cf5a9-e745-493f-a252-e63202f78cc3","title":"Ekster Parliament Wallet","filename":"ekster-parliament-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F07\u002F21\u002F060cf5a9-e745-493f-a252-e63202f78cc3\u002Fekster-parliament-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":20869,"width":1296,"height":720,"dateCreated":{"date":"2023-07-21 19:50:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-07-21 19:50:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Ekster\u002FZDNET","alt":"Ekster Parliament Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"060cf5a9-e745-493f-a252-e63202f78cc3","imageAltText":"Ekster Parliament Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Ekster\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ekster-parliament-wallet.jpg","imageDateCreated":"2023\u002F07\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Ekster\u002FZDNET\" data-offer=\"{"id":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","label":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","name":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","productType":"SERIES","updateType":"PRISM","mod":1729871219011,"displayDate":"Fri Oct 25 2024 11:46:59 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9","url":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F","offerMerchant":"Ekster","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ekster.com\u002Fproducts\u002Fwallet-for-airtag?","url":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F"}]\" data-usepricing=\"true\" data-like=\"~ High-quality leather ~ Minimalist design ~ Easy slide access ~ Dedicated AirTag slot ~Slim\" data-dislike=\"~ Pricey ~ Limited color options ~ No ID slot\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2433d834-099f-43d1-be78-2fb3675f2c22\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Doeboe AirTag Wallet is the best budget AirTag wallet with a surprisingly lightweight build despite its leather material.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ERicky Allen, marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, says, "It's a great wallet with all the necessities, like card slots, a pocket for bills, and an AirTag keychain holder."\u003C\u002Fp\u003E\u003Cp\u003EMade of Crazy Horse leather, this bifold wallet features 10 different card slots, including a bill pocket to stash your cash. It also has an ID window so you don't have to take your driver's license out whenever you need to show it. The simple, minimalist design is simple to manage and also lightweight, so it won't weigh your pockets down.\u003C\u002Fp\u003E\u003Cp\u003EAllen commented on the security as well. "I liked how easy it was to insert my AirTag and the anti-theft RFID protection it provides. Security is very important to me, and I'm glad this wallet provides the added protection of RFID-blocking."\u003C\u002Fp\u003E\u003Cp\u003ECurrent Doeboe wallet users on Amazon said they liked the appearance, durability, and compactness of the wallet, with several customers emphasizing the genuine leather construction.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDoeboe AirTag Bifold Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EBifold&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003ELeather&nbsp;| ID window | RFID blocking |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;1.97 x 1.57 x 0.59 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Doeboe AirTag Bifold Wallet\" data-superlative=\"Best budget AirTag wallet\" data-imagegroup=\"{"alt":"doeboe AirTag Bifold Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Doeboe\u002FZDNET","imageData":{"id":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","title":"doeboe AirTag Bifold Wallet","filename":"doeboe-airtag-bifold-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F12\u002F2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06\u002Fdoeboe-airtag-bifold-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":92192,"width":1296,"height":720,"dateCreated":{"date":"2023-04-12 18:35:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-04-12 18:35:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09BHXPH8H","alt":"doeboe AirTag Bifold Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","imageAltText":"doeboe AirTag Bifold Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Doeboe\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"doeboe-airtag-bifold-wallet.jpg","imageDateCreated":"2023\u002F04\u002F12","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Doeboe\u002FZDNET\" data-offer=\"{"id":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","label":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","name":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","productType":"SERIES","updateType":"PRISM","mod":1732130531292,"displayDate":"Wed Nov 20 2024 14:22:11 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4","url":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Roomy ~ Traditional feel ~ RFID-blocking technology ~ ID Window ~ Affordable ~ Several color options\" data-dislike=\"~Bulkier, bifold design ~ Cheaper look and feel\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to tell if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge Wallet with an accompanying AirTag holder attachment is ZDNET's top pick for best overall AirTag wallet.&nbsp; \u003C\u002Fp\u003E\u003Cp\u003EWith a slim and stylish, yet easily expandable and durable design, the Ridge wallet handles up to 12 cards, and offers an efficient storage option for cash. Equipped with RFID-blocking technology and built of tough aluminum, the Ridge is the creme de la creme of trackable, practical wallets, and is a true buy-one-time purchase. \u003C\u002Fp\u003E\u003Cp\u003ESee how our other top picks compared to the Ridge wallet in type, cost, and card capacity below:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EBest AirTag wallet\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EType\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECard capacity\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EStarts at $95\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003E$90\u003C\u002Ftd\u003E\u003Ctd\u003EMagSafe bifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 5\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003E$85\u003C\u002Ftd\u003E\u003Ctd\u003EHybird card holder\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 6\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003E$50\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003E$99\u003C\u002Ftd\u003E\u003Ctd\u003ESlide\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bilfold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003E$26\u003C\u002Ftd\u003E\u003Ctd\u003EBifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 10\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"What is the best AirTag wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt isn't easy to choose the best AirTag wallet when there are so many options on the market. These expert recommendations may help you in the buying process so you can be sure to find the right wallet for your needs.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EChoose this AirTag wallet...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall AirTag wallet for function, style, security, and longevity. Easily customize this wallet to fit your lifestyle.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003EA MagSafe wallet option equipped with Apple's Find My tracking technology.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003EAn affordable luxury, hybird AirTag wallet. \u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall affordable AirTag wallet alternative with great value.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003EThe best AirTag wallet for easy access. Store your cards with extra security while enjoying unrivaled convenience.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bifold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EA budget bifold wallet. This best AirTag wallet offers a traditional design with a built-in AirTag holder.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the best AirTag wallet for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're in the market for an AirTag wallet, you already know the marketplace is copious. Here's a few things to keep in mind while you search that may help you narrow down your options and find the right fit for you.&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECapacity\u003C\u002Fstrong\u003E: Consider what you want to store in your wallet. How many cards? Cash? Any other incidentals like your work badge or transit passes? We'd recommend finding out your absolute bare minimum need for card capacity (maybe that's three cards or maybe it's ten) and factoring that into your search. You'll easily be able to cut a huge chunk of options out based on capacity alone.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: Many AirTag wallets provide RFID-blocking, which means that it blocks card scanners that can steal your information. If this is a top priority for you, you can drop many of the cheaper options, which often don't offer these capabilities.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E: The price of AirTag wallets can vary considerably, and like with any purchase, establishing a budget is key. While we've included a budget, mid-range, and expensive pick on this list, you need to decide for yourself what your magic number is. Keep in mind that your wallet is often an everyday essential that lasts for a number of years, so it may be worth it to set a higher budget. Plus, many quality traditional leather wallets often cost over $100, too.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003EYour needs: \u003C\u002Fstrong\u003ESo you're here because you think you want an AirTag wallet. But maybe what you're actually looking for is a Bluetooth tracker card to upgrade your favorite traditional wallet. Or maybe you just want an AirTag card insert to do the same. Think about what you actually need right now and what makes the most sense for your lifestyle -- it may not be what you thought at first.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing an AirTag wallet\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"aeb5de34-5d6e-45b1-9b25-8fa4c111c9e5\" data-edition=\"us\" data-description=\"\u003Cp\u003EWe combined our expert research and analysis, hands-on testing for select products, and our extensive testing and knowledge of alternative Bluetooth trackers to curate this list. We consider factors like lifestyle, construction, durability, tracking capabilities, and function while compiling these top picks and made sure to provide options for those who aren't sure if an AirTag wallet is right for them. If we think a new product is worth your money, we'll update this list or write a spotlight review highlighting its best qualities and specifying who it's for.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPlus, we are routinely scouring the web for new products that are worthy of testing, following news on product rollouts and upgrades, and sourcing the best deals.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How did we choose these AirTag wallets?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e338db83-da68-4ce6-9398-b4683b088f84\" data-edition=\"us\" data-description=\"\u003Cp\u003EAn AirTag is a type of tracking device. You can affix it to an object, and the AirTag will then provide tracking for that item. Simply log into the Find My app to track your device and see an exact location. You can also ping your phone so it sounds like an alert, helping you to find it that much easier.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What is an AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a56e686-7136-4674-af80-65a8ebe65fd3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, AirTags can be used to track anything like keys, bags, purses, wallets, and more. There's lots of \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003Eaccessories on the market\u003C\u002Fa\u003E to seamlessly configure an AirTag to your needs, and likewise, many AirTag wallets are specially designed to hold an AirTag to upgrade your traditional wallet with location-tracking capabilities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best AirTag accessories of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can AirTags be used in a wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e33f8c0c-f5d2-483d-82ec-f5717cc0b4bd\" data-edition=\"us\" data-description=\"\u003Cp\u003ENo, by no means are AirTag wallets the only \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003Ebluetooth tracking\u003C\u002Fa\u003E accessories on the market. You can equip and configure traditional wallets with tracking cards like the KeySmart Smart Card, or use other alternative trackers like Tile. And if you want to upgrade to a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E, some are available with built-in tracking configurations already installed, like the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand" target="_blank"\u003EJourney LOC8 wallet\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best bluetooth trackers of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Are AirTag wallets the only tracking options out there?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"530a9dbb-0397-4823-9367-e052347b9bed\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere's a few different types of products and configurations that will help you track your wallet, no matter where you leave it. Here are the most common:&nbsp;\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EA wallet specially designed to house an AirTag tracker, either by design or with added attachments.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA Bluetooth tracker card that uses Apple's Find My technology that can slide into an existing wallet like any other card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA tracker card designed to hold an AirTag that can slide into an existing wallet like a card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EWallets that are already enabled with their own Bluetooth tracking systems and don't require an AirTag (these often use Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EMagSafe wallet options are enabled with Bluetooth tracking (which also likely uses Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003C\u002Fol\u003E\" data-hed=\"What types of bluetooth tracking is available for my wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"852bccff-11ea-40df-a48e-a5df96e0bc6b\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile this may not be the conventional route, if you're interested in tinkering and building your own custom AirTag setup, you actually can. ZDNET's Adrian Kingsley-Hughes did himself in April 2023, and wrote up his own \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003Estep-by-step guide\u003C\u002Fa\u003E that you can follow.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003E\u003Cstrong\u003EI built a custom AirTag that Apple will hate me for. Here's how you can too\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can I build my own custom AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9441c617-048c-459d-ae23-6b39c18c9b0a\" data-edition=\"us\" data-description=\"\u003Cp\u003EAirTags will not interfere with your debit or credit cards and they will not cause demagnetization. AirTags operate using Apple's Find My technology and a bluetooth connection, and the frequency does not disturb your cards. &nbsp;\u003C\u002Fp\u003E\" data-hed=\"Do AirTags interfere with credit cards?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"700087c7-33c1-4d66-b676-77be91ca990d\" data-edition=\"us\" data-description=\"\u003Cp\u003EAccording to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.dhs.gov\u002Fradio-frequency-identification-rfid-what-it" target="_blank"\u003EDepartment of Homeland Security\u003C\u002Fa\u003E, RFID refers to Radio Frequency Identification (RFID) technology. This technology uses radio waves to identify people or objects.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere are devices that can read information contained in a wireless device or "tag" from a distance without making any physical contact or requiring a line of sight -- for example, the chips in credit or debit cards. Wallets which feature RFID-blocking technology prevent these devices from accessing information stored in protected chips, which can help prevent your bank information from being compromised.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What does RFID mean?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2b70c98b-f3b7-4c83-85b8-f6aa453c96a7\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe beauty of an AirTag is that it can be tracked from anywhere. Your AirTag just needs to be within range of a Bluetooth connection while near an Apple device. It does not even have to be your own phone, so as long as you are close to an Apple device, you can use AirTag technology to locate your wallet.\u003C\u002Fp\u003E\" data-hed=\"How far can I track my AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d6ee353c-06e9-4aa0-a5b6-bc285c09ca55\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're an iPhone user, there's a few ways to recognize if an AirTag is tracking you. Your phone may alert you of an "AirTag found moving with you." This will happen if these things are true:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EThe AirTag is separated from its owner.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYour iPhone is awake.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to find out if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How can I find out if an AirTag is tracking me?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EMore AirTag wallets to consider \u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003EIf you haven't found an AirTag wallet that feels right for you, here are a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F\" target=\"_blank\"\u003Efew alternatives\u003C\u002Fa\u003E that may better suit your needs -- it may not be a traditional wallet that you're looking for at all. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fe2701ee-9351-4da3-adc5-9cf5eee59de4\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Geo Wallet is ESR's flagship tracking wallet, which also uses Apple's Find My technology to ensure you can always find your MagSafe wallet. It holds up to three cards, and like the Journey LOC8 wallet, it also doubles as a stand.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo MagSafe Tracking Wallet\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"906f0b35-4a46-4fc9-86ac-73ae744003a9","title":"esr-halo-lock-geo-wallet","filename":"img-1826.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F07\u002F906f0b35-4a46-4fc9-86ac-73ae744003a9\u002Fimg-1826.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1061142,"width":6000,"height":4000,"dateCreated":{"date":"2024-06-07 16:47:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-07 16:48:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"906f0b35-4a46-4fc9-86ac-73ae744003a9","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1826.jpg","imageDateCreated":"2024\u002F06\u002F07","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best Bluetooth tracking wallet alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ca868a1-1f05-47d2-92d7-5b67e33a4781\" data-edition=\"us\" data-description=\"\u003Cp\u003EMaybe you're not actually in need of an AirTag wallet option. This traditional-style wallet from ESR features plenty of card slots and a designated ID slot and is enabled with Apple's Find My technology -- the first of its kind. While it isn't made of the most premium material and certainly isn't a leather alternative, it's a great wallet if you want built-in Bluetooth tracking without all the hassle of an added AirTag.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo Wallet with Find My\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"a7f849fb-6419-4135-9267-3c8952c8f262","title":"esr-halo-lock-geo-wallet","filename":"img-2021.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002Fa7f849fb-6419-4135-9267-3c8952c8f262\u002Fimg-2021.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3663445,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:31:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:31:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a7f849fb-6419-4135-9267-3c8952c8f262","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2021.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best bluetooth tracking traditional wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F","offerMerchant":"Esrgear","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.esrgear.com\u002Fgeo-wallet-with-find-my-discount\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6d2af2ec-b708-45a0-94cd-66b97f508fac\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeySmart's SmartCard lets you instantly turn any wallet into a trackable one by simply sliding it in place. It's super thin, works with Apple iOS Find My, has a wireless rechargeable battery, and is IPX7-rated. ZDNET's Adrian Kingsley-Hughes personally prefers these nifty cards over an AirTag, which needs battery replacing and can be bulky.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"KeySmart SmartCard\" data-imagegroup=\"{"alt":"KeySmart SmartCard","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"0accc90e-03af-42d6-a3b2-691d4553c3e4","title":"KeySmart SmartCard","filename":"img-9077.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F18\u002F0accc90e-03af-42d6-a3b2-691d4553c3e4\u002Fimg-9077.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":328342,"width":1600,"height":900,"dateCreated":{"date":"2024-03-18 12:05:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-18 12:05:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"KeySmart SmartCard","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0accc90e-03af-42d6-a3b2-691d4553c3e4","imageAltText":"KeySmart SmartCard","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-9077.jpg","imageDateCreated":"2024\u002F03\u002F18","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"Best non-AirTag tracking accessory to upgrade your current wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?","url":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2518b7f0-697d-4804-be5d-febcac9e50b5\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad also offers a tracking card that is enabled with Apple's Find My technology. Newly released in May 2024, the tracking card was back ordered for several weeks but is finally back to purchase as of the last publication of this article.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Nomad Tracking Card\" data-imagegroup=\"{"alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Max Buondonno\u002FZDNET","imageData":{"id":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","title":"nomad-tracking-card-zdnet-1","filename":"nomad-tracking-card-zdnet-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F27\u002F2bd33f28-27e9-407b-af79-b0ff2c63a22e\u002Fnomad-tracking-card-zdnet-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1024037,"width":1600,"height":900,"dateCreated":{"date":"2024-05-27 20:57:05","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-27 20:57:21","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Max Buondonno\u002FZDNET","alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","imageAltText":"Nomad Tracking Card with Card Wallet Plus and iPhone.","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Max Buondonno\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nomad-tracking-card-zdnet-1.jpg","imageDateCreated":"2024\u002F05\u002F27","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Max Buondonno\u002FZDNET\" data-linktext=\"Another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Ftracking-card","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0a5a8532-add5-40fe-add5-b637ca50be7c\" data-edition=\"us\" data-description=\"\u003Cp\u003EChipolo's Card Spot is shaped like a credit card, connects to Apple's Find My network, and gets ZDNET reviews editor Kerry Wan's pick for the best Bluetooth wallet tracker. The Card Spot is designed to live in your wallet, measuring a thickness of 0.09 inches -- about the same as two credit cards stacked together.\u003C\u002Fp\u003E\" data-hed=\"Chipolo Card Spot\" data-imagegroup=\"{"alt":"chipolo-iphone-here","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNet","imageData":{"id":"229910f6-af1c-4beb-bae9-4e9cffac574b","title":"chipolo-iphone-here","filename":"dsc00202.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F03\u002F11\u002F229910f6-af1c-4beb-bae9-4e9cffac574b\u002Fdsc00202.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":2785280,"width":6000,"height":3376,"dateCreated":{"date":"2022-03-11 23:07:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-03-11 23:07:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNet","alt":"chipolo-iphone-here","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"229910f6-af1c-4beb-bae9-4e9cffac574b","imageAltText":"chipolo-iphone-here","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dsc00202.jpg","imageDateCreated":"2022\u002F03\u002F11","imageWidth":6000,"imageHeight":3376,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNet\" data-linktext=\"Yet another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"47777800-8d9e-43f0-a72e-fae7294a820c\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad Goods also offers a card for the AirTag. Pop in your AirTag and slide it into your favorite wallet. It's as simple as that. \u003Cem\u003EAuthor's Note: This card is currently out of stock at the time of publication on 11\u002F19.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\" data-hed=\"Nomad Goods Card for AirTag\" data-imagegroup=\"{"alt":"airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"ec6a4994-42cd-410c-84e8-c0cce3423f15","title":"airtag-wallet","filename":"img-1563.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F10\u002Fec6a4994-42cd-410c-84e8-c0cce3423f15\u002Fimg-1563.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243591,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-10 14:17:18","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-10 14:25:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ec6a4994-42cd-410c-84e8-c0cce3423f15","imageAltText":"airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1563.jpg","imageDateCreated":"2024\u002F04\u002F10","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Fcard-for-airtag","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf136b08-c58a-4958-a14a-c2b857d0e137\" data-edition=\"us\" data-description=\"\u003Cp\u003ESimilar to the Nomad AirTag card, the TagVault allows you to pop an AirTag into a thin card-like casing, too. Plus, you get two in this pack.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Elevation Lab TagValut AirTag Insert (2-Pack)\" data-imagegroup=\"{"alt":"tagvault-airtag-insert","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Elevation Labs\u002FZDNET","imageData":{"id":"2b4b84ba-8975-448e-9a91-d60ec69b8026","title":"tagvault-airtag-insert","filename":"tagvault-airtag-insert-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002F2b4b84ba-8975-448e-9a91-d60ec69b8026\u002Ftagvault-airtag-insert-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":71497,"width":670,"height":372,"dateCreated":{"date":"2024-04-08 20:01:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 20:01:37","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Elevation Labs\u002FZDNET","alt":"tagvault-airtag-insert","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b4b84ba-8975-448e-9a91-d60ec69b8026","imageAltText":"tagvault-airtag-insert","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Elevation Labs\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"tagvault-airtag-insert-removebg-preview.png","imageDateCreated":"2024\u002F04\u002F08","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Elevation Labs\u002FZDNET\" data-linktext=\"Best budget AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ENeed the AirTag first? \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"f98673a7-9eba-4967-bc24-e9c87a7d23e3\" data-edition=\"us\" data-hed=\"Apple AirTag 4-Pack\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","filename":"img-0679.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002Fb14c53f9-6e74-4e39-b6f4-e44f7bff40b0\u002Fimg-0679.jpg","dateCreated":{"date":"2024-02-20 18:13:00","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","imageFilename":"img-0679.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0D54JZTHY?ref=ods_ucc_kindle_B0D54JZTHY_rc_nd_ucc\" data-offermerchant=\"Amazon\" data-monetizedurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX542AM-A-AirTag-Pack\u002Fdp\u002FB0932QJ2JZ?tag=zdnet-buy-button-20\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"2bb54237-6f2e-49cc-a125-d5bbe726cc2c\" data-edition=\"us\" data-hed=\"AirTag (1 Count)\" data-imagegroup=\"{"alt":"airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"16bed821-221f-4af3-aa35-0043a2afc64c","filename":"img-0685.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002F16bed821-221f-4af3-aa35-0043a2afc64c\u002Fimg-0685.jpg","dateCreated":{"date":"2024-02-20 18:13:04","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"16bed821-221f-4af3-aa35-0043a2afc64c","imageFilename":"img-0685.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0933BVK6T\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"919366eb-c91a-486d-9d88-097ffd074900\" data-edition=\"us\" data-description=\"\u003Cp\u003EZDNET sourced external industry experts for this article. Here is more information about them:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ELiz Ho\u003C\u002Fstrong\u003E: An avid camper and outdoor enthusiast who runs the&nbsp;\u003Ca href="https:\u002F\u002Fwww.youtube.com\u002F@CampingGuidance" target="_blank"\u003ECamping Guidance YouTube channel\u003C\u002Fa\u003E, which has 16.5K subscribers.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ERicky Allen: \u003C\u002Fstrong\u003EAn interior designer and marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, which sells eco-friendly wallpaper murals.\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Meet the experts\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EOther AirTag accessories to explore\u003C\u002Fh2\u003E\u003Cp\u003EFrom keychains to mounts and more, there are many \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EAirTag accessories\u003C\u002Fa\u003E to choose from. Here are a few others we've tested. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"6b759340-3792-44f1-a52e-2fda9ea25fef\" data-edition=\"us\" data-hed=\"Belkin Secure Holder with Wire Cable \" data-imagegroup=\"{"alt":"belkin-wire-airtag-holder","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","filename":"img-1428.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F03\u002F1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe\u002Fimg-1428.jpg","dateCreated":{"date":"2024-04-03 19:49:28","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","imageFilename":"img-1428.jpg","imageDateCreated":"2024\u002F04\u002F03"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FBelkin-Protective-Scratch-Resistance-Accessory\u002Fdp\u002FB09LCJFLXM\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"3779620b-f69a-4b91-bbc3-6fa5283a7b01\" data-edition=\"us\" data-hed=\"Pelican AirTag Sticker Mount\" data-imagegroup=\"{"alt":"pelican-sticker-mount-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","filename":"img-1459.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F09\u002F5ba80891-52a3-43c0-9dc9-392fc2cd7248\u002Fimg-1459.jpg","dateCreated":{"date":"2024-04-09 19:21:10","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","imageFilename":"img-1459.jpg","imageDateCreated":"2024\u002F04\u002F09"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fpelicanoutdoor.com\u002Fproducts\u002Fpelican-protector-airtag-sticker-mount-black\" data-offermerchant=\"Pelicanoutdoor\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"417c2c85-77f2-4fb6-a72e-620264724a80\" data-edition=\"us\" data-hed=\"Apple AirTag Loop\" data-imagegroup=\"{"alt":"apple-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Jason Hiner\u002FZDNET","imageData":{"id":"d0d9c538-3c10-4cd2-a7db-707034c02254","filename":"apple-airtag.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F09\u002F12\u002Fd0d9c538-3c10-4cd2-a7db-707034c02254\u002Fapple-airtag.jpg","dateCreated":{"date":"2023-09-12 03:32:34","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"d0d9c538-3c10-4cd2-a7db-707034c02254","imageFilename":"apple-airtag.jpg","imageDateCreated":"2023\u002F09\u002F12"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Jason Hiner\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-AirTag-Loop-Capri-Blue\u002Fdp\u002FB099C2472N?\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-21 16:48:14",timezone:"UTC",updated:c,published:c},description:"We tested the best Apple AirTag wallets and tracking accessories from Nomad, ESR, Ridge, and more to help you keep track of your cards and cash.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"a687cfd4-f602-4ae8-86bc-38672bfd5ad1",image:{id:"28b4587d-26d8-4c01-9af3-9c90ebd6be03",filename:"img-2035.jpg",dateCreated:{created:c,date:"2024-10-24 15:33:27",timezone:"UTC",updated:c,published:c},alt:"airtag-wallets",credits:"Kayla Solino\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F28b4587d-26d8-4c01-9af3-9c90ebd6be03\u002Fimg-2035.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:6000,height:4000,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Wearables",relatedItems:[]},name:b,promoTitle:"The best AirTag wallets you can buy: Expert tested",section:b,slug:"best-airtag-wallet",startYear:c,summary:b,title:"The best AirTag wallets of 2024: Expert tested",topic:{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0f170e27-b89d-48a1-aa1e-6d5c3594737e",slug:"work-life",name:"Work Life",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"df4e6daa-3a40-4260-a6b4-c53410513a75",username:"emily.long",profileUrl:c,email:c,firstName:"Emily",lastName:"Long",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"b12e2baf-1e9f-41bb-9c45-e6d3c9a6faaf",filename:"elong-headshot.png",dateCreated:{created:c,date:"2024-08-08 17:06:46",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F08\u002Fb12e2baf-1e9f-41bb-9c45-e6d3c9a6faaf\u002Felong-headshot.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Emily Long is a freelance writer based in Salt Lake City, Utah. She covers consumer tech, privacy, and personal finance, and her work has been featured on sites like Lifehacker, Tom's Guide, and Wirecutter, among others. She has been reporting and writing for over a decade.",profile:c,title:"Contributing writer",bio:b,bureau:c,awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"cae1ba18-ff41-43af-adb5-28dbdacb2450\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"bitdefender-vs-malwarebytes\" data-image-filename=\"bitdefender-vs-malwarebytes.jpg\" data-image-date-created=\"2024\u002F11\u002F11\" data-image-width=\"1920\" data-image-height=\"1080\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\" target=\"_blank\"\u003EAntivirus software\u003C\u002Fa\u003E is one tool in your security toolkit to help defend your data and devices against threats like malware, ransomware, and phishing. While updated operating systems have \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-you-dont-need-to-pay-for-antivirus-software-anymore\u002F\" target=\"_blank\"\u003Edecent built-in protection\u003C\u002Fa\u003E, third-party antivirus can up the level and add layers of security through extras like \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003EVPNs\u003C\u002Fa\u003E and firewalls. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best antivirus software\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn our head-to-head comparison of popular antivirus options \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"416e2857-f04c-42c8-a4b7-a478e0d953cb\" data-raw-url=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002F\" data-link-shortcode-text=\"Bitdefender\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E vs. \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d742a138-1781-41f9-a992-53dd7f4066cd\" data-raw-url=\"https:\u002F\u002Fwww.malwarebytes.com\u002F\" data-link-shortcode-text=\"Malwarebytes\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, Bitdefender comes out on top thanks to its robust, feature-rich protection and competitive price. When deciding which antivirus software is best for you, you'll want to consider factors like compatibility across platforms and devices, types of threat protection, extra features, and price. Here's a breakdown of two popular antivirus software options. \u003C\u002Fp\u003E\u003Ch2\u003ESpecifications\u003C\u002Fh2\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cbr\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EBitdefender\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EMalwarebytes\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EFree version\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EFree premium trial\u003C\u002Ftd\u003E\u003Ctd\u003E30 days\u003C\u002Ftd\u003E\u003Ctd\u003E14 days\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ECompatibility\u003C\u002Ftd\u003E\u003Ctd\u003EWindows, MacOS, Android, iOS, Linux\u003C\u002Ftd\u003E\u003Ctd\u003EWindows, MacOS, Android, iOS\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EMalware protection\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EPhishing protection\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EScan types\u003C\u002Ftd\u003E\u003Ctd\u003EScheduled, real-time\u003C\u002Ftd\u003E\u003Ctd\u003EScheduled, real-time\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ECustomer support\u003C\u002Ftd\u003E\u003Ctd\u003ELive chat, email, phone, support pages\u003C\u002Ftd\u003E\u003Ctd\u003EAI and live chat, email, support pages\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EPrice\u003C\u002Ftd\u003E\u003Ctd\u003EPlans starting at $24 per year for one device or $35 per year for three devices\u003C\u002Ftd\u003E\u003Ctd\u003EPlans starting at $45 per year\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Chr\u003E\u003Ch2\u003EYou should choose Bitdefender if…\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9833a5f9-42aa-4258-98cf-2583b349af34\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EI tested Bitdefender, and it's our current pick for the best antivirus software.\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by Emily Long\u002FZDNET\" data-image-alt-text=\"Bitdefender antivirus screening\" data-image-filename=\"screenshot-2024-10-28-at-10-27-48am.png\" data-image-date-created=\"2024\u002F11\u002F11\" data-image-width=\"1912\" data-image-height=\"1284\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003E1. You want comprehensive protection across devices and browsers\u003C\u002Fh3\u003E\u003Cp\u003EAs a known and trusted brand, Bitdefender is our \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\" target=\"_blank\"\u003Etop pick for the best antivirus software\u003C\u002Fa\u003E. It provides protection against viruses, malware, ransomware, spyware, rootkits, and adware on all major operating systems (Windows, MacOS, Android, and iOS) to keep your data and devices safe from security threats. You also get anti-phishing protection against websites that aim to steal your personal information. On Windows, Bitdefender does continuous, real-time scans and has advanced performance settings so the software isn't a drag on your machine while you're gaming, streaming, or working. Plus, a subscription to Bitdefender Total Security ($60 per year) includes a privacy firewall for Windows users. \u003C\u002Fp\u003E\u003Cp\u003EBitdefender also has anti-tracking and anti-phishing browser extensions for Chrome, Firefox, Safari, and Microsoft Edge. Note that Bitdefender's software for Windows and Android is more robust than the versions for MacOS and iOS, so not all features and settings are available on all platforms. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-antivirus\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best free antivirus software: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch3\u003E2. You want premium features at a competitive price\u003C\u002Fh3\u003E\u003Cp\u003EIn addition to antivirus and anti-malware, Bitdefender Antivirus Plus comes with VPN service (up to 200MB of encrypted traffic per device per day) and data breach protection. An upgrade to Bitdefender Total Security adds password management to the package. Antivirus Plus starts at $24 per year, while Total Security costs $60 per year -- comparable plans from Malwarebytes run anywhere from $60 to $100 annually. If you need additional privacy and security features, Bitdefender includes them in one package at a competitive price. \u003C\u002Fp\u003E\u003Cp\u003EWhile Bitdefender's free plan is limited to virus and malware protection, you do get real-time scanning and access to 24\u002F7 customer support via live chat. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"c9fa1dab-a101-41e4-a75b-b840dbbebacb\" data-edition=\"us\" data-hed=\"Buy Bitdefender\" data-imagegroup=\"{"alt":"Bitdefender logo","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Bitdefender","imageData":{"id":"735a0811-cebd-4eed-a46a-594a184a1472","filename":"screenshot-2024-11-11-at-4-06-51pm.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F11\u002F735a0811-cebd-4eed-a46a-594a184a1472\u002Fscreenshot-2024-11-11-at-4-06-51pm.png","dateCreated":{"date":"2024-11-11 21:07:02","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"735a0811-cebd-4eed-a46a-594a184a1472","imageFilename":"screenshot-2024-11-11-at-4-06-51pm.png","imageDateCreated":"2024\u002F11\u002F11"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Bitdefender\" data-offerurl=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002F\" data-offermerchant=\"Bitdefender\" data-monetizedurl=\"http:\u002F\u002Fwww.amazon.com?tag=zdnet-buy-button-20\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EYou should choose Malwarebytes if…\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"5fad3ed5-c179-44dc-b1ce-3ed297f36f78\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EI tested Malwarebytes, and found its interface to be very user-friendly.\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by Emily Long\u002FZDNET\" data-image-alt-text=\"malwarebytes antivirus\" data-image-filename=\"screen-shot-2024-08-17-at-5-26-27-pm.png\" data-image-date-created=\"2024\u002F09\u002F03\" data-image-width=\"2036\" data-image-height=\"1424\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003E1. You're looking primarily for malware protection\u003C\u002Fh3\u003E\u003Cp\u003EMalwarebytes does anti-malware protection well. While other antivirus software -- Bitdefender included -- comes with a wide range of security features built-in even on free and basic paid plans, not everyone needs or wants an all-in-one solution. If you don't plan to use lots of extras like \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003EVPN\u003C\u002Fa\u003E access, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-password-manager\u002F\" target=\"_blank\"\u003Epassword management\u003C\u002Fa\u003E, or dark web monitoring, a free or standard subscription to Malwarebytes will get you all the malware, virus, ransomware, phishing, and rootkit protection you need. \u003C\u002Fp\u003E\u003Cp\u003EIf you \u003Cem\u003Edo\u003C\u002Fem\u003E decide you want extra features under one umbrella, Malwarebytes Plus ($60 per year) comes with VPN and anonymous browsing, while Malwarebytes Ultimate ($120 per year) adds dark web monitoring, credit reporting, and data removal services. \u003C\u002Fp\u003E\u003Ch3\u003E2. You want to supplement existing security features\u003C\u002Fh3\u003E\u003Cp\u003EIf you have a VPN or password manager already, Malwarebytes can supplement those services while focusing on its primary purpose: scanning your system for threats. Malwarebytes has VPN and identity protection add-ons, but you don't need to upgrade to these plans to get solid antivirus and anti-malware protection. Otherwise, Malwarebytes offers rapid and real-time scanning, threat quarantining, and ad blocking in a simple, user-friendly interface (though the free plan comes with manual scanning only). \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"5c4a6f7c-219e-481a-bf61-941526cd635c\" data-edition=\"us\" data-hed=\"Buy Malwarebytes\" data-imagegroup=\"{"alt":"Malwarebytes","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Malwarebytes","imageData":{"id":"ee14a53a-08f1-489f-b47f-4c0bfba186ea","filename":"malwarebytes.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F01\u002F19\u002Fee14a53a-08f1-489f-b47f-4c0bfba186ea\u002Fmalwarebytes.png","dateCreated":{"date":"2021-01-19 18:32:32","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"ee14a53a-08f1-489f-b47f-4c0bfba186ea","imageFilename":"malwarebytes.png","imageDateCreated":"2021\u002F01\u002F19"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Malwarebytes\" data-offerurl=\"https:\u002F\u002Fwww.malwarebytes.com\u002F\" data-offermerchant=\"Malwarebytes\" data-monetizedurl=\"http:\u002F\u002Fwww.amazon.com?tag=zdnet-buy-button-20\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003E Alternatives to consider\u003C\u002Fh2\u003E\u003Cp\u003EThe antivirus space is packed, so if neither Bitdefender or Malwarebytes offers what you need, there are numerous other antivirus software options available to choose from:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f448270-240e-4a55-83d8-3cc13dc7b9cb\" data-edition=\"us\" data-description=\"\u003Cp\u003EAVG is our \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-antivirus\u002F" target="_blank"\u003Etop pick for free antivirus software\u003C\u002Fa\u003E, with a simple, user-friendly interface and the ability to run manual and scheduled scans. (Its cousin, Avast Security, is also an excellent no-cost option with more premium features.)\u003C\u002Fp\u003E\" data-hed=\"AVG Antivirus Free\" data-imagegroup=\"{"alt":"avg-antvirus-free","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Emily Long\u002FZDNET","imageData":{"id":"2f5d722f-3734-48c7-a1bc-afe8a12cc4c0","title":"avg-antivirus-free","filename":"avg-antvirus-free.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F21\u002F2f5d722f-3734-48c7-a1bc-afe8a12cc4c0\u002Favg-antvirus-free.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":2141938,"width":1994,"height":1328,"dateCreated":{"date":"2024-08-21 18:45:02","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-21 18:45:17","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Screenshot by Emily Long\u002FZDNET","alt":"avg-antvirus-free","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2f5d722f-3734-48c7-a1bc-afe8a12cc4c0","imageAltText":"avg-antvirus-free","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Emily Long\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"avg-antvirus-free.png","imageDateCreated":"2024\u002F08\u002F21","imageWidth":1994,"imageHeight":1328,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Emily Long\u002FZDNET\" data-linktext=\"Best free antivirus alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"AVG","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.avg.com\u002Fen-us\u002F","url":""}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"792a18df-9cd5-44d9-ae82-282b966751a8\" data-edition=\"us\" data-description=\"\u003Cp\u003ENorton Antivirus Plus is a simple and affordable antivirus solution that offers real-time threat protection, a firewall, and password management for one device.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Norton Antivirus Plus\" data-imagegroup=\"{"alt":"Norton Antivirus Plus","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Norton","imageData":{"id":"58fe571b-3b72-4075-a413-45015db5fa52","title":"Norton Antivirus Plus","filename":"a.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F06\u002F58fe571b-3b72-4075-a413-45015db5fa52\u002Fa.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":142627,"width":1296,"height":720,"dateCreated":{"date":"2023-11-06 14:18:10","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-06 14:18:15","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Norton","alt":"Norton Antivirus Plus","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"58fe571b-3b72-4075-a413-45015db5fa52","imageAltText":"Norton Antivirus Plus","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Norton","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"a.jpg","imageDateCreated":"2023\u002F11\u002F06","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Norton\" data-linktext=\"Best antivirus alternative for a single device\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Norton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fus.norton.com\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2bb82779-f5f6-4859-af6e-823b4fdfb592\" data-edition=\"us\" data-description=\"\u003Cp\u003EMcAfee Total Protection is a comprehensive, multi-platform antivirus with plans for multiple devices that include dark web monitoring, VPN, and a password manager.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"McAfee Total Protection\" data-imagegroup=\"{"alt":"McAfee Total Protection 2023","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"McAfee","imageData":{"id":"2d6cc682-c102-4802-950d-91d3ee2201d0","title":"McAfee Total Protection 2023","filename":"145.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F06\u002F2d6cc682-c102-4802-950d-91d3ee2201d0\u002F145.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":149604,"width":1296,"height":720,"dateCreated":{"date":"2023-04-06 10:26:10","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-04-06 10:26:18","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"McAfee","alt":"McAfee Total Protection 2023","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2d6cc682-c102-4802-950d-91d3ee2201d0","imageAltText":"McAfee Total Protection 2023","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"McAfee","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"145.jpg","imageDateCreated":"2023\u002F04\u002F06","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"McAfee\" data-linktext=\"Best antivirus alternative for features\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"McAfee","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.mcafee.com\u002Fen-us\u002Fantivirus\u002Fmcafee-total-protection.html","url":""}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-12 15:00:00",timezone:"UTC",updated:c,published:c},description:"Bitdefender offers feature-rich antivirus at a competitive price, while Malwarebytes focuses on protection against malware. Here's how to decide between the two.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"f5b44717-e06a-45a8-a029-9e296c4d7596",image:{id:"cae1ba18-ff41-43af-adb5-28dbdacb2450",filename:"bitdefender-vs-malwarebytes.jpg",dateCreated:{created:c,date:"2024-11-11 21:33:20",timezone:"UTC",updated:c,published:c},alt:"2022-ipad-air-fifth-generation-1.jpg",credits:"Jason Cipriani\u002FZDNet",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F11\u002Fcae1ba18-ff41-43af-adb5-28dbdacb2450\u002Fbitdefender-vs-malwarebytes.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1920,height:1080,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"review-multi",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"bitdefender-vs-malwarebytes-which-antivirus-is-best",startYear:c,summary:b,title:"Bitdefender vs. Malwarebytes: Which antivirus is best?",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fbeaa3cc-7de3-495c-8f08-90ab7735bd7e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero with the Wi-Fi dev board\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero with the Wi-Fi dev board\" data-image-filename=\"img-1565.jpg\" data-image-date-created=\"2023\u002F01\u002F09\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIt's been a long time since I've seen as much buzz over a bit of tech as I've seen about the Flipper Zero. \u003C\u002Fp\u003E\u003Cp\u003EThis $169 \"portable multi-tool for pentesters and geeks in a toy-like body\" puts the power to explore RFID and radio protocols, as well as debug hardware using GPIO pins in your pocket.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-choose-the-right-linux-desktop-distribution\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to choose the right Linux desktop distribution\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EI posted \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fflipper-zero-geeky-toy-or-serious-security-tool\u002F\"\u003Emy first impressions of the Flipper Zero\u003C\u002Fa\u003E the other day, and since then I've been bombarded with questions. Here I'm going to do my best to answer the most commonly asked Flipper Zero questions.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"efbd3e2b-8b43-424d-b5c4-caefa2cfd9ce\" data-edition=\"us\" data-hed=\"Buy the Flipper Zero here\" data-imagegroup=\"{"alt":"2023-01-09-12-06-00","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"97c5f5b0-e45b-4ec2-a1e0-fcc6c212d4c3","filename":"2023-01-09-12-06-00.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F01\u002F09\u002F97c5f5b0-e45b-4ec2-a1e0-fcc6c212d4c3\u002F2023-01-09-12-06-00.jpg","dateCreated":{"date":"2023-01-09 12:06:25","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"97c5f5b0-e45b-4ec2-a1e0-fcc6c212d4c3","imageFilename":"2023-01-09-12-06-00.jpg","imageDateCreated":"2023\u002F01\u002F09"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FFlipper-Zero\u002Fdp\u002FB0BBSRM37R\" data-offermerchant=\"Amazon\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cblockquote\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003ENote: Don't mess with hardware and Wi-Fi networks that you don't own or have permission to work with! You can quickly end up in a world of hurt and deep into legal headaches.\u003C\u002Fstrong\u003E\u003C\u002Fem\u003E\u003Cstrong\u003E \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ff1dc942-a932-479d-9faf-e518842c3236\" data-edition=\"us\" data-description=\"\u003Cp\u003EHaving been using the Flipper Zero for a few weeks now, I have to say that I'm impressed by what this pocket tool can do.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt's allows me to read\u002Fcopy\u002Femulate NFC\u002FRFID\u002FIR remotes and sub-GHz wireless signals with ease. That's a lot of power in a small tool.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBut don't get carried away. If there are limitations to what the tool can do, a quick web search or a look on YouTube will give you a good overview of them.\u003C\u002Fp\u003E\" data-hed=\"Is the Flipper Zero a "hack the planet" tool?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"82209ed2-b759-430f-83a9-72cf3d37f7e3\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt's \u003Ca href="https:\u002F\u002Fflipperzero.one\u002F" target="_blank"\u003E$169 from the official store with free shipping\u003C\u002Fa\u003E (if you can buy it new, but \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FFlipper-Zero\u002Fdp\u002FB0BBSRM37R\u002F?tag=zdnet-deals-20" target="_blank"\u003Ethird-party sellers\u003C\u002Fa\u003E are pushing them for two or three times the price). For some, this is nothing. For others, this is a lot.\u003C\u002Fp\u003E\u003Cp\u003EAs to whether it's worth the money, it depends.\u003C\u002Fp\u003E\u003Cp\u003EFor the money, it's hard to buy anything else that can do what the Flipper Zero can do. If you want something to experiment with NFC and RFID and sub-GHz wireless networks, it's a nice all-in-one tool. The GPIO outputs are also cool if you're into playing with hardware.\u003C\u002Fp\u003E\u003Cp\u003EIt also gives you the ability to run&nbsp;\u003Ca href="https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FBadUSB" target="_blank"\u003EBadUSB\u003C\u002Fa\u003E&nbsp;attacks on devices.\u003C\u002Fp\u003E\u003Cp\u003EBut where I see the main power of Flipper Zero is less the hacking destination, but more the journey.\u003C\u002Fp\u003E\u003Cp\u003EThe Flipper Zero is a brilliant learning tool, and you will be learning all along the way.\u003C\u002Fp\u003E\u003Cp\u003EWhat can you learn? How \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgithub-vs-gitlab-the-key-differences\u002F" target="_blank"\u003EGitHub\u003C\u002Fa\u003E works, how to download and install firmware, how to flash hardware, what all the different networking and wireless protocols are and how they work, and how to work with GPIO -- for starters.\u003C\u002Fp\u003E\" data-hed=\"Is the Flipper Zero worth the money?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b42507f0-cbb1-4568-850e-065f5a99b4b5\" data-edition=\"us\" data-description=\"\u003Cp\u003EI hate to break it to you, but 95% of the stuff you see people doing on TikTok and Instagram is fake nonsense created by people looking for 5 seconds of fame.\u003C\u002Fp\u003E\u003Cp\u003EAnd this is a big negative for the Flipper Zero. These videos give people a false sense of what's possible, and it's going to mean that for every ten Flipper Zeros sold, a good nine are going to end up being resold or forgotten in a drawer or box.\u003C\u002Fp\u003E\u003Cp\u003EBut for a good portion of that 10% that stick with it, the Flipper Zero could be their first steps to a long path of learning, and one that could end up in a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftech-jobs-are-changing-here-are-the-real-skills-youll-need-to-get-promoted\u002F" target="_blank"\u003Ecareer in tech\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"Can I clone bank cards\u002Fmess with infrastructure\u002Fmake ATMs pour out money?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e9491d2c-58d0-4f08-aad1-299853fb4f1e\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, but not directly.\u003C\u002Fp\u003E\" data-hed=\"Can you hack Wi-Fi networks?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"139968c1-0e88-4912-9514-728539f2767c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero and the Wi-Fi dev board\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero and the Wi-Fi dev board\" data-image-filename=\"img-1566.jpg\" data-image-date-created=\"2023\u002F01\u002F09\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EFirst, you need a \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8e00face-4e7d-4eac-adf6-622b728bf083\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FWiFi-Devboard-for-Flipper-Zero\u002Fdp\u002FB0BBWHS5R1\u002F\" data-link-shortcode-text=\"Wi-Fi dev board\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, and then you're going to have to flash the firmware on the Wi-Fi board, install new firmware on the Flipper Zero, figure out what to do when things don't work, and then learn how it all works.\u003C\u002Fp\u003E\u003Cp\u003EThen you can run a tool called Wi-Fi Marauder that will give you access to a bunch of wireless tools.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"19ecddde-b7df-4ebb-85af-9e0f3a96c514\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ERunning a RickRoll Wi-Fi 'attack'\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Running a RickRoll Wi-Fi 'attack'\" data-image-filename=\"img-1571.jpg\" data-image-date-created=\"2023\u002F01\u002F09\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"8d43e6d0-1cf5-4e30-9e89-d67b4b333d64\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ERickRoll attack creates loads of WI-FI SSIDs with names that are lyrics of "that song"\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"RickRoll attack creates loads of WI-FI SSIDs with names that are lyrics of "that song"\" data-image-filename=\"img-1572.jpg\" data-image-date-created=\"2023\u002F01\u002F09\" data-image-width=\"1600\" data-image-height=\"813\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere are no shortcuts though. Every step takes time and learning and some effort on your part.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8aa3a428-1118-46d8-af34-1b24f2868f1e\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt's a good start, and a lot less intimidating (and cheaper) than other routes. You could download and install Kali Linux, get yourself an \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FALFA-AWUS036ACH-%E3%80%90Type-C%E3%80%91-Long-Range-Dual-Band\u002Fdp\u002FB08SJC78FH\u002F?tag=zdnet-deals-20" target="_blank"\u003EALFA AWUS036ACH dual-band wireless USB Wi-Fi adapter\u003C\u002Fa\u003E (you need this because it supports advanced features such as monitor mode and injection), and then learn to use Linux.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fpeople-are-already-trying-to-get-chatgpt-to-write-malware\u002F" target="_blank"\u003E\u003Cstrong\u003EPeople are already trying to get ChatGPT to write malware\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis will give you a lot more power than the Flipper, but it's also a much steeper learning curve. &nbsp;\u003C\u002Fp\u003E\" data-hed=\"Is it the best tool to learn pentesting\u002Fhacking?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"91bd907d-b33e-4683-811b-05e1e4b4dd33\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. Not permanently (well, I've not done that… yet) but things can stop working properly.\u003C\u002Fp\u003E\u003Cp\u003EI've had my Flipper Zero for a couple of weeks and I've crashed Wi-Fi on my router, temporarily stopped a car's key fob from working properly (which could have meant a trip to the garage if I didn't know how to solve the issue), and made an AC unit go bananas using the IR remote.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-enable-uwb-on-android-and-why-you-should\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to enable UWB on Android (and why you should)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis is why you shouldn't mess with things that don't belong to you or that you don't have permission to work with.\u003C\u002Fp\u003E\" data-hed=\"Can you damage things with the Flipper Zero?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"059abb4e-3159-4654-bb63-c8646944a201\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe official website gets stock on a regular basis, but if you're in a rush and want to pay over the odds, there are plenty of sellers flipping their Flipper Zeros.\u003C\u002Fp\u003E\" data-hed=\"Where can I buy a Flipper Zero?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf it's the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"92e729a4-ddd7-4560-a446-a73e9d2c8d0d\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FWiFi-Devboard-for-Flipper-Zero\u002Fdp\u002FB0BBWHS5R1\u002F\" data-link-shortcode-text=\"Wi-Fi dev board\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E you want, that's quite easy to pick up. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-06-20 17:24:00",timezone:"UTC",updated:c,published:c},description:"You have Flipper Zero questions. I have answers.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c0c77276-ca9a-4940-a496-d950db46d308",image:{id:"a56489a9-491f-4835-a9a3-e6507a82bd5d",filename:"flipper-zero-dolphin.jpg",dateCreated:{created:c,date:"2024-06-20 15:56:50",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F20\u002Fa56489a9-491f-4835-a9a3-e6507a82bd5d\u002Fflipper-zero-dolphin.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:489,height:378,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Home & Office",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"flipper-zero-can-you-really-hack-wi-fi-networks-and-other-questions-answered",startYear:c,summary:b,title:"Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered",topic:{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"112a7545-ec91-11e3-95d2-02911863765e",slug:"reviews",name:"Reviews",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"0a6fffc2-2220-44ba-99e4-4c567f6f57bb",username:"maria-diaz-zd",profileUrl:c,email:c,firstName:"Maria",lastName:"Diaz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"d89921b7-c002-40ef-8401-f002f1a769e9",filename:"maria-diaz.jpg",dateCreated:{created:c,date:"2022-08-05 14:44:33",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fd89921b7-c002-40ef-8401-f002f1a769e9\u002Fmaria-diaz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Maria Diaz is a staff writer based in the Raleigh-Durham, NC area with a passion for home automation and a background in graphic design, photography, and filmmaking. She has a bachelor's in Mass Communication and experience in journalism.",profile:c,title:"Staff Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"9bd28cc2-5e0d-4026-9c5a-b6d463a77e0d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"3.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EZDNET's key takeaways\u003Cbr\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003EThe \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"963af709-bd70-4a79-8f23-3627bf0ba1c1\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-link-shortcode-text=\"Blink Mini 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E is available for $30 on its own or bundled with a \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ad625748-25b0-42dc-ad57-dc29714e1d49\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-monetized-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20\" data-link-shortcode-text=\"weather-resistant power adapter for $40\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fli\u003E\u003Cli\u003EWith a stronger construction, improved video quality, a new spotlight, person detection, and weather resistance for outdoor use, the Blink Mini 2 is a definite upgrade from the first generation.\u003C\u002Fli\u003E\u003Cli\u003EAs an Amazon device, the Blink Mini 2 works with Alexa but not Google Home, Matter, or other smart home systems.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003EIf you're looking for an affordable security camera to replace your Wyze Cam after this year's data breaches, Blink may have the one for you. The Blink Mini 2 is available now for 40% off.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fi-just-tested-the-new-eufycam-and-im-never-going-back-to-grainy-night-vision\u002F\"\u003EI just tested the new EufyCam, and I'm never going back to grainy night vision\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EI've been testing the Blink Mini 2 for the past week and noticed some big changes over the original \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"e88bbed6-7365-43c4-8c4e-37bc3d7ae191\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-White-1Cam\u002Fdp\u002FB07X6C9RMF\" data-link-shortcode-text=\"Blink Mini\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, which I've had for almost two years. Widely known as an affordable indoor camera (normally retailing for $49), the Blink Mini is a compact plug-in camera that can be installed anywhere inside or outside your home.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Blink Mini 2 is a compact plug-in security camera fit for indoor or outdoor use, featuring on-device person detection, Alexa support, a 143-degree FOV, and a built-in spotlight.\u003C\u002Fp\u003E\" data-hed=\"Blink Mini 2\" data-imagegroup=\"{"alt":"Blink Mini 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Maria Diaz\u002FZDNET","imageData":{"id":"ddd4fa89-f37f-483b-b6af-a6a9b6c353ee","title":"Blink Mini 2","filename":"img-5595-copy.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F13\u002Fddd4fa89-f37f-483b-b6af-a6a9b6c353ee\u002Fimg-5595-copy.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":4931046,"width":4935,"height":2767,"dateCreated":{"date":"2024-03-13 18:31:59","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-13 18:32:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Maria Diaz\u002FZDNET","alt":"Blink Mini 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ddd4fa89-f37f-483b-b6af-a6a9b6c353ee","imageAltText":"Blink Mini 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Maria Diaz\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-5595-copy.jpg","imageDateCreated":"2024\u002F03\u002F13","imageWidth":4935,"imageHeight":2767,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Maria Diaz\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe older Blink Mini has two-way audio, 1080p video resolution, Amazon Alexa integration, and works as a chime for the Blink video doorbell. The new Blink Mini 2 has all these features, plus weather-resistant indoor and outdoor construction, person detection, and a spotlight.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe weather resistance is a feature that takes the Blink to the next level, making it a direct \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"9ca3375b-ae63-4fec-b157-c20479e588ee\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FVision-Indoor-Outdoor-Camera-Assistant\u002Fdp\u002FB08R59YH7W\" data-link-shortcode-text=\"Wyze Cam v3\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E competitor. Wyze Cam maker Wyze Labs has recently been the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fwyze-camera-breach-let-13000-strangers-view-other-peoples-homes\u002F\" target=\"_blank\"\u003Etarget of user frustration\u003C\u002Fa\u003E after a service outage led to a privacy incident where some users could temporarily see other users' live cameras and events.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9a67c961-3fe8-4a14-8446-ae0657b10120\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Blink Mini 2 next to a Wyze Cam v3.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2 vs Wyze Cam v3\" data-image-filename=\"1.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter testing the Blink Mini 2, I spoke to Blink's head of product, Jonathan Cohn, to discuss the ins and outs of the new security camera. Cohn explained that after listening to user feedback, the company added weather resistance and a spotlight, which works as a light source for color night vision, to illuminate dark areas when motion is detected. The camera also has a recording indicator to deter would-be intruders.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fa-battery-powered-floodlight-camera-was-exactly-what-my-dark-backyard-needed\u002F\"\u003EA battery-powered floodlight camera was exactly what my dark backyard needed\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile not as bright as an outdoor light, the spotlight is bright enough to illuminate people as they approach and light up pathways in the dark. This made me consider setting up the Mini 2 by the garbage cans beside my house, but I decided against it since I don't have a power source nearby, and the camera needs to be plugged in at all times. The Mini 2 would go perfectly in a garage or a carport to illuminate a driveway or surveil a back door. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"e89b5a18-b5dd-4cc6-b97e-5176ed0cb92c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"4.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELike the Blink Outdoor 4, the Blink Mini 2 can notify you when a person has been detected, ignoring all other motion powered by the Blink's silicon.\u003C\u002Fp\u003E\u003Cp\u003E\"Blink makes its chip and uses the chip on our cameras, which means we own the end-to-end experience and design of our camera,\" Cohn explained. Using proprietary silicon and design ensures Blink can guarantee the entire privacy and security experience from when the light enters the lens to the recorded video clips, Cohn added.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fwyze-camera-breach-let-13000-strangers-view-other-peoples-homes\u002F\"\u003EWyze camera breach let 13,000 strangers look into other people's homes\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThough the Blink Mini and Mini 2 feature 1080p HD resolution video recording, the difference in the recorded clips is noticeable. Cohn explained that Blink significantly improved the Mini 2's video quality, increasing the field-of-view from 110 to 143 degrees for more coverage, increasing the sensor's lowlight capability, and improving the dynamic range.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0abe0e3c-3abe-4370-85f8-6fe8ea8961bc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"2.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThis means the Mini 2 can capture clearer and more detailed images in mixed lighting, even if very bright and dark areas are in a single frame. A better dynamic range can show details in shadowy and brightly lit areas in a single video, making it easier to identify people and objects.\u003C\u002Fp\u003E\u003Ch2\u003EZDNET's buying advice\u003C\u002Fh2\u003E\u003Cp\u003EIn my home, the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"625ecebe-6c5e-4c16-a831-7e1b60e54f59\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-link-shortcode-text=\"Blink Mini 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E replaced a Wyze Cam v3 in my sunroom. This is a fairly humid room with direct entry to my home, so a camera with a spotlight is better than one without. Since making the switch, I won't be going back.\u003C\u002Fp\u003E\u003Cp\u003EBlink cameras come with a 30-day free trial to the Blink Subscription Plan. The monthly subscription gives users cloud storage and extra features, like person detection and a continuous live feed for up to 90 minutes. You can bypass the subscription by purchasing a Blink Sync Module and a USB flash drive to store video clips, which is the solution I've set up in my home.\u003C\u002Fp\u003E\u003Cp\u003ESince my home relies on Amazon's Alexa, I appreciate that the Blink Mini 2 is quicker to connect to multiple Echo Shows than the Wyze camera, showing me what's happening in the sunroom. Blink doesn't integrate with Google Home, Apple HomeKit, Samsung SmartThings, or other smart home systems, which is a factor to consider if your smart home uses one.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 15:28:21",timezone:"UTC",updated:c,published:c},description:"The Blink Mini 2 is feature-rich, and it includes a waterproof adapter that makes it that much sweeter. Currently, it's available on Amazon for just $30.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d1d0894f-8501-4ed1-931e-2af58b95c9c1",image:{id:"ac5435dc-534f-4bbc-8021-67b19f13e6c3",filename:"5.jpg",dateCreated:{created:c,date:"2024-03-13 18:39:28",timezone:"UTC",updated:c,published:c},alt:"Blink Mini 2",credits:"Maria Diaz\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F13\u002Fac5435dc-534f-4bbc-8021-67b19f13e6c3\u002F5.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4935,height:2767,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Home & Office^Smart Home^Home Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now",startYear:c,summary:b,title:"Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now)",topic:{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"60832ece-f84e-43d8-a207-9697d20dc673",slug:"kitchen-household",name:"Kitchen & Household",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"81fcf152-44b9-45ff-8a25-04f5b2472176",slug:"yard-outdoors",name:"Yard & Outdoors",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Ch2\u003EWhat is the best no-log VPN in 2024?\u003C\u002Fh2\u003E\u003Cp\u003EZDNET's top no-log VPN this year is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"229a0e02-dba0-4427-8e81-22401ec1395f\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. NordVPN combines strong security, excellent speeds, and a vast server network with a no-logs policy and a transparent approach to privacy that many users trust. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EZDNET writers have \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Etested and reviewed\u003C\u002Fa\u003E VPNs for years. We rely on our experiences with the best VPNs on the market, frequent speed tests, and customer feedback to recommend the top VPNs you should consider before signing up. Below, you will find our selection of the best no-log VPNs.\u003C\u002Fp\u003E\u003Ch2\u003EThe best no-log VPNs in 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"baf4c70c-a089-41e9-a4d6-55dc4946e6ad\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordVPN is one of our top picks in the VPN market. While we would like to see support for unlimited simultaneous connections added in the future, NordVPN still stands out due to its excellent speeds, server network of over 110 countries, and multi-platform compatibility.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordVPN operates a strict no-logs policy that has been validated multiple times since 2018. Deloitte verified the policy's claims in 2023. Furthermore, NordVPN is based in Panama, which does not enforce any data retention laws that would force the VPN provider to abandon this policy.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnordvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003ENordVPN review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe've consistently found that NordVPN provides a stable, solid server network, fantastic speeds, and good connection times. Customers say this VPN is easy to use and that customer support is prompt and friendly.\u003C\u002Fp\u003E\u003Cp\u003EIf you're interested in trying out NordVPN, the biggest savings can be found on two-year contracts, starting at $3.59 per month. If you agree to such a contract you should also get three months of free access. Alternatively, one-year plans begin at $4.99 per month, or one month of access costs $12.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENordVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E10 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, and routers |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;111 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Email address and billing information only | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on&nbsp;Android\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Best no-logs VPN overall\" data-imagegroup=\"{"alt":"NordVPN","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"ba0d3eda-fd61-4ad4-87e4-a664ccd7d814","title":"nordvpn-windows-1","filename":"nordvpn-windows-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F21\u002Fba0d3eda-fd61-4ad4-87e4-a664ccd7d814\u002Fnordvpn-windows-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":327970,"width":1296,"height":720,"dateCreated":{"date":"2024-05-21 09:42:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-21 09:42:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne\u002FZDNET","alt":"nordvpn-windows-1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba0d3eda-fd61-4ad4-87e4-a664ccd7d814","imageAltText":"NordVPN","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nordvpn-windows-1.jpg","imageDateCreated":"2024\u002F05\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnordvpn.com\u002F","url":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378"}]\" data-usepricing=\"false\" data-like=\"~ Excellent speeds ~ Massive server network ~ Attractive user interface ~ Independent no-logs verification\" data-dislike=\"~ Expensive premium plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a19b1bfb-6aea-472f-98a9-09b447b7d821\" data-edition=\"us\" data-description=\"\u003Cp\u003EMullvad VPN is a lesser-known VPN provider, but its customers know the organization takes privacy and security seriously.\u003C\u002Fp\u003E\u003Cp\u003EBased in Sweden and protected by strict data privacy laws, Mullvad operates a strict \u003Ca href="https:\u002F\u002Fmullvad.net\u002Fen\u002Fhelp\u002Fno-logging-data-policy" target="_blank"\u003Eno-logs policy\u003C\u002Fa\u003E and does not collect or store activity logs. While payment data may be processed (and protected by local laws, including GDPR), the company focuses on user anonymity, going so far as to number accounts rather than ask you for personal details, such as your email address.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EFurthermore, we've seen how Mullvad deals with law enforcement requests. When subjected to a search warrant in \u003Ca href="https:\u002F\u002Fmullvad.net\u002Fen\u002Fblog\u002Fmullvad-vpn-was-subject-to-a-search-warrant-customer-data-not-compromised" target="_blank"\u003E2023\u003C\u002Fa\u003E, Mullvad discussed the situation publicly and confirmed that while police intended to seize computers with customer data, no such devices existed for them to take.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWe like how easy this VPN is to use and its upfront pricing structure, although it would be great to see an expanded server network in the future. Customers like the transparent nature of this VPN and its provider but would like to see more advanced features in the future.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMullvad offers a fixed pricing structure without changes or promotional deals. This way, you know whether you want a month, a year, or a decade of service, you will pay €5 ($5.48) per month.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMullvad VPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E5 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Fedora Android TV, Fire TV, routers, and browser extensions |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;47 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Numbered accounts, billing in accordance with law |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days, some payment methods&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: No\u003C\u002Fp\u003E\" data-hed=\"Mullvad VPN\" data-superlative=\"Best transparent no-logs VPN\" data-imagegroup=\"{"alt":"Mullvad VPN Web","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"4bb2a64d-f3fa-4249-b1b8-8f022c0659f1","title":"Mullvad VPN Web","filename":"mullvad-vpn-web.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F4bb2a64d-f3fa-4249-b1b8-8f022c0659f1\u002Fmullvad-vpn-web.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1543517,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:42","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Mullvad VPN Web","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4bb2a64d-f3fa-4249-b1b8-8f022c0659f1","imageAltText":"Mullvad VPN Web","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"mullvad-vpn-web.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fsecure.money.com\u002Fpr\u002Fk7529e67c0ae?s1=subid_value","offerMerchant":"Mullvad","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmullvad.net\u002Fen","url":"https:\u002F\u002Fsecure.money.com\u002Fpr\u002Fk7529e67c0ae?s1=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Search warrant transparency ~ Reasonable speeds ~ Fixed pricing\" data-dislike=\"~ Limited simultaneous connections ~ Low server network\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e6450c42-ecf4-401d-a289-2f6884c5340f\" data-edition=\"us\" data-description=\"\u003Cp\u003EProtected by Swiss privacy laws, Proton VPN is another great VPN if you want a service that prioritizes security and privacy -- even on its free plan.\u003C\u002Fp\u003E\u003Cp\u003EProton VPN operates a no-logs policy and does not collect or store data such as activity logs or session duration records. This VPN is also open-source, which means that any third party can examine its code for security or privacy flaws. We've picked this VPN as one of the best options if you want a free plan, because while limited, it is backed by paid subscribers -- meaning you aren't trading your data for the service.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fproton-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EProton VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn general, customers like Proton's attitude to security and privacy, and many like the user interface. Although Trustpilot ratings are low, the feedback primarily relates to the firm's free plan limitations and customer support system. Despite this, as a free plan, Proton VPN is one of the few we recommend as a trustworthy service.\u003C\u002Fp\u003E\u003Cp\u003EProton VPN's pricing is reasonable, but not as cheap as some of its competitors. Plans lasting two years offer the best value for money and are priced at $4.49 per month. Alternatively, annual plans cost $4.99 per month, whereas one month of service is $9.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton VPN features:&nbsp;\u003C\u002Fstrong\u003EOpen-source | \u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: One to 10, depending on plan |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 91 |&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No-logs policy | Security audits |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, Kodi, and routers | VPN accelerator | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Free option\u003C\u002Fp\u003E\" data-hed=\"Proton VPN\" data-superlative=\"Best free no-logs VPN\" data-imagegroup=\"{"alt":"proton vpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ZDNET | Charlie Osborne","imageData":{"id":"8fff6f6d-9cc0-44fd-a860-54b829a99243","title":"proton vpn","filename":"protonvpn.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F19\u002F8fff6f6d-9cc0-44fd-a860-54b829a99243\u002Fprotonvpn.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":134307,"width":1296,"height":720,"dateCreated":{"date":"2024-04-19 10:59:59","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-19 11:00:05","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"proton vpn","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8fff6f6d-9cc0-44fd-a860-54b829a99243","imageAltText":"proton vpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ZDNET | Charlie Osborne","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"protonvpn.jpg","imageDateCreated":"2024\u002F04\u002F19","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ZDNET | Charlie Osborne\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value","offerMerchant":"ProtonVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprotonvpn.com\u002F","url":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Security pedigree ~ Open source ~ Free plan\" data-dislike=\"~ Limited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"844da452-b761-472e-a443-9be3eee9aca2\" data-edition=\"us\" data-description=\"\u003Cp\u003EPrivate Internet Access, also known as PIA, is another of our favorite no-logs VPNs. Not only is this service open-source, but its stringent privacy policy is frequently audited by independent parties, including Deloitte, verifying that PIA does not collect or store your data.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPIA also makes use of RAM-only servers, which removes traces of online activity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fprivate-internet-access-review\u002F" target="_blank"\u003E\u003Cstrong\u003EPrivate Internet Access review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EDuring our speed tests, PIA performed reasonably well, and we like the fact that this VPN provides unlimited simultaneous connections for its price point. Customers, in particular, applaud its Linux support.\u003C\u002Fp\u003E\u003Cp\u003EPIA is a consistently affordable option. The best deal right now is for two-year contracts, which cost only $2.19 per month and come with two months of free service. You can also sign up for six months for the equivalent of $7.50 per month, or try out the VPN for one month for $11.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPrivate Internet Access features:&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003EUnlimited&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes | \u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, tvOS, routers, Fire TV, and NAS |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;91 | \u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;No-logs policy |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days | \u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days, Android and iOS\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-superlative=\"Best no-logs VPN with unlimited connections\" data-imagegroup=\"{"alt":"pia","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"58eb6769-6d6d-4277-bb1a-1309c64ae1b8","title":"pia","filename":"pia.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F31\u002F58eb6769-6d6d-4277-bb1a-1309c64ae1b8\u002Fpia.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1030099,"width":1296,"height":720,"dateCreated":{"date":"2024-05-31 13:20:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-31 13:20:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"pia","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"58eb6769-6d6d-4277-bb1a-1309c64ae1b8","imageAltText":"pia","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"pia.jpg","imageDateCreated":"2024\u002F05\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-14570828-1657804763000?sid=subid_value","offerMerchant":"PIA","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002F","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-14570828-1657804763000?sid=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Unlimited simultaneous connections ~ Mobile trials ~ Open source\" data-dislike=\"~ Average speeds ~ Limited server network\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"419f93cb-950f-45c5-a96b-e6ca9cf12f91\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf speed and customer service -- alongside a strict no-logs policy -- is what you're after, consider ExpressVPN.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN also operates a strict no-logs policy and will not collect or store personal data, including browsing history, traffic records, DNS queries, or IP addresses. The company uses RAM-only servers for additional data protection, and independent audits of its no-logs policy have been conducted since 2019.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EExpressVPN review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe like this VPN's speed. It always performs well on our speed tests, often taking center stage as the best on offer, with a robust server network as a bonus. We would, however, like to see the price reduced, and this sentiment is reflected in customer reviews.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt is an excellent service but not the cheapest, with annual plans priced at $6.67 per month. Three months of free access are included. If you want to sign up for a six-month contract, you will pay $6.66 per month. One month of service is priced at $12.95.\u003C\u002Fp\u003E\u003Cp\u003EExpress VPN now also offers dedicated IP addresses for $3.19 per month.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E8&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Chrome, Firefox, Edge, Linux, Fire TV, Android TV, tvOS, and routers&nbsp;|&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;105&nbsp;|&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No browsing logs, some connection logs |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN\" data-superlative=\"Best no-logs VPN for speed, service\" data-imagegroup=\"{"alt":"expressvpn-windows-3","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne\u002FZDNET","imageData":{"id":"14737c6d-c3b7-44f4-b893-4b6468b816d7","title":"expressvpn-windows-3","filename":"expressvpn-windows-3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F17\u002F14737c6d-c3b7-44f4-b893-4b6468b816d7\u002Fexpressvpn-windows-3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":190112,"width":1296,"height":720,"dateCreated":{"date":"2024-05-17 12:44:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-17 12:44:21","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne\u002FZDNET","alt":"expressvpn-windows-3","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"14737c6d-c3b7-44f4-b893-4b6468b816d7","imageAltText":"expressvpn-windows-3","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-windows-3.jpg","imageDateCreated":"2024\u002F05\u002F17","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1330033\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002F","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1330033\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Excellent speeds ~ Large server network ~ Mobile trials\" data-dislike=\"~ Expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-streaming-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best streaming VPNs: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"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\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bcce56a4-5f76-4fd6-bb2a-b292d7e3fa10\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENo-logs VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo-logs policy?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWarrant canary?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EServer network\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u002Ftransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E111\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$3.59\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EMullvad VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENews publications\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E47\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$5.48\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E91\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$4.49\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPrivate Internet Access\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E91\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.19\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E105\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$6.67\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"No-log VPNs, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6b5b6c37-06fe-4b85-8a52-c8c29147153e\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN service is a virtual private network that encrypts your internet traffic, hides your IP address, and provides a relatively anonymous and secure connection. The point of a VPN is to make it more difficult for people to eavesdrop on you or monitor your online activities, but there is little point in using a VPN if your information is being collected or exposed.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThat's why choosing a no-logs VPN is crucial. Some free VPN providers offer a VPN in exchange for your data and records, negating the whole point of a VPN. That's why you should&nbsp;pick a paid plan from a reputable VPN with a no-logs policy.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-why-do-you-need-one-all-your-virtual-private-network-questions-answered\u002F" target="_blank"\u003EWhat is a VPN and why do you need one?\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"What is a no-log VPN service and why should you use one?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to set up a no-log VPN\u003C\u002Fh2\u003E\u003Cp\u003EOnce you've chosen the VPN you want to install, head to an official software repository -- such as Apple's App Store or the Google Play Store -- or directly to the VPN's website, which should have links to all the download sources.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9236e0e2-6920-4e76-a41f-63f4b46ba109\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"June Wan\u002FZDNET\" data-image-alt-text=\"ExpressVPN Web\" data-image-filename=\"expressvpn-web.jpg\" data-image-date-created=\"2023\u002F11\u002F07\" data-image-width=\"4240\" data-image-height=\"2384\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EDownloaded the app and install it. You may have to provide the VPN with specific device permissions. Once the software is installed, open it and log in with your credentials, QR code, or one-time passcode. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"062b2dcb-90e4-48d6-a759-eeb9128e8d8b\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"ZDNET\" data-image-alt-text=\"expressvpn\" data-image-filename=\"192.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"1296\" data-image-height=\"720\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESelect a country or choose quick connect, and you're done.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F\" target=\"_blank\"\u003EHow to set up a VPN on your router\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"82b22c2d-24fe-4b59-a8a2-c96ec42a7e14\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany providers recommended in this list have been subject to in-depth testing and reviews by the ZDNET team. We've been talking about VPNs for years, spoken with their management and their users, and developed a generally favorable impression. \u003C\u002Fp\u003E\u003Cp\u003EZDNET tests VPN services from multiple locations, but we can't test from all locations. Every home, community, local ISP, and nation has a different infrastructure. \u003C\u002Fp\u003E\u003Cp\u003EWe analyzed the no-log best VPNs below using the following criteria that are most important in helping you make an informed decision: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ENo-logs\u003C\u002Fstrong\u003E \u003Cstrong\u003Epolicies\u003C\u002Fstrong\u003E: We thoroughly examined the transparency and security standards of each VPN we recommend. Each VPN must operate a no-logs policy and keep user data collection to a minimum.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: There's no point in using a VPN unless its security protocols and encryption levels are up to scratch. We also ensured the development team behind each recommended VPN cares about making security improvements and patching reported bugs.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPerformance:\u003C\u002Fstrong\u003E&nbsp;Our top VPNs must have a minimum level of performance. After all, there's no point in using a VPN if your connection continually drops or lags.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Many VPNs limit the number of devices you can connect at the same time. If you have a phone, tablet, laptop, desktop, or smart TV you want to connect to a VPN, you need a service that allows at least five or six simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: A kill switch prevents you from having an unprotected connection. It is an important feature for a VPN, as it protects you by preventing a return to a default Wi-Fi connection should your internet connection unexpectedly drop.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGeo-blocks and streaming\u003C\u002Fstrong\u003E: VPNs can be key to accessing local content and services while you're away from home. We ensured that our top recommendations performed well given these factors and are unlikely to slow down your connection while streaming.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: What systems and devices can you run the VPN on? Our no-logs VPN recommendations naturally have to offer easy-to-use and intuitive apps.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems with installing apps, using the service, renewing, or canceling. We list VPNs with an available support team.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECountries and servers\u003C\u002Fstrong\u003E: In how many different countries does the VPN have servers? This can include physical and virtual servers, and whether there are enough -- at least 50 or so -- to provide variety.\u003C\u002Fli\u003E\u003Cli\u003E \t\t \t\t\t\u003Cstrong\u003ETrial length and price\u003C\u002Fstrong\u003E: Each VPN we recommend has a solid money-back guarantee.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor a more extensive breakdown, check out our comprehensive \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F" target="_blank"\u003EVPN testing methodology page\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\" data-hed=\"How we test VPNs\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"393e346a-0576-47e3-be0f-7828d3d6cb7e\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this VPN...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe best overall no-logs VPN. NordVPN provides the whole package: robust security, speed, and a validated no-logs policy.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EMullvad VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA transparent no-logs VPN. Mullvad is based in Sweden and subject to strict data protection laws. The company is transparent in regard to police activities.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free VPN focused on security and privacy. While the free plan is limited, it is backed by paid subscribers, so your data should not be collected and sold.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPrivate Internet Access\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA no-logs VPN with unlimited connections. PIA is open-source, uses RAM-only servers, and is known for its stringent approach to security.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA speedy no-logs VPN. ExpressVPN provides fantastic speeds and is easy to use, and audits have been conducted to verify its no-logs policy.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Choosing the right no-logs VPN\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"57ac28c4-d8ab-4957-89ba-69272e360ebc\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen you are selecting your new no-logs VPN, consider the following factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrivacy\u003C\u002Fstrong\u003E: It is important that your new VPN takes user privacy and security seriously. Look for no-logs pledges, transparent security reports, warrant canaries, and practices like frequent patch updates.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: You need to consider the overall price of your new VPN plan. Try to take advantage of promotions, but ignore countdown timers -- they typically are just marketing tools. While top-notch VPNs can cost upwards of $10 per month, many are available for only a few dollars. Many VPN providers will also offer free, limited mobile app trials. We recommend that you avoid free VPNs -- with a few exceptions -- as they may sell your data or bombard you with ads.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: If you're paying for a VPN, you might want to use it across multiple devices, such as a desktop, a laptop, or smartphone. We recommend that you sign up for a plan supporting at least six devices. Thankfully, many paid VPN plans now offer unlimited connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E: You must also decide how long you want to use a VPN. If you opt for a two-year term, you tend to secure the best prices, but other options are available. After you've made a selection, you typically have a 30-day money-back guarantee.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EApps\u003C\u002Fstrong\u003E: When selecting a VPN, you should consider what devices you want to protect. For example, if you have a Windows PC and an iPhone, take a look at the apps on offer to see if you like their user interfaces and functions.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"What are the factors to consider when choosing a no-logs VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EFAQs\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8683a4cf-d532-4345-95c0-6a99f9382432\" data-edition=\"us\" data-description=\"\u003Cp\u003EA no-logs policy ensures that a VPN will not log your activity, including the websites you visit, the online services you access, or DNS queries when your requests are sent through its server network.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EA no-logs policy doesn't mean that the VPN provider doesn't log all traffic and data. For example, a VPN provider may still log your VPN usage records, sessions, and billing information. They may also be required to log some customer information to comply with the laws of the country they are headquartered in.\u003C\u002Fp\u003E\" data-hed=\"What does no-logs mean?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cf8d3f51-7b38-4a60-9449-cf33ccbf5be7\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe police can request user information from a VPN provider in the same way they do for any other organization. With a court order, the VPN vendor will have to comply, but the information they can provide depends on their logging activities.\u003C\u002Fp\u003E\u003Cp\u003ELaw enforcement may be able to detect VPN use and may investigate IP addresses associated with you, but it's highly unlikely they would go down this route unless you are suspected of involvement in illegal activity. Remember, a VPN is not a foolproof privacy barrier and does not guarantee full anonymity.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Can the police track a VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9ca214e5-c61d-41f3-ac07-5c5f8108486e\" data-edition=\"us\" data-description=\"\u003Cp\u003ETo check if your VPN is safe and working properly, first choose a reputable vendor known to have a strong security background.\u003C\u002Fp\u003E\u003Cp\u003ENext, compare your IP address before and after enabling a VPN connection. You can find this under your device's settings (typically under Wi-Fi) or by visiting \u003Ca href="https:\u002F\u002Fwhatismyipaddress.com\u002F" target="_blank"\u003Ewhatismyipaddress.com\u003C\u002Fa\u003E. If they both display the same IP address, your VPN may not be working properly.\u003C\u002Fp\u003E\u003Cp\u003EYou can also visit \u003Ca href="https:\u002F\u002Fwww.dnsleaktest.com\u002F" target="_blank"\u003Ednsleaktest.com\u003C\u002Fa\u003E to see if any DNS leaks are detected while you are using a VPN, which could be a sign that your information is being leaked.\u003C\u002Fp\u003E\u003Cp\u003EFinally, be careful with free VPNs offered by unknown or shady companies, especially if they are outside of official app repositories. This could open your device to surveillance or malware.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How do I tell if my VPN is safe?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"647999d0-b2ee-4c24-96c9-0db60b00b50f\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, no-logs VPN services are legal in the US, but the legality of using VPNs varies from country to country.\u003C\u002Fp\u003E\u003Cp\u003EIt is important to check the laws of your location before using a VPN. Some countries ban their use outright, such as North Korea, Belarus, and Iraq, whereas other countries, including Russia and China, frown upon using any non-state-controlled VPN.\u003C\u002Fp\u003E\u003Cp\u003EFor a list of countries where VPN usage is illegal, check out NordVPN's \u003Ca href="https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fare-vpns-legal\u002F" target="_blank"\u003Eguide\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"Are no-logs VPN services legal?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5e4fc9f1-5c2e-41c7-a0d1-2729208823b6\" data-edition=\"us\" data-description=\"\u003Cp\u003EPotentially, yes. If your VPN is working properly, your data and activities are hidden within an encrypted tunnel, and you have improved protection and anonymity online, but this doesn't mean that your browsing history isn't logged through your browser or that monitoring software on corporate PCs isn't logging your activities. Corporate VPNs may also log your website visits.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Can my employer see my browsing history if I use a VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"454c362f-b32b-4723-a726-83dc2759e56d\" data-edition=\"us\" data-description=\"\u003Cp\u003EOur recommendations above are the best no-logs-focused VPNs on the market today. If they aren't quite right for your particular needs, there are other trustworthy options below.\u003C\u002Fp\u003E\" data-hed=\"Are there alternative no-logs VPNs to consider?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae424410-5192-45b0-906d-e43c3a071b32\" data-edition=\"us\" data-description=\"\u003Cp\u003ESurfshark is an excellent alternative if you want a consistently affordable VPN. Surfshark operates a no-logs policy and maintains a warrant canary.\u003C\u002Fp\u003E\" data-hed=\"Surfshark\" data-imagegroup=\"{"alt":"surfshark-windows-1","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"792b612d-1f0c-420c-93fb-e1bc6896f800","title":"surfshark-windows-1","filename":"surfshark-windows-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F20\u002F792b612d-1f0c-420c-93fb-e1bc6896f800\u002Fsurfshark-windows-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1093404,"width":1296,"height":720,"dateCreated":{"date":"2024-06-20 10:14:34","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-20 10:14:39","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"surfshark-windows-1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"792b612d-1f0c-420c-93fb-e1bc6896f800","imageAltText":"surfshark-windows-1","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-windows-1.jpg","imageDateCreated":"2024\u002F06\u002F20","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-linktext=\"Best affordable alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsurfshark.com\u002Fpricing","url":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c42d211c-cde6-49e1-b543-53f9115ef234\" data-edition=\"us\" data-description=\"\u003Cp\u003EIPVanish doesn't log user traffic and self-destructs connection diagnostic data after every session.\u003C\u002Fp\u003E\" data-hed=\"IPVanish\" data-imagegroup=\"{"alt":"ipvanish android","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ZDNET | Charlie Osborne","imageData":{"id":"0ac08f82-963a-488d-8bf7-e55a75a868f3","title":"ipvanish android","filename":"ipvanishandroid.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F29\u002F0ac08f82-963a-488d-8bf7-e55a75a868f3\u002Fipvanishandroid.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":191816,"width":1296,"height":720,"dateCreated":{"date":"2024-04-29 08:11:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-29 08:11:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"ipvanish android","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0ac08f82-963a-488d-8bf7-e55a75a868f3","imageAltText":"ipvanish android","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ZDNET | Charlie Osborne","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ipvanishandroid.jpg","imageDateCreated":"2024\u002F04\u002F29","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ZDNET | Charlie Osborne\" data-linktext=\"Best alternative with audited no-logs policy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value","offerMerchant":"IPVanish","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ipvanish.com\u002F","url":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 16:40:00",timezone:"UTC",updated:c,published:c},description:"No-log VPNs claim to not keep records of their customers' online activities. These are the best no-log VPNs to protect your privacy.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"0ce755a9-86e9-4230-bf67-fbf22ad3ceaf",image:{id:"9236e0e2-6920-4e76-a41f-63f4b46ba109",filename:"expressvpn-web.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:40",timezone:"UTC",updated:c,published:c},alt:"ExpressVPN Web",credits:"June Wan\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F9236e0e2-6920-4e76-a41f-63f4b46ba109\u002Fexpressvpn-web.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best no-log VPNs of 2024: Expert tested and reviewed",section:b,slug:"best-no-log-vpns",startYear:c,summary:b,title:"The best no-log VPNs of 2024: Expert tested and reviewed",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1147b242-ec91-11e3-95d2-02911863765e",slug:"smartphones",name:"Smartphones",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"ae164b3d-9f4e-461e-8353-db202258465a",slug:"cyber-threats",name:"Cyber Threats",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero reading an NFC security key.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero reading an NFC security key\" data-image-filename=\"img-1508.jpg\" data-image-date-created=\"2023\u002F01\u002F03\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter over a year of use, I love my Flipper Zero, and I'm still finding cool things to do with it.\u003C\u002Fp\u003E\u003Cp\u003EAm I using it to steal cars, clone credit cards, or change the prices shown on gas station displays? Of course not! That's just fake trash people upload to TikTok to try to look cool, and you can't do anything like that. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\"\u003EThe 50+ best Black Friday deals 2024: Early sales live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut that doesn't mean the Flipper Zero can't do some very cool and useful things. Over the past year, I've been exploring the suite of tools built into the Flipper Zero, as well as extending its capabilities by installing custom firmware. It's been a game-changer in so many ways! \u003C\u002Fp\u003E\u003Cp\u003EThe Flipper Zero might be small, but there's a lot of hardware packed into a small space.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero is a portable multi-tool for pen-testers and geeks in a toy-like shell.\u003C\u002Fp\u003E\" data-hed=\"Flipper Zero\" data-imagegroup=\"{"alt":"sample-image-16-9-red.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","title":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","filename":"img-2128.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F02\u002F20\u002F6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16\u002Fimg-2128.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":357488,"width":1600,"height":900,"dateCreated":{"date":"2023-02-20 11:30:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-02-20 11:30:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","imageAltText":"sample-image-16-9-red.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2128.jpg","imageDateCreated":"2023\u002F02\u002F20","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flipper Zero store","offerPrice":"169","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.flipperzero.one\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETo begin with, there's a sub-GHz wireless antenna that can capture and transmit wireless codes to operate wireless devices and access control systems, such as garage door remotes, boom barriers, IoT sensors, and even remote keyless systems. \u003C\u002Fp\u003E\u003Cp\u003ERFID support allows it to read, store, and emulate a number of different RFID cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdo-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EDo RFID blocking cards actually work? My Flipper Zero revealed the truth\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIt can also read, write, store, and emulate NFC tags. On the front, there's a 1-Wire connector that can read and emulate iButton (aka DS1990A, CYFRAL, Touch Memory, or Dallas key) contact keys.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere's also a built-in infrared transceiver that can both capture and transmit IR codes to control things like TVs. Finally, on the top, there are GPIO connectors that allow the Flipper Zero to connect to other gadgets in the real world.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F\"\u003E\u003Cstrong\u003EHow to unlock the Flipper Zero's true power\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat's a lot of features crammed into a tiny $169 device. But every week, I hear from buyers who are frustrated and disappointed because their Flipper Zero won't do the things that it can seemingly do based on fake social media videos.\u003C\u002Fp\u003E\u003Cp\u003EHere are some of the things I've been doing with my Flipper Zero over the past few weeks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENote\u003C\u002Fstrong\u003E: I'm usually running \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F#link={\" target=\"_blank\"\u003Ethird-party software on my Flipper Zero\u003C\u002Fa\u003E, which gives me access to a bunch of additional features. But worry not—loading third-party software doesn't invalidate your warranty, and you can easily go back to the stock software at any time using the Flipper Zero app on a desktop, laptop, or mobile device.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"df78e6a6-cf08-4210-9cbd-3a8d5548b772\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe sub-GHz wireless antenna can pick up signals from devices such as wireless doorbells and car key fobs, making the Flipper Zero a handy tool for testing if wireless transmitters are working properly. I use mine to test if the fobs are working and to test their range.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy (and how they work)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAnd yes, the Flipper Zero can record the codes transmitted by car key fobs, but retransmitting these codes to a modern car won't unlock it due to a feature called 'rolling codes' that changes the code with each use. On older cars -- those 20 years old and more -- you could use a code captured to unlock the vehicle (but don't do that unless it's your car or you have permission!), but you still couldn't drive away with it.\u003C\u002Fp\u003E\u003Cp\u003EOn the flip side -- pun intended -- retransmitting the codes to a wireless doorbell will cause the bell to ring, as most of these systems don't have a mechanism to protect against such annoyances.\u003C\u002Fp\u003E\" data-hed=\"1. Testing car key fobs, wireless doorbells and more\" data-imagegroup=\"{"alt":"Testing a car key fobs","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","title":"Testing a car key fobs","filename":"img-4422.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F542dcafa-5ad4-49e5-9e4c-2ace0599a37c\u002Fimg-4422.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":289398,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:01:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:01:56","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Testing a car key fobs","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","imageAltText":"Testing a car key fobs","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4422.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b9e30cff-c108-4dac-838f-86abe2ca1591\" data-edition=\"us\" data-description=\"\u003Cp\u003ENFC is everywhere nowadays, and the Flipper Zero allows you to work with this wireless protocol. It's built into plastic cards and fobs and used for all sorts of things, from unlocking hotel room doors to controlling barriers.\u003C\u002Fp\u003E\u003Cp\u003EBut this doesn't mean you can cause chaos in the world, because to unlock things you more often than not need access to the NFC key.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENFC signals can be read by the Flipper Zero, and many NFC cards can also be \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=ZpUqQsiwULk" target="_blank"\u003Ecopied and cloned\u003C\u002Fa\u003E (this depends on the security used for the card, so I can't give you any hard and fast rules about which NFC devices can be cloned). I've used my Flipper Zero to copy my hotel room card on occasion when the hotel only gives you a single card or when we have multiple rooms and don't want to juggle a handful of cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services (and how to choose the right one for you)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, note that while the Flipper Zero can read NFC cards and fobs, it cannot decode the card's encrypted security code used on credit and debit cards, so they can't be cloned.\u003C\u002Fp\u003E\" data-hed=\"2. Reading\u002Fsaving\u002Femulating NFC\" data-imagegroup=\"{"alt":"Flipper Zero reading an NFC output from a smartphone","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"45efd2a9-585d-4294-bf6a-9196bc707b7f","title":"Flipper Zero reading an NFC output from a smartphone","filename":"img-4423.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F45efd2a9-585d-4294-bf6a-9196bc707b7f\u002Fimg-4423.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":254166,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:03:52","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:04:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading an NFC output from a smartphone","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"45efd2a9-585d-4294-bf6a-9196bc707b7f","imageAltText":"Flipper Zero reading an NFC output from a smartphone","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4423.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2e662499-3476-44dd-bbe7-4ad6fff5ae53\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero cannot decode the card's encrypted security code, so it cannot clone bank cards.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero cannot decode the card's encrypted security code so it cannot clone bank cards\" data-image-filename=\"img-4428.jpg\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e28f271e-650a-40cb-a8be-98ddab286693\" data-edition=\"us\" data-description=\"\u003Cp\u003EAlong with NFC, the Flipper Zero can read and clone RFID cards and fobs, including hotel cards as shown in the picture above.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-retailer-is-using-rfid-tags-to-make-in-person-clothes-shopping-less-frustrating\u002F" target="_blank"\u003E\u003Cstrong\u003EHow RFID tags can make in-person clothes shopping less frustrating\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ERFID cards and tags can be locked to prevent them from being overwritten or having their security keys extracted, but the Flipper Zero can bypass many of these mechanisms. For example, it can offer to unlock the card if you present it to a valid reader (such as the lock it has been programmed to open). This allows you to clone the card and unlock the door using both the card and the Flipper Zero.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"3. Reading and unlocking RFID tags and cards\" data-imagegroup=\"{"alt":"Reading an RFID card","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","title":"Reading an RFID card","filename":"img-4425.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002Fa4cdee3f-d1db-4e9d-8a48-91d615f65221\u002Fimg-4425.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":210438,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:06:03","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:06:17","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Reading an RFID card","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","imageAltText":"Reading an RFID card","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4425.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf72a74f-7b37-428e-bda9-0dfcf8c6cd52\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero has a built-in infrared module that can be programmed to operate a wide range of devices, from \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv\u002F" target="_blank"\u003ETVs\u003C\u002Fa\u003E to AC units.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPretty much any consumer device with an IR remote control interface can be controlled using the Flipper Zero.\u003C\u002Fp\u003E\u003Cp\u003EAnother cool use of this functionality is to test if infrared remote controls are working. Simply point the remote control at the Flipper Zero in 'read IR' mode, and it will detect the signals.\u003C\u002Fp\u003E\u003Cp\u003EI use this feature all the time to test remote controls that I've fixed after battery leaks have damaged the device. It's an incredibly handy feature!\u003C\u002Fp\u003E\" data-hed=\"4. Universal infrared remote control\" data-imagegroup=\"{"alt":"The Flipper Zero has infrared capability","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","title":"The Flipper Zero has infrared capability","filename":"img-4429.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F294e7dd9-b9ab-469b-bbe8-e6ff18c4b316\u002Fimg-4429.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":230567,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:12:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:12:54","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"The Flipper Zero has infrared capability","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","imageAltText":"The Flipper Zero has infrared capability","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4429.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae924844-ed51-4006-9e66-448121b9ada3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, the Flipper Zero can bypass the security on some Sentry Safe electronic safes using an output from the GPIO.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is definitely not something you want to be doing if it isn't your safe or you don't have permission, but it goes to show just how insecure the "complimentary" safes found in hotels, spas, and Airbnbs actually are.\u003C\u002Fp\u003E\" data-hed=\"5. Bypassing Sentry Safe security\" data-imagegroup=\"{"alt":"Yes, the Flipper Zero can unlock some electronic safes","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","title":"Yes, the Flipper Zero can unlock some electronic safes","filename":"img-4427.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F468027ea-ccf8-4a20-8593-f1ec7abc26dd\u002Fimg-4427.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":194201,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:10:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:10:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Yes, the Flipper Zero can unlock some electronic safes","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","imageAltText":"Yes, the Flipper Zero can unlock some electronic safes","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4427.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0ecfec0d-98c7-40d2-afcf-aaa9107dbd58\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero can act as a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\u002F" target="_blank"\u003EBadUSB device\u003C\u002Fa\u003E, which means that when connected to a port it is seen as a Human Interface Device (HID), such as a keyboard.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services for iPhone and iPad (yes, you need to use one)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EA BadUSB device can change system settings, open backdoors, retrieve data, initiate reverse shells, or do anything that can be achieved with physical access. These tasks are completed by using a set of commands written in the Rubber Ducky Scripting Language, also known as \u003Ca href="https:\u002F\u002Fdocs.hak5.org\u002Fhak5-usb-rubber-ducky\u002Fducky-script-basics\u002Fhello-world" target="_blank"\u003EDuckyScript\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"6. Automating scripts in a variety of platforms\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fc6c2aa5-6d06-47e0-a71d-6bbdfa02f56a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero opens a browser and navigates to a webpage with no user input.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero opens a browser and navigates to a webpage with no user input\" data-image-filename=\"img-4431.gif\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"500\" data-image-height=\"281\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c430499e-fa24-4cad-bf3b-045fc036a82f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero can use the GPIO to output electrical signals and act as a signal generator. I last used this to simulate an antilock braking system module on a vehicle to confirm that all the wiring and computers in the car were working.\u003C\u002Fp\u003E\" data-hed=\"7. Signal generator\" data-imagegroup=\"{"alt":"Configuring the signal generator settings","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"66ad5e4b-bc49-441e-926b-751da4e0ec96","title":"Configuring the signal generator settings","filename":"img-4432.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F66ad5e4b-bc49-441e-926b-751da4e0ec96\u002Fimg-4432.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":218186,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:27:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:27:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Configuring the signal generator settings","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"66ad5e4b-bc49-441e-926b-751da4e0ec96","imageAltText":"Configuring the signal generator settings","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4432.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f084b423-70dc-4544-ab21-71b08e45f3ae\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Video Game Module is powered by the RP2040 microcontroller developed by Raspberry Pi and adds a bunch of gaming-related functionality.\u003C\u002Fp\u003E\u003Cp\u003EFirst, it adds a DVI video output port to the Flipper Zero, allowing it to send video to external displays. This is essential since the tiny LED panel built into the Flipper Zero isn't ideal for gaming. This capability isn't limited to gaming, though. The ability to beam video output to a larger display is great for various other applications, such as testing or training.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fif-you-like-your-flipper-zero-then-youll-love-this\u002F"\u003EIf you like your Flipper Zero, then you'll love this\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Video Game Module also includes an IMU (Inertial Measurement Unit) featuring a TDK ICM-42688-P sensor, which adds a 3-axis gyroscope and a 3-axis accelerometer to the package, allowing it to sense tilting or shaking.\u003C\u002Fp\u003E\u003Cp\u003EIf you're not into gaming, that's no problem. The RP2040 microcontroller can run applications programmed in C, C++, or MicroPython, making it a versatile addition to the Flipper Zero.\u003C\u002Fp\u003E\" data-hed=\"BONUS! Raspberry Pi Video Game Module for Flipper Zero\" data-imagegroup=\"{"alt":"Using Apple BLE Spam to spam an iPhone with popups","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Flipper Zero","imageData":{"id":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","title":"Flipper Zero Video Game Module","filename":"flipper-zero-raspberry-pi-video-game-module.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F11\u002Fa17bb30a-5f96-4f38-9fd0-5634c9d5bb9a\u002Fflipper-zero-raspberry-pi-video-game-module.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":333628,"width":1600,"height":900,"dateCreated":{"date":"2024-02-11 09:51:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-11 09:52:10","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Flipper Zero\u002FZDNET","alt":"Flipper Zero Video Game Module","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","imageAltText":"Using Apple BLE Spam to spam an iPhone with popups","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Flipper Zero","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"flipper-zero-raspberry-pi-video-game-module.jpg","imageDateCreated":"2024\u002F02\u002F11","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Flipper Zero\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:34:00",timezone:"UTC",updated:c,published:c},description:"This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ad79dfb5-0569-4d71-a848-3274e6eb00e8",image:{id:"22f4df1f-e7a0-4702-b40c-05a6afe1671d",filename:"img-20231215-101642-034.jpg",dateCreated:{created:c,date:"2023-12-15 11:24:01",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F12\u002F15\u002F22f4df1f-e7a0-4702-b40c-05a6afe1671d\u002Fimg-20231215-101642-034.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:900,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do",startYear:c,summary:b,title:"One year later: 7 useful things the Flipper Zero can do that still blows my mind",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"d821f795-4aa2-44eb-a81d-45e14dca01e0",username:"Reviews.com Staff",profileUrl:c,email:c,firstName:"Reviews.com",lastName:"Staff",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:c,socialProfileIds:c,authorBio:"The Reviews.com staff is dedicated to providing you with all the deep-dive details. Our writers, researchers, and editors came together from Charlotte, Seattle, San Juan, Fort Worth, Fort Lauderdale, San Diego, and Chicago to put this review together.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ETo find the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-system\u002F\"\u003Ebest home security companies\u003C\u002Fa\u003E Dallas has to offer, we reviewed each of the following brands based on affordability, monitoring capabilities, equipment availability, and integration capabilities with smart devices. While none of these Dallas alarm companies is perfect, each of them offers an intuitive experience, whether that be a professional or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftips-for-building-your-home-security-system\u002F\"\u003EDIY install\u003C\u002Fa\u003E. Our favorites of the bunch we reviewed -- SimpliSafe, Ring, Abode, Arlo, Blue by ADT, and Cove -- offered \u003Ca href=\"https:\u002F\u002Fwww.reviews.com\u002Fhome\u002Fsecurity-systems\u002Fbest-wireless\u002F\"\u003Ehigh-tech equipment\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-home-security-monitoring-companies\u002F\"\u003Eround-the-clock monitoring services\u003C\u002Fa\u003E, and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-best-self-monitored-home-security-system\u002F\"\u003Eeasy DIY options\u003C\u002Fa\u003E. In a word, these home security systems Dallas provides made us feel safe.\u003C\u002Fp\u003E\u003Cp\u003EHere is a comparison of our top picks for the best home security system in Dallas:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cbr\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESimpliSafe\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ERing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EAbode\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EArlo\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EBlue by ADT\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ECove\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EScore\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.4\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.2\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.25\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E3.6\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E3.5\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPrices start at\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$184.99\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$199.99\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$199.99\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$129.99\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$179.99\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$122\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo contracts\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo contracts\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo contracts\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo contracts\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E36 months\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo contracts\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ECameras\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u002FDoorbell\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u002FOutdoor\u002FDoorbell\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u002FOutdoor.Doorbell\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u002FOutdoor\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u002FOutdoor\u002FDoorbell\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIndoor\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESensors\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EEntry sensor, motion sensor, glass break sensor, panic button, smoke detector, water sensor, temperature sensor\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EDoor,window,motion detection, spotlight,floodlight,flood and freeze sensor,panic button\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EDoor, window, motion detection, door sensor, window sensor\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EDoor,window,motion detection,spotlight,floodlight\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EDoor, window, motion detection, smoke and carbon monoxide sensor\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EDoor\u002Fwindow sensor, motion detector, panic button, glass-break detector, smoke\u002Fheat\u002Ffreeze detector, flood sensor, carbon monoxide detector\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESmart home features\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E105dB siren, smart lock, pro-set-up help, smart home support through third party systems\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESmart home integration with Z-Wave support\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESmart home integration through the custom engine (CUE), third party smart software support\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESmart home support through their proprietary hub selection\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESmart home integration with Z-Wave hub\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EKey remote\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EControl panel\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWireless, keypad, key fob, base station, mobile app, key fob\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMobile app\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe mobile app, key fob, keypad\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMobile app\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe mobile app, keypad is integrated on the hub\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe mobile app, touchscreen alarm panel\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E\u003Cem\u003E*Information accurate as of May 2021\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f3f35b2c-0c73-4bfc-bed1-8c1be666b3e1\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore: \u003C\u002Fstrong\u003E4.4 |&nbsp;\u003Cstrong\u003EJ.D. Power\u003C\u002Fstrong\u003E: 889 |&nbsp;\u003Cstrong\u003EContract requirement: \u003C\u002Fstrong\u003ENo |&nbsp;\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf you want to keep your home and loved ones safe but aren't a fan of home security prices, SimpliSafe is a strong as well as flexible option. SimpliSafe offers 24\u002F7 professional monitoring services and gives customers wanting to save money the option to monitor their security system themselves.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EEasy, DIY installation option\u003C\u002Fli\u003E\u003Cli\u003EDIY monitoring option\u003C\u002Fli\u003E\u003Cli\u003ENo required contracts\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENo outdoor camera options\u003C\u002Fli\u003E\u003Cli\u003EExpensive video storage fees\u003C\u002Fli\u003E\u003Cli\u003ELimited integration options\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMotion sensor\u003C\u002Fli\u003E\u003Cli\u003E105dB siren\u003C\u002Fli\u003E\u003Cli\u003ESmart lock\u003C\u002Fli\u003E\u003Cli\u003EWireless, keypad\u003C\u002Fli\u003E\u003Cli\u003EKey fob\u003C\u002Fli\u003E\u003Cli\u003EEntry sensor\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFoundation: $229\u003C\u002Fli\u003E\u003Cli\u003EEssentials: $259\u003C\u002Fli\u003E\u003Cli\u003EHearth: $374\u003C\u002Fli\u003E\u003Cli\u003EKnox: $449\u003C\u002Fli\u003E\u003Cli\u003EHaven: $489\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"SimpliSafe\" data-superlative=\"Best for flexibility\" data-imagegroup=\"{"alt":"simplisafe.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Shutterstock","imageData":{"id":"f644e44f-ed5b-4c4d-b8a8-1d1127c60e05","title":"simplisafe","filename":"simplisafe.jpg","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F19\u002Ff644e44f-ed5b-4c4d-b8a8-1d1127c60e05\u002Fsimplisafe.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1259903,"width":1600,"height":1069,"dateCreated":{"date":"2021-08-19 10:50:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-19 10:50:26","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Shutterstock","alt":"simplisafe.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f644e44f-ed5b-4c4d-b8a8-1d1127c60e05","imageAltText":"simplisafe.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Shutterstock","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"simplisafe.jpg","imageDateCreated":"2021\u002F08\u002F19","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Shutterstock\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"SimpliSafe","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsimplisafe.com\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"64a451d0-23c1-4aa9-96f4-3a5ed8ae70b1\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore: \u003C\u002Fstrong\u003E4.2 |&nbsp;\u003Cstrong\u003EJ.D. Power: \u003C\u002Fstrong\u003E882 |&nbsp;\u003Cstrong\u003EContract requirement:&nbsp;\u003C\u002Fstrong\u003ENo |&nbsp;\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ERing's straightforward DIY approach makes the home security company a top contender for those looking to protect their homes. While not perfect, Ring's affordable pricing and lack of contracts make it an attractive option.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EQuick, easy installation process\u003C\u002Fli\u003E\u003Cli\u003EAffordable packages\u003C\u002Fli\u003E\u003Cli\u003ESimple pricing for subscription support\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPoorer performance compared to competitors\u003C\u002Fli\u003E\u003Cli\u003EGoogle support can be problematic\u003C\u002Fli\u003E\u003Cli\u003EThe basic plan offers no professional monitoring services\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EOutdoor camera\u003C\u002Fli\u003E\u003Cli\u003EWindow sensor\u003C\u002Fli\u003E\u003Cli\u003EDoor sensor\u003C\u002Fli\u003E\u003Cli\u003EMotion detector\u003C\u002Fli\u003E\u003Cli\u003EPanic button\u003C\u002Fli\u003E\u003Cli\u003EIndoor camera\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBasic: $30\u002Fyear\u003C\u002Fli\u003E\u003Cli\u003EPlus: $100\u002Fyear\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Ring Security\" data-superlative=\"Best for ease of use\" data-imagegroup=\"{"alt":"ring-home-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Ring","imageData":{"id":"bc74889c-0316-4a0d-b145-77cc43b45ed4","title":"ring-home-security","filename":"ring-home-security.png","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F19\u002Fbc74889c-0316-4a0d-b145-77cc43b45ed4\u002Fring-home-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":2936,"width":283,"height":178,"dateCreated":{"date":"2021-08-19 11:05:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-19 11:05:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Ring","alt":"ring-home-security.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"bc74889c-0316-4a0d-b145-77cc43b45ed4","imageAltText":"ring-home-security.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Ring","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ring-home-security.png","imageDateCreated":"2021\u002F08\u002F19","imageWidth":283,"imageHeight":178,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Ring\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Ring Security","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fring.com\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e95014b5-a8a2-41dc-9f7e-b6f24a349c6f\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore: \u003C\u002Fstrong\u003E4.25 |&nbsp;\u003Cstrong\u003EJ.D. Power: \u003C\u002Fstrong\u003EN\u002FA | \u003Cstrong\u003EContract requirement: \u003C\u002Fstrong\u003ENo |\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAbode security plans are a great option if you don't want to break the bank on a home security system but still want the peace of mind it offers. Unfortunately, its limited integration capabilities with smart devices can be a big frustration.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EInexpensive costs\u003C\u002Fli\u003E\u003Cli\u003ENo security contracts\u003C\u002Fli\u003E\u003Cli\u003EOffers DIY and professional monitoring\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EEarly termination fees apply\u003C\u002Fli\u003E\u003Cli\u003ERefund options are lacking\u003C\u002Fli\u003E\u003Cli\u003EWarranty is limited to a year\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EGlass break sensor\u003C\u002Fli\u003E\u003Cli\u003EMotion sensors\u003C\u002Fli\u003E\u003Cli\u003EOutdoor camera\u003C\u002Fli\u003E\u003Cli\u003EIndoor camera\u003C\u002Fli\u003E\u003Cli\u003ESiren\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003ERecessed window and door sensor\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EStandard: $6\u002Fmo.\u003C\u002Fli\u003E\u003Cli\u003EPro Plan: $19.80\u002Fmo.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Abode\" data-superlative=\"Best for budget\" data-imagegroup=\"{"alt":"abode-home-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Abode","imageData":{"id":"452e9973-0981-48ca-87b5-4464962cd632","title":"abode-home-security","filename":"abode-home-security.png","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F19\u002F452e9973-0981-48ca-87b5-4464962cd632\u002Fabode-home-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":50884,"width":1200,"height":1200,"dateCreated":{"date":"2021-08-19 10:57:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-19 10:57:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Abode","alt":"abode-home-security.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"452e9973-0981-48ca-87b5-4464962cd632","imageAltText":"abode-home-security.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Abode","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"abode-home-security.png","imageDateCreated":"2021\u002F08\u002F19","imageWidth":1200,"imageHeight":1200,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Abode\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"abode","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgoabode.com\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"061619be-17fa-4a67-b028-c353f5894686\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore: \u003C\u002Fstrong\u003E4 | \u003Cstrong\u003EJ.D. Power: \u003C\u002Fstrong\u003EN\u002FA | \u003Cstrong\u003EContract requirement: \u003C\u002Fstrong\u003ENo |\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EUninterested in monitoring your home security system yourself but don't want to pay an arm and a leg? Arlo's professional monitoring systems are some of the cheapest plans on the market and come with some impressive camera equipment.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EOffers 4K-video footage capabilities\u003C\u002Fli\u003E\u003Cli\u003EGood BBB ratings\u003C\u002Fli\u003E\u003Cli\u003EInexpensive plans\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECosts extra for 24\u002F7 monitoring\u003C\u002Fli\u003E\u003Cli\u003EIt doesn't provide products like doors and windows sensors\u003C\u002Fli\u003E\u003Cli\u003EExpensive camera equipment\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EIndoor camera\u003C\u002Fli\u003E\u003Cli\u003EOutdoor camera\u003C\u002Fli\u003E\u003Cli\u003ESolar panel camera\u003C\u002Fli\u003E\u003Cli\u003ESmarthub\u003C\u002Fli\u003E\u003Cli\u003EMounts\u003C\u002Fli\u003E\u003Cli\u003EChime\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESmart: free\u003C\u002Fli\u003E\u003Cli\u003EPremier: $2.99\u002Fmo.\u003C\u002Fli\u003E\u003Cli\u003EElite: $4.99\u002Fmo.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Arlo\" data-superlative=\"Best for technical features\" data-imagegroup=\"{"alt":"arlo-home-security.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Shutterstock","imageData":{"id":"44180139-c0df-408d-9625-b2d5c5ede9b3","title":"arlo-home-security","filename":"arlo-home-security.jpg","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F19\u002F44180139-c0df-408d-9625-b2d5c5ede9b3\u002Farlo-home-security.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1291910,"width":1600,"height":1069,"dateCreated":{"date":"2021-08-19 11:10:51","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-19 11:10:57","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Shutterstock","alt":"arlo-home-security.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"44180139-c0df-408d-9625-b2d5c5ede9b3","imageAltText":"arlo-home-security.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Shutterstock","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"arlo-home-security.jpg","imageDateCreated":"2021\u002F08\u002F19","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Shutterstock\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Arlo","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.arlo.com\u002Fen-us\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ef1e09f4-531a-43c9-b7f5-627b3426522d\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore\u003C\u002Fstrong\u003E: 3.6 |&nbsp;\u003Cstrong\u003EJ.D. Power: \u003C\u002Fstrong\u003E880 |&nbsp;\u003Cstrong\u003EContract requirement: \u003C\u002Fstrong\u003EYes |&nbsp;\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs one of the longest-running security system companies, ADT has a long, trusted history with a solid variety of plan options for home security. Despite being one of the few security system companies requiring a contract, Blue by ADT offers extensive hardware options.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EQuality professional monitoring\u003C\u002Fli\u003E\u003Cli\u003EQuick installations and repairs\u003C\u002Fli\u003E\u003Cli\u003EMoney-back guarantee for first six months\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ERequires a long contract\u003C\u002Fli\u003E\u003Cli\u003ECancellation fees\u003C\u002Fli\u003E\u003Cli\u003EPoor BBB customer service ratings\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EHub\u003C\u002Fli\u003E\u003Cli\u003EIndoor camera\u003C\u002Fli\u003E\u003Cli\u003EOutdoor camera\u003C\u002Fli\u003E\u003Cli\u003EDoor sensors\u003C\u002Fli\u003E\u003Cli\u003EWindow sensors\u003C\u002Fli\u003E\u003Cli\u003EMotion sensor\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBuild Your Own System: $179.99\u003C\u002Fli\u003E\u003Cli\u003EStarter System: $219.99\u003C\u002Fli\u003E\u003Cli\u003EStarter Plus System: $299.99\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Blue by ADT\" data-superlative=\"Best for most rounded features\" data-imagegroup=\"{"alt":"adt-home-seucirty-sign.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Shutterstock","imageData":{"id":"89db5692-8258-4e68-935e-f4d346fc68c7","title":"adt-home-seucirty-sign","filename":"adt-home-seucirty-sign.jpg","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F18\u002F89db5692-8258-4e68-935e-f4d346fc68c7\u002Fadt-home-seucirty-sign.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":5822467,"width":4032,"height":3024,"dateCreated":{"date":"2021-08-18 16:12:34","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-18 16:12:39","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Shutterstock","alt":"adt-home-seucirty-sign.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"89db5692-8258-4e68-935e-f4d346fc68c7","imageAltText":"adt-home-seucirty-sign.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Shutterstock","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"adt-home-seucirty-sign.jpg","imageDateCreated":"2021\u002F08\u002F18","imageWidth":4032,"imageHeight":3024,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Shutterstock\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Blue by ADT","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.bluebyadt.com\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6f04a42d-744d-4610-861b-3193b3a846e2\" data-edition=\"us\" data-description=\"\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EScore: \u003C\u002Fstrong\u003E3.5 | \u003Cstrong\u003EJ.D. Power: \u003C\u002Fstrong\u003EN\u002FA |&nbsp;\u003Cstrong\u003EContract requirement: \u003C\u002Fstrong\u003ENo |\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWhy we chose it\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EFounded in 2018, Cove is new to the home security scene, but that by no means makes it a non-valuable player. Cove's BBB customer ratings are impressive, to say the least, and its easily customizable security plans make it a dream for customers who want more control over their home security setup.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENo contracts\u003C\u002Fli\u003E\u003Cli\u003ECustomizable plans\u003C\u002Fli\u003E\u003Cli\u003EStellar BBB customer service reviews\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENo professional installation\u003C\u002Fli\u003E\u003Cli\u003ELimited app functions\u003C\u002Fli\u003E\u003Cli\u003ELimited integration\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EEquipment available\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDoor\u002Fwindow sensor\u003C\u002Fli\u003E\u003Cli\u003EMotion detector\u003C\u002Fli\u003E\u003Cli\u003EPanic button\u003C\u002Fli\u003E\u003Cli\u003EYI Indoor Camera\u003C\u002Fli\u003E\u003Cli\u003EKey remote\u003C\u002Fli\u003E\u003Cli\u003ETouchscreen alarm panel\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EPlans &amp; pricing\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECove Basic: $15\u002Fmo\u003C\u002Fli\u003E\u003Cli\u003ECove Plus: $25\u002Fmo\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Cove\" data-superlative=\"Best for customizing\" data-imagegroup=\"{"alt":"cove-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Cove","imageData":{"id":"d595dfc2-c2ae-4e02-a674-8ae774fdb1c2","title":"cove-security","filename":"cove-security.png","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F08\u002F24\u002Fd595dfc2-c2ae-4e02-a674-8ae774fdb1c2\u002Fcove-security.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1833,"width":225,"height":225,"dateCreated":{"date":"2021-08-24 10:38:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-24 10:38:14","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Cove","alt":"cove-security.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d595dfc2-c2ae-4e02-a674-8ae774fdb1c2","imageAltText":"cove-security.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Cove","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cove-security.png","imageDateCreated":"2021\u002F08\u002F24","imageWidth":225,"imageHeight":225,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Cove\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Cove","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.covesmart.com\u002F","url":""}]\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHome security in Dallas: What you need to know \u003C\u002Fh2\u003E\u003Ch3\u003EDallas, Texas, crime statistics\u003C\u002Fh3\u003E\u003Cp\u003EYour city's \u003Ca href=\"https:\u002F\u002Fwww.neighborhoodscout.com\u002Ftx\u002Fdallas\u002Fcrime\"\u003Eoverall crime rate and common types of crimes\u003C\u002Fa\u003E can provide better insight into how to keep your home safe. However, keep in mind that crime stats only offer a piece of the entire puzzle. In Dallas, Texas, the crime rate is twice as high as the national rate, which is understandable given how large a city it is. Unfortunately, in Dallas, you have a 1 in 29 chance of becoming the victim of a property crime. \u003C\u002Fp\u003E\u003Cp\u003EHere are a few more statistics to bear in mind:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E34 out of 1000 residents of Dallas are victims of property crimes\u003C\u002Fli\u003E\u003Cli\u003ENearly 7 out of 1000 people in Dallas will experience a burglary\u003C\u002Fli\u003E\u003Cli\u003E20 out of 1000 people in Dallas will experience a theft\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch3\u003EResearch your neighborhood\u003C\u002Fh3\u003E\u003Cp\u003EThe type of home security system you'll need will depend on what kind of neighborhood you live in. Be sure to research your neighborhood to see how likely it is that you'll experience a crime and what kind of crimes are common in your area. If you live in a low-crime neighborhood, you may only need a basic security setup. However, if burglary is a concern where you live, you may want to consider a complete home security package. Most of the safest neighborhoods like Hillcrest Road\u002FSpring Valley Road, Northaven Road\u002FHillcrest Road, Northaven Road\u002FInwood Road, Northaven Road\u002FPreston Road are located in northern Dallas. Areas like Sargent and Fruitdale, however, have lower safety ratings. \u003C\u002Fp\u003E\u003Cp\u003ETo learn more about how to research your neighborhood's safety record, browse our resources \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fonline-tools-to-track-your-neighborhoods-safety\u002F\"\u003Ehere\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Ch3\u003ERegister your home security system in Dallas\u003C\u002Fh3\u003E\u003Cp\u003EIt's important to register your home security system with the city of Dallas because, if it's not, the city can refuse to respond to your home alarms. Keeping a record of the Security Alarm Permits helps the city keep the registration information up-to-date. Hence, law enforcement knows how to reach you should your alarm go off and you're not home, and it lets the city of Dallas keep track of false alarms. The first three times you spark a false alarm in Dallas, you will not be charged a fee. After that, the fourth, fifth, and sixth false alarms will cost you $50. For the seventh and eighth false alarms, you'll be charged $75 and $100 from then on. \u003C\u002Fp\u003E\u003Cp\u003EIn order to register for a \u003Ca href=\"https:\u002F\u002Fdallascityhall.com\u002Fdepartments\u002Fwaterutilities\u002Fspecial_collections\u002FPages\u002Fspecial_collections_registrations.aspx\"\u003ESecurity Alarm Permit\u003C\u002Fa\u003E with the city of Dallas, follow these instructions:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EVisit \u003Ca href=\"https:\u002F\u002Fwww.dallasalarmpermit.com\u002F\"\u003EFalse Alarm Reduction Website (dallasalarmpermit.com)\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003EClick \"Register Online\"\u003C\u002Fli\u003E\u003Cli\u003EFill out the online registration form, which will require your contact information, address, and alarm company information\u003C\u002Fli\u003E\u003Cli\u003EPay the $50 fee\u003C\u002Fli\u003E\u003Cli\u003EFor more information, visit \u003Ca href=\"https:\u002F\u002Fwww.dallaspolice.net\u002F\"\u003EHome (dallaspolice.net)\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Ch2\u003EHow to choose your Dallas home security system\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EInterior\u002Fexterior cameras:\u003C\u002Fstrong\u003E If you're going to purchase a security camera for your home, consider the weather ratings for exterior cameras. Dallas is hot and humid, with warm summers and mild winters. Since Dallas is exposed to such extreme weather conditions, you'll want to make sure the camera you install outside your home is rated for your specific climate.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EControl panel: \u003C\u002Fstrong\u003EThe control panel is one of the most important facets of your home security system. This is the interface that gives you access to the backend of your home security system. Before you purchase a security system for your home, research how intuitive and easy to use the control panel is. You won't want to find yourself with a complicated control panel while frantically trying to turn off your home's security alarm. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility: \u003C\u002Fstrong\u003EOne of the most convenient aspects of a home security system is its compatibility with your smart devices. The top operating systems for phones, Android, Google, and iOS, should integrate with most home security system hubs. Before choosing a home security system, research to make sure the software, usually an app, will work with your phone or any other smart devices you own. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EStorage: \u003C\u002Fstrong\u003EIf you live in an area where you're bombarded with foot traffic, you might stock up on video storage a lot more quickly than you would expect should you have a motion-sensor camera. If this is the case, be sure to position the camera to focus on the traffic that's coming in and out of your home instead of the street. This will help to cut down on needless monitoring and keep you from racking up unnecessary video footage.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWindow\u002Fdoor sensors: \u003C\u002Fstrong\u003EDue to Dallas's considerable humidity, you'll want to make sure your door and window sensors are weatherproofed. With long-term exposure, the dense humidity and heat could cause a lot of wear and tear on any outdoor sensors. Ideally, you'll want to keep your window and door sensors indoors. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ELocal vs. national companies\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPros of local security company\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIt offers a more personalized experience\u003Cbr\u003E Familiarity with your neighborhood\u003Cbr\u003E Investment in your community\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ECons of local security company\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPricier packages\u003Cbr\u003E Longer wait times\u003Cbr\u003E Less resources to offer\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPros of national security company\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E24\u002F7 monitoring\u003Cbr\u003E Wide variety of equipment options\u003Cbr\u003E Smart equipment capabilities\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ECons of national security company\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPoor customer service\u003Cbr\u003E Less personalized experience\u003Cbr\u003E Lack of familiarity with your neighborhood\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Ch2\u003E\u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"be98ca49-3c48-4bec-b32f-ae21e122e2f4\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile some home security systems do require a professional install, many companies offer self-install options. If you'd like the DIY option, make sure to read all the fine print before purchasing a system to find out whether the home security company allows for self-installs.\u003C\u002Fp\u003E\" data-hed=\"Can I self-install my home security system?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bb73da3d-6779-4848-9f83-29f63e4db333\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe best home security system entirely depends on your individual needs and budget. If money isn't an object, consider going with a package from a company like Blue by ADT, which is more costly but offers many benefits. If you're interested in a more basic option, consider a company like Arlo or Abode.\u003C\u002Fp\u003E\" data-hed=\"What's the best Dallas home security system?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0d768369-63d4-444f-88cb-5e2abfb7081d\" data-edition=\"us\" data-description=\"\u003Cp\u003EWithin this listing, the least expensive home security system is Arlo. The company only charges $2.99\u002Fmonth for its Premier plan and $4.99\u002Fmonth for its Elite plan.\u003C\u002Fp\u003E\" data-hed=\"What's the least expensive home security system?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EMethodology \u003C\u002Fh2\u003E\u003Cp\u003EWe evaluated home security companies based on equipment cost, monthly costs, contract options, installation and customer satisfaction to determine our scores and create our best home security reviews. To compare home security companies with other providers across the board, we calculate each score based on the following:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EMonthly price\u003C\u002Fstrong\u003E: The lower the cost of a home security company's monthly contract, the higher the score. Inversely, the higher the cost of the monthly contract, the lower the score in this metric. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EEquipment cost\u003C\u002Fstrong\u003E: Affordability is important with home security, so we awarded higher scores to home security companies with lower equipment prices.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContracts\u003C\u002Fstrong\u003E: We reviewed the flexibility in contracts of the home security companies. The more flexibility, like having no contracts to bind customers for long periods, the higher the score. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer satisfaction\u003C\u002Fstrong\u003E: With J.D. Power's \u003Ca href=\"https:\u002F\u002Fwww.jdpower.com\u002Fbusiness\u002Fpress-releases\u002F2020-home-security-satisfaction-study\" target=\"_blank\"\u003E2020 Home Security Satisfaction Study\u003C\u002Fa\u003E, we assigned a score to each company based on the rating it received.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EInstallation\u003C\u002Fstrong\u003E: Like with contracts, we award higher scores to companies with flexible installation options, like DIY or professional options.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-09-08 13:48:00",timezone:"UTC",updated:c,published:c},description:"While none of these Dallas alarm companies is perfect, each of them offers an intuitive experience, whether that be a professional or DIY install.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"109b6e7d-fe23-4d76-929a-713fe275e25e",image:{id:"33f9f16f-906e-493b-ac07-585dca7ae9c2",filename:"best-home-security-in-dallas.jpg",dateCreated:{created:c,date:"2021-08-24 10:49:22",timezone:"UTC",updated:c,published:c},alt:"replace-this-image.jpg",credits:"By metamorworks -- Shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F08\u002F24\u002F33f9f16f-906e-493b-ac07-585dca7ae9c2\u002Fbest-home-security-in-dallas.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Home & Office^Smart Home^Home Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"best-home-security-system-in-dallas",startYear:c,summary:b,title:"The best home security system in Dallas",topic:{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10666ed8-ec91-11e3-95d2-02911863765e",slug:"hardware",name:"Hardware",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EWhen mass data collection and big data analysis exploded on the technology scene, security and encryption, unfortunately, took a back seat. \u003C\u002Fp\u003E\u003Cp\u003EIn a world where data breaches happen on a daily basis -- involving everything from device theft to vulnerability exploitation and open AWS buckets exposed for the world to see -- businesses and home users alike should educate themselves and employ encryption software where they can protect their personal data or information they have become controllers of -- and, therefore, may be legally liable if records are stolen or leaked. \u003C\u002Fp\u003E\u003Cp\u003EEncryption can help protect information stored, received, and sent between systems, such as between transfers in enterprise networks or in simple browser sessions. Readable information is scrambled through the use of encryption keys, and then algorithms that can sort through this text and return it to a readable format. For example, today, the Advanced Encryption Standard (AES) using 128- and 256-bit key lengths are commonly used worldwide. \u003C\u002Fp\u003E\u003Cp\u003EIf strong encryption and security practices are not in place, businesses are not only opening themselves up to potential cyberattacks, but also the loss of corporate and customer information, fines for non-compliance with laws including HIPAA and GDPR, financial damage, and the loss of reputation. At home, encryption can protect your personal files and communication and keep them safe from prying eyes and from theft. \u003C\u002Fp\u003E\u003Cp\u003EBelow, we list our favorite encryption solutions, suitable for home users, SMBs, and enterprise players. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fc0b605d-9b0d-48bc-a892-bbbc5943bfa6\" data-edition=\"us\" data-description=\"\u003Cp\u003EMicrosoft's BitLocker, available on business editions of the OS and server software, is the name given to a set of encryption tools providing XTS-AES 128-bit device encryption.\u003Cbr\u003E&nbsp;\u003Cbr\u003EThe Redmond giant's solution is focused on the encryption of drives on a device out of the box and can also be used to protect removable drives through BitLocker To Go. Recovery keys can also be set to retrieve data should firmware issues or errors prevent IT administrators from accessing encrypted drives.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EA set of admin tools, including features such as enabling the encryption of full drives and other media, as well as domain or Microsoft account linking, are included.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EBitLocker's hardware specifications require an onboard Trusted Platform Module (TPM) chip and Modern Standby support, two elements generally supported on modern Windows PCs. &nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EBitLocker is built into the Windows operating system but only a limited set of encryption tools are included with Home editions, the standard OS that many PCs consumers purchase. BitLocker is available on Windows 10 and 11 (Pro and above).\u003Cbr\u003E&nbsp;\u003Cbr\u003EInterested in BitLocker? You can check out our \u003Ca target="_blank" href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-10-experts-guide-everything-you-need-to-know-about-bitlocker\u002F"\u003Euser guide here\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFree\u003C\u002Fli\u003E\u003Cli\u003EUser-friendly interface\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENot fully available on Home versions of the Windows operating system\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Microsoft BitLocker\" data-superlative=\"Redmond's solution\" data-imagegroup=\"{"alt":"win.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"1e268e40-ac0b-46b9-8eea-14daaee472d2","title":"best-encryption-software-bitlocker","filename":"image-7.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F06\u002F1e268e40-ac0b-46b9-8eea-14daaee472d2\u002Fimage-7.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":375024,"width":1600,"height":1069,"dateCreated":{"date":"2021-05-06 21:09:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-06 21:09:41","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-encryption-software-bitlocker.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1e268e40-ac0b-46b9-8eea-14daaee472d2","imageAltText":"win.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"image-7.jpg","imageDateCreated":"2021\u002F05\u002F06","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Microsoft","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fdocs.microsoft.com\u002Fen-us\u002Fwindows\u002Fsecurity\u002Finformation-protection\u002Fbitlocker\u002Fbitlocker-device-encryption-overview-windows-10","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fb0e2775-f51d-4509-bf63-a286b47a788a\" data-edition=\"us\" data-description=\"\u003Cp\u003EIBM Guardium is a data protection platform that pulls together a suite of security tools in an effort to streamline data management and reduce vendor product disparity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EEncryption services are included for corporate data, alongside data discovery and classification, vulnerability scans, data activity monitoring, analytics, and compliance reports, among other features.\u003Cbr\u003E&nbsp;\u003Cbr\u003EIBM Guardium for File and Database Encryption can be used to encrypt on-premise files and databases by leveraging the hardware encryption capabilities of host CPUs.\u003Cbr\u003E&nbsp;\u003Cbr\u003EData can be encrypted on the go without taking business applications offline, levels of encryption can be enabled to match user access rights, and keys can be managed from a central platform. IBM says GDE "equips organizations with powerful tools to help combat external threats, guard against insider abuse, and establish persistent controls, even when data is stored in the cloud or an external provider's infrastructure."\u003Cbr\u003E&nbsp;\u003Cbr\u003EA useful accompaniment to IBM encryption is access policies that can be set to identify anomalous behavior such as mass copy and deletion of files and directories. FIPS 140-2 certified cryptographic keys can also be generated for cloud key management.\u003Cbr\u003E&nbsp;\u003Cbr\u003EIBM Guardium is a subscription-based service provided on request and is most suitable for enterprise companies willing to invest in a one-stop-shop solution for data management and protection.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECan be used for GDPR, CCPA, PCI DSS, and HIPAA compliance and report generation\u003C\u002Fli\u003E\u003Cli\u003EScale to 10,000+ agents\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESome users report that graphical interfaces could be improved\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"IBM Guardium\" data-superlative=\"Data protection platform\" data-imagegroup=\"{"alt":"obm.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"8ccf60c0-fe2e-4001-9f41-5ae2e4a5b14a","title":"best-encryption-software-ibm-guardium","filename":"image-6.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F06\u002F8ccf60c0-fe2e-4001-9f41-5ae2e4a5b14a\u002Fimage-6.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":609448,"width":1600,"height":1069,"dateCreated":{"date":"2021-05-06 21:08:08","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-06 21:08:25","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-encryption-software-ibm-guardium.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8ccf60c0-fe2e-4001-9f41-5ae2e4a5b14a","imageAltText":"obm.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"image-6.jpg","imageDateCreated":"2021\u002F05\u002F06","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"IBM","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ibm.com\u002Fuk-en\u002Fsecurity\u002Fdata-security\u002Fguardium","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"60a4800c-dce0-4ec9-9924-234cb4db9693\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple's FileVault is built-in on the macOS operating system. Apple first introduced FileVault in 2013, later upgrading to FileVault2 on macOS Lion and later versions. The onboard system can be enabled to encrypt all information stored on disk to prevent the theft of data by anyone without access or account credentials. iMac Pro and users of devices with Apple T2 chips will have their information encrypted automatically.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EModern CPU power is leveraged to provide AES 128\u002F256-bit encryption. Users can choose to leverage their iCloud account credentials or generate a recovery key to unlock disks if they forget their standard device password.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EHowever, businesses should not consider FileVault to be a full, robust solution for data security; rather, it is a \u003Ca href="https:\u002F\u002Fwww.techrepublic.com\u002Farticle\u002Fapples-filevault-2-encryption-program-a-cheat-sheet\u002F" target="_blank"\u003Euseful addition\u003C\u002Fa\u003E for ensuring a basic level of encryption and protection.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFree\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EEntry-level encryption but not suitable for business use\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Apple FileVault\" data-superlative=\"Built-in on the MacOS operating system\" data-imagegroup=\"{"alt":"mac.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"f1652101-2c8b-41a6-9eaf-49c1c8261bc4","title":"best-encryption-software-filevault","filename":"image-8.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F06\u002Ff1652101-2c8b-41a6-9eaf-49c1c8261bc4\u002Fimage-8.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":561862,"width":1600,"height":1069,"dateCreated":{"date":"2021-05-06 21:10:23","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-06 21:10:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-encryption-software-filevault.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f1652101-2c8b-41a6-9eaf-49c1c8261bc4","imageAltText":"mac.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"image-8.jpg","imageDateCreated":"2021\u002F05\u002F06","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Apple","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002FHT204837","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"37d996d4-f6d6-4abb-8ae0-1243068591dc\" data-edition=\"us\" data-description=\"\u003Cp\u003EAxCrypt is an encryption solution that has been widely adopted and should be considered if more than one individual is using the same machine on a regular basis.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EFiles are secured with AES 128\u002F256-bit encryption on Mac and Windows machines through simple one-click functionality. Once files and directories are secure they can be accessed with a password, of which more than one AxCrypt user can open if they have been given permission to do so. In addition, information can be locked down across mobile devices and encryption standards can be extended to cloud services, such as Google Drive or Dropbox.\u003Cbr\u003E&nbsp;\u003Cbr\u003EBusiness users can manage passwords through a central platform.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EA free, trial version of AxCrypt is available as well as a mobile version. Yearly subscriptions for premium and business versions, including extended features and licensing for more than one machine, are also on offer.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESimple user functionality\u003C\u002Fli\u003E\u003Cli\u003ECloud storage encryption&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EOutdated look\u003C\u002Fli\u003E\u003Cli\u003ESome users report friction with the mobile apps\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"AxCrypt\" data-superlative=\"Widely adopted encryption solution\" data-imagegroup=\"{"alt":"ax.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"a3e0193b-0a38-4f58-971f-ff33d8e6e2bd","title":"ax","filename":"ax.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2020\u002F04\u002F14\u002Fa3e0193b-0a38-4f58-971f-ff33d8e6e2bd\u002Fax.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":117320,"width":1600,"height":1068,"dateCreated":{"date":"2020-04-14 15:48:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2020-04-14 15:48:06","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"ax.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a3e0193b-0a38-4f58-971f-ff33d8e6e2bd","imageAltText":"ax.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ax.jpg","imageDateCreated":"2020\u002F04\u002F14","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"AxCrypt","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.axcrypt.net\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"75c9ffa1-b692-4a0b-b233-b190da07b6bb\" data-edition=\"us\" data-description=\"\u003Cp\u003ETrend Micro's Endpoint Encryption software, part of the Smart Protection Suites range, can be used across Macs, Windows machines, and removable media to encrypt either full disks or individual files and folders.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EAES 128\u002F256-bit encryption is on offer through passwords and multi-factor authentication across endpoints. Multiple user and administrator accounts can be set for individual devices.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EOther functionality includes the release of one-time passwords to access endpoint data, the remote wipe or lock of stolen devices, lockouts automatically enabled in response to failed authentication attempts, pre-boot auth, and the support of consumer-grade encryption services including BitLocker and FileVault.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003EThe management console for the software and keys can be integrated with other Trend Micro software. In addition, the suite is FIPS certified.&nbsp;\u003Cbr\u003E&nbsp;\u003Cbr\u003ETrend Micro's Endpoint Encryption solution is priced based on request.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFlexible encryption options across different media\u003C\u002Fli\u003E\u003Cli\u003ECentralized policy managmement\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESome clients report the need for process and interface streamlining\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Trend Micro Endpoint Encryption\" data-superlative=\"Part of the Smart Protection Suites range\" data-imagegroup=\"{"alt":"tm.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"ef6acd91-2ec8-4a55-a7f8-d362c3ae82e9","title":"best-encryption-software-trend-micro","filename":"fde-preboot.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F06\u002Fef6acd91-2ec8-4a55-a7f8-d362c3ae82e9\u002Ffde-preboot.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":611339,"width":1600,"height":1069,"dateCreated":{"date":"2021-05-06 21:14:01","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-05-06 21:14:11","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"best-encryption-software-trend-micro.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ef6acd91-2ec8-4a55-a7f8-d362c3ae82e9","imageAltText":"tm.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"fde-preboot.png","imageDateCreated":"2021\u002F05\u002F06","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Trend Micro","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.trendmicro.com\u002Fen_us\u002Fbusiness\u002Fproducts\u002Fuser-protection\u002Fsps\u002Fendpoint\u002Fendpoint-encryption.html","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6a89d0de-df24-4faf-9176-768b53f2d35e\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen we considered our recommendations for encryption software, we focused on three themes: strength, the flexibility of use, and both multi-device and OS support. While enterprise organizations need robust solutions for coping with vast amounts of data, home users, too, could not be ignored as their personal data is just as valuable and should also be protected.\u003C\u002Fp\u003E\" data-hed=\"How did we choose these encryption software options?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4730b76e-603c-4e53-83a0-ca8a14d3dae4\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile some users and small businesses may need no more than simple, standalone encryption offerings to protect content on PCs, today's encryption solutions in the enterprise space -- especially important for larger firms -- must also keep hybrid environments and remote working in mind.\u003C\u002Fp\u003E\u003Cp\u003EThere is a high demand for encryption solutions able to protect corporate, sensitive data that may be accessed remotely by workers and hosted either in the cloud or in company networks.\u003C\u002Fp\u003E\u003Cp\u003EStrong encryption is now necessary when files must be shared with others not only to maintain corporate privacy and compliance over networks, but home use, to also ensure data does not end up in the wrong hands.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EProduct\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EEncryption bit\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EOS\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003E\u003C\u002Fstrong\u003EMicrosoft BitLocker\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EXTS-AES 128-bit\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWindows 10 and 11 (Pro and above)\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIBM Guardium\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ECustom pricing\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EN\u002FA\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWindows and Mac\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EApple FileVault\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAES 128\u002F256-bit\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EmacOS\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAxCrypt\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$5\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAES 128\u002F256-bit\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWindows and Mac\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETrend Micro Endpoint Encryption\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EN\u002FA\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAES 128\u002F256-bit\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWindows and Mac\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which encryption software is right for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2b2ac046-b94e-48df-838c-266dcb5f5052\" data-edition=\"us\" data-description=\"\u003Cp\u003ESymmetric encryption and asymmetric encryption are the types commonly used today, including AES and RSA. These forms of encryption are used in security protocols including TLS\u002FSSL, SSH, as well as PGP communication.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOne challenge faced by businesses, however, is protecting data both in storage (at rest) and when information needs to be decrypted while in use (in transit).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fquantum-computing-may-make-current-encryption-obsolete-a-quantum-internet-could-be-the-solution\u002F" target="_blank"\u003EQuantum\u003C\u002Fa\u003E&nbsp;and&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fibm-launches-experimental-homomorphic-data-encryption-environment-for-the-enterprise\u002F" target="_blank"\u003Ehomomorphic data encryption\u003C\u002Fa\u003E&nbsp;are being explored by technology vendors, but we aren't there quite yet when it comes to commercial rollouts.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What different levels of encryption are available?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9cfc485a-398c-4872-b1ce-6eba76fbeb5c\" data-edition=\"us\" data-description=\"\u003Cp\u003EAt home, end-to-end encryption for online communication and hard drive encryption is valuable for adding a layer of privacy to your conversations and locking up content contained on personal devices. In business use cases, with regulators clamping down on data breaches through legislation such as GDPR, consumer and corporate records should be protected when at rest -- and cloud storage, such as AWS buckets, should be configured properly so they are not open or accessible to the public.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What types of data should be protected by encryption? \" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bedbe72d-2767-4643-b7c6-ec03046af69f\" data-edition=\"us\" data-description=\"\u003Cp\u003EHere are a few others to look into:\u003C\u002Fp\u003E\" data-hed=\"Are there other encryption software options to consider?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"3e2049e5-f128-45b2-8311-f70c8db3cf02\" data-edition=\"us\" data-hed=\"Boxcryptor\" data-imagegroup=\"{"alt":"best-encryption-software-boxycryptor.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"5942ccc3-77f5-4699-b7ef-e97a6f24f868","filename":"image-10.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F06\u002F5942ccc3-77f5-4699-b7ef-e97a6f24f868\u002Fimage-10.jpg","dateCreated":{"date":"2021-05-06 21:15:07","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"5942ccc3-77f5-4699-b7ef-e97a6f24f868","imageFilename":"image-10.jpg","imageDateCreated":"2021\u002F05\u002F06"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.boxcryptor.com\u002Fen\u002Fpricing\u002F\" data-offermerchant=\"Boxcryptor\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"7b2b4e20-834b-4db7-be26-aac18d49876a\" data-edition=\"us\" data-hed=\"Sophos Central Device Encryption\" data-imagegroup=\"{"alt":"best-encryption-software-kruptos.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Sophos","imageData":{"id":"0b4d22c9-0cbc-43a9-b471-d420a9bf71fd","filename":"screenshot-2022-03-17-at-15-26-27.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2022\u002F03\u002F17\u002F0b4d22c9-0cbc-43a9-b471-d420a9bf71fd\u002Fscreenshot-2022-03-17-at-15-26-27.png","dateCreated":{"date":"2022-03-17 15:26:54","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"0b4d22c9-0cbc-43a9-b471-d420a9bf71fd","imageFilename":"screenshot-2022-03-17-at-15-26-27.png","imageDateCreated":"2022\u002F03\u002F17"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Sophos\" data-offerurl=\"https:\u002F\u002Fwww.sophos.com\u002Fen-us\u002Fproducts\u002Fcentral-device-encryption\" data-offermerchant=\"Sophos\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003E \t\u003Cbr\u003E \u003C\u002Fh3\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-03-18 15:30:00",timezone:"UTC",updated:c,published:c},description:"From home officers to on-premise, hybrid environments, and cloud solutions, we have you covered.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"08b2c43e-4253-4e2c-b3f1-3071978a89b0",image:{id:"51570813-7d3f-4fec-a2eb-a278ec7b58ec",filename:"screenshot-2020-04-15-at-15-34-00.png",dateCreated:{created:c,date:"2020-04-15 14:34:25",timezone:"UTC",updated:c,published:c},alt:"screenshot-2020-04-15-at-15-34-00.png",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2020\u002F04\u002F15\u002F51570813-7d3f-4fec-a2eb-a278ec7b58ec\u002Fscreenshot-2020-04-15-at-15-34-00.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1898,height:1136,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:"The best encryption software: Protect your data",section:b,slug:"best-encryption-software",startYear:c,summary:b,title:"Best encryption software 2022: Protect your data",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1048432a-ec91-11e3-95d2-02911863765e",slug:"enterprise-software",name:"Enterprise Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"10a72f10-ec91-11e3-95d2-02911863765e",slug:"laptops",name:"Laptops",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"10d0341c-ec91-11e3-95d2-02911863765e",slug:"mobility",name:"Mobility",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9d3e6108-0023-11e4-95d2-02911863765e",slug:"innovation",name:"Innovation",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"b9d55db1-c979-42b8-b467-3b3a67ca331f",username:"Marc Wojno",profileUrl:c,email:c,firstName:"Marc",lastName:"Wojno",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e932bec6-637b-457c-88c8-63587c47a71d",filename:"marc-wojno.jpg",dateCreated:{created:c,date:"2022-08-05 14:24:58",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe932bec6-637b-457c-88c8-63587c47a71d\u002Fmarc-wojno.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Marc Wojno has been a writer and editor in the financial field for more than two decades, including for such media organizations as Kiplinger Washington Editors and Dow Jones Newswires. Most recently, Wojno contributed as a writer for US News & World Report and as a contributing editor for Bankrate, a Red Ventures company. Wojno has been featured as a personal finance expert in numerous local print, radio and television outlets throughout the country, including in such major markets as New York City, Chicago, San Francisco and Washington, D.C. He received both his BA in radio and television communication and computer science, and his MBA in international business and information systems, from The George Washington University.",profile:c,title:"Senior Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EThere are few scenarios more distressing than losing access to your bank account. One of these is losing the keys to your digital wallet. In order to alleviate that fear among crypto users, Toronto-based internet security company \u003Ca href=\"https:\u002F\u002F1password.com\u002F\"\u003E1Password\u003C\u002Fa\u003E announced today that it is teaming up with crypto wallet \u003Ca href=\"https:\u002F\u002Fphantom.app\u002F\"\u003EPhantom\u003C\u002Fa\u003E to make it easier and safer for digital wallet holders to access their cryptocurrencies, NFTs and other digital assets.\u003C\u002Fp\u003E\u003Cp\u003E1Password's first foray into the digital wallet arena is an application programming interface, or API, called \u003Ca href=\"https:\u002F\u002Fblog.1password.com\u002Fsave-in-1password-button-with-ramp\u002F\"\u003ESave in 1Password\u003C\u002Fa\u003E, which integrates with Phantom wallet so that users can protect and trade their tokens, NFTs and collectibles built on the \u003Ca href=\"https:\u002F\u002Fsolana.com\u002F\"\u003ESolana\u003C\u002Fa\u003E blockchain. \u003C\u002Fp\u003E\u003Cp\u003EWith Save in 1Password, the company said, digital wallet holders can now save all Phantom wallet credentials and keys to 1Password without the hassle of logging on or the threat of losing access forever. \"We just want to make it easier for people to protect their digital lives,\" Matthew O'Leary, vice-president of partnerships at 1Password, told \u003Cem\u003EZDNet\u003C\u002Fem\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"0642f6eb-3cf3-486e-a830-6e3291ab7cc6\" data-edition=\"us\" data-hed=\" 1Password\" data-imagegroup=\"{"alt":"1password.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"By T. Schneider -- Shuterstock","imageData":{"id":"1d850aaa-6371-48ff-97ac-59fcdb63ee53","filename":"1password.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F10\u002F12\u002F1d850aaa-6371-48ff-97ac-59fcdb63ee53\u002F1password.jpg","dateCreated":{"date":"2021-10-12 18:15:45","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"1d850aaa-6371-48ff-97ac-59fcdb63ee53","imageFilename":"1password.jpg","imageDateCreated":"2021\u002F10\u002F12"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"By T. Schneider -- Shuterstock\" data-offerurl=\"https:\u002F\u002F1password.com\u002F\" data-offermerchant=\" 1Password\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EUnlike misplacing the password to an online checking account at your local bank, a password for a digital wallet – and a seed phrase used to reset a password – are the only ways to access one's digital account. Lose them and you lose access to your digital coins and tokens; devise an easy-to-remember password and you run the risk of someone, or something, hacking into your account. Going to your bank and flashing your ID to access your digital wallet isn't possible. The repercussions faced by losing a password specifically for your digital wallet were epitomized by San Francisco-based programmer – and early Bitcoin adopter – \u003Ca href=\"https:\u002F\u002Fabc7news.com\u002Fstefan-thomas-bitcoin-password-san-francisco\u002F9635218\u002F\"\u003EStefan Thomas\u003C\u002Fa\u003E who, early last year, said he couldn't remember the password to his digital wallet. As a result, he couldn't get access to his Bitcoin wallet which had a value of [gasp] $220 million.\u003C\u002Fp\u003E\u003Ch3\u003EHOW IT WORKS\u003C\u002Fh3\u003E\u003Cp\u003EThe average person is expected to \u003Ca href=\"https:\u002F\u002Ftech.co\u002Fpassword-managers\u002Fhow-many-passwords-average-person\" target=\"_blank\"\u003Eremember 100 passwords\u003C\u002Fa\u003E as they manage their digital lives, be it from bank and email accounts to social media and Netflix subscriptions. At a time when online security is paramount, people are burdened with having to create logins, passwords and two-factor authentication to access personal accounts and information. In the haste of getting online, countless many risk using the same password or the same pattern of words, numbers and symbols across accounts. \"And that's what we're trying to guard against,\" O'Leary told ZDNet. \"Too many people end up reusing their password credentials.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7098396a-45dc-4f31-8567-d4b310457b81\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7098396a-45dc-4f31-8567-d4b310457b81\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBased on its 15 years of providing password and security resources, 1Password's entrance into the crypto market is a logical step. If you or your business needs to create an account for a crypto wallet, go to \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"b580e8d9-581d-4022-b990-b9b2a5459573\" data-raw-url=\"https:\u002F\u002F1password.com\u002F\" data-link-shortcode-text=\"1Password's website\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, key in your credit card information, and the sign-up flow begins. The service is available on all major computing and mobile platforms.\u003C\u002Fp\u003E\u003Cp\u003EWhen signing up for a Solana wallet, you're asked to store a seed phrase that is required if you get locked out of your wallet and you need to log back in. The Save in 1Password API is integrated into the wallet, so when you're going through the sign-up flow, you will be prompted by 1Password to automatically save that seed phrase within 1Password. \"So instead of writing it down or printing it off and storing it somewhere that you won't forget, it's going to be stored directly in 1Password,\" O'Leary said. \"That just brings a lot more safety and a lot more security to people who are in droves weighing into crypto.\" \u003C\u002Fp\u003E\u003Cp\u003EWith more than 300 million people worldwide \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ffinance\u002Fblockchain\u002Ftwo-thirds-of-americans-are-bullish-on-cryptocurrencies-being-widely-accepted-within-5-years-survey\u002F\" target=\"_blank\"\u003Ealready invested in some form of cryptocurrency\u003C\u002Fa\u003E – and with that number projected to swell to 1 billion by 2023 – a lot of people new to crypto won't necessarily understand the importance of storing a seed phrase; they might assume that they can contact a service for help in recovering that phrase. \"You can't do that in the crypto world,\" O'Leary noted. \"So backing that up in 1Password – that was the entire purpose of this integration,\" he added.\u003C\u002Fp\u003E\u003Cp\u003EAccording to 1Password, to utilize this new integration, users will need to use both the \u003Ca href=\"https:\u002F\u002Fphantom.app\u002Fdownload\"\u003EPhantom extension\u003C\u002Fa\u003E and the \u003Ca href=\"https:\u002F\u002F1password.com\u002Fdownloads\u002Fwindows\u002F#browsers\"\u003E1Password browser extension\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"aa46de76-899f-4423-83b7-a891c88392d8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Faa46de76-899f-4423-83b7-a891c88392d8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-02-23 14:00:18",timezone:"UTC",updated:c,published:c},description:"1Password offers Phantom users an easy and secure way to save credentials and ensure access to their cryptocurrency.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"2f023889-86cc-41e5-ab4f-3751563093f7",image:{id:"398505aa-78e1-497c-8c7a-6905705604a3",filename:"shutterstock-1854624547.jpg",dateCreated:{created:c,date:"2022-01-11 21:20:19",timezone:"UTC",updated:c,published:c},alt:"shutterstock-1854624547.jpg",credits:"insta_photos",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F01\u002F11\u002F398505aa-78e1-497c-8c7a-6905705604a3\u002Fshutterstock-1854624547.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Finance^Blockchain",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"lose-your-keys-to-your-phantom-crypto-wallet-1password-has-you-covered",startYear:c,summary:b,title:"Lose your keys to your Phantom crypto wallet? 1Password has you covered",topic:{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"2a142269-ad72-4347-a8d7-cbab9a2f6346",username:"chris_matyszczyk",profileUrl:c,email:c,firstName:"Chris",lastName:"Matyszczyk",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dc8b697c-2b0a-4b2d-8ce9-7ff431642a42",filename:"chris-matyszczyk.jpg",dateCreated:{created:c,date:"2022-08-05 15:17:05",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdc8b697c-2b0a-4b2d-8ce9-7ff431642a42\u002Fchris-matyszczyk.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Chris Matyszczyk is an award-winning creative director who now runs the consultancy Howard Raucous LLC. In 2013, Mediapost named him the Most Influential Person on Madison Avenue. His writing has been published all over the world, most recently on CNET.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"90b0bc44-9fe0-4058-b283-19a2a81cd9b7\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"C. Osborne | ZDNet\" data-image-alt-text=\"screenshot-2022-01-18-at-15-40-39.png\" data-image-filename=\"screenshot-2022-01-18-at-15-40-39.png\" data-image-date-created=\"2022\u002F01\u002F18\" data-image-width=\"1722\" data-image-height=\"1082\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EApple's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-just-found-my-lost-airtag-youll-never-guess-where-it-went\u002F\" target=\"_blank\"\u003EAirTags\u003C\u002Fa\u003E are getting some of a bad (brand) name. \u003C\u002Fp\u003E\u003Cp\u003EIt's \"a perfect tool for stalking,\" as Eva Galperin, Director of Cyber-Security at the Electronic Frontier Foundation, \u003Ca href=\"https:\u002F\u002Fwww.bbc.com\u002Fnews\u002Ftechnology-60004257\" target=\"_blank\"\u003Eput it to the BBC\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"5f2129ef-44cd-475f-be6e-66d788257ef8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F5f2129ef-44cd-475f-be6e-66d788257ef8\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EShe's right, of course. \u003C\u002Fp\u003E\u003Cp\u003EThat's the problem with technology, isn't it? For every potential good use, there are at least several pain-inducing, criminal-pleasing, world-ending uses. Too often, the bad outweighs the good, especially in the public eyes and ears. \u003C\u002Fp\u003E\u003Cp\u003EHere, though, is a tale of a woman who's glad she used an AirTag for her own surveillance purposes. \u003C\u002Fp\u003E\u003Cp\u003EValerie McNulty has moved around a few times. She's an army spouse and she knows the drill. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.militarytimes.com\u002Fthe-home-front\u002F2022\u002F01\u002F12\u002Farmy-wife-uses-airtag-hack-to-track-her-movers-while-pcsing\u002F\" target=\"_blank\"\u003EAs she told the Military Times\u003C\u002Fa\u003E, McNulty also knows that moving companies aren't universally reliable. It's not just that they can break things or lose things. It's that, well, they may not always deliver the facts in a way that's actually factual. \u003C\u002Fp\u003E\u003Cp\u003ESo McNulty slid an AirTag into one of her family's moving boxes containing her son's toys. They had a long way to go, from Fort Carson, Colorado to Fort Drum, New York. \u003C\u002Fp\u003E\u003Cp\u003EYou'll be stunned when I tell you the boxes didn't turn up on time. They were a month late. A promise of a Friday delivery became the promise of a Sunday delivery. You know how these things go. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-todays-technologies-become-weapons-in-modern-domestic-abuse\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow tech is a weapon in modern domestic abuse -- and how to protect yourself\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003EThe driver finally called McNulty and told her that he was just picking up her family's boxes in Colorado. \u003C\u002Fp\u003E\u003Cp\u003EThe call didn't go well. You see, McNulty had already checked the location of her AirTag. She knew it was in Elizabeth, New Jersey, not far from her new home. \u003C\u002Fp\u003E\u003Cp\u003E\"I made him aware that I knew he was only four hours away from us,\" she told the Military Times. \"He called back several minutes later trying to bargain with me to see if he could deliver it on Sunday or Monday.\" \u003C\u002Fp\u003E\u003Cp\u003E\"Where was the driver?,\" you might ask. Allegedly seeing a lady friend, said McNulty. \u003C\u002Fp\u003E\u003Cp\u003EAnd, of course, all of her family's boxes didn't arrive. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"98b03771-ff02-4115-ae04-edae0c1f8e5d\" data-edition=\"us\" data-hed=\"Apple AirTag\" data-imagegroup=\"{"alt":"airtag-better.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Apple","imageData":{"id":"a1529b59-7f75-4d80-9ee6-5f929ba09dd0","filename":"airtag-better.png","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F11\u002F22\u002Fa1529b59-7f75-4d80-9ee6-5f929ba09dd0\u002Fairtag-better.png","dateCreated":{"date":"2021-11-22 16:24:12","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"a1529b59-7f75-4d80-9ee6-5f929ba09dd0","imageFilename":"airtag-better.png","imageDateCreated":"2021\u002F11\u002F22"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Apple\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX532AM-A-AirTag\u002Fdp\u002FB0933BVK6T\" data-offerprice=\"29\" data-offermerchant=\"Amazon\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou can completely understand why McNulty used the AirTag in the way she did. This whole tale makes me wonder, though, what we've come to and where we're going. \u003C\u002Fp\u003E\u003Cp\u003EEmployers don't trust remote employees, for example, so they \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fworking-from-home-your-boss-has-a-creepy-new-way-to-spy-on-you\u002F\" target=\"_blank\"\u003Egarland them with surveillance technology\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EToo many humans don't like or trust each other. So they use technology to abuse each other, stalk each other, hack each other, and even break into their lovers' gadgets. \u003C\u002Fp\u003E\u003Cp\u003EAt the same time, they use technology to stay in touch with each other and work together in ways that were never previously possible. \u003C\u002Fp\u003E\u003Cp\u003EPerhaps we were always as two-sided as this. \u003C\u002Fp\u003E\u003Cp\u003EUltimately, though, because of the immediacy and ubiquity of technology, the result is an exponentially heightened collective paranoia. If our default is that we can trust no one and fear everyone, how can we ever really get along? \u003C\u002Fp\u003E\u003Cp\u003EHow can we ever be at peace? \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGlmcmFtZSBzcmM9Imh0dHBzOi8vb3Blbi5zcG90aWZ5LmNvbS9lbWJlZC9lcGlzb2RlLzV3d0pGemFKaUJ0RUF0eTl5YXA1MWUiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjIzMiIgZnJhbWVCb3JkZXI9IjAiIGFsbG93dHJhbnNwYXJlbmN5PSJ0cnVlIiBhbGxvdz0iZW5jcnlwdGVkLW1lZGlhIj48L2lmcmFtZT4=\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"d9187ff5-288d-4569-8b5e-e4f0aa892d83\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fd9187ff5-288d-4569-8b5e-e4f0aa892d83\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-01-23 13:00:00",timezone:"UTC",updated:c,published:c},description:"AirTags are being used for all sorts of evil purposes. They're also proving to be very useful for many people.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"3440877a-f0ae-4dd0-9f44-7c668ceb5c38",image:{id:"90b0bc44-9fe0-4058-b283-19a2a81cd9b7",filename:"screenshot-2022-01-18-at-15-40-39.png",dateCreated:{created:c,date:"2022-01-18 15:40:51",timezone:"UTC",updated:c,published:c},alt:"screenshot-2022-01-18-at-15-40-39.png",credits:"C.Osborne | ZDNet",caption:"\u003Cp\u003EIt takes just one.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F01\u002F18\u002F90b0bc44-9fe0-4058-b283-19a2a81cd9b7\u002Fscreenshot-2022-01-18-at-15-40-39.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1722,height:1082,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Business^Companies^Apple",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"she-didnt-trust-her-movers-a-single-apple-airtag-showed-she-was-right",startYear:c,summary:b,title:"She didn't trust her movers. A single Apple AirTag proved she was right",topic:{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"9a23272b-10d6-11e4-9732-00505685119a",username:"David Gewirtz",profileUrl:c,email:c,firstName:"David",lastName:"Gewirtz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"de4475ef-be59-4858-beb8-6f7696c85945",filename:"david-gewirtz.jpg",dateCreated:{created:c,date:"2022-08-05 15:19:52",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fde4475ef-be59-4858-beb8-6f7696c85945\u002Fdavid-gewirtz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"In addition to hosting the ZDNET Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.\r\n\r\nDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ECryptocurrency exchanges are a lot like \u003Ca href=\"https:\u002F\u002Fwowpedia.fandom.com\u002Fwiki\u002FAuction_House\" target=\"_blank\"\u003Ethe auction house\u003C\u002Fa\u003E in World of Warcraft. Like in WoW, you're buying and selling digital goods, except this time you're buying and selling, say, Dogecoin instead of \u003Ca href=\"https:\u002F\u002Fwowpedia.fandom.com\u002Fwiki\u002FCrystallized_Dread\" target=\"_blank\"\u003ECrystalized Dread\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EBasically, crypto exchanges help traders acquire or divest cryptocurrency holdings. They do this by converting fiat money (actual government-backed currency) into the digital currency of your choice (and vice versa when you sell). Some exchanges only take real money. Some only take digital currency. All charge fees of one sort or another, which is key to how they make a profit. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"ba897fe6-2f92-4fbd-aab9-48162b509e96\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fba897fe6-2f92-4fbd-aab9-48162b509e96\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIt should go without saying, but we'll say it here: investing in cryptocurrency is risky as all heck. Crypto investing involves transferring hard-earned actual money for some fake bits generated by a purposely obtuse algorithm in the hope that enough other people will believe in the fake bits to make them somehow real. If that raises the hairs on the back of your neck, it should. \u003C\u002Fp\u003E\u003Cp\u003EBut some of you will be brave enough, or crazy enough, or wealthy enough that it just doesn't matter, and put down cold, hard cash in return for fantasy money. Good luck. People are out there are making money off this stuff. We're not, but someone is. \u003C\u002Fp\u003E\u003Ch2\u003E \tHow we made our selections\u003C\u002Fh2\u003E\u003Cp\u003EWe did a \u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FLiterature_review\" target=\"_blank\"\u003Eliterature review\u003C\u002Fa\u003E of the findings of six financially-oriented sites (they're listed below) who ranked the exchanges and aggregated those findings. By looking at findings from evaluators across the internet, we stand a better chance of creating a more reliable picture of the exchanges, while also being careful to avoid picking winners in a possibly regulated market. \u003C\u002Fp\u003E\u003Cp\u003EAcross all the sites, we identified 43 crypto exchanges. Of those 43 exchanges, 29 of them were only reviewed on one site. Because we're explicitly trying to find how they're perceived across the internet, we removed all of the one-hit wonders. We also removed another six exchanges that showed up on only two sites. None of them scored near the top of their respective reviewers' lists, so there was no great loss. \u003C\u002Fp\u003E\u003Cp\u003EThat left us with seven providers tested on three or more sites, giving us a good starting point. Of those seven, four exchanges (Coinbase, Gemini, Binance.US, and Kraken) each got three sets of star-ratings. Two sites rated on a 1-5 scale and one (BitDegree) rated on a 1-10 scale. We converted BitDegree's rating to a 1-5 scale (by dividing the ratings in half), and that allowed us to total up average ratings for the four exchanges where we had enough representative data. \u003C\u002Fp\u003E\u003Cp\u003EThese are the crypto exchanges that you might consider checking out.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"de33ddec-0974-47ca-8aa8-2a1155e94316\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: 4.63\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003EFree crypto on signup: $5 worth of free bitcoin\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 20+\u003C\u002Fli\u003E\u003Cli\u003EWallet: Yes\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESpread fee: 0.5%\u003C\u002Fli\u003E\u003Cli\u003EFees: $1.49 - $2.99 depending on amount\u003C\u002Fli\u003E\u003Cli\u003EWire transfer fees: $10 incoming, $25 outgoing\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EPayment fees when buying crypto\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH deposits: 1.49%\u003C\u002Fli\u003E\u003Cli\u003ECoinbase wallet: 1.49%\u003C\u002Fli\u003E\u003Cli\u003EDebit cards: 3.99%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EMany categories of online services have canonical brands that are nearly synonymous with the category. For online shopping, it's Amazon. For auctions, it's eBay. For movie streaming, it's still Netflix. For cryptocurrency, it's Bitcoin. And for crypto exchanges, it's Coinbase. No other crypto exchange has the brand equity of Coinbase. Coinbase was one of only two sites that were rated by all our source reviewers (the other was Gemini).\u003C\u002Fp\u003E\u003Cp\u003ECoinbase seems to be a solid platform if you're just starting out and you want to trade some bitcoin. One benefit of Coinbase is that it's a US company. This is important if&nbsp;you're trading more than $10,000 and want to keep your tax paperwork less complex. That's because US Coinbase customers are not required to file the \u003Ca href="https:\u002F\u002Fwww.irs.gov\u002Fbusinesses\u002Fsmall-businesses-self-employed\u002Freport-of-foreign-bank-and-financial-accounts-fbar" target="_blank"\u003EReport of Foreign Bank and Financial Accounts\u003C\u002Fa\u003E (FBAR) with the IRS.\u003C\u002Fp\u003E\u003Cp\u003ECoinbase does offer a wallet, so you can treat the exchange as your one-stop shop for basic crypto. There's also a Coinbase Pro service for those who have more in-depth intentions in this field.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EProbably best known crypto exchange\u003C\u002Fli\u003E\u003Cli\u003EClean user interface\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMediocre technical support\u003C\u002Fli\u003E\u003Cli\u003EHigher fees than many\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Coinbase\" data-superlative=\"Probably the best-known crypto exchange\" data-imagegroup=\"{"alt":"coinbase.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"ed675a44-bacc-443b-8826-3610af65b2e0","title":"coinbase","filename":"coinbase.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002Fed675a44-bacc-443b-8826-3610af65b2e0\u002Fcoinbase.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":306465,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 04:55:06","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 04:55:08","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"coinbase.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"ed675a44-bacc-443b-8826-3610af65b2e0","imageAltText":"coinbase.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"coinbase.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Coinbase","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.coinbase.com\u002F","url":"https:\u002F\u002Fwww.coinbase.com\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5696de25-4d26-485b-9854-63cd39ecbed5\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: 4.62\u003C\u002Fli\u003E\u003Cli\u003EFree crypto on signup: None\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 50+\u003C\u002Fli\u003E\u003Cli\u003EWallet: No\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFees (maker\u002Ftaker): 0-0.2%\u002F0.1-0.5% depending on volume\u003C\u002Fli\u003E\u003Cli\u003EAdditional fees: Leverage buying has margin opening and rollover fees\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EPayment fees when buying crypto\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH deposits: $0-10 depending on bank option\u003C\u002Fli\u003E\u003Cli\u003EDebit\u002Fcredit cards: 3.75% + $0.25\u003C\u002Fli\u003E\u003Cli\u003ECrypto deposit: Percentage of currency being deposited (varies by currency)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EWithdrawal fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECash withdrawal: $0-35 depending on bank option\u003C\u002Fli\u003E\u003Cli\u003ECrypto withdrawal: Percentage of currency being withdrawn (varies by currency)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThere's something unsettling about using a currency exchange whose name immediately brings to mind the phrase "beware the..." before its name. But, at least according to the aggregated internet reviews, you probably don't have to beware this Kraken. It has the second highest review average and quite a lot of positive comments.\u003C\u002Fp\u003E\u003Cp\u003EThe&nbsp;\u003Ca href="https:\u002F\u002Fwww.miamiherald.com\u002Findulge\u002Farticle250836074.html" target="_blank"\u003EMiami Herald\u003C\u002Fa\u003E, for example, says it has the "best customer support of any crypto exchange," even though the only support provided is via chat or ticket requests. Given that many of the crypto exchanges we've looked at tend to elicit "good, but terrible customer support," that may not be a terribly high bar. But any customer support has to be better than terrible customer support, so there you go.\u003C\u002Fp\u003E\u003Cp\u003EThe customer support may be needed, because the interface is relatively complex and is reputed to "have bugs that need fixing in the UI," according to the Herald. Kraken also offers a variety of advanced services including margin trading, futures trading, and&nbsp;\u003Ca href="https:\u002F\u002Facademy.binance.com\u002Fen\u002Farticles\u002Fwhat-is-staking" target="_blank"\u003Estaking rewards\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBetter customer service than many other exchanges\u003C\u002Fli\u003E\u003Cli\u003EWide range of currencies and services\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EComplex interface\u003C\u002Fli\u003E\u003Cli\u003ESomewhat buggy\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Kraken\" data-superlative=\"A monster of a crypto exchange\" data-imagegroup=\"{"alt":"kraken.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"5cc32997-c64d-4f59-b4b8-d996d3699964","title":"kraken","filename":"kraken.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002F5cc32997-c64d-4f59-b4b8-d996d3699964\u002Fkraken.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":428034,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:02:43","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:02:46","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"kraken.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"5cc32997-c64d-4f59-b4b8-d996d3699964","imageAltText":"kraken.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"kraken.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Kraken","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.kraken.com\u002Fen-us\u002F","url":"https:\u002F\u002Fwww.kraken.com\u002Fen-us\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9f4bab2d-0108-44d8-b203-23359ff69287\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: 4.57\u003C\u002Fli\u003E\u003Cli\u003EFree crypto on signup: None\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 200+\u003C\u002Fli\u003E\u003Cli\u003EWallet: Yes\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESpot trading fee: 0.1%\u003C\u002Fli\u003E\u003Cli\u003EInstant buy\u002Fsell fee: 0.5%\u003C\u002Fli\u003E\u003Cli\u003EDiscount: 25% if you use BNB (Binance's own currency)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EDeposit fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH deposits: free\u003C\u002Fli\u003E\u003Cli\u003EWire: $15\u003C\u002Fli\u003E\u003Cli\u003EDebit cards: 4.5%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EWithdrawal fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH withdrawal: 0%\u003C\u002Fli\u003E\u003Cli\u003EWire: $15 domestic, $35 international\u003C\u002Fli\u003E\u003Cli\u003EDebit card: not available\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBinance.US is the American version of the Binance trading platform. The US site has a more limited selection of coins and tokens to trade than the international Binance. That's not necessarily meant to imply that the coins and tokens on the US implementation are any safer, however.\u003C\u002Fp\u003E\u003Cp\u003EThere are also issues with access control. We've seen quite a few reports like \u003Ca href="https:\u002F\u002Fwww.reddit.com\u002Fr\u002Fbinance\u002Fcomments\u002Fm7yml4\u002Fbinanceus_unable_to_recover_account_via_2fa\u002F" target="_blank"\u003Ethis one\u003C\u002Fa\u003E, which describe serious difficulties setting up and using multifactor authentication.\u003C\u002Fp\u003E\u003Cp\u003EIf you're a big-money trader (more than $50,000 in a given month), you may be able to get discounts on trading fees. The company offers a wide range of order types including limit, market, and stop-limit mechanisms. Some of these options may not be available in the US.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBig volume discounts\u003C\u002Fli\u003E\u003Cli\u003EMany coin types available\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFutures and margin trading not available in US\u003C\u002Fli\u003E\u003Cli\u003EMany additional limits for US traders\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Binance.US\" data-superlative=\"Lots of currencies, but US restrictions and UI issues\" data-imagegroup=\"{"alt":"binance.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"283d52d8-f7a3-4141-a898-23c4a16cc3e9","title":"binance","filename":"binance.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002F283d52d8-f7a3-4141-a898-23c4a16cc3e9\u002Fbinance.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":248642,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:07:32","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:07:34","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"binance.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"283d52d8-f7a3-4141-a898-23c4a16cc3e9","imageAltText":"binance.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"binance.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Binance.US","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.binance.us\u002Fen\u002Fhome","url":"https:\u002F\u002Fwww.binance.us\u002Fen\u002Fhome"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d10f2813-dc28-4b82-b064-ac9e30003ef8\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: 4.23\u003C\u002Fli\u003E\u003Cli\u003EFree crypto: $10 worth of Bitcoin after buying\u002Fselling $100 BTC\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 25+\u003C\u002Fli\u003E\u003Cli\u003EWallet: No\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E"Convenience" fee: 0.5% over market rate\u003C\u002Fli\u003E\u003Cli\u003ETransaction fees: $0.99-$2.99\u003C\u002Fli\u003E\u003Cli\u003ELarge transaction ($200,00+) fee: 1.49% of market value\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EDeposit fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH deposits: free\u003C\u002Fli\u003E\u003Cli\u003EWire transfer fees: $10 incoming, $25 outgoing\u003C\u002Fli\u003E\u003Cli\u003ENo debit or credit cards\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETransfer fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EACH: free\u003C\u002Fli\u003E\u003Cli\u003EWire: free\u003C\u002Fli\u003E\u003Cli\u003ESome crypto: free\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ESo here's a bit of trivia. Remember Cameron Winklevoss and Tyler Winklevoss, contenders to the title of founders of Facebook? It's\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwinklevoss-twins-lose-again-ordered-to-pay-law-firm-13-million\u002F" target="_blank"\u003E&nbsp;a long story\u003C\u002Fa\u003E and part of a&nbsp;\u003Ca href="https:\u002F\u002Fwww.imdb.com\u002Ftitle\u002Ftt1285016\u002F" target="_blank"\u003Erelatively inaccurate movie\u003C\u002Fa\u003E with Aaron Sorkin's unbelievable but spectacularly-written dialog. Both Winklevi (they're twins) were played by Armie Hammer in the movie.\u003C\u002Fp\u003E\u003Cp\u003EGemini trades in quite a few digital currencies, but that's not all. The company has begun trading in&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fare-nft-collectibles-the-new-trading-cards-or-a-hype-bubble-soon-to-burst\u002F" target="_blank"\u003ENFTs\u003C\u002Fa\u003E. One interesting fact is that Gemini is a US-based company that's FDIC-insured and regulated by the New York State Department of Financial Services.\u003C\u002Fp\u003E\u003Cp\u003EGemini appears to generally have a reputation for a good UI. Guru99 says, "It is a simple, elegant, and secure way to build bitcoin and crypto portfolio." That feeling is echoed by most of the internet evaluations we examined.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EGood user interface\u003C\u002Fli\u003E\u003Cli\u003ENew York State regulated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EChallenging and unclear fee structure\u003C\u002Fli\u003E\u003Cli\u003EFounders not on Zuckerberg's Friends list\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Gemini\" data-superlative=\"Because...the founders are the Winklevoss twins\" data-imagegroup=\"{"alt":"gemini.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"cc552906-ac7c-4333-84cd-501794cb28be","title":"gemini","filename":"gemini.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002Fcc552906-ac7c-4333-84cd-501794cb28be\u002Fgemini.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":202546,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:19:09","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:19:11","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"gemini.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"cc552906-ac7c-4333-84cd-501794cb28be","imageAltText":"gemini.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"gemini.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Gemini","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.gemini.com\u002F","url":"https:\u002F\u002Fwww.gemini.com\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e7ca4b0-97b4-4911-bf26-ea9474747a69\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: not enough ratings\u003C\u002Fli\u003E\u003Cli\u003EFree crypto: No\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 220+\u003C\u002Fli\u003E\u003Cli\u003EWallet: Yes\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFlat fee for all transactions: 0.25%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EDeposit fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENo wire transfer fees\u003C\u002Fli\u003E\u003Cli\u003EOnly US Dollar transfers allowed via wire transfer\u003C\u002Fli\u003E\u003Cli\u003EIndividual currency transfers may have fees\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAccording to&nbsp;\u003Ca href="https:\u002F\u002Ftradesanta.com\u002Fblog\u002Fhow-to-trade-crypto-on-bittrex" target="_blank"\u003ETradesanta.com\u003C\u002Fa\u003E, "Bittrex is probably one of the most advanced crypto exchanges on the market today. It provides users with the fastest transactions available."\u003C\u002Fp\u003E\u003Cp\u003EBased up here in the Pacific Northwest, Bittrex is a Seattle-based company. However, despite being a US-based company, Bittrex states "Bittrex is not a regulated exchange under U.S. securities laws."\u003C\u002Fp\u003E\u003Cp\u003EBittrex was founded by Bill Shihara (a former security engineering manager at Amazon and Blackberry, with a prior 11-year Microsoft tenure), Richie Lai (a former leader in the Amazon information security team, with a prior 12 year Microsoft tenure), and Rami Kawach (a former principle security engineer at Amazon, with time at Qualys and Microsoft). All that certainly explains why they're based in the Evergreen State.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFree online wallet\u003C\u002Fli\u003E\u003Cli\u003EVery few deposit fees\u003C\u002Fli\u003E\u003Cli\u003EA metric ton of currencies\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENo margin trading\u003C\u002Fli\u003E\u003Cli\u003EFlat fee could get expensive\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Bittrex\" data-superlative=\"Lots of currencies and flat-fee trading\" data-imagegroup=\"{"alt":"bittrex.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"e73c1334-893b-41ff-a981-deb526e2f312","title":"bittrex","filename":"bittrex.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002Fe73c1334-893b-41ff-a981-deb526e2f312\u002Fbittrex.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":378049,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:45:56","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:45:59","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"bittrex.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"e73c1334-893b-41ff-a981-deb526e2f312","imageAltText":"bittrex.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"bittrex.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Bittrex","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fbittrex.com\u002F","url":"https:\u002F\u002Fbittrex.com\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d34c5786-4ede-4b4d-9072-8fd3602c2e20\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: not enough ratings\u003C\u002Fli\u003E\u003Cli\u003EFree crypto: No\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 10+\u003C\u002Fli\u003E\u003Cli\u003EWallet: No\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESpread:&nbsp;\u003Ca href="https:\u002F\u002Fwww.coindesk.com\u002Findexes\u002Fxbx" target="_blank"\u003EXBX\u003C\u002Fa\u003E + 2%\u003C\u002Fli\u003E\u003Cli\u003EBuy order commission fee: Up to 3.9%\u003C\u002Fli\u003E\u003Cli\u003ESell order commission fee: 0.1% to 0.9%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EPayment fees when buying crypto\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDebit\u002Fcredit cards: Additional 5% "momentum" fee\u003C\u002Fli\u003E\u003Cli\u003ESEPA bank transfer fee: £0\u003C\u002Fli\u003E\u003Cli\u003ESWIFT bank transfer: £0 over $1,000, £20 under $1,000\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EWithdrawal fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EWithdrawal: $0\u003C\u002Fli\u003E\u003Cli\u003EAdditional sell fee: 0.1-0.9%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECoinmama, the exchange with the best name we've seen, was founded by Nimrod Gruber (also the best founder name we've seen), is registered in Slovakia and operates out of Israel.\u003C\u002Fp\u003E\u003Cp\u003EThe exchange's most obvious benefit is the ease of transferring fiat currency (i.e., dollars or euros) into and out of the exchange. The firm accepts not only debit cards, but credit cards and even Apple Pay.\u003C\u002Fp\u003E\u003Cp\u003ECoinmama is more of a reseller than an exchange. You can't use one cryptocurrency to buy another. Instead, if you want to buy a currency, you have to use fiat money. The same is true of selling a currency. So if you want to use your Bitcoin to buy Ethereum, you'll first need to sell your Bitcoin and get dollars or euros, then spend those dollars or euros to buy the Etherium.\u003C\u002Fp\u003E\u003Cp\u003EWhen you add up the spread fee percentage plus the sell fee percentage, you get a fee basis that's higher than Coinbase, which has among the highest fees we've seen. You can lower those fees a bit by being what Coinmama calls Curious, Enthusiast, or Believer, a&nbsp;\u003Ca href="https:\u002F\u002Fwww.coinmama.com\u002Fblog\u002Fintroducing-coinmama-loyalty\u002F" target="_blank"\u003Eloyalty discount\u003C\u002Fa\u003E based on your trading volume over both a rolling 90-day period and lifetime on Coinmama.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBest name evar!\u003C\u002Fli\u003E\u003Cli\u003EAccepts credit and debit cards, plus Apple Pay\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EVery few currencies comparative to other exchanges\u003C\u002Fli\u003E\u003Cli\u003EFlat fee could get expensive\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Coinmama\" data-superlative=\"Accepts credit and debit cards, plus Apple Pay\" data-imagegroup=\"{"alt":"coinmama.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"c3fc8e3d-60d9-41bd-90f1-d5ef588a5b3b","title":"coinmama","filename":"coinmama.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002Fc3fc8e3d-60d9-41bd-90f1-d5ef588a5b3b\u002Fcoinmama.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":371459,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:51:59","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:52:01","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"coinmama.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"c3fc8e3d-60d9-41bd-90f1-d5ef588a5b3b","imageAltText":"coinmama.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"coinmama.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Coinmama","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.coinmama.com\u002F?locale=en","url":"https:\u002F\u002Fwww.coinmama.com\u002F?locale=en"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9343774d-351f-4f4e-ba75-c73837ba3c25\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EOverview\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview average: not enough ratings\u003C\u002Fli\u003E\u003Cli\u003EFree crypto: Get $50 when you buy $1,000 worth of crypto\u003C\u002Fli\u003E\u003Cli\u003ENumber of currencies: 14\u003C\u002Fli\u003E\u003Cli\u003EWallet: Yes\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ETrading fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ETrading fee: 0.75% to 2.9% based on the spread between bid and ask\u003C\u002Fli\u003E\u003Cli\u003EConversion (currency to currency) fee: 0.1%\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EPayment fees when buying crypto\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDeposit fee: $0\u003C\u002Fli\u003E\u003Cli\u003EAdditional fees: Extra fee for deposting non-USD currency\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EWithdrawal fees\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EWithdrawal: $0\u003C\u002Fli\u003E\u003Cli\u003EAdditional fees: Extra fee for withdrawing in non-USD currency\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EOne of the most interesting features of eToro is its "practice trading account," which allows you to game trading and get used to the process before risking actual money. Another interesting feature is eToro's CopyTrade option, which allows you to automatically run trades based on the actions of top traders on the platform. Essentially, you can put your trading on autopilot, and as long as the trader you're mimicking is making smart moves, so will you.\u003C\u002Fp\u003E\u003Cp\u003EBe aware that there are some built-in delays getting started with eToro. Every incoming deposit is put on hold for 7 days. Transfers can then take another 3 days, so you're looking at 10 days before you're actually in the money, er, crypto. This also applies to wired-in funds as well, which can also take up to 7 days to hit your account.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EAbility to mimic successful traders automatically\u003C\u002Fli\u003E\u003Cli\u003EPractice trading account\u003C\u002Fli\u003E\u003Cli\u003EThe best Baldwin\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EComparatively high trading fees\u003C\u002Fli\u003E\u003Cli\u003ECredit\u002Fdebit cards not accepted\u003C\u002Fli\u003E\u003Cli\u003EBaked-in delays on top of baked-in delays\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"eToro\" data-superlative=\"Automatically mimic successful traders (and there's Alex Baldwin)\" data-imagegroup=\"{"alt":"etoro.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"b21ce77c-1178-47da-b8d7-b09c030a1c22","title":"etoro","filename":"etoro.png","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F06\u002F17\u002Fb21ce77c-1178-47da-b8d7-b09c030a1c22\u002Fetoro.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":671407,"width":1200,"height":900,"dateCreated":{"date":"2021-06-17 05:56:24","timezone":"UTC"},"dateUpdated":{"date":"2021-06-17 05:56:27","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"etoro.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"b21ce77c-1178-47da-b8d7-b09c030a1c22","imageAltText":"etoro.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"etoro.png","imageDateCreated":"2021\u002F06\u002F17","imageWidth":1200,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5142a758-fb42-4153-b31e-ca59888a5be4\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile exchanges are not banks, they all have one very bankerly philosophy: whether or not you make money, the banker always wins. In this case, the exchanges make money through a wide range of fees attached to just about everything. For example, there's the spread fee. If you buy cryptocurrency, you'll pay a bit more than the asking price. If you sell cryptocurrency, you'll get a bit less than market price. That bit more or bit less is the spread.\u003C\u002Fp\u003E\u003Cp\u003EOn top of the actual purchase fees are the fees you pay to bring real world money (called stablecoin in crypto vernacular) into the exchange. These include&nbsp;\u003Ca href="https:\u002F\u002Fwww.investopedia.com\u002Fach-transfers-what-are-they-and-how-do-they-work-4590120" target="_blank"\u003EACH transfers\u003C\u002Fa\u003E, wire transfers, use of the exchange's wallet, and debit and credit card fees (although most exchanges only accept debit cards).\u003C\u002Fp\u003E\" data-hed=\"How much does it cost to trade crypto currency?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6b9269de-8b68-467d-9e70-b3a8d14d79ba\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany of the reviewers we explored during our literature review made claims about the security of the various exchanges. Over the past year,&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F2020s-worst-cryptocurrency-breaches-thefts-and-exit-scams\u002F" target="_blank"\u003Ethere has been a constant series of hacks of exchanges, accounts, and crypto-related activities\u003C\u002Fa\u003E. We do not feel that we have anywhere near enough information to declare one exchange more secure than another (and, quite honestly, don't feel that any reviewer has enough information to make any claims).\u003C\u002Fp\u003E\u003Cp\u003EAs such, we're not reporting that one exchange is more secure than another, or this or that exchange has not been hacked (because they may have been, but not reported it). This is definitely an area where caveat emptor is in full effect. Be careful, young Padawan. Be very, very careful.\u003C\u002Fp\u003E\" data-hed=\"How secure are crypto exchanges?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"685a7166-89dc-429f-bdb2-c108a5c28f2e\" data-edition=\"us\" data-description=\"\u003Cp\u003ELook, crypto investing isn't for everyone. Almost everything about the process, once you think about the real money implications, should invoke a sense of caution and care, if not some crystalized dread. Much of the terminology and mechanisms behind crypto trading is complex and arcane, so it's very possible to lose your shirt.\u003C\u002Fp\u003E\u003Cp\u003EThat said, the exchanges we're spotlighting here seem to be some of the best out there, at least according to other outlets that examined them in some detail.\u003C\u002Fp\u003E\u003Cp\u003EPersonally, most of my digital currency holdings are in World of Warcraft gold, and even that has some market value. If you want 5,000 WoW gold coins,&nbsp;\u003Ca href="https:\u002F\u002Fwww.mulefactory.com\u002Fcheap_wow_bc_classic_gold_for_sale\u002F" target="_blank"\u003Eyou can buy it&nbsp;\u003C\u002Fa\u003Efor about $400. I didn't buy my gold. Instead, years ago when I had more time to play video games, I farmed (the WoW equivalent of crypto mining) it in game.\u003C\u002Fp\u003E\u003Cp\u003EWhy do I keep bringing all this back to fake money in a video game? Because, fundamentally, all these cryptocurrencies we've been talking about are also fake money in a digital space. The value of crypto exists solely because enough people decided it has value -- and that value can vanish the minute people lose faith.\u003C\u002Fp\u003E\u003Cp\u003EBut isn't that also true of so-called real money? Most of us have paper in our wallets or a number on a website that represents our cash holdings. Our real money has value because we choose to accept it for goods and services. So, it's entirely possible that, as time moves on, more and more sellers will accept certain cryptocurrencies in return for their goods and services.\u003C\u002Fp\u003E\u003Cp\u003EFor now, though, just be careful.\u003C\u002Fp\u003E\" data-hed=\"How risky is crypto investment?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"a64178b9-8d32-4816-9593-583351c8c95f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fa64178b9-8d32-4816-9593-583351c8c95f\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003E \tThe sites we used as source material \u003C\u002Fh2\u003E\u003Cp\u003EThese are the sites we used in researching and assembling the data in this article: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EInvestopedia:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.investopedia.com\u002Fbest-crypto-exchanges-5071855\" target=\"_blank\"\u003EBest crypto exchanges\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EForbes:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.forbes.com\u002Fadvisor\u002Finvesting\u002Fbest-crypto-exchanges\u002F\" target=\"_blank\"\u003EBest crypto exchanges of 2021\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGuru99:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.guru99.com\u002Fbest-cryptocurrency-exchanges.html\" target=\"_blank\"\u003ETop 15 BEST Crypto Exchanges & Trading Platforms in 2021\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EBitDegree:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.bitdegree.org\u002Fcrypto\u002F\" target=\"_blank\"\u003EBest Crypto Exchange Reviews of 2021\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThe College Investor:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fthecollegeinvestor.com\u002F21245\u002Ftop-10-bitcoin-crypto-investing-sites\u002F\" target=\"_blank\"\u003EThe Top 10 Bitcoin And Crypto Investing Sites\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EMiami Herald:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.miamiherald.com\u002Findulge\u002Farticle250836074.html\" target=\"_blank\"\u003E8 Best Crypto Exchanges For Altcoins Bitcoin, ETH, and More: Top Cryptocurrency Trading Platforms Reviewed\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EWhat about you? Have you invested in crypto? Do you plan to in the future? Share your thoughts and experiences (and advice, if you have any) below. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"aa46de76-899f-4423-83b7-a891c88392d8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Faa46de76-899f-4423-83b7-a891c88392d8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003EYou can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fdavidgewirtz\"\u003E@DavidGewirtz\u003C\u002Fa\u003E, on Facebook at \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fdavidgewirtz\"\u003EFacebook.com\u002FDavidGewirtz\u003C\u002Fa\u003E, on Instagram at \u003Ca href=\"https:\u002F\u002Fwww.instagram.com\u002FDavidGewirtz\u002F\"\u003EInstagram.com\u002FDavidGewirtz\u003C\u002Fa\u003E, and on YouTube at \u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FDavidGewirtzTV\"\u003EYouTube.com\u002FDavidGewirtzTV\u003C\u002Fa\u003E.\u003C\u002Fem\u003E \u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-06-17 12:44:00",timezone:"UTC",updated:c,published:c},description:"We can't recommend which exchanges are the best or safest (our lawyers won't let us) but we have explored some of the leading exchanges to help you learn about the pros and cons of each.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"479310ba-3969-45c7-975b-42e99b2b48e1",image:{id:"1d029b40-5526-4579-88ee-39752971899a",filename:"crytpo-exchanges.jpg",dateCreated:{created:c,date:"2021-06-17 12:00:03",timezone:"UTC",updated:c,published:c},alt:"crytpo-exchanges.jpg",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F06\u002F17\u002F1d029b40-5526-4579-88ee-39752971899a\u002Fcrytpo-exchanges.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Finance^Blockchain",relatedItems:[]},name:b,promoTitle:"Top crypto exchanges: The ones you need to know",section:b,slug:"best-crypto-exchange",startYear:c,summary:b,title:"Top crypto exchange 2022: The exchanges to know",topic:{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"101518dd-ec91-11e3-95d2-02911863765e",slug:"cloud",name:"Cloud",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EIf you're carrying unencrypted data around with you, then you should stop doing that. The consequences of losing data can range from embarrassing to damaging to potentially opening up your company to legal headaches.\u003C\u002Fp\u003E\u003Cp\u003EBut encrypting data on external drives used to be a pain. You had to run an application and sometimes that wouldn't work on certain platforms, and it all would quickly turn into a big hassle.\u003C\u002Fp\u003E\u003Cp\u003EBut those days are over. A drive like the new \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"14000367-438b-4a2b-962b-80576148f0e0\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FKingston-Encrypted-Protection-IKVP80ES-1920G\u002Fdp\u002FB0B1W53S3X\u002F\" data-link-shortcode-text=\"Kingston IronKey Vault Privacy 80 SSD\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E makes encrypting your data super easy.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"dce93159-4b54-444c-8d25-1ff00cbe7e5e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EKingston IronKey Vault Privacy 80 SSD\u003C\u002Fp\u003E\" data-image-alt-text=\"Kingston IronKey Vault Privacy 80 SSD\" data-image-filename=\"img-6626.jpg\" data-image-date-created=\"2022\u002F06\u002F13\" data-image-width=\"1296\" data-image-height=\"972\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a5eb6c5d-9808-4d21-84cc-93ee4e872ec1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EWhat's in the box\u003C\u002Fp\u003E\" data-image-alt-text=\"What's in the box\" data-image-filename=\"img-6628.jpg\" data-image-date-created=\"2022\u002F06\u002F13\" data-image-width=\"1296\" data-image-height=\"972\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe SSD looks like any regular SSD, expect it has a screen. Actually, it's a touchscreen, and you use this to input your passcode and also change the settings in the drive.\u003C\u002Fp\u003E\u003Cp\u003EIt really makes using the drive a snap. In fact, this is one of the easiest to use encrypted SSDs I've ever used. The setup took seconds -- basically inputting my secret passcode -- and it was ready for data.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b8b27919-ac75-4b6f-814a-e006ce737286\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ESetup was quick and simple\u003C\u002Fp\u003E\" data-image-alt-text=\"Setup was quick and simple\" data-image-filename=\"img-6634.jpg\" data-image-date-created=\"2022\u002F06\u002F13\" data-image-width=\"1296\" data-image-height=\"972\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5bcfb340-7b9a-44a2-bcbf-4bd137a88b2d\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003EXTS-AES 256-bit hardware encryption\u003C\u002Fli\u003E\u003Cli\u003EFIPS 197 certified\u003C\u002Fli\u003E\u003Cli\u003EUnique intuitive touchscreen\u003C\u002Fli\u003E\u003Cli\u003EMulti-password (admin\u002Fuser) option with PIN and Passphrase modes\u003C\u002Fli\u003E\u003Cli\u003EConfigurable password rules\u003C\u002Fli\u003E\u003Cli\u003EDual read-only (write protected) modes for malware protection\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Kingston IronKey Vault Privacy 80 SSD highlights\" data-imagegroup=\"{"alt":"img-6637","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"dfdb218e-857c-4722-b210-2a75b2a3bf85","title":"img-6637","filename":"img-6637.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F13\u002Fdfdb218e-857c-4722-b210-2a75b2a3bf85\u002Fimg-6637.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":277009,"width":1296,"height":972,"dateCreated":{"date":"2022-06-13 14:12:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-13 14:12:45","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"img-6637","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"dfdb218e-857c-4722-b210-2a75b2a3bf85","imageAltText":"img-6637","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-6637.jpg","imageDateCreated":"2022\u002F06\u002F13","imageWidth":1296,"imageHeight":972,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Amazon","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FKingston-Encrypted-Protection-IKVP80ES-1920G\u002Fdp\u002FB0B1W53S3X\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe drive is powered using USB, so there's no battery to charge up or wear out, and it comes with a USB-C to USB-C and USB-C to USB-A cable (and a nice neoprene carry case).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a4cfe74b-531d-48e4-96fe-e41ea23c693d\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe drive is super-simple to use thanks to the touchscreen display\u003C\u002Fp\u003E\" data-image-alt-text=\"The drive is super-simple to use thanks to the touchscreen display\" data-image-filename=\"img-6642.jpg\" data-image-date-created=\"2022\u002F06\u002F13\" data-image-width=\"1296\" data-image-height=\"972\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EData on the drive is protected using XTS-AES 256-bit hardware encryption, and the drive is certified FIPS 197. It offers built-in protection against attacks such as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\u002F\" target=\"_blank\"\u003EBadUSB\u003C\u002Fa\u003E, as well as brute force attacks.\u003C\u002Fp\u003E\u003Cp\u003ESpeeds for the drive are rated at around 250MB\u002Fs and I was able to get close to 230MB\u002Fs in testing.\u003C\u002Fp\u003E\u003Cp\u003EThe drive is packed with some really nice features, such as a randomized on-screen keyboard (so finger smudges don't give away your passcode), a read-only mode to prevent data (or malware) being written to the drive, and automatic timeout.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"ec2308d5-537d-4295-b710-fd19bc525d72\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EHighly configurable\u003C\u002Fp\u003E\" data-image-alt-text=\"Highly configurable\" data-image-filename=\"img-6638.jpg\" data-image-date-created=\"2022\u002F06\u002F13\" data-image-width=\"1296\" data-image-height=\"972\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe drive also features a cool admin mode to set up security options, such as configuring password requirements by setting the maximum number of shared attempts, minimum password length of 6-64 characters, as well as alphanumeric password rules. The drive also allows you to use the \"space\" character, making it easier to use a memorable quote or lyrics from a favorite song as your passcode.\u003C\u002Fp\u003E\u003Cp\u003EI can't fault the Kingston IronKey Vault Privacy 80. It's an excellent way to secure your data when out and about. \u003C\u002Fp\u003E\u003Cp\u003EThe \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4891d09c-2a80-4057-aae6-16c7835b2d3a\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FKingston-Encrypted-Protection-IKVP80ES-1920G\u002Fdp\u002FB0B1W53S3X\u002F\" data-link-shortcode-text=\"Kingston IronKey Vault Privacy 80\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E is offered in 480GB, 960GB, and 1920GB.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-13 16:16:52",timezone:"UTC",updated:c,published:c},description:"The days where people carry unencrypted data around with them need to come to an end.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"4b3137f3-4a46-4988-93dc-7e512560291f",image:{id:"dfdb218e-857c-4722-b210-2a75b2a3bf85",filename:"img-6637.jpg",dateCreated:{created:c,date:"2022-06-13 14:12:41",timezone:"UTC",updated:c,published:c},alt:"img-6637",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F13\u002Fdfdb218e-857c-4722-b210-2a75b2a3bf85\u002Fimg-6637.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:972,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Innovation^Computing^Storage",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"secure-your-data-like-james-bond-with-the-kingston-ironkey-vault-privacy-80",startYear:c,summary:b,title:"Secure your data like James Bond with the Kingston IronKey Vault Privacy 80",topic:{id:"11601750-ec91-11e3-95d2-02911863765e",slug:"storage",name:"Storage",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"11601750-ec91-11e3-95d2-02911863765e",slug:"storage",name:"Storage",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"9a23272b-10d6-11e4-9732-00505685119a",username:"David Gewirtz",profileUrl:c,email:c,firstName:"David",lastName:"Gewirtz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"de4475ef-be59-4858-beb8-6f7696c85945",filename:"david-gewirtz.jpg",dateCreated:{created:c,date:"2022-08-05 15:19:52",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fde4475ef-be59-4858-beb8-6f7696c85945\u002Fdavid-gewirtz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"In addition to hosting the ZDNET Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.\r\n\r\nDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EThere are really only a few ways to make money from cryptocurrency. You can buy it, making a profit when you eventually sell it. You can mine it and make enough coins to make a profit when you eventually sell it. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"ba897fe6-2f92-4fbd-aab9-48162b509e96\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fba897fe6-2f92-4fbd-aab9-48162b509e96\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou can run a cryptocurrency exchange and make a profit from every transaction. You can even invent your own cryptocurrency and make money when your idea eventually grows big enough to make a profit. \u003C\u002Fp\u003E\u003Cp\u003EWhat have I left out? Ah, yes. The risks and the costs. \u003C\u002Fp\u003E\u003Cp\u003EYou can buy cryptocurrency, but you'll only make a profit if the currency's value goes up -- and goes up enough to exceed the fees involved in buying and selling. Whether or not that happens is anyone's guess. It's very similar to buying stocks. Safe bets don't necessarily net big returns, but high-risk bets can cause you to lose your shirt.\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-single-most-important-thing-you-need-to-know-about-bitcoin-ethereum-and-all-those-hot\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003ECryptocurrency comes with one colossal caveat: Remember the tulips\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003EYou can mine cryptocurrency, but there's a cost to the mining rigs and an even greater cost in electricity and cooling. If you're just using a spare computer during its idle time, you're never going to make enough for it to be worth the time and effort. But if you dedicate machines or an entire facility, the cost in hardware and power may exceed the value of the coin you mine. \u003C\u002Fp\u003E\u003Cp\u003EYou can set up an exchange, but there's an enormous level of effort to build in the infrastructure and security, as well as the marketing necessary to be accepted as the crypto equivalent of a bank. It's not an easy task. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"8b0236d9-9285-434a-a0e7-a7befab1c418\" data-edition=\"us\" data-hed=\"ZDNet Recommends: Kaspersky -- Total Security\" data-imagegroup=\"{"alt":"kaspersky-total-security-2021-best-antivirus-software-review.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"ab5e0e32-ca5c-475e-9e75-a983d9802e74","filename":"kaspersky-total-security-2021-best-antivirus-software-review.png","path":"https:\u002F\u002Fimage-resizer.prod.zdnet.com\u002Fi\u002F2021\u002F02\u002F03\u002Fab5e0e32-ca5c-475e-9e75-a983d9802e74\u002Fkaspersky-total-security-2021-best-antivirus-software-review.png","dateCreated":{"date":"2021-02-03 17:16:07","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"ab5e0e32-ca5c-475e-9e75-a983d9802e74","imageFilename":"kaspersky-total-security-2021-best-antivirus-software-review.png","imageDateCreated":"2021\u002F02\u002F03"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fusa.kaspersky.com\u002Ftotal-security?CJEVENT=6b405927746911ec83e8008b0a18050e\" data-offerprice=\"49\" data-offermerchant=\"Kaspersky\" data-monetizedurl=\"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-3586864-11744984-1631118503000?sid=[subid_value]\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou could create your own coin and hope investors jump on it as a bandwagon. Generally, unless you have someone \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-hyperscalers-will-allay-musks-bitcoin-energy-consumption-worries\u002F\" target=\"_blank\"\u003Eas high profile as Elon Musk touting it,\u003C\u002Fa\u003E you're probably not going to reach critical mass. \u003C\u002Fp\u003E\u003Cp\u003EBut what if there was a risk-free way to make big crypto profits? Scammers and criminals, it turns out, have figured out a way. They've created malware that does crypto mining when placed on an unsuspecting user's computer. The scammers don't have to spend on energy or gear. All that is paid for by their victims. The criminals need to rake in the profits from selling coins they spent nothing to gather. \u003C\u002Fp\u003E\u003Cp\u003EFortunately, antivirus and anti-malware products like Norton 360 scan for crypto-mining malware. So if you don't want your machine's cycles sucked away by a criminal enterprise, invest in a subscription to Norton's service, and your PC will be crypto-mining free... or... wait... what? \u003C\u002Fp\u003E\u003Ch2\u003E We're about to split some very ugly hairs here \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e15d46f0-8970-4563-9219-a6569bd82690\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe15d46f0-8970-4563-9219-a6569bd82690\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-new-surprise-feature-for-norton-360-antivirus-users-you-can-mine-for-cryptocurrency\u002F\" target=\"_blank\"\u003EWe covered this\u003C\u002Fa\u003E last summer. When you install Norton 360, you also install a program called NCrypt.exe in the program's Windows directory. Recently, the Verge did \u003Ca href=\"https:\u002F\u002Fwww.theverge.com\u002F2022\u002F1\u002F7\u002F22869528\u002Fnorton-crypto-miner-security-software-reaction\" target=\"_blank\"\u003Ea deep dive on how this works\u003C\u002Fa\u003E. NCrypt is an Ethereum crypto-mining application. Fortunately, and we can give slim kudos to NortonLifeLock (the company behind the software), the crypto-mining application is not automatically turned on. \u003C\u002Fp\u003E\u003Cp\u003EInstead, the installer presents a big green nag screen promising you can \"Turn your PC's idle time into cash.\" This leads to the switch that enables the crypto-miner. \u003C\u002Fp\u003E\u003Cp\u003ESo while Norton isn't running a crypto-miner without your permission, it is installing the software automatically and without prior permission. It's definitely a step up from malware vendors because you can turn the feature on and off. \u003C\u002Fp\u003E\u003Cp\u003EThat said, there's an element of \"\u003Ca href=\"https:\u002F\u002Fwww.yourdictionary.com\u002Fthe-house-always-wins\" target=\"_blank\"\u003Ethe house always wins\u003C\u002Fa\u003E\" at work here, and Norton 360 users are definitely not \"the house.\" \u003C\u002Fp\u003E\u003Ch2\u003E Norton's cynical bet \u003C\u002Fh2\u003E\u003Cp\u003EWhen Bitcoin was first introduced, its shadowy creator came up with a scheme for creating value. The idea was that as more and more coin was \"mined\" using complex computer algorithms, the computer overhead would increase. In other words, it took more computer work and power to mine the 100th Bitcoin than the 10th. \u003C\u002Fp\u003E\u003Cp\u003EToday, mining popular currencies like Bitcoin and Ethereum takes tremendous processing power. You could take all the spare cycles of your desktop computer and run it every night for a year and make less than $250. \u003C\u002Fp\u003E\u003Cp\u003EWhile an extra $250 is nothing to sneeze at, the gotcha is that it will cost at least that much in electricity. In fact, the Verge did a mining test using NCrypt.exe. Their testing showed, \"In real numbers, a night of mining on an RTX 3060 Ti netted $0.66 worth of Ethereum and cost $0.66 in off-peak electricity.\" \u003C\u002Fp\u003E\u003Cp\u003EThe thing is, Norton takes 15% of all the cryptocurrency that users mine using Norton 360. I reached out to Norton's PR team to ask what percentage of Norton 360 users turn on crypto but have not yet received a response. We can assume there's a fair number. After all, the promise of \"Turn your PC's idle time into cash\" would seem pretty compelling to most users. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-bought-bitcoin-from-paypal-heres-what-happened\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EI bought Bitcoin from PayPal. Here's what happened\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003EEven if you keep your machine on all the time, it uses considerably less power than if you're running crypto-mining algorithms. \u003C\u002Fp\u003E\u003Cp\u003EWith that, let's deconstruct Norton's cynical bet. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"b696bc2e-5ec9-4d59-963f-e526236a98ee\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fb696bc2e-5ec9-4d59-963f-e526236a98ee\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EMost users will lose a considerable amount in terms of power expense and wear and tear on their machines because even though the mining and power costs broke even for the Verge with today's Ethereum mining overhead, it will only get more costly in terms of calculation effort and power over time. \u003C\u002Fp\u003E\u003Cp\u003ENorton also doesn't release the Ethereum sliver unless a user reaches a minimum threshold, and that could take a very long time. Then, and only then, can the user transfer the Norton-mined Ethereum to Coinbase, and both the transfer and the sale of the transferred Ethereum will also result in fees. \u003C\u002Fp\u003E\u003Cp\u003ENorton has to know that most users won't make any money. In fact, they have to know that most users will lose money, never actually derive any value, and never take the step to move that tiny little bit of mined Ethereum to Coinbase. Norton has to know that what it's really doing is almost the same as malware vendors: using unsuspecting users' gear and power to mine coin, from which Norton takes a no-way-to-lose 15% cut. \u003C\u002Fp\u003E\u003Cp\u003ENorton is cynically betting that most of its users are too unsophisticated to do the analysis. Norton is also cynically betting that most users will respond positively to an offer that appears to be easy money. \u003C\u002Fp\u003E\u003Cp\u003ESo not only does Norton charge \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"087b39b0-f03c-4932-be92-1e675e6fbe90\" data-raw-url=\"https:\u002F\u002Fus.norton.com\u002Fproducts\" data-link-shortcode-text=\"$50 to $250 a year for Norton 360\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E (the price goes up in subsequent years, because of course it does), they're betting that users will spend another $200+ a year on electricity based on the promise of turning \"your PC's idle time into cash.\" \u003C\u002Fp\u003E\u003Cp\u003EThat's just cold. \u003C\u002Fp\u003E\u003Ch2\u003E Too juicy a scheme \u003C\u002Fh2\u003E\u003Cp\u003EI think Norton has unleashed a very dangerous and very disturbing genie here. Because while Norton is an early player in the bundled crypto-mining game, they sure won't be the last. \u003C\u002Fp\u003E\u003Cp\u003EShaving 15% in profits off the top, using users' power and gear to do all the work and pay all the expenses, is just too promising a scheme for other companies to avoid. \u003C\u002Fp\u003E\u003Cp\u003EWithout a doubt, expect a darker future where technology vendors embed crypto-miners in their code. The more up-and-up companies may give users the option to opt-in or opt-out, while the less aboveboard businesses are likely just to embed their own mining code and hope nobody calls them out. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fin-just-a-week-my-bitcoin-investment-plummeted-by-almost-14\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EIn just a week, my Bitcoin 'investment' plummeted by almost 14%\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003EHow many connected devices are there out there? How many smart bulbs, smart microwaves, anti-malware software suites, smartphone apps, and games -- oh, you can definitely expect this crap from game makers -- how many will embed mining software into their programs and sleeze that 15% off the top? \u003C\u002Fp\u003E\u003Cp\u003EMark my words. Cryptocurrency mined using increasing processor work algorithms is a pox on humankind. \u003C\u002Fp\u003E\u003Cp\u003EGo ahead, comment below. Crypto fans, tell me why being a crypto-miner will make you rich and cool. You know you want to. Go ahead. Thoughtful folks, please feel free to weigh in on the implications of this kind of scheme. Voices of reason are welcome, too. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGlmcmFtZSBzcmM9Imh0dHBzOi8vb3Blbi5zcG90aWZ5LmNvbS9lbWJlZC9lcGlzb2RlLzQ0aUdNMG5ERlNWV1JDRzFYT3IxTGk\u002FdXRtX3NvdXJjZT1nZW5lcmF0b3IiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjIzMiIgZnJhbWVCb3JkZXI9IjAiIGFsbG93ZnVsbHNjcmVlbj0iIiBhbGxvdz0iYXV0b3BsYXk7IGNsaXBib2FyZC13cml0ZTsgZW5jcnlwdGVkLW1lZGlhOyBmdWxsc2NyZWVuOyBwaWN0dXJlLWluLXBpY3R1cmUiPjwvaWZyYW1lPg==\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EDisclosure: \u003C\u002Fstrong\u003ENortonLifeLock was previously known as Symantec. Back in the days of wooden computers and iron programmers, a way, way, waaay long time ago, I was an executive at Symantec.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003EYou can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fdavidgewirtz\"\u003E@DavidGewirtz\u003C\u002Fa\u003E, on Facebook at \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fdavidgewirtz\"\u003EFacebook.com\u002FDavidGewirtz\u003C\u002Fa\u003E, on Instagram at \u003Ca href=\"https:\u002F\u002Fwww.instagram.com\u002FDavidGewirtz\u002F\"\u003EInstagram.com\u002FDavidGewirtz\u003C\u002Fa\u003E, and on YouTube at \u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FDavidGewirtzTV\"\u003EYouTube.com\u002FDavidGewirtzTV\u003C\u002Fa\u003E.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"aa46de76-899f-4423-83b7-a891c88392d8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Faa46de76-899f-4423-83b7-a891c88392d8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-01-13 13:18:00",timezone:"UTC",updated:c,published:c},description:"Anti-malware vendors are taking a page from the malware makers they're supposed to be policing. What if all software vendors decide to embed crypto-miners and skim the profits?",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"7448035c-4d73-453f-b535-9b052abd319c",image:{id:"9eafb7e5-f1f9-4369-a375-256b197f5a21",filename:"shutterstock-1732038682.jpg",dateCreated:{created:c,date:"2022-01-13 13:16:30",timezone:"UTC",updated:c,published:c},alt:"abstract highway path through digital binary towers in city.",credits:"shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F01\u002F13\u002F9eafb7e5-f1f9-4369-a375-256b197f5a21\u002Fshutterstock-1732038682.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Finance",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"nortons-cynical-crypto-ploy-a-dark-harbinger-of-crapware-to-come",startYear:c,summary:b,title:"Norton's cynical crypto ploy: A dark harbinger of crapware to come?",topic:{id:"87ec6ace-0121-41fb-b122-922dab341f69",slug:"finance",name:"Finance",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"87ec6ace-0121-41fb-b122-922dab341f69",slug:"finance",name:"Finance",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"97e448d5-eecb-4b4e-9e00-04cef3eaaaa4",username:"scondon1",profileUrl:c,email:c,firstName:"Stephanie",lastName:"Condon",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"bca73539-dbd2-46c5-8de4-f286b3d3e73b",filename:"stephanie-condon.jpg",dateCreated:{created:c,date:"2022-08-05 14:37:33",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fbca73539-dbd2-46c5-8de4-f286b3d3e73b\u002Fstephanie-condon.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Stephanie Condon is a staff writer for Red Ventures based in Portland, Oregon, covering business technology for ZDNET. She previously covered politics for CBSNews.com, as well as the intersection of technology and politics for CNET. Stephanie graduated with a B.A. in communication from Stanford University.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ELeveraging its threat analysis team's expertise and broad visibility, VMware's Carbon Black is rolling out a new service that helps organizations respond and contain cybersecurity threats or breaches. \u003C\u002Fp\u003E\u003Cp\u003EThe new \u003Ca href=\"https:\u002F\u002Fnews.vmware.com\u002Freleases\u002Fmanaged-detection-response\"\u003ECarbon Black Cloud Managed Detection and Response (MDR)\u003C\u002Fa\u003E for endpoints and workloads is supported by analysts with decades of experience. They monitor and analyze data for customers in the VMware Carbon Black Cloud using advanced machine learning and algorithmic toolsets. \u003C\u002Fp\u003E\u003Cp\u003EThe threat analysis team \"has not only expertise derived over many years but also the ability to watch the threat landscape over a broad spectrum,\" Kal De, VP and GM of VMware's Security Business Unit, said to \u003Cem\u003EZDNet\u003C\u002Fem\u003E. \"We have approximately a million endpoints under active monitoring at any given point in time... versus an individual [at a customer organization] -- their visibility is limited to what's happening in their particular environment.\"\u003C\u002Fp\u003E\u003Cp\u003EThe new offering builds on the managed detection capabilities Carbon Black has offered since 2017. Now, if there's an incident, analysts can proactively reach out to the affected customer and initiate a two-way conversation. They'll respond to questions regarding alerts and offer recommendations for policy changes customers can take to remediate the threat. Analysts can maintain visibility on a compromised endpoint even after isolating and securing it, and they'll continue communications until the threat is contained. \u003C\u002Fp\u003E\u003Cp\u003EMDR analysts provide around-the-clock monitoring, which Carbon Black says will help reduce security staffing pressures.\u003C\u002Fp\u003E\u003Cp\u003E\"What we're trying to do is combine machine intelligence with expert eyes that can offer a much higher degree of accuracy in responding to the signal quickly and effectively,\" De said. Compared to competing for security products, he said Carbon Black offers a \"much more unified boots on ground, human response.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-12-01 13:00:02",timezone:"UTC",updated:c,published:c},description:"With the new Managed Detection and Response solution, Carbon Black analysts will help security teams detect threats and respond to them.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"e526694f-3a43-41f9-8ae1-0070d57ee1ef",image:{id:"6f2cd5c4-0b1c-412c-82e9-176e9a8637f1",filename:"vmware-using-carbon-black-to-secure-the-5f7fbaf893eaa218d73901d1-1-oct-09-2020-4-42-50-poster.jpg",dateCreated:{created:c,date:"2020-10-09 04:43:33",timezone:"UTC",updated:c,published:c},alt:"vmware-using-carbon-black-to-secure-the-5f7fbaf893eaa218d73901d1-1-oct-09-2020-4-42-50-poster.jpg",credits:"Shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2020\u002F10\u002F09\u002F6f2cd5c4-0b1c-412c-82e9-176e9a8637f1\u002Fvmware-using-carbon-black-to-secure-the-5f7fbaf893eaa218d73901d1-1-oct-09-2020-4-42-50-poster.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:960,height:540,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"vmwares-carbon-black-offers-more-analyst-assistance-to-respond-to-attacks",startYear:c,summary:b,title:"VMware's Carbon Black offers more analyst assistance to respond to attacks",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"11dd6fac-ec91-11e3-95d2-02911863765e",slug:"vmware",name:"VMWare",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EMacs are true workhorses, but as is the case with every computer, detritus builds up, filling storage space, and turning a once-speedy system sluggish. With a little bit of care and feeding, a Mac can run at its best for longer. Also, depending on what you use your Mac for, having a suite of tools and utilities that can carry out useful tasks with a click of a button is super handy.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"dded23b9-319f-4f47-9efd-b255a49536bd\" data-edition=\"us\" data-description=\"\u003Cp\u003EMy absolute favorite Mac utility. One click allows you to find junk files, scan my system for threats, and look for ways to speed up my system. Then, with another click, all those tasks are carried out, quickly, efficiently, and safely. It's a great product that gets regular and timely updates, and a tool that's helped me keep many Macs running smoothly for years. Highly recommended!\u003C\u002Fp\u003E\" data-hed=\"CleanMyMac X\" data-imagegroup=\"{"alt":"CleanMyMac X","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"f8300c3d-fdb6-4996-a3e1-e413c86a7fca","title":"best-mac-cleaner-app-1-cleanmymac-x","filename":"best-mac-cleaner-app-1-cleanmymac-x.jpg","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F03\u002F09\u002Ff8300c3d-fdb6-4996-a3e1-e413c86a7fca\u002Fbest-mac-cleaner-app-1-cleanmymac-x.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":344022,"width":1600,"height":1069,"dateCreated":{"date":"2021-03-09 17:30:54","timezone":"UTC"},"dateUpdated":{"date":"2021-03-09 17:30:55","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-mac-cleaner-app-1-cleanmymac-x.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"f8300c3d-fdb6-4996-a3e1-e413c86a7fca","imageAltText":"CleanMyMac X","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"best-mac-cleaner-app-1-cleanmymac-x.jpg","imageDateCreated":"2021\u002F03\u002F09","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"MacPaw","offerPrice":"34","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fmacpaw.audw.net\u002Fc\u002F159047\u002F66209\u002F1733?u=https:\u002F\u002Fmacpaw.com\u002Fstore\u002Fcleanmymac&subid1=[subid_value]&sharedId=zdnet","url":"https:\u002F\u002Fmacpaw.audw.net\u002Fc\u002F159047\u002F66209\u002F1733?u=https:\u002F\u002Fmacpaw.com\u002Fstore\u002Fcleanmymac&subid1=[subid_value]&sharedId=zdnet"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"de3c101b-671b-4bfd-8854-bd1dfe0ce94f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are a lot of tools that claim to be able to recover your data when your disk fails.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDiskWarrior is the only one I trust with that task. With one click, you can get DiskWarrior to scan your storage drive, finds all recoverable data, and then build an error-free, optimized copy for you.\u003C\u002Fp\u003E\" data-hed=\"DiskWarrior 5\" data-imagegroup=\"{"alt":"DiskWarrior 5","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"f22a72bb-4fd7-4846-9270-a503f754a608","title":"best-mac-cleaner-app-3-diskwarrior-5","filename":"best-mac-cleaner-app-3-diskwarrior-5.jpg","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F03\u002F09\u002Ff22a72bb-4fd7-4846-9270-a503f754a608\u002Fbest-mac-cleaner-app-3-diskwarrior-5.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":307992,"width":1600,"height":1069,"dateCreated":{"date":"2021-03-09 17:31:07","timezone":"UTC"},"dateUpdated":{"date":"2021-03-09 17:31:09","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-mac-cleaner-app-3-diskwarrior-5.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"f22a72bb-4fd7-4846-9270-a503f754a608","imageAltText":"DiskWarrior 5","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"best-mac-cleaner-app-3-diskwarrior-5.jpg","imageDateCreated":"2021\u002F03\u002F09","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Alsoft","offerPrice":"119","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.alsoft.com\u002Fbuy-now","url":"https:\u002F\u002Fwww.alsoft.com\u002Fbuy-now"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"871233d7-7b94-40b3-857e-66295472a71d\" data-edition=\"us\" data-description=\"\u003Cp\u003ENot a single tool, but a suite of over 30 tools, most of which are productivity and system health tools, and all of which are super easy to use. Many do their jobs with a single click.\u003C\u002Fp\u003E\u003Cp\u003ESo, what utilities are there? There's a disk cleanup tool, image resizer, video downloader, screen recorder, archiver, clipboard history tool, GIF maker, presentation mode switch, and much more. Because there are so many parts to Parallels Toolbox, I sometimes lose track of how much I use these tools every day.\u003C\u002Fp\u003E\" data-hed=\"Parallels Toolbox\" data-imagegroup=\"{"alt":"Parallels Toolbox","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"8b3450bc-1cdb-4e3f-888c-55ab9787fd97","title":"best-mac-cleaner-app-2-parallels-toolbox","filename":"best-mac-cleaner-app-2-parallels-toolbox.jpg","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F03\u002F09\u002F8b3450bc-1cdb-4e3f-888c-55ab9787fd97\u002Fbest-mac-cleaner-app-2-parallels-toolbox.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":691356,"width":1600,"height":1069,"dateCreated":{"date":"2021-03-09 17:31:18","timezone":"UTC"},"dateUpdated":{"date":"2021-03-09 17:31:19","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-mac-cleaner-app-2-parallels-toolbox.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"8b3450bc-1cdb-4e3f-888c-55ab9787fd97","imageAltText":"Parallels Toolbox","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"best-mac-cleaner-app-2-parallels-toolbox.jpg","imageDateCreated":"2021\u002F03\u002F09","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Parallels","offerPrice":"19","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002F[subid_value]\u002Fhttps:\u002F\u002Fwww.parallels.com\u002Fproducts\u002Ftoolbox\u002F","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002F[subid_value]\u002Fhttps:\u002F\u002Fwww.parallels.com\u002Fproducts\u002Ftoolbox\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bea34d4e-a618-44ae-a689-49d7b2a070ce\" data-edition=\"us\" data-description=\"\u003Cp\u003EOne of the things that can be responsible for a lot of wasted storage space is duplicate files. It's not just duplicate files that can be a problem, but also similar files. This can be especially true when it comes to photos. Gemini 2 can scan your photos, spot ones that are similar, and lets you pick which ones to keep.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Gemini 2\" data-imagegroup=\"{"alt":"Gemini 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"722fcc3c-4bf3-4e10-accb-658584c74d0e","title":"best-mac-cleaner-app-4-gemini-2","filename":"best-mac-cleaner-app-4-gemini-2.jpg","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F03\u002F09\u002F722fcc3c-4bf3-4e10-accb-658584c74d0e\u002Fbest-mac-cleaner-app-4-gemini-2.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":354648,"width":1600,"height":1069,"dateCreated":{"date":"2021-03-09 17:31:27","timezone":"UTC"},"dateUpdated":{"date":"2021-03-09 17:31:29","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-mac-cleaner-app-4-gemini-2.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"722fcc3c-4bf3-4e10-accb-658584c74d0e","imageAltText":"Gemini 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"best-mac-cleaner-app-4-gemini-2.jpg","imageDateCreated":"2021\u002F03\u002F09","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"MacPaw","offerPrice":"19","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fmacpaw.audw.net\u002Fc\u002F159047\u002F66209\u002F1733?u=https:\u002F\u002Fmacpaw.com\u002Fstore\u002Fgemini&subid1=[subid_value]&sharedId=zdnet","url":"https:\u002F\u002Fmacpaw.audw.net\u002Fc\u002F159047\u002F66209\u002F1733?u=https:\u002F\u002Fmacpaw.com\u002Fstore\u002Fgemini&subid1=[subid_value]&sharedId=zdnet"}]\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b5a4c3f3-9115-4fb6-99f7-1ee4cabadd27\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe all-in-one temperature monitoring, fan control, and diagnostics for Macs.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you're someone who makes their Mac work hard, this is a fantastic tool for tuning the cooling system for optimal performance and keeping things running at their best.\u003C\u002Fp\u003E\" data-hed=\"TG Pro\" data-imagegroup=\"{"alt":"TG Pro","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"cb729376-c856-4c8d-972c-1844a69400de","title":"best-mac-cleaner-app-5-tg-pro","filename":"best-mac-cleaner-app-5-tg-pro.jpg","path":"https:\u002F\u002Fgcp-prod-image-resizer.zdnet.com\u002Fi\u002F2021\u002F03\u002F09\u002Fcb729376-c856-4c8d-972c-1844a69400de\u002Fbest-mac-cleaner-app-5-tg-pro.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":408930,"width":1600,"height":1069,"dateCreated":{"date":"2021-03-09 17:31:35","timezone":"UTC"},"dateUpdated":{"date":"2021-03-09 17:31:37","timezone":"UTC"},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"best-mac-cleaner-app-5-tg-pro.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"typeName":"content_image"},"uuid":"cb729376-c856-4c8d-972c-1844a69400de","imageAltText":"TG Pro","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"best-mac-cleaner-app-5-tg-pro.jpg","imageDateCreated":"2021\u002F03\u002F09","imageWidth":1600,"imageHeight":1069,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Tunabelly Software","offerPrice":"10","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.tunabellysoftware.com\u002Ftgpro\u002F","url":"https:\u002F\u002Fwww.tunabellysoftware.com\u002Ftgpro\u002F"}]\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003E\u003Cstrong\u003EOther honorable mentions\u003C\u002Fstrong\u003E\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Ftrack.flexlinks.com\u002Fa.ashx?foid=1189971.A208046&foc=1&fot=9999&fos=1&url=https:\u002F\u002Fnektony.com\u002Fmac-cleaner-pro&fobs=zdnet\" target=\"_blank\"\u003E\u003Cstrong\u003EMacCleaner Pro\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E: Speed up and clean up your Mac, as well as manage your precious storage space (compatible with M1-powered Macs).\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.macbooster.net\u002Fpurchase\u002Fmacbooster8.php\" target=\"_blank\"\u003E\u003Cstrong\u003EMacBooster 8\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E: Free up space on your Mac by eradicating 20 different types of junk files from your system. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-03-09 17:46:00",timezone:"UTC",updated:c,published:c},description:"Macs are good. With these tools, you can keep them that way.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"505b9651-a780-4218-a3bd-3cce5f711142",image:{id:"83a1ab08-b6a3-4c2e-92df-5a9772fe7b10",filename:"mac-in-action.jpg",dateCreated:{created:c,date:"2021-03-09 15:21:47",timezone:"UTC",updated:c,published:c},alt:"mac-in-action.jpg",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F03\u002F09\u002F83a1ab08-b6a3-4c2e-92df-5a9772fe7b10\u002Fmac-in-action.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2800,height:1868,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Innovation^Services & Software^Productivity",relatedItems:[]},name:b,promoTitle:"The best Mac cleaners: Our favorite optimization apps",section:b,slug:"best-mac-cleaner",startYear:c,summary:b,title:"Best Mac cleaner 2022: Our favorite optimization apps",topic:{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"aa60a5c2-e881-41bd-bb76-a797c30ea405",username:"jonathanegreig",profileUrl:c,email:c,firstName:"Jonathan",lastName:"Greig",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e1751fe3-e83c-4bc5-b425-4f3cfa6f6748",filename:"headshot-2.jpg",dateCreated:{created:c,date:"2019-10-28 16:51:44",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2019\u002F10\u002F28\u002Fe1751fe3-e83c-4bc5-b425-4f3cfa6f6748\u002Fheadshot-2.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jonathan Greig is a journalist based in New York City. He recently returned to the United States after reporting from South Africa, Jordan, and Cambodia since 2013.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ETech manufacturing giant Panasonic has \u003Ca href=\"https:\u002F\u002Fnews.panasonic.com\u002Fglobal\u002Fpress\u002Fdata\u002F2021\u002F11\u002Fen211126-4\u002Fen211126-4-1.pdf\"\u003Econfirmed\u003C\u002Fa\u003E that its network was accessed illegally this month during a cyberattack. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"c383d3b6-4126-4d78-b2d7-adf7cb43c731\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fc383d3b6-4126-4d78-b2d7-adf7cb43c731\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn a statement released on Friday, the Japanese company said it was attacked on November 11 and determined that \"some data on a file server had been accessed during the intrusion.\" \u003C\u002Fp\u003E\u003Cp\u003E\"After detecting the unauthorized access, the company immediately reported the incident to the relevant authorities and implemented security countermeasures, including steps to prevent external access to the network,\" Panasonic said in a statement. \u003C\u002Fp\u003E\u003Cp\u003E\"In addition to conducting its own investigation, Panasonic is currently working with a specialist third-party organization to investigate the leak and determine if the breach involved customers' personal information and\u002For sensitive information related to social infrastructure.\" \u003C\u002Fp\u003E\u003Cp\u003EWhile no other information was provided in the statement, Japanese outlets \u003Ca href=\"https:\u002F\u002Fmainichi.jp\u002Farticles\u002F20211126\u002Fk00\u002F00m\u002F040\u002F326000c\"\u003EMainichi\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww3.nhk.or.jp\u002Fnews\u002Fhtml\u002F20211126\u002Fk10013363971000.html\"\u003ENHK\u003C\u002Fa\u003E said the breach actually started on June 22 and ended on November 3. \u003C\u002Fp\u003E\u003Cp\u003EPanasonic did not respond to requests for comment but \u003Ca href=\"https:\u002F\u002Ftechcrunch.com\u002F2021\u002F11\u002F29\u002Fpanasonic-data-breach\u002F\"\u003Econfirmed\u003C\u002Fa\u003E that date in an interview with TechCrunch and said the November 11 date actually refers to when the breach was first discovered. \u003C\u002Fp\u003E\u003Cp\u003ENHK reported that the attacked servers stored information about Panasonic business partners and the company's technology, noting a ransomware incident last November involving a subsidiary of the company that also leaked business information. \u003C\u002Fp\u003E\u003Cp\u003E\"We cannot predict whether it will affect our business or business performance, but we cannot deny the possibility of a serious incident,\" the company told Mainichi on Friday, which according to \u003Ca href=\"https:\u002F\u002Ftherecord.media\u002Fpanasonic-discloses-four-months-long-data-breach\u002F\"\u003EThe Record\u003C\u002Fa\u003E reported that the breach may have also involved employee information. \u003C\u002Fp\u003E\u003Cp\u003EPanasonic \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fpanasonic-mcafee-team-up-to-tackle-vehicle-cybersecurity\u002F\"\u003Esigned a pact with McAfee in March\u003C\u002Fa\u003E to create a vehicle security operations center focused exclusively on cyberattacks. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGlmcmFtZSBzcmM9Imh0dHBzOi8vb3Blbi5zcG90aWZ5LmNvbS9lbWJlZC9lcGlzb2RlLzdmcnBiWG80alB2bmswTjNnQkdwbzYiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjIzMiIgZnJhbWVCb3JkZXI9IjAiIGFsbG93dHJhbnNwYXJlbmN5PSJ0cnVlIiBhbGxvdz0iZW5jcnlwdGVkLW1lZGlhIj48L2lmcmFtZT4=\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-11-29 23:21:00",timezone:"UTC",updated:c,published:c},description:"On Friday, the tech giant said its network was illegally accessed on November 11.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"7990c7f9-2bd2-40e1-b75f-b2c2a444a96f",image:{id:"9c20e502-958e-447b-8d55-edfd27d2ced7",filename:"panasonic.png",dateCreated:{created:c,date:"2021-11-30 12:51:18",timezone:"UTC",updated:c,published:c},alt:"how-panasonic-watches-hackers-to-help-bo-5dee24fb9184870001a151ea-1-dec-10-2019-12-54-11-poster.jpg",credits:"By Cineberg -- Shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F11\u002F30\u002F9c20e502-958e-447b-8d55-edfd27d2ced7\u002Fpanasonic.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"panasonic-confirms-cyberattack-and-data-breach",startYear:c,summary:b,title:"Panasonic confirms cyberattack and data breach",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10666ed8-ec91-11e3-95d2-02911863765e",slug:"hardware",name:"Hardware",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"ae164b3d-9f4e-461e-8353-db202258465a",slug:"cyber-threats",name:"Cyber Threats",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EApple has supported \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3523cef7-7390-4de3-bb79-27d5e94aee01\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fshop\u002Fbuy-mac\u002Fmacbook-pro\u002F14-inch\" data-link-shortcode-text=\"Macs\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E for many years, but inevitably the day will come when the support plug is pulled, and security patches dry up.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e658c585-db33-46c8-918a-752729fe81da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe658c585-db33-46c8-918a-752729fe81da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAnd once that happens, it's the beginning of the end.\u003C\u002Fp\u003E\u003Cp\u003EAnd then it's time for the scrap heap.\u003C\u002Fp\u003E\u003Cp\u003EWell, if you're someone who didn't send their old Mac off to the scrap heap (or, as it would be today, the recycling center), then you might be able to give the system a new lease of life thanks to Google.\u003C\u002Fp\u003E\u003Cp\u003EYes, you read that, right. Google. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fchromeenterprise.google\u002Fos\u002Fchromeosflex\u002F\"\u003EChrome OS Flex\u003C\u002Fa\u003E is Google's latest project, and it brings Chrome OS to \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"58195bf1-e6fc-420c-b40d-39e1837e4ae4\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fimac\u002F\" data-link-shortcode-text=\"Macs\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E and PCs. Aimed at businesses and schools, it is currently in the early access stage and has been designed to be installed in minutes and will look and feel the same as Chrome OS.\u003C\u002Fp\u003E\u003Cp\u003EGoogle has published a certified models list of systems that will run Chrome OS Flex, and on that list are \u003Ca href=\"https:\u002F\u002Fsupport.google.com\u002Fchromeosflex\u002Fanswer\u002F11513094#zippy=%2Capple\"\u003Ea number of Macs that are either verified to work or will work but with minor issues\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fapples-m1-pro-macbook-pro-is-an-amazing-windows-11-laptop\u002F\" target=\"_blank\"\u003EApple's M1 Pro MacBook Pro is an amazing Windows 11 laptop\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EHere's the listing:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"317efd63-21c9-4401-8f4b-ce8ff0eaf9be\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EMacs supported by Google Chrome OS Flex\u003C\u002Fp\u003E\" data-image-alt-text=\"2022-02-16-12-06-14.jpg\" data-image-filename=\"2022-02-16-12-06-14.jpg\" data-image-date-created=\"2022\u002F02\u002F16\" data-image-width=\"1078\" data-image-height=\"826\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWe can decipher this list into something a bit more useful, and we can see that they span 2009 to 2015:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EiMac 21.5-inch Midv2010\u003C\u002Fli\u003E\u003Cli\u003EiMac 21.5-inch Mid 2011\u002FLate 2011\u003C\u002Fli\u003E\u003Cli\u003EiMac 20-inch Early 2009\u002FMid 2009\u003C\u002Fli\u003E\u003Cli\u003EMac Mini Late 2014\u003C\u002Fli\u003E\u003Cli\u003EMacBook 13-inch Early 2009\u002FMid 2009\u003C\u002Fli\u003E\u003Cli\u003EMacBook 13-inch Late 2009\u003C\u002Fli\u003E\u003Cli\u003EMacBook 13-inch Mid 2010\u003C\u002Fli\u003E\u003Cli\u003EMacBook Air 11-inch Mid 2012\u003C\u002Fli\u003E\u003Cli\u003EMacBook Air 11-inch Mid 2013\u002FEarly 2014\u003C\u002Fli\u003E\u003Cli\u003EMacBook Pro 13-inch Mid 2009\u003C\u002Fli\u003E\u003Cli\u003EMacBook Pro 13-inch Mid 2012\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAs you can see, a lot of Macs here going back over a decade. Macs that Apple has long forgotten.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"b52f243d-d968-4fd5-8bcc-f361e1cf72aa\" data-edition=\"us\" data-hed=\"ZDNet Recommends: MacBook Pro -- 16-inch\" data-imagegroup=\"{"alt":"macbook-pro-16-2021.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"b9309e91-8b8d-4117-95b9-04ae1264e04a","filename":"macbook-pro-16-2021.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2022\u002F01\u002F31\u002Fb9309e91-8b8d-4117-95b9-04ae1264e04a\u002Fmacbook-pro-16-2021.png","dateCreated":{"date":"2022-01-31 19:30:53","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"b9309e91-8b8d-4117-95b9-04ae1264e04a","imageFilename":"macbook-pro-16-2021.png","imageDateCreated":"2022\u002F01\u002F31"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-offerurl=\"https:\u002F\u002Fwww.apple.com\u002Fshop\u002Fbuy-mac\u002Fmacbook-pro\u002F16-inch\" data-offerprice=\"3499\" data-offermerchant=\"Apple\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOh, and Chrome OS Flex also runs on a variety of PCs from vendors ranging from Acer, ASUS, Dell, HP, Microsoft, Toshiba, and many more.\u003C\u002Fp\u003E\u003Cp\u003EIt's an interesting project and a good way to offer a new lease of life for older macs. That said, I wonder just how many Macs are still around from the 2009 to 2015 era.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"3be818df-27e4-42c7-813f-c703e2d38814\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F3be818df-27e4-42c7-813f-c703e2d38814\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-02-16 13:14:00",timezone:"UTC",updated:c,published:c},description:"A way to bring new life -- and security -- to your otherwise obsolete Mac.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"559ce2de-06a6-4d1a-ab2d-1701b0be8d95",image:{id:"709d23b7-8a44-4ce3-9876-26a8749b7bdc",filename:"2022-02-16-13-13-02.jpg",dateCreated:{created:c,date:"2022-02-16 13:13:19",timezone:"UTC",updated:c,published:c},alt:"2022-02-16-12-06-14.jpg",credits:"Adrian Kingsley-Hughes",caption:"\u003Cp\u003EMacs supported by Google Chrome OS Flex\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F02\u002F16\u002F709d23b7-8a44-4ce3-9876-26a8749b7bdc\u002F2022-02-16-13-13-02.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1280,height:960,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Business^Companies^Google",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"google-chrome-os-flex-supporting-macs-that-apple-has-long-forgotten",startYear:c,summary:b,title:"Google's Chrome OS Flex supporting Macs that Apple has long forgotten",topic:{id:"1050fa4d-ec91-11e3-95d2-02911863765e",slug:"google",name:"Google",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"1050fa4d-ec91-11e3-95d2-02911863765e",slug:"google",name:"Google",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"82451d6f-094b-42ba-94a8-a74617af6c9e\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Getty Images\" data-image-alt-text=\"Close-up of a person wearing glasses leaning toward a computer screen. Lines of code reflect on the glasses.\" data-image-filename=\"gettyimages-1076658510.jpg\" data-image-date-created=\"2022\u002F04\u002F20\" data-image-crop=\"2121x1192+0+106\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"72263e9e-9a96-495c-b8e6-44e778f50793\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F72263e9e-9a96-495c-b8e6-44e778f50793\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe best cybersecurity certifications cover the right fundamental skills at the right price. Finding a good fit for the specific role you're applying for can be challenging, so we'll help you find the right choice.\u003C\u002Fp\u003E\u003Cp\u003EWe wanted you to get the most bang for your buck, so we compiled exhaustive research. We considered cost, prerequisites, course material, difficulty, and more to select our top picks. Below, we listed your best options to get you started and to help you stand out when you apply for a role in this lucrative field.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGRpdiBjbGFzcz0ibXlGaW5hbmNlLXdpZGdldCIgZGF0YS1jYW1wYWlnbj0iemRuZXQtaGlnaGVyLWVkLWRjcyIgZGF0YS13aWRnZXQtaWQ9IjFmZjkzMDUzLTJhZjYtNDY0Yy1hNjc4LWZmNzA5NDg1ZDhlYyIgZGF0YS1kZWdyZWU9ImJhY2hlbG9ycyIgZGF0YS1jYXRlZ29yeT0iY3JpbWluYWwtanVzdGljZS1hbmQtbGVnYWwiIGRhdGEtc3ViamVjdD0iY3liZXItY3JpbWUiPjwvZGl2Pg==\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bb0e309d-3d86-4ad8-807e-fc59d404e765\" data-edition=\"us\" data-description=\"\u003Cp\u003ECybrary is an excellent online resource for video-based courses in cybersecurity, suiting a range of skill levels and existing qualifications.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou can enroll in courses that explain the fundamentals of particular career paths, whether as a system administrator or as a network engineer — and if you can ignore the cheesy thumbnails used to tout some of the courses, the actual content is valuable. The courses also come with an estimated time to completion and difficulty rating.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou might want to explore some of these courses as introductory prep for other formal qualifications, such as the EC-Council's Certified Ethical Hacking (CEH) and CISSP. Virtual labs for tools including Wireshark and practice tests for qualifications including CompTIA Security+, CISM, and others are also available.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EHowever, it should be noted that the resources on offer, such as \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-ethical-hacking-certification\u002F" target="_blank"\u003Efor the CEH\u003C\u002Fa\u003E, are not official courseware or lab sessions.\u003C\u002Fp\u003E\u003Cp\u003EAlso of note is that Coursera offers suggested "paths" toward professional qualifications in line with industry standards, such as those managed by NIST. Courses can also be completed at your own pace, and some do result in formal qualifications after you pass.\u003C\u002Fp\u003E\u003Cp\u003ESome courses are free, while others require an enrollment or test fee.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EExcellent online resource for video-based courses in cybersecurity\u003C\u002Fli\u003E\u003Cli\u003ELearn the fundamentals of a career as a system administrator or a network engineer\u003C\u002Fli\u003E\u003Cli\u003ESome courses are free\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESome courses require an enrollment or test fee\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Cybrary courses\" data-superlative=\"Best overall, with both free and paid courses\" data-imagegroup=\"{"alt":"cybrary.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"1bbd8420-956e-4dbb-b10a-6817b59cb8f8","title":"cybrary-best-cybersecurity-certification","filename":"cybrary.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F05\u002F12\u002F1bbd8420-956e-4dbb-b10a-6817b59cb8f8\u002Fcybrary.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":276029,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:31:51","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:57:08","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"cybrary-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1bbd8420-956e-4dbb-b10a-6817b59cb8f8","imageAltText":"cybrary.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cybrary.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Cybrary","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.cybrary.it\u002Finfo\u002Flp\u002Fbusiness\u002F","url":"https:\u002F\u002Fwww.cybrary.it\u002Finfo\u002Flp\u002Fbusiness\u002F"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGhlLWVkaXRvcmlhbC1saXN0aW5ncyBkZWdyZWU9ImJvb3RjYW1wcyIgY2F0ZWdvcnk9ImNyaW1pbmFsLWp1c3RpY2UtYW5kLWxlZ2FsIiBzdWJqZWN0PSJjeWJlci1jcmltZSIgbGltaXQ9IjIiIHRoZW1lPSJub25lIj48L2hlLWVkaXRvcmlhbC1saXN0aW5ncz4=\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"66ba9bd3-2f7c-444f-8c3f-ceefbe739aed\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt might not be as exciting as learning about penetration tools, Cobalt Strike beacons, or password crackers, but a thorough understanding of networks is necessary for today's cybersecurity defenders.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETo get started, you should consider the CompTIA Network+ course, which teaches learners how to build a network from the ground up and how to identify different kinds of network topology and configurations.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EA solid foundation in networking protocols and standards can help you identify and understand network-based intrusions, propagation, and malware, including ransomware, operating on target networks.\u003C\u002Fp\u003E\u003Cp\u003EYou can take Security+, a baseline qualification in security concepts and roles, risk analysis, hands-on troubleshooting, and more from this entry-level course. The Security+ exam has had a recent refresh to SY0-601.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELearn how to build a network from the ground up&nbsp;\u003C\u002Fli\u003E\u003Cli\u003ELearn how to identify different kinds of network topology and configurations\u003C\u002Fli\u003E\u003Cli\u003EThe Security+ exam has had a recent refresh to SY0-601\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EN\u002FA\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"CompTIA Network+, Security+\" data-superlative=\"Best for networking and basic business security concepts\" data-imagegroup=\"{"alt":"comp.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"8e0df307-9e3e-4365-8bd0-38a43a5d43db","title":"comp-best-cybersecurity-certification","filename":"comp.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F05\u002F12\u002F8e0df307-9e3e-4365-8bd0-38a43a5d43db\u002Fcomp.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":152361,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:32:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:57:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"comp-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8e0df307-9e3e-4365-8bd0-38a43a5d43db","imageAltText":"comp.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"comp.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"CompTIA","offerPrice":"338","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.comptia.org","url":"https:\u002F\u002Fwww.comptia.org"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5f9bb310-b277-48e6-8568-4495c820625f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe SANS Institute is a respected provider of professional cybersecurity courses, and SEC401 is described as a "bootcamp" for those with some existing knowledge of IT, networking, and security.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWhile certainly not a cheap undertaking, the in-depth course covers security metrics, audits, risk assessments, network protection, incident detection and response, and more.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESANS says the course "will provide the essential information security skills and techniques you need to protect and secure your critical information and technology assets, whether on-premise or in the cloud."\u003C\u002Fp\u003E\u003Cp\u003EAs a course for working professionals, SANS offers flexibility through on-demand, online, or in-person&nbsp;training.&nbsp; You can complete the course virtually or in-person over six days.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFlexibility through on-demand, online, or in-person\u003C\u002Fli\u003E\u003Cli\u003EIn-depth course covers security metrics, audits, risk assessments, more\u003C\u002Fli\u003E\u003Cli\u003ELearn essential information and security skills and techniques\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECertainly not a cheap\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"SANS SEC401: Security Essentials Bootcamp Style\" data-superlative=\"Best for those who want an intense deep dive\" data-imagegroup=\"{"alt":"sans.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"f7cff9f7-e3a3-45c4-bb08-f22feabbe5a3","title":"sans-best-cybersecurity-certification","filename":"sans.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F05\u002F12\u002Ff7cff9f7-e3a3-45c4-bb08-f22feabbe5a3\u002Fsans.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":222814,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:33:49","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:57:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"sans-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f7cff9f7-e3a3-45c4-bb08-f22feabbe5a3","imageAltText":"sans.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"sans.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"SANS","offerPrice":"7270","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.sans.org\u002Fcyber-security-courses\u002Fsecurity-essentials-bootcamp-style\u002F","url":"https:\u002F\u002Fwww.sans.org\u002Fcyber-security-courses\u002Fsecurity-essentials-bootcamp-style\u002F"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"45c32dfd-e609-46a1-b2e0-0338d280fa92\" data-edition=\"us\" data-description=\"\u003Cp\u003EOffensive Security's Penetration Testing with Kali Linux (PEN-200) is the organization's foundation course in using the Kali Linux OS for ethical hacking.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe vendor's focus is on offense and hands-on learning rather than lectures, tickboxes, and completely academic study. Offensive Security encourages critical thinking and problem-solving with its "Try Harder" slogan. After all, if you can learn to think like an attacker, you can better protect systems against them.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou will need a solid understanding of networking principles, and some understanding of Windows, Linux, and Bash\u002FPython will help.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESuccessfully completing the course will give you the OSCP certification —&nbsp;as long as you can handle the 24-hour exam. The vendor has recently added the course as an option on a subscription basis for busy individuals who need the flexibility to learn at their own pace.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELearn to think like an attacker\u003C\u002Fli\u003E\u003Cli\u003EFocus is on offense and hands-on learning\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EYou will need a solid understanding of networking principles\u003C\u002Fli\u003E\u003Cli\u003ESome understanding of Windows, Linux, and Bash\u002FPython will help\u003C\u002Fli\u003E\u003Cli\u003E24-hour exam\u003C\u002Fli\u003E\u003Cli\u003ERelatively expensive\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Offensive Security Pen 200 (OSCP)\" data-superlative=\"Best for those who want to focus on offense and hands-on learning\" data-imagegroup=\"{"alt":"pen200.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"60277298-a5e6-4014-82bf-e704e2877787","title":"pen200-best-cybersecurity-certification","filename":"pen200.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F05\u002F12\u002F60277298-a5e6-4014-82bf-e704e2877787\u002Fpen200.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":175172,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:34:44","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:57:52","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"pen200-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"60277298-a5e6-4014-82bf-e704e2877787","imageAltText":"pen200.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"pen200.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Offensive Security","offerPrice":"1499","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.offensive-security.com\u002Fpwk-oscp\u002F","url":"https:\u002F\u002Fwww.offensive-security.com\u002Fpwk-oscp\u002F"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"217eaebe-43b2-4b0e-a681-ddc85567fe2a\" data-edition=\"us\" data-description=\"\u003Cp\u003ECISSP, offered by the International Information System Security Certification Consortium, is one of the most well-known professional cybersecurity qualifications worldwide.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe course covers the design and implementation of cybersecurity programs, including engineering, security architectures, risk management, identity and access management, and software security, among other topics.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECISSP can be taken in the classroom and led by instructors in real-time, but you will need years of experience in the field as a prerequisite. Online training is possible, but costs vary.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EOne of the most well-known professional cybersecurity qualifications\u003C\u002Fli\u003E\u003Cli\u003ECan be taken in the classroom and led by instructors in real-time\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EYou will need years of experience in the field as a prerequisite\u003C\u002Fli\u003E\u003Cli\u003ECosts vary\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Certified Information Systems Security Professional (CISSP)\" data-superlative=\"Best for those who want a globally recognized qualification\" data-imagegroup=\"{"alt":"isc.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"adfa6539-f7a5-43b2-9e18-c2e6df296c0a","title":"isc-best-cybersecurity-certification","filename":"isc.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F12\u002Fadfa6539-f7a5-43b2-9e18-c2e6df296c0a\u002Fisc.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":217244,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:36:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:58:04","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"isc-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"adfa6539-f7a5-43b2-9e18-c2e6df296c0a","imageAltText":"isc.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"isc.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"(ISC)²","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.isc2.org\u002FCertifications\u002FCISSP","url":"https:\u002F\u002Fwww.isc2.org\u002FCertifications\u002FCISSP"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fe9ab17f-24aa-49c4-87dd-f48e86475970\" data-edition=\"us\" data-description=\"\u003Cp\u003EISACA Certified Information Security Manager (CISM) certification is focused on four areas: information security governance, risk management, infosec program creation and management, and security incident management.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETherefore, this qualification isn't suitable as a foundation course but rather could be valuable to move up the management chain in an enterprise security role. To become certified, you need to both pass the exam and have acceptable work experience. Still, afterwards, ISACA says the average salary of a CISM-certified individual can reach $118,000 (although there is an annual maintenance fee).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you're interested in this course, it should be noted that the old syllabus was retired in June 2022 to make way for an updated exam.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EValuable to move up the management chain in an enterprise security role\u003C\u002Fli\u003E\u003Cli\u003ENewly updated exam\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EIsn't suitable as a foundation course&nbsp;\u003C\u002Fli\u003E\u003Cli\u003ECertification requires you to pass the exam and have acceptable work experience\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"ISACA Certified Information Security Manager (CISM)\" data-superlative=\"Best for moving into management\" data-imagegroup=\"{"alt":"cism.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"db9df573-3680-4436-82fa-45c9681de2fc","title":"cism-best-cybersecurity-certification","filename":"cism.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F12\u002Fdb9df573-3680-4436-82fa-45c9681de2fc\u002Fcism.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":205169,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:36:47","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:58:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"cism-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"db9df573-3680-4436-82fa-45c9681de2fc","imageAltText":"cism.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cism.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"ISACA","offerPrice":"749","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.isaca.org\u002Fcredentialing\u002Fcism","url":"https:\u002F\u002Fwww.isaca.org\u002Fcredentialing\u002Fcism"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"886a6207-f41e-4ec4-9f68-7bf6300ab726\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F886a6207-f41e-4ec4-9f68-7bf6300ab726\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ed0d308c-71ea-4311-b852-7d0b500c1c4d\" data-edition=\"us\" data-description=\"\u003Cp\u003EGlobal Information Assurance Certification (GIAC) is an institution that offers an array of IT and cybersecurity qualifications.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EGIAC's offerings include topics such as security administration, management, legal, auditing, cyberforensics, and software security. Depending on your areas of interest, you can follow roadmaps with suggested courses to broaden your knowledge and skill set.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EGIAC is an affiliate of the SANS Institute, and some courses, such as GIAC Security Essentials, correspond to training offered by its partner organization.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPrices vary for different certifications.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EOffers an array of IT and cybersecurity qualifications\u003C\u002Fli\u003E\u003Cli\u003ELearn security administration, management, legal, auditing, cyberforensics, etc\u003C\u002Fli\u003E\u003Cli\u003EAn affiliate of the SANS Institute\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPrices vary for different certifications\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"GIAC certifications\" data-superlative=\"Pick your roadmap\" data-imagegroup=\"{"alt":"giac.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"f1cbfcff-4efb-4a2d-b5eb-d698d6ba3d6c","title":"giac-best-cybersecurity-certification","filename":"giac.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F05\u002F12\u002Ff1cbfcff-4efb-4a2d-b5eb-d698d6ba3d6c\u002Fgiac.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":243257,"width":1600,"height":1068,"dateCreated":{"date":"2021-05-12 14:37:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-04-20 20:58:23","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"giac-best-cybersecurity-certification.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f1cbfcff-4efb-4a2d-b5eb-d698d6ba3d6c","imageAltText":"giac.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"giac.jpg","imageDateCreated":"2021\u002F05\u002F12","imageWidth":1600,"imageHeight":1068,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"GIAC","offerPrice":"","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fwww.giac.org\u002Fcertifications\u002Fget-certified\u002Froadmap","url":"https:\u002F\u002Fwww.giac.org\u002Fcertifications\u002Fget-certified\u002Froadmap"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f2413859-e903-4978-a005-b59393652dd1\" data-edition=\"us\" data-description=\"\u003Cp\u003EChoosing a course should depend on your knowledge level and current skill set. Rather than jump right in with an advanced qualification, you may need to spend time learning the basics with a CompTIA, or you may already have enough industry experience to tackle one of the more advanced courses on our list.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What is the best cybersecurity certification?\" data-superlative=\"Cybrary is our top choice for cybersecurity courses, but one size doesn't fit all\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f661e7c6-2d01-4c52-8297-1bc603bee016\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile compiling our recommendations, we covered a range starting from entry-level and broad courses designed to give you foundational knowledge in IT — from the hardware to networks and how systems communicate — to more advanced technical certifications valued by employers.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How did we select these cybersecurity certifications?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65edd17b-3b00-446a-82ad-d090b412d2ec\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're unsure, check out free courses on Cybrary, YouTube tutorial videos, and Hack The Box before you sign up for a qualification. We especially recommend these options for those who are not completely sure they want a career in cybersecurity. \u003C\u002Fp\u003E\" data-hed=\"Should you pay for a course?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2f90d48e-a4bc-42bc-bc77-44729e1a9416\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. If you don't understand the fundamentals, this will lead to a flawed understanding of cybersecurity concepts. You should take the time to build yourself a foundation in IT knowledge first rather than go straight into playing with pen testing software.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EHowever, it's also important to have fun with it, and there are plenty of legal online hubs for learning about cybersecurity — without landing yourself in hot water.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Is it really important to learn about networking and PCs first?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"16fc7af1-8dce-4760-881d-08957ce96885\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere is a range of options out there: being self-taught, apprenticeships, degrees, and professional qualifications. If you're serious about a career in cybersecurity and want to eventually move up the ladder, qualifications can give you a good start, just as in many other fields.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Do you have to be certified?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e5ab87fd-643b-452f-ae26-a710514d46d2\" data-edition=\"us\" data-description=\"\u003Cp\u003EA certification alone is likely not enough to get you a job. The average recruiter for a cybersecurity career looks for candidates with at least a bachelor's in \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fbest-online-computer-science-degree\u002F"\u003Ecomputer science degree\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt's not uncommon for your competition to have a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fbest-online-computer-science-masters\u002F"\u003Ecomputer science master's\u003C\u002Fa\u003E. A graduate-level education is a great way to further your knowledge in vital skills like digital forensics, ethics, biometry, cryptography, and more. Before you invest in a cybersecurity certification, we suggest that you secure the proper education first.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESince the right credentials are key to employment, we did all the research for you and compiled your\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fcybersecurity-school\u002F"\u003E best schools and programs for cybersecurity\u003C\u002Fa\u003E, plus a list of the best \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fbest-online-cybersecurity-degrees\u002F"\u003Eonline cybersecurity degrees\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EHowever, the right certification is a great way to supplement your resume to stand out amongst the competition if you already have your degree.\u003C\u002Fp\u003E\" data-hed=\"Will a cybersecurity certification get you employed?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"17557f60-a92c-4927-a812-dcc69f71a0d7\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F17557f60-a92c-4927-a812-dcc69f71a0d7\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0d51b3aa-fa26-44ad-a790-2fa7f82eefd8\" data-edition=\"us\" data-description=\"\u003Cp\u003EA typical salary for a cybersecurity professional ranges from $70,000-$120,000, according to the \u003Ca href="https:\u002F\u002Fwww.bls.gov\u002Fooh\u002Fcomputer-and-information-technology\u002Finformation-security-analysts.htm" target="_blank"\u003EU.S. Bureau of Labor Statistics\u003C\u002Fa\u003E (BLS). The median wage was $102,600 as of May 2022.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAs a bonus, according to the BLS, \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fhow-to-get-a-job-in-cybersecurity-top-paying-jobs-in-cybersecurity\u002F" target="_blank"\u003Ecybersecurity jobs\u003C\u002Fa\u003E are projected to grow 33% from 2020 to 2030. This positive job outlook not only towers over the average occupation, but it also creates substantial job security.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESo, becoming certified may help you be successful in the future.\u003C\u002Fp\u003E\" data-hed=\"What is the average salary in cybersecurity?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"41be7f37-8c1f-437a-950e-6704d48bd702\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn addition to cybersecurity, becoming a certified ethical hacker can be a rewarding career. In our review of the best ethical hacking certifications, we chose EC-Council CEH as our top choice because it is globally recognized, among other things.\u003C\u002Fp\u003E\" data-hed=\"Are there alternative certifications worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"fe9fc8ce-7c61-4f45-9085-d281f41c21f8\" data-edition=\"us\" data-hed=\"EC-Council CEH: Best globally recognized ethical hacking certification\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"42150903-473e-46ab-82e2-d65f4dbd574b","filename":"ec-council-certified-ethical-hacker-ceh.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F08\u002F18\u002F42150903-473e-46ab-82e2-d65f4dbd574b\u002Fec-council-certified-ethical-hacker-ceh.jpg","dateCreated":{"date":"2021-08-18 17:50:17","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"42150903-473e-46ab-82e2-d65f4dbd574b","imageFilename":"ec-council-certified-ethical-hacker-ceh.jpg","imageDateCreated":"2021\u002F08\u002F18"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.eccouncil.org\u002Fprograms\u002Fcertified-ethical-hacker-ceh\u002F\" data-offerprice=\"1199\" data-offermerchant=\"EC-Council\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"PGRpdiBjbGFzcz0ibXlGaW5hbmNlLXdpZGdldCIgZGF0YS1jYW1wYWlnbj0iemRuZXQtaGlnaGVyLWVkLWRjcyIgZGF0YS13aWRnZXQtaWQ9IjFmZjkzMDUzLTJhZjYtNDY0Yy1hNjc4LWZmNzA5NDg1ZDhlYyIgZGF0YS1kZWdyZWU9ImJhY2hlbG9ycyIgZGF0YS1jYXRlZ29yeT0iY3JpbWluYWwtanVzdGljZS1hbmQtbGVnYWwiIGRhdGEtc3ViamVjdD0iY3liZXItY3JpbWUiPjwvZGl2Pg==\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-24 15:00:00",timezone:"UTC",updated:c,published:c},description:"What is the best cybersecurity certification? Cybrary is our top choice because it's an excellent online resource for free and paid video-based courses in cybersecurity. Cybersecurity certifications can help you stand out in a fast-growing industry.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"7bd7cb33-1b7e-4562-a358-f87a478bc923",image:{id:"82451d6f-094b-42ba-94a8-a74617af6c9e",filename:"gettyimages-1076658510.jpg",dateCreated:{created:c,date:"2022-04-20 20:55:34",timezone:"UTC",updated:c,published:c},alt:"replace-this-image.jpg",credits:"StackCommerce",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F04\u002F20\u002F82451d6f-094b-42ba-94a8-a74617af6c9e\u002Fgettyimages-1076658510.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Education^Computers & Tech",relatedItems:[]},name:b,promoTitle:"The 7 best cybersecurity certifications: Become a security expert",section:b,slug:"best-cybersecurity-certification",startYear:c,summary:b,title:"7 best cybersecurity certifications of 2022",topic:{id:"95ca6724-c309-42a2-b946-f359f1127d73",slug:"computers-tech",name:"Computers & Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"95ca6724-c309-42a2-b946-f359f1127d73",slug:"computers-tech",name:"Computers & Tech",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"5d68ddc2-d682-11e4-9a74-d4ae52e95e57",slug:"developer",name:"Developer",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"c5f3e698-8175-11e2-9d12-0018fe8a00b0",username:"mary.branscombe",profileUrl:c,email:c,firstName:"Mary",lastName:"Branscombe",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"7e874878-1175-11e4-9732-00505685119a",filename:"mary-branscombe.jpg",dateCreated:{created:c,date:"2014-07-22 07:55:06",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2014\u002F07\u002F22\u002F7e874878-1175-11e4-9732-00505685119a\u002Fmary-branscombe.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Mary Branscombe is a freelance tech journalist. Mary has been a technology writer for nearly two decades, covering everything from early versions of Windows and Office to the first smartphones, the arrival of the web and most things inbetween.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"c656648b-123a-488e-a105-80d5a4f7a5fd\" data-size=\"medium\" data-float=\"left\" data-image-caption=\"\u003Cp\u003EEthical Hacking: A Hands-on Introduction to Breaking In • By Daniel G Graham • No Starch Press • 376 pages • ISBN 9781718501874 • £41.99 \u002F $49.99&nbsp; &nbsp;\u003C\u002Fp\u003E\" data-image-alt-text=\"ethical-hacking-book-main.jpg\" data-image-target-url=\"https:\u002F\u002Fwww.penguinrandomhouse.com\u002Fbooks\u002F690696\u002Fethical-hacking-by-daniel-graham\u002F\" data-image-filename=\"ethical-hacking-book-main.jpg\" data-image-date-created=\"2021\u002F11\u002F23\" data-image-width=\"358\" data-image-height=\"470\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe parlous state of software and IT infrastructure security is also a career opportunity, with malware analysts, security researchers, penetration testers and red teams all in demand. Defenders need to know how attackers think, and what tools they use, so they can assess their own infrastructure for vulnerabilities and learn to detect malicious activity in the network. \u003C\u002Fp\u003E\u003Cp\u003EIn \u003Ca href=\"https:\u002F\u002Fwww.penguinrandomhouse.com\u002Fbooks\u002F690696\u002Fethical-hacking-by-daniel-graham\u002F\" target=\"_blank\"\u003E\u003Cem\u003EEthical Hacking: A Hands-on Introduction to Breaking In\u003C\u002Fem\u003E\u003C\u002Fa\u003E, Daniel G Graham sets out to deliver a practical guide for learning hacking techniques, and you jump straight into the hands-on guide by creating a set of Linux VMs to host the environment you're going to break into (since you can't ethically hack someone else's environment). You then work through some known vulnerabilities, progressing to capturing traffic, building a botnet and a ransomware server, generating phishing emails and deepfakes. \u003C\u002Fp\u003E\u003Cp\u003EAlthough you'll need to know how to write and run Python code, you don't need a great deal of expertise to get started because the step-by-step instructions are clear and detailed. Along the way, complex concepts are explained well: if you want to execute ransomware or try to bypass \u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FTransport_Layer_Security\" target=\"_blank\"\u003ETLS\u003C\u002Fa\u003E, you need to understand encryption first, you need to understand syscalls and the underpinnings of Linux for rootkits, and likewise hashing for cracking passwords. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EGraham steps through common hacking techniques, creating deepfake video and audio, exploring how publicly available information is interconnected with \u003Ca href=\"https:\u002F\u002Fwww.maltego.com\u002F\" target=\"_blank\"\u003EMaltego\u003C\u002Fa\u003E to reveal information about an organisation's staff and infrastructure, downloading databases of cracked and breached passwords, looking for exposed vulnerable devices with \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Frobertdavidgraham\u002Fmasscan\" target=\"_blank\"\u003EMasscan\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.shodan.io\u002F\" target=\"_blank\"\u003EShodan\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.tenable.com\u002Flp\u002Fcampaigns\u002F19\u002Ftry-nessus\u002F\" target=\"_blank\"\u003ENessus\u003C\u002Fa\u003E, building Trojans and Linux rootkits (you'll need to know C coding for this), using SQL injection to extract usernames and passwords from websites, cross-site scripting attacks and privilege escalation once you get into a network. You're unlikely to discover your own zero days, but you will learn fuzzing, and how to exploit the \u003Ca href=\"https:\u002F\u002Fheartbleed.com\u002F\" target=\"_blank\"\u003EOpenSSL Heartbleed\u003C\u002Fa\u003E vulnerability. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-looking-for-weaknesses-in-your-own-network-is-key-to-stopping-attacks\u002F\"\u003E\u003Cstrong\u003ERansomware: Looking for weaknesses in your own network is key to stopping attacks\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAlong the way, Graham introduces other hacking tools like \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fsecurestate\u002Fking-phisher\" target=\"_blank\"\u003EKing Phisher\u003C\u002Fa\u003E, the \u003Ca href=\"https:\u002F\u002Fwww.kali.org\u002Ftools\u002Fswaks\u002F\" target=\"_blank\"\u003Eswaks\u003C\u002Fa\u003E SMTP auditing tool in Kali Linux, \u003Ca href=\"https:\u002F\u002Fwww.openwall.com\u002Fjohn\u002F\" target=\"_blank\"\u003EJohn the Ripper\u003C\u002Fa\u003E for password cracking, \u003Ca href=\"https:\u002F\u002Fwww.kali.org\u002Ftools\u002Fhydra\u002F\" target=\"_blank\"\u003EHydra\u003C\u002Fa\u003E for automating brute force password attacks, and many others. \u003C\u002Fp\u003E\u003Cp\u003EThe chapter on attacking domain servers, Active Directory and Kerberos on large Windows networks could probably be expanded to fill a book of its own, but if you're a Windows network admin and you don't already know how to use \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fgentilkiwi\u002Fmimikatz\" target=\"_blank\"\u003EMimikatz\u003C\u002Fa\u003E, even this quick survey of the approaches hackers will take should be something of a wake-up call. (Microsoft has extensive guidance on remediating many of the issues covered here.) \u003C\u002Fp\u003E\u003Cp\u003EWhile this book will help even a relative beginner to become familiar with a wide range of tools that are useful to hackers, it is -- as promised -- a hands-on introduction. Readers will be in a position to explore further, and the final chapter talks you through hardening a hosted VM that you can use for actual ethical hacking. It also mentions some tantalising advanced targets like industrial systems and cellular infrastructure, although readers won't immediately be in a position to go after those without doing quite a bit of extra work. \u003C\u002Fp\u003E\u003Cp\u003EEven if you don't plan to do any active ethical hacking, it should be a salutary warning to anyone in IT that hacking tools are both sophisticated and widely available. There are plenty of tutorials aimed at using them maliciously, so the detail in this book doesn't increase the risk to those with vulnerable systems. If you do want to pursue this as a career, \u003Cem\u003EEthical Hacking\u003C\u002Fem\u003E will guide you through the first steps. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead more book reviews\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-new-breed-book-review-use-animals-not-humans-as-the-model-for-robots\u002F\"\u003EThe New Breed book review: Use animals, not humans, as the model for robots\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexponential-book-review\u002F\"\u003EExponential, book review: Technology acceleration and its impact on society\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftiktok-boom-book-review-the-rise-and-rise-of-youtubes-younger-hipper-competitor\u002F\"\u003ETikTok Boom, book review: The rise and rise of YouTube's younger, hipper competitor\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsocial-warming-book-review\u002F\"\u003ESocial Warming, book review: Temperature rising, regulation required\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-token-woman-book-review-how-to-handle-common-workplace-irritations\u002F\"\u003EThe Token Woman, book review: How to handle common workplace irritations\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-11-23 09:50:00",timezone:"UTC",updated:c,published:c},description:"Daniel G Graham's book won't help hackers who already have a wide range of tools to attack networks and devices. But it will help defenders who want to turn those techniques to more benevolent use.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"9a418d47-aedd-4e8c-9480-20f3d404e7ea",image:{id:"f04dfea8-67b1-48f1-b037-4a46ab3ee467",filename:"ethical-hacking-book-thumb.jpg",dateCreated:{created:c,date:"2021-11-23 09:32:29",timezone:"UTC",updated:c,published:c},alt:"ethical-hacking-book-thumb.jpg",credits:"Penguin Random House",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F11\u002F23\u002Ff04dfea8-67b1-48f1-b037-4a46ab3ee467\u002Fethical-hacking-book-thumb.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:620,height:465,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"review-single",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"ethical-hacking-book-review-a-hands-on-guide-for-would-be-security-professionals",startYear:c,summary:b,title:"Ethical Hacking, book review: A hands-on guide for would-be security professionals",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fb04832-ec91-11e3-95d2-02911863765e",slug:"after-hours",name:"After Hours",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"112a7545-ec91-11e3-95d2-02911863765e",slug:"reviews",name:"Reviews",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"5a505bd7-edd5-4501-b6a1-0b4b0149318e",username:"Jason Cipriani",profileUrl:c,email:c,firstName:"Jason",lastName:"Cipriani",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"ec9503e9-68fc-4acb-b714-31487e597154",filename:"jason-cipriani.jpg",dateCreated:{created:c,date:"2022-08-05 15:09:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fec9503e9-68fc-4acb-b714-31487e597154\u002Fjason-cipriani.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jason Cipriani is based out of beautiful Colorado and has been covering technology news and reviewing the latest gadgets as a freelance journalist for the past 13 years. His work can be found all across the Internet and in print. When he's not writing, he can be found hanging out with his family, gaming, or trying to force himself to read a book.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"1d765648-7f1a-4edd-a2ed-ab41baa6d590\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Firewalla\" data-image-alt-text=\"Firewalla Gold Plus router\" data-image-filename=\"firewalla-gold-plus.jpg\" data-image-date-created=\"2022\u002F09\u002F02\" data-image-width=\"1629\" data-image-height=\"1014\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI've been experimenting with \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7cc2a0a2-4389-4701-8f23-eb3ca747147d\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FFirewalla-Security-Firewall-Business-Parental\u002Fdp\u002FB09GLPGDPK\u002F\" data-link-shortcode-text=\"Firewalla\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E firewalls since the launch of the original Blue model, but for the last two months, I've been using the \u003Ca href=\"https:\u002F\u002Ffirewalla.com\u002Fproducts\u002Ffirewalla-gold?variant=42638546993396\" target=\"_blank\"\u003EFirewalla Gold\u003C\u002Fa\u003E as my network's main router. \u003C\u002Fp\u003E\u003Cp\u003EI finally made the switch for a number of reasons, one of which was the fact that Firewalla has a \u003Ca href=\"https:\u002F\u002Ffirewalla.com\u002Fproducts\u002Ffirewalla-wi-fi-sd\" target=\"_blank\"\u003EWi-Fi SD\u003C\u002Fa\u003E option that allows you to use your phone's hotspot capability as a backup connection for your home internet. If you ask my coworkers, my internet service used to break down constantly. Since switching to Gold and adding the Wi-Fi SD option, my internet connection has been perfect. \u003C\u002Fp\u003E\u003Cp\u003EAnd now that I've started traveling for work again, I've been taking the \u003Ca href=\"https:\u002F\u002Ffirewalla.com\u002Fproducts\u002Ffirewalla-purple\" target=\"_blank\"\u003EFirewalla Purple\u003C\u002Fa\u003E with me to connect to hotel Wi-Fi and keep my devices secure. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-you-shouldnt-connect-to-insecure-networks-with-your-mobile-device\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe high price of free Wi-Fi: Never connect to an insecure network\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut there's a problem with my current home setup -- my internet plan offers speeds up to 1,200Mbs, but the Firewalla Gold maxes out at 1,000Mbps. And while the current connection speed is more than fast enough for my family of five, if I'm paying for speed, I should be able to use it. Right?\u003C\u002Fp\u003E\u003Cp\u003EOne way to make that happen would be to upgrade my \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fnetworking\u002Fcomcast-reveals-prototype-10g-modem-for-home-broadband-users\u002F\" target=\"_blank\"\u003Ecable modem\u003C\u002Fa\u003E to one that supports link aggregation and combines two ports on the modem and the Gold to create a faster connection. The other is something the Firewalla just announced -- the \u003Ca href=\"https:\u002F\u002Ffirewalla.com\u002Fproducts\u002Ffirewalla-gold-plus\" target=\"_blank\"\u003EFirewalla Gold Plus\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"703494eb-70a7-458d-a4d5-e48a5394e0f3\" data-edition=\"us\" data-hed=\"Firewalla Gold Plus 2.5G Cyber Security Firewall & Router\" data-imagegroup=\"{"alt":"Firewalla Gold Plus showing ports","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Image: Firewalla","imageData":{"id":"485f52da-ef30-4abc-9820-a0916d1f2486","filename":"firewalla-gold-plus-front.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F02\u002F485f52da-ef30-4abc-9820-a0916d1f2486\u002Ffirewalla-gold-plus-front.jpg","dateCreated":{"date":"2022-09-02 20:23:03","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"485f52da-ef30-4abc-9820-a0916d1f2486","imageFilename":"firewalla-gold-plus-front.jpg","imageDateCreated":"2022\u002F09\u002F02"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Image: Firewalla\" data-offerurl=\"https:\u002F\u002Ffirewalla.com\u002Fproducts\u002Ffirewalla-gold-plus\" data-offermerchant=\"Firewalla\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIt's the company's first 2.5Gbps firewall and it's currently available for preorder. The presale price is $569. The full retail price after the preorder period is over has yet to be announced, but in the past the discount for preorders has been fairly significant. \u003C\u002Fp\u003E\u003Cp\u003EPreorders are currently scheduled to start shipping between \u003Ca href=\"https:\u002F\u002Fwww.reddit.com\u002Fr\u002Ffirewalla\u002Fcomments\u002Fx2ikp2\u002Fgold_plus_now_shipping_121222_to_1122023\u002F\"\u003EDec. 12 of this year and Jan. 21, 2023\u003C\u002Fa\u003E. According to related Reddit posts, generally the more preorders Firewalla receives, the further up the shipping estimate moves. The company, however, hasn't said how many orders are required to make a significant impact on shipping time. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"fb301a19-6edd-4aeb-9658-434837be1dd4\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Ffb301a19-6edd-4aeb-9658-434837be1dd4\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAs for the Firewalla Gold Plus feature set, the firewall comes with four 2.5Gbps ethernet ports, 4GB of memory and 5-gigabit deep packet inspection. \u003C\u002Fp\u003E\u003Cp\u003EIn addition to meeting some users' at-home internet speeds, the Firewalla Gold Plus has all of the same features as previous Firewalla firewalls. \u003C\u002Fp\u003E\u003Cp\u003EThat includes the ability to monitor your internet traffic for cyberattacks, insights into how you're using your bandwidth, broad controls over which kind of content can and can't be viewed, and ad-blocking, and it doubles as a VPN server so you can easily connect to your home network.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best 5 VPN services: Performance, security and more\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EI don't know many people with home internet connections over 1Gbps, so I suspect that early adopters of the Firewalla Gold Plus will surely be \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsmall-business-cybersecurity-avoid-these-8-basic-mistakes-that-could-let-hackers-in\u002F\" target=\"_blank\"\u003Esmall businesses that want to boost the security\u003C\u002Fa\u003E of their office network. And then as more time passes and home internet speeds continue to slowly increase, devices like the Firewalla Gold Plus will surely become more attractive to small business and home users alike.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-02 22:36:59",timezone:"UTC",updated:c,published:c},description:"Doubling as a VPN server and with features like the ability to monitor your internet traffic for cyberattacks, this router should appeal to security-minded small businesses.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"81e6248e-26d0-4958-89f8-be6b5be02af8",image:{id:"1d765648-7f1a-4edd-a2ed-ab41baa6d590",filename:"firewalla-gold-plus.jpg",dateCreated:{created:c,date:"2022-09-02 20:08:51",timezone:"UTC",updated:c,published:c},alt:"firewalla-gold-plus",credits:"Image: Firewalla",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F02\u002F1d765648-7f1a-4edd-a2ed-ab41baa6d590\u002Ffirewalla-gold-plus.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1629,height:1014,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Home & Office^Networking^Home Networking",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"firewalla-starts-taking-preorders-for-2-5-gigabit-gold-plus-firewall",startYear:c,summary:b,title:"Firewalla starts taking preorders for 2.5Gbps Gold Plus firewall",topic:{id:"a3279b29-677e-4133-9d9a-eb87332abb09",slug:"home-networking",name:"Home Networking",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"a3279b29-677e-4133-9d9a-eb87332abb09",slug:"home-networking",name:"Home Networking",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"54795830-f620-4b12-bd83-5740537be838",slug:"internet-of-things",name:"Internet of Things",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EIf you dabble in bitcoin or other cryptocurrencies, then you may be able to get away with storing your private keys in a software wallet. But if you are serious about crypto, are mining your own bitcoins, or have serious cash invested in crypto, then a hardware wallet is something that you need to seriously consider.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0383856d-f28d-47ae-8620-b39504a35f86\" data-edition=\"us\" data-description=\"\u003Cp\u003EHere we have a compact hardware wallet that not only holds your cryptocurrency private keys but can also be a device that can be used to store passwords and even be used as a U2F hardware token.\u003C\u002Fp\u003E\u003Cp\u003EThe Trezor Model T is easy to use thanks to its touchscreen display. Another nice feature of the Model T is that it is quick and easy to set up; you can be up and running after going through three simple setup steps.\u003C\u002Fp\u003E\u003Cp\u003EYes, the price has gone up in recent months (as have most things, in particular, cryptocurrency-related things), but this still remains the best hardware cryptocurrency wallet you can buy.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EStore passwords\u003C\u002Fli\u003E\u003Cli\u003EU2F hardware token\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003ESetup in three simple steps\u003C\u002Fli\u003E\u003Cli\u003ETouchscreen display\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPrice has gone up\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Trezor Model T\" data-superlative=\"A cutting-edge hardware wallet\" data-imagegroup=\"{"alt":"Trezor Model T","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"ba967c81-ee27-4065-bc36-829aef22279a","title":"Trezor Model T","filename":"2021-04-06-11-39-37.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F04\u002F06\u002Fba967c81-ee27-4065-bc36-829aef22279a\u002F2021-04-06-11-39-37.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":151728,"width":1600,"height":1119,"dateCreated":{"date":"2021-04-06 10:40:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-04-06 10:40:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"Trezor Model T","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba967c81-ee27-4065-bc36-829aef22279a","imageAltText":"Trezor Model T","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"2021-04-06-11-39-37.jpg","imageDateCreated":"2021\u002F04\u002F06","imageWidth":1600,"imageHeight":1119,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Trezor","offerPrice":"280","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fshop.trezor.io\u002Fproduct\u002Ftrezor-model-t?offer_id=15&aff_id=10021&source=zdnet&aff_sub=[subid_value]","url":"https:\u002F\u002Fshop.trezor.io\u002Fproduct\u002Ftrezor-model-t?offer_id=15&aff_id=10021&source=zdnet&aff_sub=[subid_value]"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"76f8c280-d701-46be-b7c8-1bcc4f2d5652\" data-edition=\"us\" data-description=\"\u003Cp\u003ENeed a hardware crypto wallet that costs under $100? Take a look at the Trezor One.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is a cut-down, simplified version of the Trezor Model T that's perfect for those who want a cheaper and simpler wallet that doesn't compromise security.\u003C\u002Fp\u003E\u003Cp\u003EThere's also a \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002F3X-Trezor-One-Multipack-Hardware\u002Fdp\u002FB08FBGDG3C?tag=zdnet-deals-20"\u003Ethree-pack of the Trezor One\u003C\u002Fa\u003E available if you want to buy a set so you have backups.\u003C\u002Fp\u003E\u003Cp\u003EThe price has gone up in recent months, but it remains a good deal, coming in under $100.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESimplified version of Trezor Model T\u003C\u002Fli\u003E\u003Cli\u003Edoesn't compromise security\u003C\u002Fli\u003E\u003Cli\u003EAvailable in a three-pack\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPrice has gone up\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Trezor One\" data-superlative=\"Simplified version of the Trezor Model T\" data-imagegroup=\"{"alt":"Trezor One","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"9b9d4049-2154-4db9-a4f4-7273de5970c6","title":"Trezor One","filename":"2021-04-06-11-44-57.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F04\u002F06\u002F9b9d4049-2154-4db9-a4f4-7273de5970c6\u002F2021-04-06-11-44-57.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":176154,"width":1600,"height":980,"dateCreated":{"date":"2021-04-06 10:45:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-04-06 10:45:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"Trezor One","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"9b9d4049-2154-4db9-a4f4-7273de5970c6","imageAltText":"Trezor One","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"2021-04-06-11-44-57.jpg","imageDateCreated":"2021\u002F04\u002F06","imageWidth":1600,"imageHeight":980,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FTrezor-One-Cryptocurrency-Protection-including\u002Fdp\u002FB00R6MKDDE?tag=zdnet-buy-button-20","offerMerchant":"Trezor","offerPrice":"77","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.trezor.io\u002Fproduct\u002Ftrezor-one-black?offer_id=35&aff_id=10021&source=zdnet&aff_sub=[subid_value]","url":"https:\u002F\u002Fwww.amazon.com\u002FTrezor-One-Cryptocurrency-Protection-including\u002Fdp\u002FB00R6MKDDE?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"da22a2ea-ad9a-4ce1-ac5e-82204a3f7c5a\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis is a hardware bitcoin wallet that looks like a USB flash drive. The Ledger Nano S supports more than 30 different cryptocurrencies (including Bitcoin, Ethereum, XRP, Bitcoin Cash, EOS, Stellar, Dogecoin, and many more), and all ERC20 tokens, and everything is protected by an 8-digit PIN code.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESupports more than 30 different cryptocurrencies\u003C\u002Fli\u003E\u003Cli\u003Eprotected by an 8-digit PIN code\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003EDisplay is small and isn't a touchscreen\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Ledger Nano S\" data-superlative=\"Everything is protected by a PIN code\" data-imagegroup=\"{"alt":"Ledger Nano S","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"b13593ed-388b-4e1c-915a-4a003f0bcf2d","title":"Ledger Nano S","filename":"2021-04-06-11-47-01.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F04\u002F06\u002Fb13593ed-388b-4e1c-915a-4a003f0bcf2d\u002F2021-04-06-11-47-01.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":148845,"width":1500,"height":1002,"dateCreated":{"date":"2021-04-06 10:47:24","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-04-06 10:47:29","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"Ledger Nano S","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"b13593ed-388b-4e1c-915a-4a003f0bcf2d","imageAltText":"Ledger Nano S","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"2021-04-06-11-47-01.jpg","imageDateCreated":"2021\u002F04\u002F06","imageWidth":1500,"imageHeight":1002,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FLedger-Nano-Cryptocurrency-Hardware-Ethereum\u002Fdp\u002FB07FY5R77T?tag=zdnet-buy-button-20","offerMerchant":"Ledger","offerPrice":"59","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.ledger.com\u002Fproducts\u002Fledger-nano-s","url":"https:\u002F\u002Fwww.amazon.com\u002FLedger-Nano-Cryptocurrency-Hardware-Ethereum\u002Fdp\u002FB07FY5R77T?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"96b075a5-fdc6-4f39-a490-eb66cfc1bc9d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis is the hardware wallet for those who are ultra-paranoid or who want high security. The ColdCard Mk3 device is a high-security device that is built around high-security hardware and open-source software. It also features a brilliant OLED display and a full-sized numeric keypad.\u003C\u002Fp\u003E\u003Cp\u003EYou can augment the ColdCard with a range of accessories, including an adapter that allows you to power the ColdCard from a 9V PP3 battery, protecting you from attacks that might make use of a compromised USB charger.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBuilt around high-security hardware and open-source software\u003C\u002Fli\u003E\u003Cli\u003EBrilliant OLED display and a full-sized numeric keypad\u003C\u002Fli\u003E\u003Cli\u003EAugment the ColdCard with a range of accessories\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBitcoin only\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Coinkite ColdCard\" data-superlative=\"For those who want high security\" data-imagegroup=\"{"alt":"Coinkite ColdCard","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"be77d371-0a0c-4490-89d7-cc05fc16ff7a","title":"Coinkite ColdCard","filename":"2021-04-06-11-49-03.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F04\u002F06\u002Fbe77d371-0a0c-4490-89d7-cc05fc16ff7a\u002F2021-04-06-11-49-03.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":839025,"width":3200,"height":2310,"dateCreated":{"date":"2021-04-06 10:50:01","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-04-06 10:50:07","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"Coinkite ColdCard","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"be77d371-0a0c-4490-89d7-cc05fc16ff7a","imageAltText":"Coinkite ColdCard","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"2021-04-06-11-49-03.jpg","imageDateCreated":"2021\u002F04\u002F06","imageWidth":3200,"imageHeight":2310,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Coinkite","offerPrice":"129","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fstore.coinkite.com\u002Fstore\u002Fcoldcard","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1248092b-7276-4e99-86ce-6cab6f5f1ad7\" data-edition=\"us\" data-description=\"\u003Cp\u003EMade from indestructible 316-marine grade stainless steel, this is a cold storage cryptocurrency wallet that's designed and built to be fireproof, waterproof, shockproof, and hacker-proof. This is the perfect tool for keeping your seed phrases secure, which would allow you to recover your private keys in the event that you lose or break your electronic hardware wallet.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMade from indestructible 316-marine grade stainless steel\u003C\u002Fli\u003E\u003Cli\u003Efireproof, waterproof, shockproof, and hacker-proof\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECan be tricky to get open the first time\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Billfold Steel Bitcoin Wallet\" data-superlative=\"Fireproof, waterproof, shockproof, and hacker-proof\" data-imagegroup=\"{"alt":"Billfold Steel Bitcoin Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"136033f8-5ad3-4d4c-b0c8-94072266c84e","title":"Billfold Steel Bitcoin Wallet","filename":"2021-04-06-11-51-55.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fhub\u002Fi\u002F2021\u002F04\u002F06\u002F136033f8-5ad3-4d4c-b0c8-94072266c84e\u002F2021-04-06-11-51-55.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":141966,"width":1600,"height":1063,"dateCreated":{"date":"2021-04-06 10:52:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-04-06 10:52:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"Billfold Steel Bitcoin Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"136033f8-5ad3-4d4c-b0c8-94072266c84e","imageAltText":"Billfold Steel Bitcoin Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"2021-04-06-11-51-55.jpg","imageDateCreated":"2021\u002F04\u002F06","imageWidth":1600,"imageHeight":1063,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FBillfodl-Private-Key-Backup\u002Fdp\u002FB07BS632RR?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"95","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FBillfodl-Private-Key-Backup\u002Fdp\u002FB07BS632RR","url":"https:\u002F\u002Fwww.amazon.com\u002FBillfodl-Private-Key-Backup\u002Fdp\u002FB07BS632RR?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7145475d-5765-437a-9136-54a0234be579\" data-edition=\"us\" data-description=\"\u003Cp\u003EA crypto wallet is a device that stores and manages the private keys you hold for your cryptocurrency. They act much like how you keep money in your wallet or purse, or how your bank details are stored on your credit or debit cards.\u003C\u002Fp\u003E\" data-hed=\"What is a crypto wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6d0fb933-6d12-4d0d-8402-ae0b6e09281d\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. Bitcoin is a type of cryptocurrency, and most hardware wallet work with a broad range of cryptocurrencies.\u003C\u002Fp\u003E\" data-hed=\"Is a crypto wallet the same as a bitcoin wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"dacd3e74-9b2e-48b9-beb6-c04c62ed65bb\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are a number of factors to consider here.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: Not everyone wants to spend $200 on a wallet.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EDurability\u003C\u002Fstrong\u003E: A broken hardware wallet can leave you hating life (not to mention down the cost of the hardware), so choosing something that will last is a good investment.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EReputable manufacturer\u003C\u002Fstrong\u003E: You could be trusting thousands of dollars of cryptocurrency to a hardware wallet, so you want to know that your wallet has been made by a reputable company with a track record in delivering secure and reliable products.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EEase of use\u003C\u002Fstrong\u003E: Setting up a hardware wallet can be daunting enough, but it can be made all the more difficult if the documentation is poor (or non-existent) or the device itself is quirky and unpredictable.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"How did we choose these cryptocurrency hardware wallets?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9104d995-f60c-4899-928b-43a3629ec44f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are two kinds of wallets: Hardware and software. A software wallet is an app that lives on your computer or smartphone, or even on the web, while a hardware wallet is a separate physical device (much like a wallet or purse). This hardware wallet is connected to a PC or mobile device to carry out transactions.\u003C\u002Fp\u003E\u003Cp\u003ESoftware wallets range in price from free to, well, not free, so they are great for those starting out. Since hardware wallets cost you money, there's a financial investment that you have to make right from the beginning.\u003C\u002Fp\u003E\" data-hed=\"What are the different kinds of cryptocurrency wallets?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7beb1eb8-07a7-445b-8fc9-ffe805b7a046\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt's important to note that you don't need a hardware wallet to buy, store, or send bitcoins or any other cryptocurrency. Some people hold many thousands of dollars in bitcoin or other cryptocurrencies and don't use a hardware wallet.\u003C\u002Fp\u003E\u003Cp\u003EHowever, where hardware wallets shine is the improved security that they offer compared to an app that lives on a smartphone, computer, or in the cloud. Having a device that puts an air gap between your private keys and other apps, the internet, and the bad guys offers vastly improved security from hackers and viruses.\u003C\u002Fp\u003E\u003Cp\u003EHardware bitcoin wallets put you in complete and total control over your private keys.\u003C\u002Fp\u003E\" data-hed=\"Why do you need a hardware wallet?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"59b0d1f6-d2c5-430f-9a42-902d72a21b10\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EPros\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EImproved security: Total air gap between your private keys and everything else.\u003C\u002Fli\u003E\u003Cli\u003EBetter control: You hold your keys and can keep them separate from all your other devices.\u003C\u002Fli\u003E\u003Cli\u003EEasy transportation: Bitcoin hardware wallets are small and easily transported. But they can also be stored securely in a safe or safety deposit box.\u003C\u002Fli\u003E\u003Cli\u003ENo reliance on a third-party app or web service: Apps and services come and go.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ECons\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECost: Hardware bitcoin wallet solutions aren't free.\u003C\u002Fli\u003E\u003Cli\u003EExtra complexity: There's always a learning curve with hardware, and some bitcoin wallets have quite advanced features that will have you reaching for the manual.\u003C\u002Fli\u003E\u003Cli\u003ELoss, destruction, theft: Hardware can break, be lost, be stolen, become obsolete, or succumb to all sorts of mishaps.\u003C\u002Fli\u003E\u003Cli\u003EAnother thing to take care of: If you need to make a transaction, you'll need your wallet!\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"What are the pros and cons of hardware crypto wallets?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ede25720-c456-42c7-8054-03d5597c1aa0\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, a hardware bitcoin wallet offers greater security, but you still need to make sure that you are buying a decent device from a reputable source.\u003C\u002Fp\u003E\u003Cp\u003EYou also need to decide how much security you need. For some, having the air gap of a separate wallet is good enough, while others will feel the need to beef up security, and have a device that offers higher levels of security, biometrics, and even isolating the device from possible sources of attack, such as USB chargers.\u003C\u002Fp\u003E\u003Cp\u003EYou also need a backup, just in case. Maybe this is another hardware wallet, or maybe you're going to go for a "cold storage" solution that might include having your private keys printed on paper, or even engraved, stamped, or etched into metal.\u003C\u002Fp\u003E\u003Cp\u003EAnother consideration is price. Unless you're planning to hold huge cryptocurrency investments, then it might sting a bit to spend over $100 on a wallet.\u003C\u002Fp\u003E\" data-hed=\"What should you consider when buying a cryptocurrency hardware wallet?\" data-imagegroup=\"{}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003E\u003Cbr\u003E\u003C\u002Fh3\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-03-08 15:25:00",timezone:"UTC",updated:c,published:c},description:"If you're serious about keeping your cryptocurrency secure, then you need a crypto hardware wallet.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"88a74724-b66a-4fbd-bb9d-bee9baf5bff1",image:{id:"99353b40-dc0d-413b-a05f-3ac134f8b4fb",filename:"screen-shot-2021-04-06-at-11-18-37-am.png",dateCreated:{created:c,date:"2021-04-06 15:19:11",timezone:"UTC",updated:c,published:c},alt:"screen-shot-2021-04-06-at-11-18-37-am.png",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F04\u002F06\u002F99353b40-dc0d-413b-a05f-3ac134f8b4fb\u002Fscreen-shot-2021-04-06-at-11-18-37-am.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Finance^Blockchain",relatedItems:[]},name:b,promoTitle:"The best crypto hardware wallets: Secure your cryptocurrency",section:b,slug:"best-crypto-wallet",startYear:c,summary:b,title:"Best crypto wallet 2022: Secure your cryptocurrency",topic:{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"c5f3e698-8175-11e2-9d12-0018fe8a00b0",username:"mary.branscombe",profileUrl:c,email:c,firstName:"Mary",lastName:"Branscombe",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"7e874878-1175-11e4-9732-00505685119a",filename:"mary-branscombe.jpg",dateCreated:{created:c,date:"2014-07-22 07:55:06",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2014\u002F07\u002F22\u002F7e874878-1175-11e4-9732-00505685119a\u002Fmary-branscombe.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Mary Branscombe is a freelance tech journalist. Mary has been a technology writer for nearly two decades, covering everything from early versions of Windows and Office to the first smartphones, the arrival of the web and most things inbetween.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"reviewcard\" data-id=\"313c3d5a-e580-4213-b21b-9c52011b12b6\" data-edition=\"us\" data-productname=\"Winkeo-C FIDO2\" data-like=\"Good price ~ FIDO2 and FIDO U2F support\" data-dislike=\"Some setup required ~ No NFC or biometric options\" data-editorschoice=\"false\" data-editorsmonth=\"10\" data-editorsyear=\"2022\" data-editorsdate=\""2022-10-27T12:02:14.334Z"\" data-innovationaward=\"false\" data-innovationmonth=\"10\" data-innovationyear=\"2022\" data-innovationdate=\""2022-10-27T12:02:14.334Z"\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"afadf42c-58b3-407d-844d-893ae431b0ce","filename":"winkeo-c-770x433.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F27\u002Fafadf42c-58b3-407d-844d-893ae431b0ce\u002Fwinkeo-c-770x433.jpg","dateCreated":{"date":"2022-10-27 09:29:47","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"afadf42c-58b3-407d-844d-893ae431b0ce","imageFilename":"winkeo-c-770x433.jpg","imageDateCreated":"2022\u002F10\u002F27"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Amazon.co","offerPrice":"","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.co.uk\u002FPasswordless-Two-Factor-Authentication-Smartphone-Interface-Black\u002Fdp\u002FB09M8XBP34\u002Fref=sr_1_1?crid=XOC03E8LU4AH&keywords=Winkeo&qid=1666870385&sprefix=winko,aps,103&sr=8-1","url":""}]\" data-techobjectinfo=\"{}\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EMany devices now use biometrics to let you log in without the inconvenience of remembering and typing a password: it's more secure, but it usually adds a little to the price of the device. If you use any devices that don't have Windows Hello, Face ID or a fingerprint sensor then you must have a password on your account anyway. \u003C\u002Fp\u003E\u003Cp\u003EIf you want to use two-factor authentication (2FA) or even go full passwordless but you still have older devices with no biometric hardware (or you prefer not to use biometrics), a \u003Ca href=\"https:\u002F\u002Ffidoalliance.org\u002Ffido2\u002F\" target=\"_blank\"\u003EFIDO2\u003C\u002Fa\u003E hardware key will let you use the same cross-platform authentication that's built into Windows, MacOS, iOS, Android, ChromeOS, Linux (although you may need to do \u003Ca href=\"https:\u002F\u002Fwww.sindastra.de\u002Fp\u002F1259\u002Ffix-fido-u2f-linux\" target=\"_blank\"\u003Ea little more setup\u003C\u002Fa\u003E) and an increasing number of online services like Microsoft 365, Azure AD, Google Drive and more. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"64bde74c-be17-4f3a-aa95-d546fb27a566\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Winkeo-C FIDO2 key is small enough to leave in your laptop.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Mary Branscombe \u002F ZDNET\" data-image-alt-text=\"Winkeo-C FIDO2 in laptop\" data-image-filename=\"winkeo-c-in-laptop.jpg\" data-image-date-created=\"2022\u002F10\u002F27\" data-image-width=\"712\" data-image-height=\"541\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe \u003Ca href=\"https:\u002F\u002Fneowave.fr\u002Fen\u002Fproducts\u002Ffido-range\u002Fwinkeo-c-fido2\u002F\" target=\"_blank\"\u003EWinkeo-C FIDO2\u003C\u002Fa\u003E from Neowave is a compact little security key that also supports the older \u003Ca href=\"https:\u002F\u002Ffidoalliance.org\u002Fspecs\u002Fu2f-specs-master\u002Ffido-u2f-overview.html\" target=\"_blank\"\u003EFIDO U2F\u003C\u002Fa\u003E specification that works with AWS, Dropbox, Facebook, GitHub, Gmail, GOV.UK, Okta, Salesforce, Twitter, Zoho and dozens of other sites and services. It's small enough to keep in the USB port of your laptop most of the time, although it doesn't sit flush enough that you'd necessarily want to leave it in place when you're carrying it in a bag (the lanyard hole makes it easy to put on a keyring to carry around though). We also found it fitted very snugly into the USB-C ports on multiple test devices, so you have to tug quite hard to extract it.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"83e62eae-a713-456b-9de7-45d432e7020a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ESites and services that use FIDO2 let you create a PIN and use a hardware key like the Winkeo-C to log in securely.\u003C\u002Fp\u003E\" data-image-credit=\"Screenshots: Mary Branscombe \u002F ZDNET\" data-image-alt-text=\"Winkeo-C FISO2 setup\" data-image-filename=\"winkeo-c-setup.jpg\" data-image-date-created=\"2022\u002F10\u002F27\" data-image-width=\"1167\" data-image-height=\"562\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou don't have to install any software – not even a driver: just set up your accounts for 2FA (you have to do that for each site or service you want to use it with) and add the Winkeo-C as your security key. For many services, that will involve setting a PIN. Whereas a password is sent to the server (and if the service provider doesn't protect their data properly a data breach could expose it to attackers), PINs never leave your device and are not synced across devices the way passwords are, so you must set them up on each system. PINs are just used to unlock the secure hardware that stores your log-on credentials, which means they can't be exposed in the same way passwords can. Even if someone tricks you into telling them your PIN, they can't use it without your security key. \u003C\u002Fp\u003E\u003Cp\u003EOnce set up, the key uses both the PIN and a tiny touch surface on the end to log into FIDO2-enabled systems and services that support passwordless: when you're using it as 2FA with a service like Gmail, you still need to fill in your password, but you must also have the security key plugged in and touch it to prove you're there. This isn't a fingerprint sensor, just a capacitive sensor that detects a live person touching it. \u003C\u002Fp\u003E\u003Cp\u003EUsually, the interface will tell you when to touch your device: if you miss that, the Winkeo-C flashes a bright red light to attract your attention (it also lights up green when you first plug it in to show it's been detected by your device). Because it's a USB-C device you can put it either way up: the light and touch surface are more visible when it's the right way up, but because the case is slightly translucent and the touch sensor is on the end, you can still use it (and notice the light) either way round. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"80cfbc0c-949e-4996-a7c4-8749e20d79e6\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe USB-A version of the Winkeo FIDO2 is quite a bit bigger.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Mary Branscombe \u002F ZDNET\" data-image-alt-text=\"Winkeo-C vs Winkeo-A\" data-image-filename=\"winkeo-c-vs-a.jpg\" data-image-date-created=\"2022\u002F10\u002F27\" data-image-width=\"999\" data-image-height=\"694\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you don't have a USB-C port, Neowave has a USB-A model (the \u003Ca href=\"https:\u002F\u002Fneowave.fr\u002Fen\u002Fproducts\u002Ffido-range\u002Fwinkeo-a-fido-2\u002F\" target=\"_blank\"\u003EWinkeo-A FIDO2\u003C\u002Fa\u003E), which is quite a lot larger but otherwise works in the same way. \u003C\u002Fp\u003E\u003Cp\u003EThere are plenty of FIDO2 hardware keys on the market, with \u003Ca href=\"https:\u002F\u002Fwww.yubico.com\u002F\" target=\"_blank\"\u003EYubico\u003C\u002Fa\u003E being perhaps the best known, which have options like NFC or biometrics and are mostly priced around £40-50. The Neowave keys are rather cheaper – £21.99\u002F€29.99 for the Winkeo-A and £32.50\u002F€29.99 for the Winkeo-C – if more basic. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"730bd103-ef08-41e8-ae43-bdaed109955f\" data-edition=\"us\" data-hed=\"Winkeo-C FIDO2\" data-imagegroup=\"{"alt":"Winkeo-C FIDO2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Image: Neowave","imageData":{"id":"afadf42c-58b3-407d-844d-893ae431b0ce","filename":"winkeo-c-770x433.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F27\u002Fafadf42c-58b3-407d-844d-893ae431b0ce\u002Fwinkeo-c-770x433.jpg","dateCreated":{"date":"2022-10-27 09:29:47","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"afadf42c-58b3-407d-844d-893ae431b0ce","imageFilename":"winkeo-c-770x433.jpg","imageDateCreated":"2022\u002F10\u002F27"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Image: Neowave\" data-offerurl=\"https:\u002F\u002Fwww.amazon.co.uk\u002FPasswordless-Two-Factor-Authentication-Smartphone-Interface-Black\u002Fdp\u002FB09M8XBP34\u002Fref=sr_1_1?crid=XOC03E8LU4AH&keywords=Winkeo&qid=1666870385&sprefix=winko%2Caps%2C103&sr=8-1\" data-offermerchant=\"Amazon\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAs a lesser-known supplier, you may have a few more hoops to jump through to use these Neowave devices: they're not listed on the common instructions for setting up a UDEV rule to FIDO2 and you may need to \u003Ca href=\"https:\u002F\u002Fwww.authentification-web.co.uk\u002Ffido2-microsoft-tutorial\" target=\"_blank\"\u003Eturn off the key restriction policies in Azure AD\u003C\u002Fa\u003E that limit hardware manufacturers you can use before enabling security keys for your tenant. \u003C\u002Fp\u003E\u003Cp\u003EThat doesn't mean there are any security concerns (Neowave is a \u003Ca href=\"https:\u002F\u002Flearn.microsoft.com\u002Fen-us\u002Fazure\u002Factive-directory\u002Fauthentication\u002Fconcept-fido2-hardware-vendor\" target=\"_blank\"\u003EMicrosoft partner\u003C\u002Fa\u003E and its security keys are certified by ANSSI, the French national cybersecurity agency), but it does mean a little extra setup work to make logging in both simpler and more secure. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EWinkeo-C FIDO2 specifications\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd width=\"30%\"\u003E\t\t\t\t\u003Cem\u003ESmart card component\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd width=\"70%\"\u003ECertified Common Criteria EAL5+ • up to 1024 credentials for FIDO2 and FIDO U2F\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EFIDO2 features\u003C\u002Ftd\u003E\u003Ctd\u003E\t\t\t\t\u003Cbr\u003E \u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003ESupported crypto-algorithm\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003EECC P-256\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003ESupported options\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003Euser PIN (4-63 bytes, try limit = 8) • resident keys (max number ~256 credentials)\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003EExtension\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003EHMAC secret\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EFIDO U2F features\u003C\u002Ftd\u003E\u003Ctd\u003E\t\t\t\t\u003Cbr\u003E \u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cbr\u003E \u003C\u002Ftd\u003E\u003Ctd\u003ENo security failure in case of key or password theft (Authentication requires both)\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cbr\u003E \u003C\u002Ftd\u003E\u003Ctd\u003E Second factor authentication fully compliant with Google services through Chrome, Edge and Firefox browsers\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cbr\u003E \u003C\u002Ftd\u003E\u003Ctd\u003EExtended compatibility (Salesforce, Office 365, etc.) through federation identity providers (Web SSO)\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003ESupported operating systems\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003EWindows, Mac, Linux and Android\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003ESupported browsers\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003EChrome, Chromium, Vivaldi, Opera, Mozilla Firefox, Microsoft Edge (via WebAuthn\u002FFIDO2 CTAP)\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003EDimensions\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E23.5mm (26.1mm with cap) x 14.4mm x 6.5mm\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003EWeight\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E3g\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\t\t\t\t\u003Cem\u003EPrice\u003C\u002Fem\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E£32.50 \u002F €29.99\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cbr\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Chr\u003E\u003Ch2\u003E Alternatives to consider \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"88096407-0511-4392-a808-8939a3ebc3c2\" data-edition=\"us\" data-hed=\"Yubikey 5C NFC\" data-imagegroup=\"{"alt":"YubiKey 5C NFC","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"c7fb7694-46ca-4c0c-8f4b-d27d153bba7e","filename":"5cnfc-tap.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F01\u002F08\u002Fc7fb7694-46ca-4c0c-8f4b-d27d153bba7e\u002F5cnfc-tap.jpg","dateCreated":{"date":"2021-01-08 17:13:45","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"c7fb7694-46ca-4c0c-8f4b-d27d153bba7e","imageFilename":"5cnfc-tap.jpg","imageDateCreated":"2021\u002F01\u002F08"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FYubico-YubiKey-USB-Authentication-Security\u002Fdp\u002FB07HBD71HL\u002Fref=sr_1_1_sspa?crid=2XAPIN6WTW9FZ&keywords=Yubikey+5C+NFC&qid=1666870746&qu=eyJxc2MiOiIxLjY4IiwicXNhIjoiMS4xMCIsInFzcCI6IjEuMjAifQ%3D%3D&sprefix=yubikey+5c+nfc%2Caps%2C142&sr=8-1-spons&psc=1\" data-offermerchant=\"Amazon\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"14a9a804-c300-4998-8d75-8236497af30c\" data-edition=\"us\" data-hed=\"Google Titan Security Key\" data-imagegroup=\"{"alt":"Google Titan Security Key","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Image: Google","imageData":{"id":"617f49f3-03c2-4e72-b2f9-23b155649312","filename":"google-titan-security-key-770x433.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F27\u002F617f49f3-03c2-4e72-b2f9-23b155649312\u002Fgoogle-titan-security-key-770x433.jpg","dateCreated":{"date":"2022-10-27 11:48:40","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"617f49f3-03c2-4e72-b2f9-23b155649312","imageFilename":"google-titan-security-key-770x433.jpg","imageDateCreated":"2022\u002F10\u002F27"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Image: Google\" data-offerurl=\"https:\u002F\u002Fstore.google.com\u002Fus\u002Fproduct\u002Ftitan_security_key?hl=en-US\" data-offermerchant=\"Google\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003ERECENT AND RELATED CONTENT\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-is-the-ultimate-security-key-heres-why-you-need-one\u002F\" target=\"_blank\"\u003EThis is the ultimate security key. Here's why you need one\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-yubikey\u002F\" target=\"_blank\"\u003EThe best YubiKeys: What's the difference between each key?\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-two-factor-authentication-for-your-facebook-account\u002F\" target=\"_blank\"\u003EHow to set up two-factor authentication for your Facebook account\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fconnecting-to-public-wi-fi-heres-how-to-protect-your-data-and-your-device\u002F\" target=\"_blank\"\u003EConnecting to public Wi-Fi: Here's how to protect your data and your device\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best security keys: Protect your online accounts\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead more \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Freviews\u002F\" target=\"_blank\"\u003E\u003Cem\u003Ereviews\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdrop-epos-pc38x-review\u002F\" target=\"_blank\"\u003EThis headset's directional game sound is so good you'll feel like you're cheating\u003C\u002Fa\u003E \u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-surface-laptop-5-hands-on-this-looks-familiar\u002F\" target=\"_blank\"\u003EMicrosoft Surface Laptop 5 hands-on: This looks familiar...\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-surface-pro-9-review-impressive-but-is-it-worth-the-price-of-an-m2-macbook-air\u002F\" target=\"_blank\"\u003EMicrosoft Surface Pro 9 review: Impressive but is it worth the price of an M2 MacBook Air?\u003C\u002Fa\u003E \u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fipad-2022-10th-gen-review-better-than-the-pro-in-two-ways\u002F\" target=\"_blank\"\u003EiPad 2022 (10th Gen) review: Better than the Pro in two ways\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-office\u002Frode-procaster-microphone-review\u002F\" target=\"_blank\"\u003ERode Procaster review: Broadcast-quality microphone for under $200\u003C\u002Fa\u003E \u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-10-27 12:06:00",timezone:"UTC",updated:c,published:c},description:"Add FIDO2 to devices that don't have built-in security hardware. There's a little extra setup work, but the price is competitive.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"820f6124-a9e7-42be-937f-588ad3f7fe90",image:{id:"afadf42c-58b3-407d-844d-893ae431b0ce",filename:"winkeo-c-770x433.jpg",dateCreated:{created:c,date:"2022-10-27 09:29:47",timezone:"UTC",updated:c,published:c},alt:"Winkeo-C FIDO2",credits:"Image: Neowave",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F27\u002Fafadf42c-58b3-407d-844d-893ae431b0ce\u002Fwinkeo-c-770x433.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:770,height:433,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"review-single",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"winkeo-c-fido2-hands-on",startYear:c,summary:b,title:"Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"112a7545-ec91-11e3-95d2-02911863765e",slug:"reviews",name:"Reviews",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"d94ec5d6-b77e-45bf-9ad6-bd0c3f85c947\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EApricorn Aegis Secure Key 3&nbsp;\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Apricorn Aegis Secure Key 3 \" data-image-filename=\"img-0353.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELosing hardware is a pain, but everything is replaceable. \u003C\u002Fp\u003E\u003Cp\u003EAllowing data to fall into someone else's hands is the ultimate headache. Once your data is out there in the wild, it's game over.\u003C\u002Fp\u003E\u003Cp\u003EThe \"solution\" is to encrypt your data. But the problem with that solution is that unless the encryption is easy and foolproof, users are going to sacrifice data security for convenience.\u003C\u002Fp\u003E\u003Cp\u003EIf you want easy-to-use high security encryption, then you need hardware that's aimed at professionals, and that hardware doesn't get much better than the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0d46e638-dddb-48c6-9999-1401e2a285f2\" data-raw-url=\"https:\u002F\u002Fapricorn.com\u002Faegis-secure-key-3\" data-link-shortcode-text=\"Apricorn Aegis Secure Key 3.0\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-unusual-ransomware-attack-targets-home-pcs-so-beware\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThis unusual ransomware attack targets home PCs, so beware\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"efbd3e2b-8b43-424d-b5c4-caefa2cfd9ce\" data-edition=\"us\" data-hed=\"Apricorn Aegis Secure Key 3.0\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"3e3b152b-d390-467c-b0f5-d1be72546c1a","filename":"img-0352.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F14\u002F3e3b152b-d390-467c-b0f5-d1be72546c1a\u002Fimg-0352.jpg","dateCreated":{"date":"2022-10-14 10:34:53","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"3e3b152b-d390-467c-b0f5-d1be72546c1a","imageFilename":"img-0352.jpg","imageDateCreated":"2022\u002F10\u002F14"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FApricorn-Validated-256-bit-Encryption-ASK3-120GB\u002Fdp\u002FB07QMNC6CD\u002F\" data-offermerchant=\"Amazon\" data-monetizedurl=\"https:\u002F\u002Fwww.amazon.com\u002FApricorn-Validated-256-bit-Encryption-ASK3-120GB\u002Fdp\u002FB07QMNC6CD\u002F?tag=zdnet-buy-button-20\" data-techobjectinfo=\"{"uuid":"35765a27-87c7-45e2-930f-81ca4f582730","slug":"apricorn-aegis-secure-key-3-0-usb-flash-drive-1-tb-taa-compliant","name":"Apricorn Aegis Secure Key 3.0 - USB flash drive - 1 TB - TAA Compliant","productType":"PRODUCT","updateType":"EZMONEY","mod":1665745094134,"displayDate":"Fri Oct 14 2022 11:58:14 GMT+0100 (British Summer Time)"}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EApricorn Aegis Secure Key 3.0 tech specs:\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003ENo software – so there's nothing to keylog or to hack.\u003C\u002Fli\u003E\u003Cli\u003EOS agnostic – the device is completely cross platform compatible.\u003C\u002Fli\u003E\u003Cli\u003EOnboard keypad – all authentication takes place within the device itself.\u003C\u002Fli\u003E\u003Cli\u003EAll data, passwords and encryption keys are 256-bit encrypted at rest.\u003C\u002Fli\u003E\u003Cli\u003ENo host computer is involved in setup, authentication or encryption.\u003C\u002Fli\u003E\u003Cli\u003EForced enrollment – no default PINs ensures that data is not put at risk by employees who fail to change a factory set PIN before deployment.\u003C\u002Fli\u003E\u003Cli\u003EIP68 rated against water and dust damage.\u003C\u002Fli\u003E\u003Cli\u003ESeparate administrator and user access.\u003C\u002Fli\u003E\u003Cli\u003ERead-only options that can be enforced by the administrator or set by the user if allowed by policy.\u003C\u002Fli\u003E\u003Cli\u003EHighly configurable with policy such as time out values, data recovery PINs, and programmable PIN lengths.\u003C\u002Fli\u003E\u003Cli\u003EBrute force PIN attack protection.\u003C\u002Fli\u003E\u003Cli\u003EExtruded aluminum enclosure with protective sleeve.\u003C\u002Fli\u003E\u003Cli\u003EFIPS 140-2 Level 3 validated.\u003C\u002Fli\u003E\u003Cli\u003ECan be automatically configured remotely using Apricorn's Aegis Configurator tool.\u003C\u002Fli\u003E\u003Cli\u003EUp to 195MB\u002Fs read speed\u002F162MB\u002Fs write speed.\u003C\u002Fli\u003E\u003Cli\u003ESuper Speed USB 3.2 (backwards compatible with USB 3.0, 2.0 and 1.1)\u003C\u002Fli\u003E\u003Cli\u003ECapacities ranging from 30GB to 2TB.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"98c74a93-3f00-49c4-aaba-09463dc12399\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ENot much bigger than a regular USB flash drive\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Not much bigger than a regular USB flash drive\" data-image-filename=\"img-0354.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELooking like an oversized USB flash drive, the Aegis Secure Key 3.0 packs a lot of high-tech into the tough aluminum shell. \u003C\u002Fp\u003E\u003Cp\u003EThe first thing that immediately stands out is the built-in keypad that's used to enter the passcode, which eliminates the risk of your passcode being compromised by a keylogger.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"3e945c99-f206-423f-b2c7-31fe9fee7089\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe keypad is rugged and blocks passcode leaking as a result of keyloggers\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"The keypad is rugged and blocks passcode leaking as a result of keyloggers\" data-image-filename=\"img-0358.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen I started using Aegis encrypted flash drives with the built-in keypad I expected the polymer-coated buttons to be the weak link, but they are exceedingly wear-resistant and do not seem to wear out over time to reveal the most commonly used buttons. I have similar drives that have been in regular usage for several years and the keypads still look like new.\u003C\u002Fp\u003E\u003Cp\u003EIt's not just the keypad that's tough. The flash drive is encased in aluminum (which also acts as a heatsink to keep the drive cool when in use), and there's even an extruded aluminum protective sleeve that protects the keypad and connector.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"6d90f443-7a7c-41c4-a0b0-1b42c33fbffd\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ENot just secure, but also very tough\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Not just secure, but also very tough\" data-image-filename=\"img-0355.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe drive is IP68 rated against water and dust damage, making it a really rugged storage drive that's just as much at home in the wilderness as it is in an air-conditioned office.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn use, the simplicity of the Aegis Secure Key 3.0 really shines. Once you've set up a passcode, you can unlock and lock the drive in a matter of seconds with a few taps on the keypad.\u003C\u002Fp\u003E\u003Cp\u003EYou can unlock it easily. But the bad guys can't.\u003C\u002Fp\u003E\u003Cp\u003EThe drive features built-in brute-force decrypt defense to wipe the drive if someone tries to guess the passcode, and it has a built-in unattended auto-lock feature that secures the drive in the event you walk away from it or become distracted.\u003C\u002Fp\u003E\u003Cp\u003EFor an added level of security, there's also the ability to set a self-destruct PIN to quickly wipe the drive of its contents yet make it seem like it is fully working.\u003C\u002Fp\u003E\u003Cp\u003EHow James Bond is that?\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"7bc83934-b3f1-4575-9315-78d0c8270986\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe drive works perfectly on USB-C Macs using a thord-party USB-C-to-USB-A adapter&nbsp;\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"The drive works perfectly on USB-C Macs using a thord-party USB-C-to-USB-A adapter \" data-image-filename=\"img-0357.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAll internal components are physically protected from tampering with hardened epoxy, and the firmware is locked down, making it immune to malware attacks such as \u003Ca href=\"https:\u002F\u002Fwww.apricorn.com\u002Ffaq\u002Ffaq\u002Fview\u002Fid\u002F2415\u002F\" target=\"_blank\"\u003EBadUSB\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EAnother standout feature of this encrypted flash drive is the capacity. Two terabytes is absolutely enormous when it comes to USB flash drives, not to mention those featuring high-grade encryption. Some may advocate for smaller drives, especially when paying for for encryption as well as the storage drive, but there are a number of really big advantages to having this high capacity. \u003C\u002Fp\u003E\u003Cp\u003EThe first is that you don't have to spend time picking and choosing what gets encrypted and what doesn't. Here you have the room to secure everything. This not only simplifies the thought process, but it also eliminates the risk that something which should be encrypted gets missed and is laying around easily accessible. \u003C\u002Fp\u003E\u003Cp\u003EAnother benefit is that sometimes you just need access to huge amounts of portable encrypted storage. Maybe you're moving a lot of documents around. Perhaps it's a backup. Maybe you want to copy and move some sensitive CCTV footage.\u003C\u002Fp\u003E\u003Cp\u003EHaving two terabytes of portable storage that's always secured means that you never have to make the sort of compromises that leave sensitive data open to interception.\u003C\u002Fp\u003E\u003Cp\u003EThe Aegis Secure Key 3.0 is also totally cross-platform compatible and OS agnostic. Whether you use Windows, Linux, Mac, Android, or Chrome, this encrypted storage drive will work as long as there's a powered USB port and storage file system available. All the encryption and decryption and control of the drive happens on the drive.\u003C\u002Fp\u003E\u003Cp\u003EOn the performance side, the drive is capable of read and write speeds up to 195MB\u002Fs and 162MB\u002Fs, respectively. I've tested this and found the real-world figures to be close to these published specs.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"7003f81b-4dbf-4aff-bd0b-e046c5b41788\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe real-world performance lives up to the published specs\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"The real-world performance lives up to the published specs\" data-image-filename=\"2022-10-14-10-41-37.jpg\" data-image-date-created=\"2022\u002F10\u002F14\" data-image-width=\"3200\" data-image-height=\"1416\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe Apricorn Aegis Secure Key 3.0 also comes in a broad range of capacities, ranging from 30GB to 2TB, with \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0d35c6aa-292d-4250-8ef6-8107d7c850dd\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FApricorn-Validated-256-bit-Encryption-ASK3-120GB\u002Fdp\u002FB07QMNC6CD\u002F\" data-link-shortcode-text=\"prices ranging from $129 to $999\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-10-14 12:50:00",timezone:"UTC",updated:c,published:c},description:"Want to feel like James Bond? Check out this easy-to-use encrypted flash drive.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"91e18972-71d7-4c90-b729-cc3fcf5f65b6",image:{id:"bc67d68f-6a4e-4f04-913a-7b2586f42b56",filename:"img-0359.jpg",dateCreated:{created:c,date:"2022-10-14 10:36:06",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F10\u002F14\u002Fbc67d68f-6a4e-4f04-913a-7b2586f42b56\u002Fimg-0359.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:900,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Innovation^Computing^Storage",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"this-flash-drive-will-self-destruct-if-you-want-it-to",startYear:c,summary:b,title:"This flash drive will self-destruct (if you want it to)",topic:{id:"11601750-ec91-11e3-95d2-02911863765e",slug:"storage",name:"Storage",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"11601750-ec91-11e3-95d2-02911863765e",slug:"storage",name:"Storage",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"5a505bd7-edd5-4501-b6a1-0b4b0149318e",username:"Jason Cipriani",profileUrl:c,email:c,firstName:"Jason",lastName:"Cipriani",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"ec9503e9-68fc-4acb-b714-31487e597154",filename:"jason-cipriani.jpg",dateCreated:{created:c,date:"2022-08-05 15:09:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fec9503e9-68fc-4acb-b714-31487e597154\u002Fjason-cipriani.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jason Cipriani is based out of beautiful Colorado and has been covering technology news and reviewing the latest gadgets as a freelance journalist for the past 13 years. His work can be found all across the Internet and in print. When he's not writing, he can be found hanging out with his family, gaming, or trying to force himself to read a book.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"436d924c-0d03-43ea-a8d9-f19ac04109b3\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Blink\" data-image-alt-text=\"Blink outdoor light on a patio\" data-image-filename=\"blink-superior-lifestyles-patio-shot3.jpg\" data-image-date-created=\"2022\u002F09\u002F27\" data-image-width=\"2700\" data-image-height=\"1800\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAmazon has announced a bunch of new products, including new Echo hardware, new Ring home security cameras, and new Blink devices. Here's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Feverything-amazon-just-announced-and-how-to-buy-it-all\u002F\" target=\"_blank\"\u003Eeverything Amazon announced at its fall event today\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EBlink, which is owned by Amazon, is known for relatively affordable \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8fd264f7-8a91-47ab-926e-6d0009f99f4b\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Outdoor-Wireless-Security-Camera-3cam\u002Fdp\u002FB086DKSHQ4\u002F\" data-link-shortcode-text=\"home security products\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E with long battery life and free video storage. However, the company just unveiled a hardwired \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"324f8616-4a73-4283-9a7c-0ddd10b8ec8f\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Wired-Floodlight-Camera\u002Fdp\u002FB0B5VLCL1N\u002F\" data-monetized-url=\"https:\u002F\u002Famazon.com\u002Fblink?tag=zdnet-buy-button-20\" data-link-shortcode-text=\"Blink Wired Floodlight Camera\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, alongside a new \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"9a3fe986-14e0-4727-905d-5dca44c94d00\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-Pan-Tilt-Camera-White\u002Fdp\u002FB09N6YCT3Y\u002F\" data-monetized-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-Pan-Tilt-Camera-White\u002Fdp\u002FB09N6YCT3Y\u002F?tag=zdnet-buy-button-20\" data-link-shortcode-text=\"Blink Mini Pan-Tilt Mount\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"f1eaeeb1-e6c8-4087-98b0-7d8ea8516bd5\" data-edition=\"us\" data-hed=\"Blink Wired Floodlight Camera\" data-imagegroup=\"{"alt":"Amazon's Blink Wired Floodlight Camera","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"08cec33b-4589-4b10-8493-866d6174743c","filename":"blink-wired-floodlight-garage-shot2.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F28\u002F08cec33b-4589-4b10-8493-866d6174743c\u002Fblink-wired-floodlight-garage-shot2.jpg","dateCreated":{"date":"2022-09-28 16:07:18","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"08cec33b-4589-4b10-8493-866d6174743c","imageFilename":"blink-wired-floodlight-garage-shot2.jpg","imageDateCreated":"2022\u002F09\u002F28"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Wired-Floodlight-Camera\u002Fdp\u002FB0B5VLCL1N\u002F\" data-offerprice=\"99.99\" data-offermerchant=\"Amazon\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EFor $99, the Blink Wired Floodlight Camera is wired into your home's existing electrical wiring for power. It then records 1080p video with live view, and has two-way audio capabilities. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Famazons-friendly-robot-helper-astro-will-now-double-as-a-security-guard-for-your-business\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EAmazon's Astro bot will now double as a security guard\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAvailability for the Blink Wired Floodlight Camera wasn't announced outside of a vague statement that it'll be \"available in the coming months.\" However, you can keep an eye on \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8de27f62-f77e-445f-9c6b-2b348e9eb125\" data-raw-url=\"https:\u002F\u002Famazon.com\u002Fblink\" data-link-shortcode-text=\"amazon.com\u002Fblink\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"be96a521-96e2-41c4-8d00-69b085f60e88\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Blink\" data-image-alt-text=\"Blink Mini Pan Tilt in a living room with modern art\" data-image-filename=\"blink-mini-pan-tilt-colorful-table.jpg\" data-image-date-created=\"2022\u002F09\u002F27\" data-image-width=\"3840\" data-image-height=\"2160\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe Blink Mini Pan-Tilt isn't a camera, specifically; instead, it's a motorized mount for the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"96e2e731-d978-4db5-98ab-b385ed9eeac4\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-White-1Cam\u002Fdp\u002FB07X6C9RMF\u002F\" data-link-shortcode-text=\"Blink Mini indoor cam\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. When the two devices are used together, the mount will rotate the Mini cam to provide up to 360-degree coverage of a room. You can use the Blink mobile app to control the camera remotely. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"bf6d8e3c-a102-41d6-beba-845c91ab8551\" data-edition=\"us\" data-hed=\"Blink Mini Pan-Tilt Mount\" data-imagegroup=\"{"alt":"Amazon's Blink Mini Pan and Tilt cameras in Black and White","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"01835ed2-7623-489a-b3e5-b34db04a11c5","filename":"blink-mini-pan-tilt-black-and-white-lifestyle-livingroom.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F28\u002F01835ed2-7623-489a-b3e5-b34db04a11c5\u002Fblink-mini-pan-tilt-black-and-white-lifestyle-livingroom.jpg","dateCreated":{"date":"2022-09-28 16:01:53","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"01835ed2-7623-489a-b3e5-b34db04a11c5","imageFilename":"blink-mini-pan-tilt-black-and-white-lifestyle-livingroom.jpg","imageDateCreated":"2022\u002F09\u002F28"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-Pan-Tilt-Camera-White\u002Fdp\u002FB08Z6MHCBW\u002F?th=1\" data-offerprice=\"29.99\" data-offermerchant=\"Amazon\" data-monetizedurl=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-Pan-Tilt-Camera-White\u002Fdp\u002FB08Z6MHCBW\u002F?th=1&tag=zdnet-buy-button-20\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso\u003C\u002Fstrong\u003E: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Famazons-device-ecosystem-is-vast-heres-why-its-going-to-get-even-bigger\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EFrom Echo to Astro, here's what Amazon's device strategy is really about\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Pan-Tilt mount on its own is priced at $29.99, while the Blink Mini bundled with the Pan-Tilt is $59.99. The stand-alone mount and the combo pack are both available for preorder now.\u003C\u002Fp\u003E\u003Cp\u003EAmazon also announced \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fring-spotlight-cam-pro-release-date-price-how-to-buy-amazon\u002F\" target=\"_blank\"\u003Enew Spotlight Cam Pro and Cam Plus models\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6a422265-8bf4-464a-ab25-f14a401bc29f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6a422265-8bf4-464a-ab25-f14a401bc29f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-28 16:44:00",timezone:"UTC",updated:c,published:c},description:"Amazon-owned Blink announces a pair of new products, including the Blink Wired Floodlight Camera -- a first for the company.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"32c2e9f8-138a-42df-ac00-965436790481",image:{id:"436d924c-0d03-43ea-a8d9-f19ac04109b3",filename:"blink-superior-lifestyles-patio-shot3.jpg",dateCreated:{created:c,date:"2022-09-27 20:56:08",timezone:"UTC",updated:c,published:c},alt:"blink-superior-lifestyles-patio-shot3",credits:"Image: Blink",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F27\u002F436d924c-0d03-43ea-a8d9-f19ac04109b3\u002Fblink-superior-lifestyles-patio-shot3.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2700,height:1800,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Home & Office^Smart Home^Home Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"blink-has-a-new-wired-floodlight-camera-and-blink-mini-pan-tilt",startYear:c,summary:b,title:"Blink has a new floodlight camera and Blink Mini Pan-Tilt mount",topic:{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fb7a83c-ec91-11e3-95d2-02911863765e",slug:"amazon",name:"Amazon",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"54795830-f620-4b12-bd83-5740537be838",slug:"internet-of-things",name:"Internet of Things",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"eb2c3201-61c4-41f4-a8cd-9ceda49f4948",slug:"smart-lighting",name:"Smart Lighting",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:"Deep-dive, compare, decide",description:c,filters:c,paging:c,slug:"dynamic-topic-4-story-carousel-product-research",title:"Product Research",label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c},{id:"49cbd472-fb49-40ab-832b-366ddd22eb32",meta:{componentName:"49cbd472-fb49-40ab-832b-366ddd22eb32",componentDisplayName:"How-to Guides",componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F49cbd472-fb49-40ab-832b-366ddd22eb32\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=49cbd472-fb49-40ab-832b-366ddd22eb32"}},items:[{author:{id:"0a6fffc2-2220-44ba-99e4-4c567f6f57bb",username:"maria-diaz-zd",profileUrl:c,email:c,firstName:"Maria",lastName:"Diaz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"d89921b7-c002-40ef-8401-f002f1a769e9",filename:"maria-diaz.jpg",dateCreated:{created:c,date:"2022-08-05 14:44:33",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fd89921b7-c002-40ef-8401-f002f1a769e9\u002Fmaria-diaz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Maria Diaz is a staff writer based in the Raleigh-Durham, NC area with a passion for home automation and a background in graphic design, photography, and filmmaking. She has a bachelor's in Mass Communication and experience in journalism.",profile:c,title:"Staff Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"f6d75cb0-a6bc-46b6-9903-1002418bef17\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"AirTag notification on iPhone\" data-image-filename=\"airtag-moving.jpg\" data-image-date-created=\"2024\u002F07\u002F18\" data-image-width=\"1920\" data-image-height=\"1080\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAn \u003Ca href=\"https:\u002F\u002Fassoc-redirect.amazon.com\u002Fg\u002Fr\u002Fhttps:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0933BVK6T?tag=zd-buy-button-20&ascsubtag=__COM_CLICK_ID__%7C84819269-7556-4229-950b-d2d20b552c2e%7Cdtp\" target=\"_blank\"\u003EApple AirTag\u003C\u002Fa\u003E can help you \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fwork-life\u002Fhow-to-track-an-airtag\u002F\"\u003Ekeep track of your most important items\u003C\u002Fa\u003E like \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhow-to-securely-attach-your-apple-airtag-to-things-without-breaking-the-bank\u002F\"\u003Ekeys, wallets\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fthis-accessory-lets-you-add-an-airtag-to-your-apple-tv-remote\u002F\"\u003Eremotes\u003C\u002Fa\u003E, and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-hide-an-apple-airtag-on-your-bike-and-why-you-should\u002F\"\u003Eeven bicycles\u003C\u002Fa\u003E. Bad actors can meanwhile leverage AirTags to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fairtag-use-in-theft-and-stalking-incidents-prompts-apple-to-update-its-personal-safety-user-guide\u002F\"\u003Etrack people without their consent\u003C\u002Fa\u003E, casting a shadow on their use.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fthe-best-airtag-for-your-wallet-is-flat-rechargeable-and-isnt-made-by-apple\u002F\"\u003EThe best AirTag for your wallet is flat, rechargeable, and isn't made by Apple\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis is why Apple has \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fapple-will-make-it-easier-to-find-unwanted-airtags\u002F\"\u003Emade significant changes\u003C\u002Fa\u003E to how AirTags can be used. The company now gives disclosures to AirTag owners, reiterating that these trackers are only for tracking their belongings and never for unwanted tracking of others, and lets iPhone users see when an AirTag has been detected to be moving with them. In fact, both \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fios-and-android-owners-will-now-be-alerted-if-an-unknown-tracker-is-moving-with-them\u002F\" target=\"_blank\"\u003EiOS and Android devices now alert\u003C\u002Fa\u003E their owners when an unknown Bluetooth tracker is found moving with them.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to know if an AirTag is tracking you\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"youtube_video\" data-size=\"large\" data-float=\"none\" data-oembed=\"{"author_name":"ZDNET","author_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F@zdnetvideo","height":113,"html":"\u003Ciframe width=\\"200\\" height=\\"113\\" src=\\"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fembed\\\u002FnymA61wX8I0?autoplay=0&amp;loop=0&amp;fs=1&amp;start=0&amp;rel=1&amp;feature=oembed\\" frameborder=\\"0\\" allow=\\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\\" allowfullscreen title=\\"How to find out if an AirTag is tracking you\\"\u003E\u003C\\\u002Fiframe\u003E","provider_name":"YouTube","provider_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F","thumbnail_height":360,"thumbnail_url":"https:\\\u002F\\\u002Fi.ytimg.com\\\u002Fvi\\\u002FnymA61wX8I0\\\u002Fhqdefault.jpg","thumbnail_width":480,"title":"How to find out if an AirTag is tracking you","type":"video","version":"1.0","width":200}\" data-url=\"https:\u002F\u002Fyoutu.be\u002FnymA61wX8I0\" data-autoplay=\"false\" data-loop=\"false\" data-start=\"0\" data-fs=\"true\" data-rel=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EWhat you'll need:\u003C\u002Fstrong\u003E To get help locating an unwanted AirTag, you'll need an \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\"\u003EiPhone\u003C\u002Fa\u003E or an \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-android-phone\u002F\"\u003EAndroid phone\u003C\u002Fa\u003E. We detail below what it looks like on an iPhone when an AirTag tracks you.\u003C\u002Fp\u003E\u003Cp\u003EIf you suspect someone is tracking your movements using an AirTag, your iOS or Android phone \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fandroids-new-unknown-tracker-alerts-can-help-warn-users-of-rogue-apple-airtags\u002F\"\u003Emay alert you\u003C\u002Fa\u003E before you have to do anything. If someone is tracking you without permission, and you feel you may be in danger, contact law enforcement to get more \u003Ca href=\"https:\u002F\u002Fwww.apple.com\u002Flegal\u002Fprivacy\u002Flaw-enforcement-guidelines-us.pdf\" target=\"_blank\"\u003Einformation on the AirTag's owner from Apple\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-clear-cache-on-iphone-and-why-you-should\u002F\"\u003EHow to clear the cache on your iPhone\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f40cdb48-ef69-4a0f-b248-501de9f191d6\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you own an iPhone, and it detects an AirTag, your phone may alert you of an "AirTag found moving with you." This will happen if these things are true:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EThe AirTag is separated from its owner.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYour iPhone is awake.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EThis can also happen with other Find My Network accessories, like \u003Ca href="https:\u002F\u002Fassoc-redirect.amazon.com\u002Fg\u002Fr\u002Fhttps:\u002F\u002Fwww.amazon.com\u002FApple-AirPods-Charging-Latest-Model\u002Fdp\u002FB07PXGQC1Q\u002F?tag=zd-buy-button-20&amp;ascsubtag=__COM_CLICK_ID__%7C84819269-7556-4229-950b-d2d20b552c2e%7Cdtp" target="_blank"\u003EAirPods\u003C\u002Fa\u003E, \u003Ca href="https:\u002F\u002Fassoc-redirect.amazon.com\u002Fg\u002Fr\u002Fhttps:\u002F\u002Fwww.amazon.com\u002FApple-Generation-Cancelling-Transparency-Personalized\u002Fdp\u002FB0BDHWDR12\u002F?tag=zd-buy-button-20&amp;ascsubtag=__COM_CLICK_ID__%7C84819269-7556-4229-950b-d2d20b552c2e%7Cdtp" target="_blank"\u003EAirPods Pro\u003C\u002Fa\u003E, \u003Ca href="https:\u002F\u002Fassoc-redirect.amazon.com\u002Fg\u002Fr\u002Fhttps:\u002F\u002Fwww.amazon.com\u002FNew-Apple-AirPods-Max-Green\u002Fdp\u002FB08PZDSP2Z\u002F?tag=zd-buy-button-20&amp;ascsubtag=__COM_CLICK_ID__%7C84819269-7556-4229-950b-d2d20b552c2e%7Cdtp" target="_blank"\u003EAirPods Max\u003C\u002Fa\u003E, and others. AirTags, second-generation AirPods Pro, and other Find My items can all play a sound when they're moved while separated from their owners.\u003C\u002Fp\u003E\" data-hed=\"1. You may receive an alert on your iPhone\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"24755f7a-62e7-4d38-a89e-bd73096633b0\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThis is the notification you get when your iPhone notices an AirTag is moving with you.\u003C\u002Fp\u003E\" data-image-credit=\"Apple\" data-image-alt-text=\"Notification that an AirTag was found moving with you\" data-image-filename=\"notification.jpg\" data-image-date-created=\"2023\u002F01\u002F19\" data-image-width=\"1080\" data-image-height=\"1920\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3bbd09cc-bbe4-4838-a620-e0ba298de1ec\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you don't receive an alert of an unknown AirTag nearby when you know there is one, you may need to follow these steps to ensure your tracking notifications are turned on:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EGo to Settings and select Privacy &amp; Security.\u003C\u002Fli\u003E\u003Cli\u003ETap on Location Services and turn on Location Services.\u003C\u002Fli\u003E\u003Cli\u003EGo to System Services.\u003C\u002Fli\u003E\u003Cli\u003ETurn on both Find My iPhone and Significant Locations.\u003C\u002Fli\u003E\u003Cli\u003EGo back to Settings and select Bluetooth.\u003C\u002Fli\u003E\u003Cli\u003ETurn on Bluetooth.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EFinally, go to the Find My app and tap on yourself, the Me tab.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003ETurn on Tracking Notifications.\u003C\u002Fli\u003E\u003Cli\u003EMake sure Airplane Mode is off, or you won't get notifications.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\" data-hed=\"2. Check that your Tracking Notifications are on\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"8f6cd66a-83f6-4a35-b4b0-6011085909f1\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EIn System Services, we're going to enable Tracking Notifications.\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by Maria Diaz\u002FZDNET\" data-image-alt-text=\"Settings for AirTag notification\" data-image-filename=\"settings.jpg\" data-image-date-created=\"2023\u002F01\u002F19\" data-image-width=\"1920\" data-image-height=\"1080\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d5af8c5a-8831-4622-b338-aae55853a522\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen an AirTag is separated from its owner, it may play a sound to make it easier for others to find it. If you hear an AirTag -- or another sound you can't recognize that you believe could be an AirTag -- open the Find My app on your Apple device and check to see if it found an AirTag.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F"\u003E\u003Cstrong\u003EThe best Bluetooth trackers you can buy\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ECheck your belongings for the hidden AirTag, making sure to pat down jackets and bags, and thoroughly check your pockets, purse, and wallet.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"3. Check the Find My app\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"f4832fac-98dd-44fc-8ac2-82fdc5add792\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot: Maria Diaz\u002FZDNET\" data-image-alt-text=\"Find My app AirTag tracking notification\" data-image-filename=\"findmyappp.jpg\" data-image-date-created=\"2024\u002F07\u002F19\" data-image-width=\"1080\" data-image-height=\"1920\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"230c6a85-74b0-4c3f-b7e3-43c547e6e816\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're checking the Find My app after being alerted that an AirTag is traveling with you, you can tap "Play Sound" on the device to find it more easily.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESimilar to how you would track your own AirTag, you can go to the Find My app by tapping on the alert on your iPhone, tapping Continue, and then Find Nearby. Move around your space, following the steps on the screen.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-gps-trackers-and-devices-for-kids\u002F"\u003EThe best GPS trackers for kids\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe "Play a Sound" option is only available to you if the AirTag owner isn't nearby and their Apple device isn't within range. The precision finding feature is only available on iPhone 11, 12, 13, 14, and 15 models with \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fuwb-what-it-is-and-why-you-really-need-an-iphone-to-use-it\u002F"\u003Eultra-wideband technology\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EIf you can't play a sound from the Find My app, there's a good possibility that the unknown AirTag isn't with you anymore and your iPhone can't find it nearby.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"4. Play a sound on AirTag\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"5688de6e-374e-4972-9e02-2f01a96a7f41\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EIf an AirTag is moving with you, you should be able to check the Find My app \u003Cem\u003E(Map has been distorted for privacy\u003C\u002Fem\u003E) to see where it was detected.\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot: Maria Diaz\u002FZDNET\" data-image-alt-text=\"Check the Find My app for AirTag tracking you\" data-image-filename=\"airtag.jpg\" data-image-date-created=\"2024\u002F07\u002F19\" data-image-width=\"1080\" data-image-height=\"1920\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f2f0bf6-b53a-45ee-a8bb-e2cfeaba11a4\" data-edition=\"us\" data-description=\"\u003Cp\u003EOnce you have eyes on the AirTag that doesn't belong to you, you can use your iPhone or any other NFC-enabled smartphone to see the AirTag's information. Just hold the top of your phone near the white side of the found AirTag.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-i-created-my-own-apple-airtag-with-a-flipper-zero-and-why-you-should\u002F"\u003EHow I created my own Apple AirTag with a Flipper Zero\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ETap on the notification that appears to access a website with the AirTag's serial number and the last four digits of the owner's phone number.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf this is a lost AirTag, the owner might have added their contact information to let the finder contact them.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"5. If you find an AirTag that doesn't belong to you, check its information\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b6905efc-3703-48c4-83e7-01dd145ad7ef\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ETapping an Apple AirTag with an NFC-enabled smartphone will let you see its information.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"AirTag NFC info\" data-image-filename=\"airtag-info.jpg\" data-image-date-created=\"2023\u002F01\u002F19\" data-image-width=\"5184\" data-image-height=\"2912\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"745df727-e974-4b3f-8b91-dbaa90707b0c\" data-edition=\"us\" data-description=\"\u003Cp\u003EDisabling an AirTag means the owner will no longer be able to see its current location or get updates for it.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETo disable an AirTag, just remove its battery. You can do this by pushing down on the AirTag, twisting the cover counterclockwise, and then taking out its battery.\u003C\u002Fp\u003E\" data-hed=\"6. Disable the AirTag\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"621181fb-877c-4455-9ede-54b7b4451190\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Disabled AirTag\" data-image-filename=\"img-3156-copy.jpg\" data-image-date-created=\"2023\u002F01\u002F19\" data-image-width=\"5184\" data-image-height=\"2912\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you're concerned about unwanted tracking or fear for your safety, take screenshots throughout this process, including the device's serial number and owner's information, contact local law enforcement, and give the disabled AirTag to authorities.\u003C\u002Fp\u003E\u003Ch2\u003EFAQs\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"youtube_video\" data-size=\"large\" data-float=\"none\" data-oembed=\"{"author_name":"ZDNET","author_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F@zdnetvideo","height":113,"html":"\u003Ciframe width=\\"200\\" height=\\"113\\" src=\\"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fembed\\\u002FqjU5W07xBzI?autoplay=0&amp;loop=0&amp;fs=1&amp;start=0&amp;rel=1&amp;feature=oembed\\" frameborder=\\"0\\" allow=\\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\\" allowfullscreen title=\\"How to know if an AirTag is tracking you #shorts\\"\u003E\u003C\\\u002Fiframe\u003E","provider_name":"YouTube","provider_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F","thumbnail_height":360,"thumbnail_url":"https:\\\u002F\\\u002Fi.ytimg.com\\\u002Fvi\\\u002FqjU5W07xBzI\\\u002Fhqdefault.jpg","thumbnail_width":480,"title":"How to know if an AirTag is tracking you #shorts","type":"video","version":"1.0","width":200}\" data-url=\"https:\u002F\u002Fyoutu.be\u002FqjU5W07xBzI\" data-autoplay=\"false\" data-loop=\"false\" data-start=\"0\" data-fs=\"true\" data-rel=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to find out if an AirTag is tracking me on Android?\u003C\u002Fh2\u003E\u003Cp\u003EAn unknown AirTag can move with you and send tracking data to the owner, whether you have an iPhone or an Android phone. \u003C\u002Fp\u003E\u003Cp\u003EIf you are an Android user, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fandroids-new-unknown-tracker-alerts-can-help-warn-users-of-rogue-apple-airtags\u002F\"\u003EGoogle offers \"unknown tracker alerts\"\u003C\u002Fa\u003E for Android 6.0 and newer. So, if an AirTag is tracking you, your Android phone should let you know without having to install a separate Android app from the Google Play Store. This feature is available for Apple tracking devices and other Bluetooth trackers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\"\u003EThe best AirTag accessories\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf your Android smartphone detects an AirTag moving with you that has been separated from its owner, it will let you scan for the tracker and play a sound to find it -- all without ever letting the owner know it's been found.\u003C\u002Fp\u003E\u003Ch2\u003EDo AirTags have GPS?\u003C\u002Fh2\u003E\u003Cp\u003EAirTags don't have \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-gps-trackers-and-devices-for-kids\u002F\"\u003EGPS\u003C\u002Fa\u003E. Instead, they use the Find My network of almost 2 billion \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-apple-products-you-shouldnt-buy-this-month-april-2023-edition\u002F\"\u003EiPhones, iPads, Apple Watches, and Macs\u003C\u002Fa\u003E. AirTag tracking works by sending anonymous Bluetooth signals that can be picked up by any of these devices within 30 feet. Then, these devices send the AirTag's location to iCloud, allowing you to see it in your own Find My app. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-wallet\u002F\"\u003E\u003Cstrong\u003EThe best AirTag wallets\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWith so many Apple devices worldwide, Apple's Find My network has become very reliable. Each Apple device is a node that grows the network, so a lost AirTag can transmit an accurate location without GPS if it's near Find My devices. \u003C\u002Fp\u003E\u003Ch2\u003EHow long does an AirTag battery last?\u003C\u002Fh2\u003E\u003Cp\u003EAirTag batteries are designed to last over a year. These trackers use a CR2032 lithium 3V coin battery that is easily replaceable by twisting open the AirTag. If you're the AirTag's owner, your iPhone will alert you when the battery needs to be replaced.\u003C\u002Fp\u003E\u003Ch2\u003ECan someone use another tracker to track me?\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"1f9725e3-f9cc-41f8-bbe2-5001d63ce8d1\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThis screenshot shows a Find My notification saying my iPhone found a Eufy tracker moving with me&nbsp;\u003Cem\u003E(Map has been distorted for privacy).\u003C\u002Fem\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot: Maria Diaz\u002FZDNET\" data-image-alt-text=\"Eufy tracker on iPhone\" data-image-filename=\"eufy.jpg\" data-image-date-created=\"2024\u002F07\u002F19\" data-image-width=\"1080\" data-image-height=\"1920\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYes, other Bluetooth trackers may or may not be compatible with the Find My network. If they use the Find My network for location tracking, you'll be notified quickly that a tracker was found moving with you, whether you have an iPhone or an Android phone. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattention-apple-airtag-users-dont-ignore-this-warning\u002F\"\u003EAttention Apple AirTag users: Don't ignore this warning\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EApple's Find My network isn't the only one with this feature. If a Samsung Tag is found moving with you, you'll also get a notification. Google's newer Find My feature also gives you alerts when an unknown Bluetooth tracker is found moving with you.\u003C\u002Fp\u003E\u003Ch2\u003EHow do I stop an Apple AirTag from tracking me?\u003C\u002Fh2\u003E\u003Cp\u003ERemoving the AirTag's battery is the easiest way to stop it from tracking you. This will disable the AirTag, and its owner won't be able to see any additional tracking information or get a notification that their device has been disabled. The owner may only know it has been disabled if they try tracking it on the Find My app and see it's disconnected. The owner can also see the AirTag's last known location. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fthis-accessory-lets-you-add-an-airtag-to-your-apple-tv-remote\u002F\"\u003E\u003Cstrong\u003EThis accessory lets you add an AirTag to your Apple TV remote\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Find My network connects different iPhones and Apple devices to AirTags, to track their location. An AirTag can continue tracking you unless you disable it by removing its battery or if you permanently stay outside the Find My network, a difficult task with as many iPhone users as there are in the world. \u003C\u002Fp\u003E\u003Ch2\u003E\u003Cp\u003ECan anyone track my Apple AirTag?\u003C\u002Fp\u003E\u003C\u002Fh2\u003E\u003Cp\u003EApple AirTags are designed to change their unique Bluetooth identifiers frequently, and the Find My network, which allows you to track AirTags miles beyond Bluetooth range, features end-to-end encryption. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002F10-tiny-tools-and-gadgets-i-carry-with-me-everywhere-on-my-keychain\u002F\"\u003E\u003Cstrong\u003E10 tiny 'everyday carry' tools and gadgets I keep on my keychain\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAlthough someone else won't be able to track your AirTag, they can hear it if it's separated from you and moving, and they can see any contact information you choose to include if the finder uses NFC.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7610e33e-ff80-4eee-aae9-f1fad8deba1a\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7610e33e-ff80-4eee-aae9-f1fad8deba1a\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-07-19 17:30:00",timezone:"UTC",updated:c,published:c},description:"Apple's handy trackers have been used to track people's location against their consent, but there's a way to determine if an AirTag is tracking you. Here's what you need to know.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"5eee98c0-6f35-4e7e-8392-67bab0b18890",image:{id:"f6d75cb0-a6bc-46b6-9903-1002418bef17",filename:"airtag-moving.jpg",dateCreated:{created:c,date:"2024-07-18 21:00:53",timezone:"UTC",updated:c,published:c},alt:"AirTag notification on iPhone",credits:"Maria Diaz\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F07\u002F18\u002Ff6d75cb0-a6bc-46b6-9903-1002418bef17\u002Fairtag-moving.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1920,height:1080,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Tech^Smartphones^Mobile Accessories",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-find-out-if-an-airtag-is-tracking-you",startYear:c,summary:b,title:"How to find out if an AirTag is tracking you",topic:{id:"972fc09a-0553-4863-854d-3d98942e4f6f",slug:"mobile-accessories",name:"Mobile Accessories",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"972fc09a-0553-4863-854d-3d98942e4f6f",slug:"mobile-accessories",name:"Mobile Accessories",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"91a4cdc7-83f0-4ac1-9561-628db15e2c76",slug:"smart-office",name:"Smart Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EI will start this out by reminding everyone that you should be using a password manager to store and protect all of your passwords. We've reached a point where password managers should be considered an absolute must to help with privacy and security.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7098396a-45dc-4f31-8567-d4b310457b81\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7098396a-45dc-4f31-8567-d4b310457b81\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThat being said, if you're a user of macOS, then there's a way to manage your passwords with a built-in tool. Said tool is the Keychain Access tool which is built-into macOS and is ready to serve in the traditional user-friendly way of Apple apps. So, if you're still not ready to jump on board the password manager trend (you should be), at least you have an option that's ready to serve.\u003C\u002Fp\u003E\u003Cp\u003EI'm going to show you how to open the Keychain Access tool and how to use it to locate (and even change) a saved password in macOS and even create a new Keychain item.\u003C\u002Fp\u003E\u003Cp\u003EThe only thing you'll need to follow along is an Apple laptop or desktop. I'll demonstrate it on a MacBook Pro running macOS Monterey (version 12.2.1). \u003C\u002Fp\u003E\u003Cp\u003EWith that said, let's get to work.\u003C\u002Fp\u003E\u003Ch2\u003EOpening the Keychain Access tool\u003C\u002Fh2\u003E\u003Cp\u003ETo open the Keychain Access tool, click on the Launchpad located in the Dock. From there, type keychain and then click on the icon for Keychain Access. In the resulting window, click on the Passwords tab to reveal every entry (\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E) that's been saved to macOS.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"58635cda-c045-4c8f-94d3-03dc06fe462c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe macOS Keychain Access saves passwords, secure notes, certificates, and keys.\u003C\u002Fp\u003E\" data-image-alt-text=\"keychain1.jpg\" data-image-filename=\"keychain1.jpg\" data-image-date-created=\"2022\u002F04\u002F13\" data-image-width=\"1774\" data-image-height=\"1096\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EMake sure to click Local items in the left navigation and you'll see every password entry that's been saved locally.\u003C\u002Fp\u003E\u003Ch2\u003EViewing a password within the Keychain Access tool\u003C\u002Fh2\u003E\u003Cp\u003EYou can either scroll through the listing or use the search tool to locate the entry you want to view. Once you've located the entry in question, double-click it or right-click it and click Get Info from the resulting menu.\u003C\u002Fp\u003E\u003Cp\u003EA new window will appear (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E) containing all of the information for that entry.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"38882319-2d94-4256-a9f7-bdfaafde7e2c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAn entry for a server I have on my LAN includes plenty of information.\u003C\u002Fp\u003E\" data-image-alt-text=\"keychain2.jpg\" data-image-filename=\"keychain2.jpg\" data-image-date-created=\"2022\u002F04\u002F13\" data-image-width=\"1090\" data-image-height=\"726\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAs you can see, the password is hidden from sight. To view the password for the entry, click Show password and, when prompted, type the password for your user account. The password will then appear in the field. You can then either copy it to the clipboard and use it or you can change it (if necessary).\u003C\u002Fp\u003E\u003Cp\u003ETo change the password, simply erase what's there and type the new entry. After changing the password, make sure to click Save Changes and the password will be updated.\u003C\u002Fp\u003E\u003Ch2\u003ECreating a password entry\u003C\u002Fh2\u003E\u003Cp\u003ECreating a new password entry in Keychain Access is just as simple. From the Passwords tab, make sure to click Local Items and then click the New icon at the top (small square with a diagonal line). When the new window appears (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E), type a name (or URL) for the Keychain item, add an account name (a username), and then type the password associated with the item.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"09290b95-aa63-4090-9074-6c67e6300f66\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ECreating a new password entry to be stored in the Keychain Access tool. \u003C\u002Fp\u003E\" data-image-alt-text=\"keychain3.jpg\" data-image-filename=\"keychain3.jpg\" data-image-date-created=\"2022\u002F04\u002F13\" data-image-width=\"878\" data-image-height=\"806\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e658c585-db33-46c8-918a-752729fe81da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe658c585-db33-46c8-918a-752729fe81da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EMake sure to pay attention to the Password Strength indicator. You always want to be using strong passwords. If your password is weak or fair, make it more complicated until you reach an Excellent rating.\u003C\u002Fp\u003E\u003Cp\u003EClick Add to save the new entry. \u003C\u002Fp\u003E\u003Cp\u003EAnd that's all there is to locating\u002Fediting a password entry in macOS and even creating a new entry. If you're not ready to migrate to a full-blown password manager, you should at least start using the Keychain Access tool until you're ready to make the jump.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead also:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsideloading-iphone-apps-creates-a-security-risk-says-apples-tim-cook-so-dont-force-us-to-support-it\u002F\" target=\"_blank\"\u003ESideloading iPhone apps creates a security risk says Apple's Tim Cook, so don't force us to support it\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fduckduckgo-brings-is-privacy-focused-browser-to-macs\u002F\" target=\"_blank\"\u003EDuckDuckGo brings is privacy-focused browser to Macs\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-quickly-patching-your-iphones-and-macs-is-more-important-than-ever\u002F\" target=\"_blank\"\u003EWhy quickly patching your iPhones and Macs is more important than ever\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-04-13 19:14:11",timezone:"UTC",updated:c,published:c},description:"macOS includes a user-friendly tool to help you keep track and manage your passwords. Although not a full-blown password manager, Jack Wallen encourages macOS users to use this tool until ready for the real thing.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"16ace04f-c530-4092-80c2-bd883ad5c5eb",image:{id:"523556c2-8609-4a31-b858-65b38065d24c",filename:"password.jpg",dateCreated:{created:c,date:"2021-09-22 12:48:07",timezone:"UTC",updated:c,published:c},alt:"keychain1.jpg",credits:"By pathdoc -- Shutterstock",caption:"\u003Cp\u003EThe macOS Keychain Access saves passwords, secure notes, certificates, and keys.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F09\u002F22\u002F523556c2-8609-4a31-b858-65b38065d24c\u002Fpassword.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-locate-a-password-with-the-macos-keychain",startYear:c,summary:b,title:"How to locate a password with the macOS Keychain",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"50f6af8c-f846-4158-835e-fd3c636dfa2b",filename:"thumbnail-lance-whitney-zdnet-shot2.jpg",dateCreated:{created:c,date:"2022-04-20 18:05:46",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F04\u002F20\u002F50f6af8c-f846-4158-835e-fd3c636dfa2b\u002Fthumbnail-lance-whitney-zdnet-shot2.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"f7da76d7-f579-40d6-9a70-5ee4dd4d90bf\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Update security questions and answers for a local Windows account\" data-image-filename=\"top-figure-how-to-manage-your-security-questions-for-a-local-windows-account-copy.jpg\" data-image-date-created=\"2022\u002F06\u002F01\" data-image-width=\"1132\" data-image-height=\"627\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EChoose to set up Windows 10 or 11 with a local account, and you're required to select three security questions to answer if you ever get locked out. Those questions include the typical ones, such as your first pet's name, the first name of your oldest cousin, and the name of your first school. But you can always change those questions and their answers if you don't like the initial ones. That option is readily accessible in Windows 10 but not in Windows 11. Here's how the process works.\u003C\u002Fp\u003E\u003Cp\u003EYou first see the option for creating an account early in the Windows setup. Of course, Microsoft wants you to use a Microsoft account so the company doesn't make it easy to choose a local account instead. But it's doable and works the same in Windows 10 and 11. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fis-your-windows-license-legal-should-you-even-care\u002F\" target=\"_blank\"\u003EIs your Windows license legal? Should you even care?\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch3\u003ECreate a local account\u003C\u002Fh3\u003E\u003Col\u003E\u003Cli\u003EAt the screen asking how you would like to set up Windows, choose the option Set up for personal use.\u003C\u002Fli\u003E\u003Cli\u003EThe next screen is where you would start veering toward a local account. In Windows 10, select Offline account. In Windows 11, select Sign in Options and then select Offline account.\u003C\u002Fli\u003E\u003Cli\u003EAt the next screen, Microsoft tries its best to steer you away from a local account. But stay strong. In Windows 10, select Limited experience. In Windows 11, select Skip for now.\u003C\u002Fli\u003E\u003Cli\u003EOkay, now you can finally enter the name you want to use for your local account. Devise a password and then confirm it.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Ch3\u003EChoose your security questions and answers\u003C\u002Fh3\u003E\u003Cp\u003EAnd that leads us to the security questions, which Microsoft requires you to set up at this point.\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EChoose your first security question and then type a response. Choose and answer your second question and then do the same for the third and final question.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"8e502d5d-58e0-4f72-8be1-2656190d8448\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Set up your questions and answers for a local Windows account\" data-image-filename=\"figure-1-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022\u002F06\u002F01\" data-image-width=\"1024\" data-image-height=\"764\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E2. Finish the reset of the setup and then you're nestled into Windows with your local account.\u003C\u002Fp\u003E\u003Ch3\u003ESwitch to a Local Account\u003C\u002Fh3\u003E\u003Cp\u003EBesides choosing a local account from the get-go, you can switch to a local account if you're already using a Microsoft Account to sign into Windows.\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EIn Windows 10 or 11, go to \u003Cstrong\u003ESettings > Accounts > Your Info\u003C\u002Fstrong\u003E.\u003C\u002Fli\u003E\u003Cli\u003EClick the link to Sign in with a local account instead. Of course, you're asked if you're sure you want to switch to a local account. Click Next to confirm.\u003C\u002Fli\u003E\u003Cli\u003EEnter your Microsoft account PIN. Create a password for your new local account. Sign out and then sign back in with your new local account.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EOkay, now there are a couple of problems. Notice that when you switch to a local account, you're not prompted to create the security questions. That means you have to choose to do so on your own. Otherwise, if you need to reset your password, the only option available is to use a recovery drive, which you probably didn't set up either.\u003C\u002Fp\u003E\u003Cp\u003EAnd even if you choose a local account during the initial Windows setup, what if you have second thoughts about your security questions at some point? Maybe you think that at least one of the answers may be too easy to guess. Or perhaps you want to change one of the questions. Can you update them? Let's try this in Windows 10 and then in Windows 11.\u003C\u002Fp\u003E\u003Ch3\u003EUpdate your questions and answers in Windows 10\u003C\u002Fh3\u003E\u003Col\u003E\u003Cli\u003EIn Windows 10, go to \u003Cstrong\u003ESettings > Accounts > Sign-in options\u003C\u002Fstrong\u003E. Click the option for Password. Then click Update your security questions.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"75e8df64-fede-4901-a73c-41859febfadd\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Reset your security questions and answers in Windows 10\" data-image-filename=\"figure-2-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022\u002F06\u002F01\" data-image-width=\"1131\" data-image-height=\"621\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E2. At the window that pops up, type your local account password and click OK. You can now choose different questions and answers for each of the three items. When done, click Finish.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"e905d460-290c-4364-9b6c-04ff2f13c01f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Update questions and answers\" data-image-alt-text=\"figure-3-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-filename=\"figure-3-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022\u002F06\u002F01\" data-image-width=\"1132\" data-image-height=\"627\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EUpdate your questions and answers in Windows 11\u003C\u002Fh3\u003E\u003Cp\u003ENow, let's try the same thing in Windows 11.\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EGo to \u003Cstrong\u003ESettings > Accounts > Sign-in options\u003C\u002Fstrong\u003E. Click the option for Password. Uh-oh. There is no option for updating your security questions. For whatever reason, either forgetfulness or a lack of concern about local accounts, Microsoft neglected to equip Windows 11 with an obvious way to change your security questions and answers. But no worries. There is an unsupported though perfectly usable workaround.\u003C\u002Fli\u003E\u003Cli\u003EHold down the Windows key and press R to trigger the Run dialog box. In the Open field, type the following string: \u003Cem\u003Ems-cxh:\u002F\u002Fsetsqsalocalonly\u003C\u002Fem\u003E.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"e34eaa40-083a-4191-ae13-6cd7a2ea3311\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Reset questions and answers in Windows 11\" data-image-alt-text=\"figure-4-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-filename=\"figure-4-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022\u002F06\u002F01\" data-image-width=\"1135\" data-image-height=\"627\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E3. You're then prompted to type your local account password. And you can now update each of the three security questions and answers. Type Finish when done.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"86649ea4-8221-4f46-ab2f-f3ae57793f27\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Update questions and answers in Windows 11\" data-image-alt-text=\"figure-5-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-filename=\"figure-5-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022-06-01 18:05:44.000000\" data-image-width=\"1080\" data-image-height=\"628\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EAnswer the security questions to reset your password\u003C\u002Fh3\u003E\u003Cp\u003ENow let's say there comes a time when you forget your local Windows account password, either in Windows 10 or 11. You've tried a few different passwords, but no dice. You're stuck at the login screen with no way to get in.\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EClick the link for Reset Password. The window for your security questions pops up. Answer each of the three questions. Then click the right arrow next to the third answer.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"f087b726-d34a-4bc7-bf13-8e716e976de6\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Answer security questions\" data-image-filename=\"figure-6-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022-06-01 18:06:41.000000\" data-image-width=\"1089\" data-image-height=\"636\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E2. Type and then retype a new local password, and click the right arrow. And you're in. But this time, try to remember your password.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"95a34d20-51bf-4ae6-a06f-d5322d4ad2ff\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Create new password\" data-image-filename=\"figure-7-how-to-manage-your-security-questions-for-a-local-windows-account.jpg\" data-image-date-created=\"2022-06-01 18:07:18.000000\" data-image-width=\"1090\" data-image-height=\"481\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-02 20:49:00",timezone:"UTC",updated:c,published:c},description:"A local Windows account requires you to set up three security questions. Here's how this works in Windows 10 and 11.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"42a01f07-3fe1-481a-b874-798e8f4da324",image:{id:"f087b726-d34a-4bc7-bf13-8e716e976de6",filename:"figure-6-how-to-manage-your-security-questions-for-a-local-windows-account.jpg",dateCreated:{created:c,date:"2022-06-01 18:06:41",timezone:"UTC",updated:c,published:c},alt:"Update security questions and answers for a local Windows account",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F01\u002Ff087b726-d34a-4bc7-bf13-8e716e976de6\u002Ffigure-6-how-to-manage-your-security-questions-for-a-local-windows-account.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1089,height:636,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems^Windows^Windows 11",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-manage-your-security-questions-for-a-local-windows-account",startYear:c,summary:b,title:"How to manage your security questions for a local Windows account",topic:{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"5a09f531-5d09-11e4-b6a0-d4ae52e95e57",slug:"windows-10",name:"Windows 10",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"1795ea35-2ef4-47fb-b2b3-3180851ccac0\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"iStockphoto\u002FGetty Images\" data-image-alt-text=\"Female professional student using a laptop at a desk.\" data-image-filename=\"istock-1198252560.jpg\" data-image-date-created=\"2021\u002F01\u002F08\" data-image-width=\"1365\" data-image-height=\"768\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI deal with a lot of remote servers, most of which I access via Secure Shell (SSH). How I manage those connections depends on the operating system I use. If I'm on Linux, most often I simply default to the command line interface and make use of SSH's config file (where I can configure any number of connections for easy access). \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e658c585-db33-46c8-918a-752729fe81da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe658c585-db33-46c8-918a-752729fe81da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAlthough I can do the same thing on MacOS, I'll often resort to a GUI app so I don't have to remember nicknames for servers or type out the SSH command every time.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-make-ssh-even-easier-to-use-with-config-files\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to make SSH even easier to use with config files\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EOne such app is \u003Ca href=\"https:\u002F\u002Ftermius.com\" target=\"_blank\"\u003ETermius\u003C\u002Fa\u003E, which has been around for some time and is easily one of the best SSH connection managers on the market.\u003C\u002Fp\u003E\u003Cp\u003ETermius can be used for free, but the feature set is limited. To get the full power of the application, you should consider purchasing a license to unlock features such as:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMobile and Desktop\u003C\u002Fli\u003E\u003Cli\u003ESecure Sync\u003C\u002Fli\u003E\u003Cli\u003ETunneling Options\u003C\u002Fli\u003E\u003Cli\u003ESecure Sharing\u003C\u002Fli\u003E\u003Cli\u003ESelf-Serviced Consolidated Billing\u003C\u002Fli\u003E\u003Cli\u003EPurchase Order\u003C\u002Fli\u003E\u003Cli\u003EWorkspaces\u003C\u002Fli\u003E\u003Cli\u003ESSO\u002FSCIM\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe pricing for Termius is:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPro - $8.33 per month\u003C\u002Fli\u003E\u003Cli\u003ETeam - $19.99 per month\u002Fseat\u003C\u002Fli\u003E\u003Cli\u003EEnterprise - Contact for details\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EYou can check out what features are available for each version on the \u003Ca href=\"https:\u002F\u002Ftermius.com\u002Fpricing\" target=\"_blank\"\u003ETermius pricing matrix\u003C\u002Fa\u003E. I recommend starting out with the free version and -- should you need more features -- look into one of the paid plans.\u003C\u002Fp\u003E\u003Cp\u003EWith that said, let's find out how to manage your SSH connections with this well-designed application.\u003C\u002Fp\u003E\u003Ch2\u003EHow to manage SSH connections on MacOS with Termius\u003C\u002Fh2\u003E\u003Ch2\u003EHow to install Termius on MacOS\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"19a3e83c-8255-45c9-8270-c5a180f061b7\" data-edition=\"us\" data-description=\"\u003Cp\u003EOn MacOS, open the App Store from either Launchpad or the Dock.\u003C\u002Fp\u003E\" data-hed=\"1. Open the Apple App store\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"4dbda600-831d-48dd-beab-65cd897413fd\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EInstalling Termius from the MacOS App Store.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The MacOS App Store.\" data-image-filename=\"termius1.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"2388\" data-image-height=\"1470\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7e0a0103-89db-4b51-b557-4335f8c4a4bf\" data-edition=\"us\" data-description=\"\u003Cp\u003ESearch for Termius. When the app appears in the App Store, click Get and then click Install.\u003C\u002Fp\u003E\" data-hed=\"2. Locate and install Termius\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-basics-of-ssh-usage\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe basics of SSH usage\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EHow to use Termius on MacOS\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b5cc1e0c-144f-4b70-bcf8-724ea35c38c7\" data-edition=\"us\" data-description=\"\u003Cp\u003EClick the Launchpad icon in the Dock and search for Termius. Click the Termius launcher to open the app.\u003C\u002Fp\u003E\" data-hed=\"3. Open Termius\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f8662f94-ac3c-4448-a03f-44472ef56cc9\" data-edition=\"us\" data-description=\"\u003Cp\u003EFrom the main Termius window, type the IP address or hostname for the remote connection in the Add Your First Host block and click Create Host.\u003C\u002Fp\u003E\" data-hed=\"4. Create a new connection\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a07c667c-0058-42b9-bbc2-546234f1c58b\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EYou can also import all of the hosts from your config file from this GUI.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Termius main window.\" data-image-filename=\"termius2.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"2576\" data-image-height=\"1612\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fd823359-5b94-426e-9af8-b17d6852aada\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn the resulting window, you'll need to at least add a username and a password. If your SSH connection uses a different port, make sure to add it.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"5. Configure your new connection\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"7ddf665f-3293-44b0-9620-d7bfca90405f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EConfiguring an SSH connection in Termius.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Termius SSH config window.\" data-image-filename=\"termius3.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"2576\" data-image-height=\"1612\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a57f4db7-b437-4a28-b679-2ef4b9a94919\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf your connection uses SSH key authentication, you'll have needed to copy the id_rsa.pub file from the server to the machine hosting Termius. To import that key, click Keys and then click Generate A New Key. In the resulting pane, click Import From Key File, locate the key file you created and click Save.\u003C\u002Fp\u003E\" data-hed=\"6. Configure SSH key authentication (optional)\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"d75e5035-122e-4d97-bd3a-14d09f928ac1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EConfiguring SSH key authentication for a Termius connection.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Termius SSH key authentitcation configuration pane.\" data-image-filename=\"termius4.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"2576\" data-image-height=\"1612\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"76c7f84b-f80d-4c85-9d7e-784b759c46f7\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou should now see your remote host added to Termius. Double-click that listing and, when prompted, type the password for either the user or SSH key. Upon successful authentication, you'll be given access to your remote server, where you can get to work.\u003C\u002Fp\u003E\" data-hed=\"7. Connect to a remote server\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"42f8e960-c2f2-4a9e-a43b-f70902fbc9f2\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EConnecting to a remote server via Termius.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Termius password prompt.\" data-image-filename=\"termius5.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-crop=\"2576x717+0+0\" data-image-width=\"2576\" data-image-height=\"1612\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAdd as many servers as you need to Termius, making sure to give them unique names, so you don't have to associate an IP address to a server.\u003C\u002Fp\u003E\u003Cp\u003EAnd that's all there is to managing your SSH connections with ease on MacOS.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"1d11a65c-977c-4f6a-82e0-a6abcfd960ff\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F1d11a65c-977c-4f6a-82e0-a6abcfd960ff\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-16 20:44:45",timezone:"UTC",updated:c,published:c},description:"Jack Wallen shows you how to easily manage your SSH connections in MacOS with the Termius GUI app.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"639a6f15-befb-4f7a-ba0f-3766b39adafb",image:{id:"bebc2523-1ebd-448c-bad1-4a90cd0af557",filename:"istock-1198252560.jpg",dateCreated:{created:c,date:"2021-01-19 10:53:36",timezone:"UTC",updated:c,published:c},alt:"Female professional student using laptop at desk, close up view",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003EFemale hands of business woman professional student using laptop sit at home office desk typing on computer keyboard study work with pc software tech concept, online job and education, close up view\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F01\u002F19\u002Fbebc2523-1ebd-448c-bad1-4a90cd0af557\u002Fistock-1198252560.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1365,height:768,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-manage-ssh-connections-on-macos-with-termius",startYear:c,summary:b,title:"How to manage SSH connections on MacOS with Termius",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"d0aee31d-965e-4a8b-97f0-5c7c1b8bf7f1",slug:"mac-os",name:"Mac OS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"video\" data-uuid=\"4dc2da6f-215d-4cb5-9d91-46ac48532d18\" data-size=\"large\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EFor small businesses, cyberattacks might sound like something they don't need to think about. Because cyber criminals only go after big, lucrative targets, right? Why would they target a small business?\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7d42924d-1de6-4ee1-a601-c9ab863dbf62\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7d42924d-1de6-4ee1-a601-c9ab863dbf62\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe unfortunate truth is that small businesses can make very tempting targets for malicious hackers and cyber criminals because they hold the same kinds of data that large businesses have, such as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-security-researcher-told-me-my-passwords-and-more-how-15-years-of-digital-footprints-left-me-exposed\u002F\"\u003Epersonal information, credit card details, passwords, and more\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EBut the nature of small business means that the information could be held less securely than it is within a large organisation, particularly if there isn't a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcybersecurity-jobs-this-is-what-were-getting-wrong-when-hiring-and-heres-how-to-fix-it\u002F\"\u003Especialist information security employee\u003C\u002Fa\u003E on staff.\u003C\u002Fp\u003E\u003Cp\u003ESmall businesses can also prove tempting to hackers looking to gain access to a bigger company as part of a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsupply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger\u002F\"\u003Esupply chain attack\u003C\u002Fa\u003E – by compromising a small business that might be a supplier to a larger organisation, the attacker could use that access to help infiltrate the network of a larger business partner.\u003C\u002Fp\u003E\u003Cp\u003ENo matter what kind of cyberattack a small business falls victim to, whether that's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\"\u003Ephishing\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\u002F\"\u003Eransomware\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F\"\u003Emalware\u003C\u002Fa\u003E or any other kind of malicious activity where attackers can access and tamper with data, the results can potentially be devastating. In some cases, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-attack-and-covid-woes-force-this-150-year-old-college-to-shut-down\u002F\"\u003Ethe cost of falling victim to a cyberattack has even forced organisations to close permanently\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EFortunately, it's possible to help keep your business and employees secure online. Here are some basic cybersecurity pitfalls that you should try to avoid.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E1. Don't use weak passwords to secure online accounts\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003ECyber criminals don't need to be super-skilled to break into business email accounts and other applications. In many cases, they're able to get in because the account owner is \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-terrible-passwords-that-people-are-still-using-heres-how-to-do-better\u002F\"\u003Eusing a weak or easy-to-guess password\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EThe shift towards \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Funsecured-servers-and-cloud-services-how-remote-work-has-increased-the-attack-surface-that-hackers-can-target\u002F\"\u003Ecloud-based office applications and remote working\u003C\u002Fa\u003E has also provided \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fterrible-cloud-security-is-leaving-the-door-open-for-hackers-heres-what-youre-doing-wrong\u002F\"\u003Ecyber criminals with additional opportunities for attacks\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003ERemembering many different passwords can be difficult, which can lead to people using simple passwords across multiple accounts. This leaves accounts and businesses vulnerable to cyberattacks, particularly if cyber criminals can use \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-systems-are-facing-billions-of-attacks-every-month-as-hackers-try-to-guess-passwords\u002F\"\u003Ebrute-force attacks\u003C\u002Fa\u003E to quickly run through a list of commonly used or simple passwords.\u003C\u002Fp\u003E\u003Cp\u003EYou should also never base your passwords around easy-to-discover information, such as your favourite sports team or your pet's name, because clues on your public social media profiles could give this information away.\u003C\u002Fp\u003E\u003Cp\u003EThe National Cyber Security Centre (NCSC) suggests using a password made up of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-a-strong-password-youre-probably-still-doing-it-the-wrong-way\u002F\"\u003Ethree random words\u003C\u002Fa\u003E, a tactic that should make passwords difficult to guess.\u003C\u002Fp\u003E\u003Cp\u003EA different password should be used to secure each account – a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fits-past-time-you-started-using-a-password-manager-whether-you-like-it-or-not\u002F\"\u003Epassword manager\u003C\u002Fa\u003E can help users by removing the need to remember every password.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E2. Don't ignore multi-factor authentication\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EIt's not impossible that even a strong password can end up in the wrong hands. Cyber criminals can use tricks, such as phishing attacks, to steal login details from users. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmulti-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\u002F\"\u003EMulti-factor authentication\u003C\u002Fa\u003E (MFA) provides an additional barrier to account compromise, by requiring the user to respond to an alert – often via a specially designed MFA application – to confirm that it really is them attempting to log in to the account.\u003C\u002Fp\u003E\u003Cp\u003EThat extra layer means that, even if a cyber criminal has the correct password, they can't use the account without the account owner approving access. If a user gets an unexpected alert saying they've attempted to log in to their account, they should report it to their IT or security team and reset their password immediately, so cyber criminals can't continue attempts to abuse a stolen password.\u003C\u002Fp\u003E\u003Cp\u003EDespite calls for the use of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbetter-than-the-best-password-how-to-use-2fa-to-improve-your-security\u002F\"\u003Emulti-factor authentication\u003C\u002Fa\u003E – also known as two-factor authentication (2FA) – being among the most commonly issued cybersecurity advice, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftwo-factor-authentication-is-a-great-idea-but-not-enough-people-are-using-it\u002F\"\u003Emany businesses still aren't using\u003C\u002Fa\u003E the technique – and that's something that needs to change.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E3. Don't put off applying security patches and updates\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EOne of the most common techniques cyber criminals use to breach and move around networks is taking advantage of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-old-security-vulnerabilities-are-creating-new-opportunities-for-hackers\u002F\"\u003Ecybersecurity vulnerabilities in applications and software\u003C\u002Fa\u003E. When these security vulnerabilities are disclosed, the vendors who make operating systems will usually release a security update to fix them.\u003C\u002Fp\u003E\u003Cp\u003EThe security patch will fix the flaw, thus protecting the system from cyber criminals attempting to exploit it – but only if the update is applied.\u003C\u002Fp\u003E\u003Cp\u003EUnfortunately, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\u002F\"\u003Emany businesses are slow to roll out security patches and updates\u003C\u002Fa\u003E, leaving their networks and systems vulnerable to hackers. Sometimes, these vulnerabilities can be left unpatched for years, putting the business – and potentially their customers – at risk from cyber incidents that could easily have been prevented.\u003C\u002Fp\u003E\u003Cp\u003ETherefore, one of the key things a small business can do to improve cybersecurity is to set out a strategy for applying critical security updates as quickly as possible. \u003C\u002Fp\u003E\u003Cp\u003EThis approach can be achieved by setting up the network so that software updates are applied automatically, or they can be dealt with on a case-by-case basis. However, what's vital to recognise is that critical security updates – \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcisa-here-are-66-more-security-flaws-actively-being-used-by-hackers-so-get-patching\u002F\"\u003Eoften detailed by cybersecurity agencies like CISA\u003C\u002Fa\u003E – should be applied as soon as possible.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E4. Don't forget about antivirus software or firewalls \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fantivirus-software-explained\u002F\"\u003EAntivirus software\u003C\u002Fa\u003E is there to help protect computers – and people – from cyber threats including malware and ransomware, but these tools can't help anyone if they're not installed or active. To improve cybersecurity, small businesses should install antivirus software across all computers and laptops on the network.\u003C\u002Fp\u003E\u003Cp\u003ENowadays, antivirus software is often bundled for free within popular operating systems, but there's also the option of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-antivirus\u002F\"\u003Einstalling a product from a dedicated antivirus software vendor\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EHowever, you can't just ignore antivirus software after installing it. As with other software, it's important to prevent antivirus tools from becoming obsolete against evolving cyber threats, so you'll need to install updates and patches as required.\u003C\u002Fp\u003E\u003Cp\u003EInstalling spam filters and firewalls can also help employees stay protected against cyberattacks – and like antivirus, it's important to have these tools turned on and kept updated in order for them to be effective.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E5. Don't leave employees without cybersecurity training\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EEven if your small business only has a handful of employees, it's important to provide tools and training around \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcybersecurity-how-talking-about-mistakes-can-make-everyone-safer\u002F\"\u003Ecybersecurity awareness\u003C\u002Fa\u003E, because all it can take to provide malicious hackers with a way into the network is one person inadvertently making an error.\u003Cbr\u003E \u003Cbr\u003E For example, they could mistakenly click on a link in a phishing email and install malware on the network, or they could fall victim to a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-is-scary-but-another-scam-is-costing-victims-much-much-more-says-fbi\u002F\"\u003Ebusiness email compromise\u003C\u002Fa\u003E scam and transfer a large sum of money to someone claiming to be a business partner – \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fis-that-email-really-from-your-boss-fbi-warns-fake-ceo-scams-now-3-1bn-crime\u002F\"\u003Eor even their boss\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ETherefore, providing education and advice to employees on how to recognise phishing emails, suspicious links and other potential methods of attack is vital for helping to keep data, money, personnel and customers secure. It's also important that employees know who they should report potential suspicious activity to, so suspected cybersecurity incidents can be prevented.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E6. Don't ignore backups\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EEven if there's only a handful of computers on your network, one of the key things you should be doing to make systems more resilient to cyberattacks is \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-backup-software\u002F\"\u003Eproducing regular backups of your data\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EThis strategy means that in the event of an incident encrypting, wiping or otherwise bringing the network down, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fpc-and-mac-backup-how-to-protect-your-data-from-disaster\u002F\"\u003Ethere will be a recent copy of all of your data that can be restored\u003C\u002Fa\u003E – and that means a relatively quick return to normal.\u003C\u002Fp\u003E\u003Cp\u003EThe backups should be updated regularly, so that the data stored within them is as recent as possible, and the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-nas-is-not-enough\u002F\"\u003Ebackups should be stored offline\u003C\u002Fa\u003E, preventing any attackers who get in the network from accessing and wiping them.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E7. Don't leave your network unmonitored\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003ESetting up the network with controls to help prevent cyberattacks is useful, but small businesses shouldn't install tools and then just ignore them and hope for the best. Someone in your business should have responsibility for monitoring activity on the network for potential harmful behaviour.\u003C\u002Fp\u003E\u003Cp\u003EThis approach starts with \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike\u002F\"\u003Eknowing what computers and other internet-connected devices actually make up your network\u003C\u002Fa\u003E – because you can't defend what you don't know about. Then, you'll need to ensure these devices are protected with the right updates. \u003C\u002Fp\u003E\u003Cp\u003EIdentifying internet-connected devices on the network might sound like a simple task, but it can get complicated quickly. These devices don't just include computers: there's also IoT devices, point-of-sale machines, security cameras, and potentially much more. All these devices could potentially be exploited and abused by cyber criminals if they are not managed correctly.\u003C\u002Fp\u003E\u003Cp\u003ETherefore, taking the time to audit your network and fully understand what's on it is vital. It's also important to be aware of what consists of regular behaviour on the network and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-even-when-the-attackers-are-in-your-network-its-not-too-late-to-fight-back\u002F\"\u003Ewhat could count as suspicious or irregular\u003C\u002Fa\u003E. If your small business is suddenly seeing logins from the other side of the world, for example, then that could be a sign that something is wrong and needs investigating.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003E8. Don't end up facing a cybersecurity incident without a plan\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EEven if you have a solid cybersecurity strategy, there's still a chance that cyber criminals could breach the network and use their access for nefarious means, whether that's installing ransomware, conducting espionage, stealing credit card information or focusing on countless other malicious attacks.\u003C\u002Fp\u003E\u003Cp\u003EIn the event of one of these events happening, it's helpful to have a plan that can be put in place – and it should be accessible even if the network ends up offline. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcompanies-are-tired-of-spending-money-on-cybersecurity-heres-how-to-change-their-minds\u002F\"\u003EHaving a plan in place – around how the business will respond to a cyberattack\u003C\u002Fa\u003E, how it could continue operating and which cybersecurity agencies and investigators should be contacted – will help your business to deal with a stressful situation with some semblance of strategy and calm.\u003C\u002Fp\u003E\u003Cp\u003EIf you are looking for more advice, the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-and-nsa-say-stop-doing-these-10-things-that-let-the-hackers-in\u002F\" target=\"_blank\"\u003ENSA and FBI has a list of 10 cybersecurity errors\u003C\u002Fa\u003E that let hackers into your systems.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-06 13:51:51",timezone:"UTC",updated:c,published:c},description:"Cybersecurity is important for businesses of any size - even small ones. Here's some pitfalls to avoid.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"67e28cdf-235f-409a-a095-3c9d482f2789",image:{id:"e46b26aa-2bf3-4a83-99ea-060ca2271199",filename:"istock-two-people-at-a-computer.jpg",dateCreated:{created:c,date:"2017-12-01 16:46:34",timezone:"UTC",updated:c,published:c},alt:"istock-two-people-at-a-computer.jpg",credits:"Image: iStock",caption:"\u003Cp\u003ETeaching staff even the most basic cyber security techniques can help protect them in the workplace - and at home.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2017\u002F12\u002F01\u002Fe46b26aa-2bf3-4a83-99ea-060ca2271199\u002Fistock-two-people-at-a-computer.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"guide",hubTopicPathString:"Business^SMB",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"small-business-cybersecurity-avoid-these-8-basic-mistakes-that-could-let-hackers-in",startYear:c,summary:b,title:"Small business cybersecurity: Avoid these 8 basic mistakes that could let hackers in",topic:{id:"114a15be-ec91-11e3-95d2-02911863765e",slug:"smb",name:"SMB",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"114a15be-ec91-11e3-95d2-02911863765e",slug:"smb",name:"SMB",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-boost-your-browsers-privacy-with-duckduckgo-privacy-essentials\u002F\" target=\"_blank\"\u003EDuckDuckGo\u003C\u002Fa\u003E is all about privacy and the company has gone out of its way to help protect consumers around the globe. One new arena it has entered is that of email privacy. You might not know this, but tracking companies can even do their thing using your email address.\u003C\u002Fp\u003E\u003Cp\u003EConsider this: Every time you sign up for a site\u002Fservice or make an online purchase, you use an email address. That email address can be used by trackers to keep tabs on your behavior. No one wants that, which is why DuckDuckGo has released the beta of its email protection service to the public at large.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is DuckDuckGo's email protection?\u003C\u002Fh2\u003E\u003Cp\u003ESimply put, the DuckDuckGo email protection allows you to define your actual email address with the service, and then, when you need to use an email address online, you then use DuckDuckGo to create either a personal or private \"Duck\" address for the website in question. Any email that is then sent to the address is stripped of trackers and then forwarded to the personal email address you configured. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"56171094-1e7b-4b42-86b1-ef2adb50bdc5\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F56171094-1e7b-4b42-86b1-ef2adb50bdc5\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBy using this service, you can be sure that any time you need to sign up for anything using an email address, nothing untoward will come of it. \u003C\u002Fp\u003E\u003Cp\u003EThe DuckDuckGo Email Protection service offers smarter encryption, link tracking protection, Duck address replying, a self-service dashboard, and more.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fpermanently-protect-your-email-addresses-for-only-20\u002F\" target=\"_blank\"\u003EPermanently protect your email addresses for only $20\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EUse cases for DuckDuckGo Email Protection\u003C\u002Fh2\u003E\u003Cp\u003EThere are a number of reasons you might want to use DuckDuckGo's Email Protection, such as:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EShopping.\u003C\u002Fli\u003E\u003Cli\u003EAvoiding spam.\u003C\u002Fli\u003E\u003Cli\u003ENewsletter signups.\u003C\u002Fli\u003E\u003Cli\u003EUnknown or new contacts.\u003C\u002Fli\u003E\u003Cli\u003EIn place of long email addresses.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ELet's see how to use DuckDuckGo's Email Protection service.\u003C\u002Fp\u003E\u003Ch2\u003EGetting started with DuckDuckGo's Email Protection\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eee0ec6b-5694-486a-bf24-a6c3e7ad4d6b\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou must first install the DuckDuckGo Privacy Essentials add-on for your web browser of choice. To do this, open your web browser and point it to the link associated with your browser.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fchrome.google.com\u002Fwebstore\u002Fdetail\u002Fduckduckgo-privacy-essent\u002Fbkdgflcldnnnapblkhphbgpggdiikppg" target="_blank"\u003EChrome\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Faddons.opera.com\u002Fen\u002Fextensions\u002Fdetails\u002Fduckduckgo-for-opera-2\u002F" target="_blank"\u003EOpera\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fmicrosoftedge.microsoft.com\u002Faddons\u002Fdetail\u002Fduckduckgo-privacy-essent\u002Fcaoacbimdbbljakfhgikoodekdnlcgpk" target="_blank"\u003EEdge\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fapps.apple.com\u002Fus\u002Fapp\u002Fduckduckgo-privacy-for-safari\u002Fid1482920575?mt=12" target="_blank"\u003ESafari\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Faddons.mozilla.org\u002Fen-US\u002Ffirefox\u002Faddon\u002Fduckduckgo-for-firefox\u002F" target="_blank"\u003EFirefox\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"1. Install the DuckDuck Go Privacy Essentials add-on\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-check-the-privacy-report-for-website-tracking-in-safari\u002F\" target=\"_blank\"\u003EHow to check the Privacy Report for website tracking on Safari\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7b7ca2ce-7143-4e3e-934d-911a5bb53673\" data-edition=\"us\" data-description=\"\u003Cp\u003EOnce you have the Privacy Essentials add-on installed, point your web browser to the \u003Ca href="https:\u002F\u002Fduckduckgo.com\u002Femail\u002F" target="_blank"\u003EDuckDuckGo Email page\u003C\u002Fa\u003E and click Get Started. When prompted, click Next (you'll do this twice).\u003C\u002Fp\u003E\" data-hed=\"2. Sign up\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fb72c119-635b-447e-8c70-a56463b548a1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EGetting started with the DuckDuckGo Email Protection service.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Get Started button for DuckDuckGo's email protection service.\" data-image-filename=\"ddgemail1.jpg\" data-image-date-created=\"2022\u002F09\u002F01\" data-image-width=\"1242\" data-image-height=\"855\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3b9e7a18-11fe-4f5d-ab34-07480c027bc1\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou will then be required to create a new Duck address and then enter an address that will receive all emails stripped of trackers. Once you've created your email addresses, click Continue, and then when prompted, click This is Correct (after reviewing your addresses).\u003C\u002Fp\u003E\" data-hed=\"3. Create your email addresses\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"95d905f3-7f85-4599-9cd9-939b8f85a7a1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ESigning up for your new Duck address.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The DuckDuckGo email address signup window.\" data-image-filename=\"ddgemail2.jpg\" data-image-date-created=\"2022\u002F09\u002F01\" data-image-width=\"676\" data-image-height=\"863\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-recall-an-email-in-outlook\u002F\" target=\"_blank\"\u003EHow to recall an email in Outlook\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f816f0b4-e26e-413e-926a-35783d6a0331\" data-edition=\"us\" data-description=\"\u003Cp\u003EGo to the email account that will serve as your DuckDuckGo forwarded address and retrieve the one-time passphrase. Copy that passphrase, paste it into the text area, and click Sign In.\u003C\u002Fp\u003E\" data-hed=\"4. Verify your new address\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0c8af354-26f7-4aec-9653-7bc40d21e179\" data-edition=\"us\" data-description=\"\u003Cp\u003EOnce everything is set up, you'll find a new entry in the DuckDuck Privacy Essential add-on, labeled Create New Duck Address. Click that entry and it will copy a randomly generated Duck email address to your clipboard that you can use when signing up for services. Any email that goes to that randomly generated email address will be stripped of any nastiness and forwarded to your email address.\u003C\u002Fp\u003E\" data-hed=\"5. Use the service\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"360aa774-3ea7-4f52-b1a9-f6d9e71b9a9b\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAccessing a new Duck address is found within the DuckDuckGo Privacy Essentials add-on.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The DuckDuckGo Privacy Essentials popup menu.\" data-image-filename=\"ddgemail4.jpg\" data-image-date-created=\"2022\u002F09\u002F01\" data-image-width=\"392\" data-image-height=\"669\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAnd that, my email-dependent friends, is all there is to add a layer or two of protection for your email communications. I highly suggest you give this service a try. Even if you only use it for online shopping and newsletter signups, you'll be glad you did.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-01 20:30:07",timezone:"UTC",updated:c,published:c},description:"Who wouldn't want a 'Duck address,' especially when it's defending them from spam, tracking, and other untoward internet elements?",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"6a8a7ff8-92ba-418a-af2b-b293618fe584",image:{id:"e56b7325-8aa5-4f74-aca9-1984393339f5",filename:"duckduckgo.jpg",dateCreated:{created:c,date:"2021-04-22 14:35:49",timezone:"UTC",updated:c,published:c},alt:"The Get Started button for DuckDuckGo's email protection service.",credits:c,caption:"\u003Cp\u003EGetting started with the DuckDuckGo Email Protection service.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F04\u002F22\u002Fe56b7325-8aa5-4f74-aca9-1984393339f5\u002Fduckduckgo.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:5000,height:3705,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"tired-of-being-tracked-online-duckduckgos-email-protection-can-help",startYear:c,summary:b,title:"Tired of being tracked online? DuckDuckGo's Email Protection can help",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"e077d2a9-647a-4e73-bdea-23e52c1cb65d\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"CNET\" data-image-alt-text=\"Lenovo Chromebook on a table.\" data-image-filename=\"lenovo-chromebook-duet.jpg\" data-image-date-created=\"2022\u002F09\u002F13\" data-image-width=\"1296\" data-image-height=\"729\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EChrome OS has become quite the platform for users of all types. Whether you're a typical user who spends most of your time within an operating system browsing social media, writing ad hoc papers, and shopping for the latest trends, or if you're an administrator who has to work on remote machines throughout the day, Chrome OS has you covered.\u003C\u002Fp\u003E\u003Cp\u003EOne tool that I use quite a bit comes by way of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Flinux\u002F\" target=\"_blank\"\u003ELinux\u003C\u002Fa\u003E. If you've already \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-enable-linux-on-your-chromebook-and-why-you-should\u002F\" target=\"_blank\"\u003Eenabled Linux\u003C\u002Fa\u003E, you understand that Chrome OS is much more than just a web browser. With Linux support enabled, you can install quite a large number of applications to turn Chrome OS into a much more traditional OS.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-i-revived-three-ancient-laptops-with-chrome-os-flex\u002F\" target=\"_blank\"\u003EHow I revived three ancient computers with ChromeOS Flex\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EAdding an SSH connection to the Linux terminal app\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAlong the ride with Linux, comes a terminal tool that is much more than a means to a command-line end. With the Linux terminal in Chrome OS, you also get a convenient Secure Shell connection manager.\u003C\u002Fp\u003E\u003Cp\u003ELet me show you how it works.\u003C\u002Fp\u003E\u003Ch3\u003ERequirements\u003C\u002Fh3\u003E\u003Cp\u003EThe only thing you need to enjoy this handy SSH management tool is a \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"df8f8047-a332-41e0-ae0a-9d7202660490\" data-raw-url=\"https:\u002F\u002Fwww.bestbuy.com\u002Fsite\u002Fall-laptops\u002Fchromebooks\u002Fpcmcat244900050010.c?id=pcmcat244900050010\" data-link-shortcode-text=\"Chromebook\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E with Linux support enabled. Of course, you'll also need a remote machine that allows SSH connections. But that's it. Let's get to work.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b5bc2169-f847-440b-aea0-6c5672a1f89a\" data-edition=\"us\" data-description=\"\u003Cp\u003EOpen the Launcher at the bottom left corner of your Chrome OS desktop. Locate and click the Terminal app.\u003C\u002Fp\u003E\" data-hed=\"1. Open the terminal\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"44e473d1-090f-4cf4-b50b-a1994775b56d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ELaunching the Terminal app from the Chrome OS launcher.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Terminal entry in the Chrome OS launcher.\" data-image-filename=\"chromeosssh1.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"1325\" data-image-height=\"321\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"201591a3-a2b3-458d-be71-8c0151f94b93\" data-edition=\"us\" data-description=\"\u003Cp\u003EFrom the terminal app, click Add SSH.\u003C\u002Fp\u003E\" data-hed=\"2. Add an SSH entry\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"241643cd-684c-4536-8087-2b1830582ca4\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Terminal app makes it easy to manage your SSH connections.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome OS Terminal app.\" data-image-filename=\"chromeosssh2.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"1515\" data-image-height=\"899\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c72a6662-b448-4abf-855b-53de092f1b3e\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn the resulting popup, type the details for your new SSH connection in the command section, which will look something like this:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Essh USERNAME@SERVER\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhere USERNAME is the username on the remote server and SERVER is the IP address of the server. For example, the command might look like this:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Essh zdnet@192.168.1.100\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf your remote server uses a different port for SSH, that command might look something like this:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Essh zdnet@192.168.1.100 -p 2022\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EDon't worry about either the Identity or SSH relay server options sections. Once you've configured the command, click Save and your new entry will now be listed under the SSH section of the terminal app.\u003C\u002Fp\u003E\" data-hed=\"3. Enter the SSH details\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b16ebca9-3b78-43ab-b9dc-3bd65f2f76a4\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEntering the SSH details for a new remote connection.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The New SSH Connection dialogue in Chrome OS.\" data-image-filename=\"chromeosssh3.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"1107\" data-image-height=\"708\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EUsing your new SSH connection\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"18bbe0da-5f83-49ba-b167-e7dbb07289e3\" data-edition=\"us\" data-description=\"\u003Cp\u003EClick on the remote server you want to connect to from under the SSH section in the terminal app.\u003C\u002Fp\u003E\" data-hed=\"1. Select the connection to be used\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9969d20a-8e87-44ef-9eea-f3cc9f8f78ec\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf this is the first time connecting to a remote server from the Chrome OS Linux terminal, you'll be prompted to accept the fingerprint. When prompted, type yes and hit Enter on your keyboard.\u003C\u002Fp\u003E\" data-hed=\"2. Accept the fingerprint\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"794c8c89-0d55-451e-93ec-9f8b803d0d70\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAccepting the SSH key fingerprint is required to make a connection.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome OS SSH fingerprint accept popup.\" data-image-filename=\"chromeosssh4.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"1324\" data-image-height=\"375\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6f0fc843-b9ee-4874-a94e-01c9a44d0ad9\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou will then be prompted to type the password for the remote user. Upon successful authentication, you'll find yourself in an SSH session on the remote machine, where you can then take care of whatever admin tasks you need.\u003C\u002Fp\u003E\" data-hed=\"3. Type the user password\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"1c9c6d58-9117-4ac6-a381-399be6520723\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EType your user password for the remote connection and you're in.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome OS Terminal SSH password prompt.\" data-image-filename=\"chromeosssh5.jpg\" data-image-date-created=\"2022\u002F09\u002F14\" data-image-width=\"648\" data-image-height=\"305\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAnd that, my admin friends, is all there is to manage your SSH connections from within Chrome OS. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"a79e7679-c6c7-4a8a-b132-d9c5800e2976\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fa79e7679-c6c7-4a8a-b132-d9c5800e2976\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-15 15:03:44",timezone:"UTC",updated:c,published:c},description:"If you regularly secure shell into different servers, Chrome OS now makes it easy to manage those connections.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"53a5f5b4-43dd-4ff1-83aa-4c9ecefe85b7",image:{id:"e077d2a9-647a-4e73-bdea-23e52c1cb65d",filename:"lenovo-chromebook-duet.jpg",dateCreated:{created:c,date:"2022-09-13 14:20:29",timezone:"UTC",updated:c,published:c},alt:"The Terminal entry in the Chrome OS launcher.",credits:"CNET",caption:"\u003Cp\u003ELaunching the Terminal app from the Chrome OS launcher.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F13\u002Fe077d2a9-647a-4e73-bdea-23e52c1cb65d\u002Flenovo-chromebook-duet.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:729,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems^Linux",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-use-the-handy-ssh-management-tool-in-chrome-os",startYear:c,summary:b,title:"How to use the handy SSH management tool in Chrome OS",topic:{id:"10b2a4fa-ec91-11e3-95d2-02911863765e",slug:"linux",name:"Linux",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"10b2a4fa-ec91-11e3-95d2-02911863765e",slug:"linux",name:"Linux",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1050fa4d-ec91-11e3-95d2-02911863765e",slug:"google",name:"Google",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"5a505bd7-edd5-4501-b6a1-0b4b0149318e",username:"Jason Cipriani",profileUrl:c,email:c,firstName:"Jason",lastName:"Cipriani",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"ec9503e9-68fc-4acb-b714-31487e597154",filename:"jason-cipriani.jpg",dateCreated:{created:c,date:"2022-08-05 15:09:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fec9503e9-68fc-4acb-b714-31487e597154\u002Fjason-cipriani.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jason Cipriani is based out of beautiful Colorado and has been covering technology news and reviewing the latest gadgets as a freelance journalist for the past 13 years. His work can be found all across the Internet and in print. When he's not writing, he can be found hanging out with his family, gaming, or trying to force himself to read a book.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"youtube_video\" data-size=\"large\" data-float=\"none\" data-oembed=\"{"author_name":"ZDNet","author_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fc\\\u002Fzdnetvideo","height":113,"html":"\u003Ciframe width=\\"200\\" height=\\"113\\" src=\\"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fembed\\\u002F7lykQRa3ftE?autoplay=0&loop=0&fs=1&start=0&rel=1&feature=oembed\\" frameborder=\\"0\\" allow=\\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\\" allowfullscreen title=\\"Here\\u00e2\\u0080\\u0099s how to opt out of T-Mobile\\u00e2\\u0080\\u0099s ultra creepy new ad tracking platform\\"\u003E\u003C\\\u002Fiframe\u003E","provider_name":"YouTube","provider_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F","thumbnail_height":360,"thumbnail_url":"https:\\\u002F\\\u002Fi.ytimg.com\\\u002Fvi\\\u002F7lykQRa3ftE\\\u002Fhqdefault.jpg","thumbnail_width":480,"title":"Here\\u2019s how to opt out of T-Mobile\\u2019s ultra creepy new ad tracking platform","type":"video","version":"1.0","width":200}\" data-url=\"https:\u002F\u002Fyoutu.be\u002F7lykQRa3ftE\" data-autoplay=\"false\" data-loop=\"false\" data-start=\"0\" data-fs=\"true\" data-rel=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELast month, T-Mobile fully launched its \u003Ca href=\"https:\u002F\u002Fwww.adexchanger.com\u002Fmobile\u002Ft-mobile-rebrands-its-ad-biz-and-navigates-the-perilous-line-between-programmatic-and-privacy\u002F\"\u003EApp Insights program\u003C\u002Fa\u003E after it \u003Ca href=\"https:\u002F\u002Fwww.wsj.com\u002Farticles\u002Ft-mobile-to-step-up-ad-targeting-of-cellphone-customers-11615285803\"\u003Espent over a year in beta\u003C\u002Fa\u003E. The program collects information about the apps you have installed on your phone, how often you use them, which Wi-Fi networks you connect to and your web browsing habits and then sells that valuable information to marketers. \u003C\u002Fp\u003E\u003Cp\u003EScary, right? To be fair, T-Mobile anonymizes the data so, in theory, it can't be traced back to a specific user. But who wants to take that chance? \u003C\u002Fp\u003E\u003Cp\u003EThankfully, the carrier is allowing its customers to opt-out of the creepy tracking program. But unless you specifically go looking for the method, you'll have a hard time figuring it out. \u003C\u002Fp\u003E\u003Cp\u003EAccording to \u003Ca href=\"https:\u002F\u002Fwww.adexchanger.com\u002Fmobile\u002Ft-mobile-rebrands-its-ad-biz-and-navigates-the-perilous-line-between-programmatic-and-privacy\u002F\" target=\"_blank\"\u003EAdExchanger\u003C\u002Fa\u003E, T-Mobile isn't tracking any data from iPhone users because of Apple's rules around tracking and selling users' data. So, for now, at least, if you use an iPhone, you're safe from T-Mobile's prying eyes. \u003C\u002Fp\u003E\u003Cp\u003EHowever, if you want to take the extra step to tell T-Mobile you don't want to be tracked right now, I can't blame you. \u003C\u002Fp\u003E\u003Ch2\u003E Install the necessary app... if you can find it \u003C\u002Fh2\u003E\u003Cp\u003ETo opt-out, you'll need to install T-Mobile's \u003Ca href=\"https:\u002F\u002Fplay.google.com\u002Fstore\u002Fapps\u002Fdetails?id=com.pushspring.preferences\"\u003EMagenta Ads Platform Choices on Android\u003C\u002Fa\u003E or \u003Ca href=\"https:\u002F\u002Fapps.apple.com\u002Fus\u002Fapp\u002Fmagenta-mktg-platform-choices\u002Fid989451308\"\u003EMagenta Mktg Platform Choices for iPhone\u003C\u002Fa\u003E app. See what I mean? T-Mobile didn't even put the company's name in the name of the app, and even then, they don't use the same name across platforms. People aren't going to search for \"Magenta.\" \u003C\u002Fp\u003E\u003Ch2\u003E Ask for your data not to be sold and deleted \u003C\u002Fh2\u003E\u003Cp\u003EI turned on the option to ask apps not to track me on my iPhone, so the Magenta Mktg app doesn't provide me with the option to view what data the companies involved have about me and my device. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"84e4b922-3fa6-4d4d-b335-9877c00b9900\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshots by Jason Cipriani\u002FZDNet\" data-image-alt-text=\"t-mobile-ad-opt-out\" data-image-filename=\"t-mobile-ad-opt-out.jpg\" data-image-date-created=\"2022\u002F07\u002F08\" data-image-crop=\"2885x2907+0+0\" data-image-width=\"2885\" data-image-height=\"2907\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOn my Android phone, though, I can view which companies have information about my device -- even though I don't have T-Mobile -- and then delete it, followed by indicating I don't want my data sold. \u003C\u002Fp\u003E\u003Cp\u003ETo be clear, I don't think T-Mobile itself is tracking me, but I believe that the marketers T-Mobile sells data to are collecting data about my device, likely through other third-party apps or services. It just happens that T-Mobile's app is surfacing my data during its check, and in turn, providing me a way to remove it and request not to be tracked. \u003C\u002Fp\u003E\u003Cp\u003EOnce you opt-out, you'll be taken to a page in the app showing you the status of your request. After it's complete, you're instructed to delete the app. As for me, I'm going to keep the app installed and check it every few months. \u003C\u002Fp\u003E\u003Cp\u003ESince this appears to be a device-by-device setting, you'll need to repeat this process on any other devices you own. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-19 17:27:00",timezone:"UTC",updated:c,published:c},description:"Customers and non-customers alike should follow these steps to remove your data from various marketers.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"52d469b7-1d59-4634-a83b-5ffd657fa9c5",image:{id:"03c88901-a148-484b-a63e-1eb935585a20",filename:"t-mobile-logo-mwc-2015.jpg",dateCreated:{created:c,date:"2018-05-24 17:09:58",timezone:"UTC",updated:c,published:c},alt:"t-mobile-ad-opt-out",credits:"Shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2018\u002F05\u002F24\u002F03c88901-a148-484b-a63e-1eb935585a20\u002Ft-mobile-logo-mwc-2015.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2000,height:1125,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Home & Office^Networking^Mobile Carriers",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-opt-out-of-t-mobiles-latest-ad-tracking-campaign",startYear:c,summary:b,title:"How to opt out of T-Mobile's creepy ad tracking campaign",topic:{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"7358f1a7-10d7-11e4-9732-00505685119a",username:"Forrester Research",profileUrl:c,email:c,firstName:"Forrester",lastName:"Research",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"da2ec7f9-15a3-4db7-8de4-133974ed5777",filename:"forrester-rgblogo.png",dateCreated:{created:c,date:"2016-09-15 20:35:45",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2016\u002F09\u002F15\u002Fda2ec7f9-15a3-4db7-8de4-133974ed5777\u002Fforrester-rgblogo.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Forrester (Nasdaq: FORR) is one of the most influential research and advisory firms in the world. We help leaders across technology, marketing, customer experience, product and sales functions use customer obsession to accelerate growth. Through Forrester's proprietary Research, Consulting, and Events, leaders from around the globe are empowered to be bold at work - to navigate change and put their customers at the center of their leadership, strategy, and operations. Our unique insights are grounded in annual surveys of more than 675,000 consumers, business leaders, and technology leaders worldwide; rigorous and objective research methodologies, including Forrester Wave™ evaluations; over 45 million real-time feedback votes; and the shared wisdom of our clients. To learn more, visit Forrester.com.",profile:c,title:b,bio:b,bureau:c,awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EAt the beginning of 2022, Zero Trust faces a bizarre dichotomy: It's on the verge of becoming the de facto \u003Cem\u003Ecybersecurity approach\u003C\u002Fem\u003E while simultaneously having many security practitioners decry it as \"just a marketing ploy.\" How did we, as the security community, arrive at such a precarious perch? \u003C\u002Fp\u003E\u003Cp\u003EPart of the problem, according to John Kindervag, former Forrester analyst and author of the original Zero Trust research, was that the trilogy of Zero Trust papers remained largely behind the Forrester paywall. For over a decade, only Forrester clients and \u003Cem\u003Eevery security vendor\u003C\u002Fem\u003E in the world had access. The hype train left the station, with those vendors shaping the Zero Trust narrative from their highly subjective perspective. Nonclients and the greater cybersecurity community only saw Zero Trust through the stained-glass windows of vendor marketing. \u003C\u002Fp\u003E\u003Cp\u003EForrester's research advanced the Zero Trust concept from network-focused to an integrated, dynamic ecosystem of security capabilities and technologies with the introduction of Zero Trust Extended (ZTX). But analysts are not necessarily marketers, and the research lacked a clear, concise, \u003Cem\u003Eshareable\u003C\u002Fem\u003E definition our clients and the larger community could use as a stake in the ground. \u003C\u002Fp\u003E\u003Cp\u003EToday, we correct both of these issues with the release of a report titled, \"The Definition Of Modern Zero Trust.\" Well, yes, that report is behind the paywall, but we're including its definition here, on the outside, for everyone. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EZero Trust defined \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EZero Trust is an information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates these three core principles: All entities are untrusted by default, least privilege access is enforced, and comprehensive security monitoring is implemented. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003ENotice that the last sentence is the three original Zero Trust principles stated together. Here are the salient points in bullet form: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003EDefault deny \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EAccess by policy only \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EFor data, workloads, users, devices \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003ELeast privilege access \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003ESecurity monitoring \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003ERisk-based verification \u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe good news for everyone is that this definition is not divergent from NIST's definition in SP 800-207. The two definitions explain the same concept, using the same principles and often the same words. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EWhat about Zero Trust Architecture or Zero Trust Strategy? \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe broad theme of Zero Trust is the reduction of implicit trust. As a model for information security, Zero Trust translates to network and security architecture. See NIST SP 800-207, Zero Trust Architectures, as the most relevant example. \u003C\u002Fp\u003E\u003Cp\u003ESome advocates of Zero Trust say that it should also be a strategy that works as well; consider replacing the phrase \"Zero Trust strategy\" with \"a strategy to reduce implicit trust throughout our enterprise\" in your mind. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESo, what isn't Zero Trust? \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ETo better help security leaders and pros communicate the benefits of Zero Trust adoption, our report provides more clarity on what it isn't. One key point is that it isn't a security awareness and training strategy. In fact, there's no need for the vast majority of end users in an organization to have any familiarity with this concept at all. Pushing Zero Trust concepts to end users will likely backfire from an awareness and training perspective as the perception of having \"zero trust\" implies a lack of trust in employees. Organizations that have adopted the Zero Trust model see trust as fundamental to creating a positive, low-friction work culture for employees and invest in initiatives to empower the firm at all levels to differentiate with trust. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGo Forth And Convert The Deniers \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EOne more time for those in the back: \u003Cem\u003EZero Trust is an information security model, one that can be worked toward but without an ultimate end state. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThis post was written by Senior Research Analyst David Holmes and it originally appeared \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Fwww.forrester.com\u002Fblogs\u002Fthe-definition-of-modern-zero-trust\u002F?utm_source=zdnet&utm_medium=pr&utm_campaign=sr\" target=\"_blank\"\u003E\u003Cem\u003Ehere\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-02-02 16:37:00",timezone:"UTC",updated:c,published:c},description:"The broad theme of Zero Trust is the reduction of implicit trust. As a model for information security, Zero Trust translates to network and security architecture.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"85dec8c6-11a4-49ac-b2ea-f237cdf929e9",image:{id:"6fba24bf-2fd4-4038-a9b1-b9cee9a4c9e2",filename:"data-center.jpg",dateCreated:{created:c,date:"2022-01-13 19:31:41",timezone:"UTC",updated:c,published:c},alt:"doca-zero-trust-image.jpg",credits:"Nvidia",caption:"\u003Cp\u003ENVIDIA DOCA 1.2 is available in early access to developers building applications for NVIDIA BlueField DPUs.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F01\u002F13\u002F6fba24bf-2fd4-4038-a9b1-b9cee9a4c9e2\u002Fdata-center.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"guide",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"the-definition-of-modern-zero-trust",startYear:c,summary:b,title:"The definition of modern Zero Trust",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"50f6af8c-f846-4158-835e-fd3c636dfa2b",filename:"thumbnail-lance-whitney-zdnet-shot2.jpg",dateCreated:{created:c,date:"2022-04-20 18:05:46",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F04\u002F20\u002F50f6af8c-f846-4158-835e-fd3c636dfa2b\u002Fthumbnail-lance-whitney-zdnet-shot2.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"03eb7b21-cccd-44c2-b4c8-78b22ddd49ed\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Photo by Brooke Cagle on Unsplash\" data-image-alt-text=\"brooke-cagle-609880-unsplash.jpg\" data-image-filename=\"brooke-cagle-609880-unsplash.jpg\" data-image-date-created=\"2018\u002F06\u002F21\" data-image-width=\"5208\" data-image-height=\"3472\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESharing a computer with multiple people can be challenging, especially when it comes to protecting that PC against security risks. Whether you use a shared PC at home, in a home office, or in a small business, you want to ensure that everyone who uses that machine follows proper security guidelines, and that especially applies to passwords.\u003C\u002Fp\u003E\u003Cp\u003ECreating a strong and complex password is one of the best ways to protect your account and your PC from any type of compromise or other security threat. You can certainly make sure that your own password is hard to crack, but how can you coax other people who use the same PC to do likewise?\u003C\u002Fp\u003E\u003Cp\u003ELarge companies and enterprises typically set up domains and rely on Group Policy to set password policies. But your average home or even small office isn't likely to go through the trouble of creating and managing domains. No problem. You can still protect your shared computer by using the local security policy in Windows. Available in Windows 10 and 11, the local security policy helps you control a variety of security options for all users of the PC, including password length and complexity.\u003C\u002Fp\u003E\u003Cp\u003EMany of the settings offered by the local security policy are geared toward domain-based computers. But if you simply want to control a single computer, you can ignore the network-specific settings and focus on the ones for passwords. Using the policy this way will help you better protect a PC shared in a home, a home office, or a small business office. Let's see how this works.\u003C\u002Fp\u003E\u003Ch2\u003EHow to set local security policy in Windows\u003C\u002Fh2\u003E\u003Cp\u003EThe local security policy is accessible from Windows 10 and 11 and works the same in both versions. You can open or access the local security policy using a few different methods. But the quickest way is through the Search tool. Click the Search field or icon, type secpol.msc, and then press Enter. The local security policy window pops up (\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2164eed6-c282-469a-a924-86c51095922f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"The local security policy in Windows\" data-image-filename=\"figure-1-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1152\" data-image-height=\"641\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ESet minimum password length\u003C\u002Fh2\u003E\u003Cp\u003EFirst, you can ensure that anyone who has an account on this computer uses a password of a certain length. Click the right arrow for Account Policies and then select Password Policy. Among the eight options here, double-click the one for Minimum Password Length.\u003C\u002Fp\u003E\u003Cp\u003EClick the Explain tab to see the details of this setting. By default, the minimum length can be as many as 14 characters. Switch back to the Local Security Setting Tab and enter a number up to 14 to specify the minimum length for a password. Click OK when done (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"1f423992-3d36-4577-8d34-efa855107177\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Set the minimum password length\" data-image-filename=\"figure-2-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1139\" data-image-height=\"543\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ESet password complexity\u003C\u002Fh2\u003E\u003Cp\u003EMore important than password length is complexity, which means requiring users of this shared PC to use passwords with uppercase and lowercase characters, numbers, and non-alphanumeric characters. Double-click the option for Password must meet complexity requirements.\u003C\u002Fp\u003E\u003Cp\u003EClick the Explain tab to see the requirements for this one. If this policy is enabled, the password can't contain the user's account name and must be at least six characters long. It also must contain characters from any three of the following categories: Uppercase characters, lowercase characters, any number 0 through 9, and non-alphanumeric characters such as ! or #. Go back to the Local Security Setting tab and click the button for Enabled. Click OK (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9694c42b-2170-432f-9036-f8ea9f34243f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Enable password complexity\" data-image-filename=\"figure-3-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1140\" data-image-height=\"540\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ERequire password changes\u003C\u002Fh2\u003E\u003Cp\u003ENext, you can make sure that people must change their passwords periodically. Double-click the option for Maximum Password Age. Select the Explain tab to learn how this setting works. Return to the Local Security Setting tab and enter a number to determine how many days someone can use a password before it expires. Depending on your environment, 90 days is typically a good timeframe, so that people have to change their passwords every three months. Click OK (\u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E). \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2de44361-ce30-4bed-903e-2fca77144a7d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Set the number of days until a password expires\" data-image-filename=\"figure-4-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1141\" data-image-height=\"542\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EEnforce password history\u003C\u002Fh2\u003E\u003Cp\u003EFaced with the challenge of changing their passwords periodically, many people will simply recycle older passwords. You can limit this tendency by enforcing a password history. Click the option for Enforce password history. Click the Explain tab to see how this plays out. At the Local Security Setting screen, enter a number between 0 and 24, with 0 meaning that no password will be remembered and 24 meaning that the past two dozen passwords will be remembered and therefore unable to be reused. Click OK (\u003Cstrong\u003EFigure 5\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"77abaf76-3177-4c3c-b98d-273122c5815e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Enforce a password history\" data-image-filename=\"figure-5-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1143\" data-image-height=\"559\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ESet lockout policy\u003C\u002Fh2\u003E\u003Cp\u003ENext, you can protect your PC's accounts from compromise by locking them out if the wrong password is entered too many times. Select the setting for Account Lockout Policy and double-click the option for Account lockout threshold.\u003C\u002Fp\u003E\u003Cp\u003EClick the Explain tab to read the details on this one. Return to the Local Security Setting screen and enter a number between 0 and 999. The number will determine how many times an incorrect password can be entered before the account is locked out. A locked out account then must be reset by an administrator account on that PC. Click OK.\u003C\u002Fp\u003E\u003Cp\u003EBased on the number you choose, you may see suggestions for the other two options: Account lockout duration and Reset account lockout counter. These two options determine how long the account will be locked out following the specified number of wrong password attempts. Click OK to accept the suggested settings (\u003Cstrong\u003EFigure 6\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"8ad1f2ec-7ea6-443b-87df-ae76b36ca3d4\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"Set lockout policy\" data-image-filename=\"figure-6-how-to-require-strong-and-complex-passwords-on-a-shared-windows-pc.jpg\" data-image-date-created=\"2022\u002F07\u002F25\" data-image-width=\"1140\" data-image-height=\"558\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EHow strict should you make the password and lockout requirements on your shared PC? That depends on the location and the people using it. For a home PC used by family members, you may want to keep the settings less restrictive. But for a business PC used by employees, you might tighten the requirements. Of course, you can always adjust the settings if they turn out to be too loose or too tight.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-25 18:05:23",timezone:"UTC",updated:c,published:c},description:"You can make sure that everyone who uses a shared Windows PC at your home or business creates a password that can't easily be cracked.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"8b96a804-156c-4e95-9819-cafe50e26366",image:{id:"03eb7b21-cccd-44c2-b4c8-78b22ddd49ed",filename:"brooke-cagle-609880-unsplash.jpg",dateCreated:{created:c,date:"2018-06-21 05:17:47",timezone:"UTC",updated:c,published:c},alt:"sample-image-16-9-red.jpg",credits:"ZDNet",caption:"\u003Cp\u003EIf you have to share a computer with a friend, guest, or sibling, one way to make sure your browsing is private is to turn on incognito mode.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2018\u002F06\u002F21\u002F03eb7b21-cccd-44c2-b4c8-78b22ddd49ed\u002Fbrooke-cagle-609880-unsplash.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:5208,height:3472,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-require-strong-passwords-on-your-shared-windows-pc",startYear:c,summary:b,title:"How to require strong passwords on your shared Windows PC",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"0a6fffc2-2220-44ba-99e4-4c567f6f57bb",username:"maria-diaz-zd",profileUrl:c,email:c,firstName:"Maria",lastName:"Diaz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"d89921b7-c002-40ef-8401-f002f1a769e9",filename:"maria-diaz.jpg",dateCreated:{created:c,date:"2022-08-05 14:44:33",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fd89921b7-c002-40ef-8401-f002f1a769e9\u002Fmaria-diaz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Maria Diaz is a staff writer based in the Raleigh-Durham, NC area with a passion for home automation and a background in graphic design, photography, and filmmaking. She has a bachelor's in Mass Communication and experience in journalism.",profile:c,title:"Staff Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"eaca28ea-e2c3-46f5-b07a-401e49afd43a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EiCloud for Windows can become your new password manager.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Maria Diaz\u002FZDNET\" data-image-alt-text=\"iCloud window on a Windows laptop.\" data-image-filename=\"icloud-windows.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAn \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyour-friends-could-help-stop-you-getting-locked-out-of-your-apple-id\u002F\" target=\"_blank\"\u003EApple ID\u003C\u002Fa\u003E gives you access to many perks within the Apple software ecosystem, and one of them is \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-locate-a-password-with-the-macos-keychain\u002F\" target=\"_blank\"\u003EKeychain\u003C\u002Fa\u003E: iCloud's password manager. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7098396a-45dc-4f31-8567-d4b310457b81\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7098396a-45dc-4f31-8567-d4b310457b81\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhether you use Keychain already or are in the market for a new password manager for your Windows computer after your \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ea164d21-7eec-4c43-a17d-950ec629f52d\" data-raw-url=\"https:\u002F\u002Fwww.lastpass.com\u002F\" data-link-shortcode-text=\"free trial of LastPass\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E expired, using \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-back-up-iphone-with-icloud-or-mac\u002F\" target=\"_blank\"\u003EiCloud\u003C\u002Fa\u003E as a password manager is possible not only on MacOS devices but also on Windows PCs.\u003C\u002Fp\u003E\u003Cp\u003EIf you've been around for the past 10 or so years, you know that most services require accounts set up to access them. This means that we end up with dozens of passwords that we somehow have to remember for each one of those accounts. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-windows-laptop\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe 10 best Windows laptops, 2-in-1s, and ultraportables\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EBut how can I remember all these passwords if I can't even remember my significant other's phone number half the time?\u003C\u002Fp\u003E\u003Ch2\u003EHow to use iCloud as a password manager on Windows\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ea395680-2bb1-46d2-b8cb-171e72f5a5db\" data-edition=\"us\" data-description=\"\u003Cp\u003EGo to your Start menu and open iCloud for Windows. Adding iCloud for Windows to your computer lets you manage your passwords from your PC and generate verification codes when an account needs \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftwo-factor-authentication-is-a-great-idea-but-not-enough-people-are-using-it\u002F" target="_blank"\u003Etwo-factor authentication\u003C\u002Fa\u003E (2FA).\u003C\u002Fp\u003E\u003Cp\u003EMake sure you have \u003Ca href="https:\u002F\u002Fapps.microsoft.com\u002Fstore\u002Fdetail\u002Ficloud\u002F9PKTQ5699M62?hl=en-us&amp;gl=us" target="_blank"\u003Edownloaded iCloud for your Windows PC\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"1. Open iCloud for Windows\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b2c34312-4c25-475c-b166-e986b853d6a1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EGo to the Start menu and open iCloud for Windows.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"iCloud highlighted in green box with arrow pointing to it in Windows laptop.\" data-image-filename=\"step1.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b216b78e-3fb5-4c36-8e1b-c215d591c126\" data-edition=\"us\" data-description=\"\u003Cp\u003EOnce you sign in to your account -- if you haven't already -- you can access your account, add another account, and make any necessary changes.\u003C\u002Fp\u003E\u003Cp\u003EGo to Passwords, and click Apply.\u003C\u002Fp\u003E\" data-hed=\"2. Sign in to your iCloud Passwords\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"74839d13-54c0-4925-a6e5-e35574caccbc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ESign in with your Apple ID and password.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Maria Diaz\u002FZDNET\" data-image-alt-text=\"Login page for iCloud Passwords.\" data-image-filename=\"log-into-icloud-copy.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f8f40929-1025-4a00-a23e-d9951949caa3\" data-edition=\"us\" data-description=\"\u003Cp\u003EMake sure Passwords is selected on the iCloud window, then click on \u003Cstrong\u003EApply\u003C\u002Fstrong\u003E to make the changes. \u003C\u002Fp\u003E\u003Cp\u003EYou can also install browser extensions at this point.\u003C\u002Fp\u003E\" data-hed=\"3. Make sure Passwords is on and click Apply\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"4a1a3a2c-fa93-4676-a5d0-32b3ed6476dc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EMake sure Passwords is on and click \u003Cstrong\u003EApply\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Passwords highlighted in green box with arrow pointing to it on a Windows laptop.\" data-image-filename=\"untitled-1-copy.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9d623095-da61-4b8a-89f1-6a487c7998b5\" data-edition=\"us\" data-description=\"\u003Cp\u003EAt this point, you can also add a browser extension to \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmalicious-google-chrome-extensions-affect-1-4-million-users\u002F" target="_blank"\u003EGoogle Chrome\u003C\u002Fa\u003E or \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbeef-up-microsoft-edge-with-my-favorite-add-ons\u002F" target="_blank"\u003EMicrosoft Edge\u003C\u002Fa\u003E by following the instructions in the iCloud for Windows app.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"4. Add browser extension\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"68a4b7ce-5b5c-46d7-8faf-115ced13fe42\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EOnce you click \u003Cstrong\u003EInstall Extension\u003C\u002Fstrong\u003E in iCloud, you'll be able to add the \u003Cstrong\u003EiCloud Passwords\u003C\u002Fstrong\u003E extension in Chrome.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"iCloud Passwords Chrome extension.\" data-image-filename=\"add-extension.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fheres-how-you-can-still-get-a-free-windows-10-upgrade\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHere's how you can still get a free Windows 10 upgrade\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"98934f98-d6dc-4a2e-8b9c-faaae7df661f\" data-edition=\"us\" data-description=\"\u003Cp\u003ESince I added the \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-chrome-extension\u002F" target="_blank"\u003EGoogle Chrome extension\u003C\u002Fa\u003E, the next step is to \u003Cstrong\u003EEnable Autofill\u003C\u002Fstrong\u003E to give Chrome permission to my iCloud Passwords.\u003C\u002Fp\u003E\u003Cp\u003ETo do this, click on the Keychain button on the toolbar (marked with an arrow on the image below).\u003C\u002Fp\u003E\u003Cp\u003EEnabling Autofill will prompt 2FA with your Apple device. You can see my phone (second image below) is asking me to allow another PC to access my account, and then it will provide a verification code to enter on the Windows PC.\u003C\u002Fp\u003E\" data-hed=\"5. Enable Autofill on Chrome\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"291bed32-cf57-4b97-8cd2-2ac9024361a2\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnable Autofill.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Green arrow pointing to where to Enable Autofill.\" data-image-filename=\"enable-autofill.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"5ad733c4-732a-4bd7-bc28-f9fae87fc5e3\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnter the verification code.&nbsp;\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"iCloud two factor authentication.\" data-image-filename=\"iphione.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"979f8e5e-7d91-4ed6-9e44-63d95f8f785e\" data-edition=\"us\" data-description=\"\u003Cp\u003EAfter you set up iCloud for \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-11-22h2-how-to-get-microsofts-latest-os-update-and-whats-coming-next\u002F" target="_blank"\u003EWindows\u003C\u002Fa\u003E as a password manager and your browser extension, you can try it out by going to a website and trying to log in.\u003C\u002Fp\u003E\" data-hed=\"6. Try out the password manager\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9c2d1429-d949-4c31-b264-49badac226af\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe iCloud Passwords icon is enabled and you can let it autofill your passwords.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"LinkedIn login page with iCloud Passwords icon enabled.\" data-image-filename=\"filled-pw.jpg\" data-image-date-created=\"2022\u002F09\u002F21\" data-image-width=\"2100\" data-image-height=\"1182\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELike LastPass, the browser extension will let you fill in your login information. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-lastpass-alternatives\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EWant to ditch LastPass? Here are the best alternatives to try\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Ch2\u003EFAQ\u003C\u002Fh2\u003E\u003Ch2\u003EHow do you get iCloud for Windows?\u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003ETo get \u003Ca href=\"https:\u002F\u002Fapps.microsoft.com\u002Fstore\u002Fdetail\u002Ficloud\u002F9PKTQ5699M62?hl=en-us&gl=us\" target=\"_blank\"\u003EiCloud for Windows\u003C\u002Fa\u003E, just download the app on your Windows PC, then log in with your Apple ID. You'll be prompted to follow the steps for two-factor authentication by entering a verification code on an iPhone with iOS 14 or later, or an iPad with iPadOS 14 or later, or a Mac with MacOS 11 or later. \u003C\u002Fp\u003E\u003Ch2\u003E How do I set up iCloud Keychain? \u003C\u002Fh2\u003E\u003Cp\u003EiCloud Keychain is available for your \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-update-all-of-your-apple-devices\u002F\" target=\"_blank\"\u003EApple devices\u003C\u002Fa\u003E: \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"edc70090-e7ca-4fa1-9578-b8a9f3bbd834\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fiphone\u002F\" data-link-shortcode-text=\"iPhone\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"11bc78d6-65e7-407e-90ce-42250bd54b6d\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fipad\u002F\" data-link-shortcode-text=\"iPad\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, and \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0ea1a941-15b2-4325-8658-377ab1aeec2f\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fshop\u002Fbuy-mac\" data-link-shortcode-text=\"Mac\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. To set it up, go to your iPhone's Settings and tap on your name at the top of the screen to access your iCloud settings. Then, choose iCloud. Find Passwords and Keychain and select that, then tap on Sync this iPhone to turn it on. \u003C\u002Fp\u003E\u003Cp\u003EIf you want to add iCloud Keychain to your Windows computer, then you can download iCloud Passwords. \u003C\u002Fp\u003E\u003Ch2\u003E Can I use LastPass for free? \u003C\u002Fh2\u003E\u003Cp\u003ELastPass changed the terms on its free option, so that someone with a free account can only use the password manager on one device. This means that you'd need a subscription to use LastPass on both your iPhone and your Windows PC, for example. So, while you can use LastPass for free on your iPhone and iPad, the free version won't be also available for your Windows PC. This is why using iCloud Passwords for Windows is the best free option. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"73acd149-be52-4594-aa01-295e1bc9507b\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F73acd149-be52-4594-aa01-295e1bc9507b\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-22 13:00:00",timezone:"UTC",updated:c,published:c},description:"If you already have an iPhone, an iPad, or a Mac, then a free and secure password manager has been in your hands all this time.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"aa130d25-9a36-4844-998b-2476f85e9629",image:{id:"e240071b-febc-4470-9a8f-557ca237e13f",filename:"gettyimages-1369567919-1-copy.jpg",dateCreated:{created:c,date:"2022-09-21 16:52:30",timezone:"UTC",updated:c,published:c},alt:"Businesswoman with smart phone looking at computer monitor. Young female professional is sitting at desk. She is wearing smart casuals at home office.",credits:"Image: Morsa Images via Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F21\u002Fe240071b-febc-4470-9a8f-557ca237e13f\u002Fgettyimages-1369567919-1-copy.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:7281,height:4856,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security^Password Manager",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"break-up-with-lastpass-how-to-use-icloud-as-a-password-manager-on-windows",startYear:c,summary:b,title:"Break up with LastPass: How to use iCloud as a password manager on Windows",topic:{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"863fe219-de4d-4c2d-9e95-55e19301075a",slug:"education",name:"Education",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"404d3080-deb4-4f91-8bac-687fb49145fb\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Shutterstock\" data-image-alt-text=\"An icon of a compass superimposed on a blurry Mac screen\" data-image-filename=\"apple-safari.jpg\" data-image-date-created=\"2020\u002F06\u002F23\" data-image-width=\"1000\" data-image-height=\"500\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EQuick… how rampant are trackers on the sites you visit? Do you know? Do you care to know? If you use the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fapple-safari-now-has-more-than-one-billion-users-thanks-to-iphone-but-its-still-lagging-its-main-rival\u002F\" target=\"_blank\"\u003ESafari browser\u003C\u002Fa\u003E on MacOS, you have everything you need to view that information built right into the browser. The tool in question is called the Privacy Report, and it's easy to access and use. With Privacy Report, you can see the reported domains as well as the sites that tracked you from those domains. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e658c585-db33-46c8-918a-752729fe81da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe658c585-db33-46c8-918a-752729fe81da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe information Safari gathers will be a real eye-opener for many users who probably had no idea just how prevalent trackers are. With that information in hand, you might be inclined to either stop visiting a site or ensure that the site is incapable of tracking. \u003C\u002Fp\u003E\u003Cp\u003EThe good news is that Safari is pretty good at blocking trackers. But having this information at your disposal can help you make informed decisions about how to approach your online behavior.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-get-more-space-in-safari-with-the-compact-layout\u002F\" target=\"_blank\"\u003EHow to get more space in Safari with Compact Layout\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThere are two ways to view this information -- on a site-by-site basis or from an all-encompassing dashboard. I'm going to show you how to do both. What you wind up doing with the information is completely up to you. On more than a few occasions, I have stopped viewing sites that used an inordinate amount of trackers (whether they were blocked or not). \u003C\u002Fp\u003E\u003Cp\u003EWith that said, how do you see the Safari Privacy Report? Let's dig in and find out. I'll demonstrate on Safari 15.6.1 running on a MacBook Pro with \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-create-a-custom-focus-in-macos-monterey-to-avoid-unnecessary-distractions\u002F\" target=\"_blank\"\u003EMacOS Monterey\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Ch2\u003EHow to view the per-site Privacy Report\u003C\u002Fh2\u003E\u003Ch3\u003E1. Open a website\u003C\u002Fh3\u003E\u003Cp\u003EOpen Safari and navigate to a site you frequent. \u003C\u002Fp\u003E\u003Ch3\u003E2. Open the Privacy Report\u003C\u002Fh3\u003E\u003Cp\u003EClick the shield icon directly to the left of the Safari address bar (\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"1ca7057e-bf85-43ed-88e5-3ff5a4e64cc8\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003Cstrong\u003EFigure 1:&nbsp;\u003C\u002Fstrong\u003EThe shield icon is how you access the Privacy Report in Safari.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Safari Privacy Report Shield.\" data-image-filename=\"privacy1.jpg\" data-image-date-created=\"2022\u002F08\u002F24\" data-image-width=\"500\" data-image-height=\"100\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EClick \"Trackers on This Webpage\" (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"d0701d63-4036-4d67-af95-c1b981742b3a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003Cstrong\u003EFigure 2:&nbsp;\u003C\u002Fstrong\u003EI'm about to glance at the amount of trackers Safari blocked on Facebook.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Privacy Report popup.\" data-image-filename=\"privacy2.jpg\" data-image-date-created=\"2022\u002F08\u002F24\" data-image-width=\"738\" data-image-height=\"388\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOnce you expand the entry, you should see the list of trackers Safari blocked. To be honest, I was surprised at how few Safari caught. And upon a quick refresh, Safari didn't find any new trackers, leading me to believe the web browser is doing its job.\u003C\u002Fp\u003E\u003Cp\u003ENext, we'll take a look at the Privacy Report for all sites. \u003C\u002Fp\u003E\u003Ch2\u003EHow to view the global Privacy Report\u003C\u002Fh2\u003E\u003Ch3\u003E1. Open the Privacy Report pop-up\u003C\u002Fh3\u003E\u003Cp\u003EAs you did to open the per-site report, click the shield icon. This time, however, click the circled \"i\" in the upper left corner of the pop-up to reveal the global Privacy Report (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a19b1018-27aa-492c-837a-1ae19a06e100\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E: The Global Privacy Report displays all the tracker information you need.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Global Privacy Report\" data-image-filename=\"privacy3.jpg\" data-image-date-created=\"2022\u002F08\u002F24\" data-image-width=\"1332\" data-image-height=\"1694\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you expand any one of the entries in the Websites tab, you'll see a listing of all the trackers Safari blocked (\u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"ff274cd2-26f1-453a-b155-b67f2bff509f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E:\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003ESafari blocked 44 trackers on wdrb.com.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"An expanded view into a Privacy Report listing.\" data-image-filename=\"privacy4.jpg\" data-image-date-created=\"2022\u002F08\u002F24\" data-image-width=\"1332\" data-image-height=\"1694\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe Trackers tab retains an even more in-depth look at the trackers Safari has blocked (\u003Cstrong\u003EFigure 5\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"d7df9f97-99f4-4aa1-b84a-90f2d1582fae\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003Cstrong\u003EFigure 5\u003C\u002Fstrong\u003E: Safari has blocked a considerable number of trackers.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"A look into the tracker listing of the Privacy Report.\" data-image-filename=\"privacy5.jpg\" data-image-date-created=\"2022\u002F08\u002F24\" data-image-width=\"1332\" data-image-height=\"1694\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EWhat can you do with this information?\u003C\u002Fh2\u003E\u003Cp\u003EThe Safari Privacy Report is a tool that gives you information; it's not a way to take action. The reason for that is that the web browser has already taken action by blocking the trackers. What you're seeing is the fruit of Safari's labor.\u003C\u002Fp\u003E\u003Cp\u003EHowever, as I said earlier, you can use that information to make informed decisions about the websites you visit. Even though Safari might block a tracker, that doesn't mean the tracker is going to stop trying to do its job. \u003C\u002Fp\u003E\u003Cp\u003EFor instance, Safari blocked branch.io and google-analytics.com from tracking me on Twitter, but they keep trying (and failing… thanks to Safari). But now that I know Twitter is trying to put those trackers on me, if that concerned me, I might opt to stop visiting the site, or use a web browser for Twitter that is even more aggressive at blocking trackers (\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffirefox-our-new-cookie-protection-will-stop-companies-tracking-you-across-sites\u002F\" target=\"_blank\"\u003Esuch as Firefox\u003C\u002Fa\u003E with its Custom option for Enhanced Tracker Protection).\u003C\u002Fp\u003E\u003Cp\u003EThese days, trusting websites can be a dangerous proposition. You should keep yourself informed on what's happening with the sites you visit, so you and your privacy can be better protected.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-08-25 23:25:00",timezone:"UTC",updated:c,published:c},description:"Jack Wallen shows you how to view the Safari Privacy Report so you can see just how prevalent trackers are on the sites you visit.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"808221dc-1674-4433-a99f-0099bf427542",image:{id:"db3a392d-0cee-4fd8-81dc-364e6825168e",filename:"zd-data-protection-and-privacy.jpg",dateCreated:{created:c,date:"2022-03-01 20:22:01",timezone:"UTC",updated:c,published:c},alt:"The Safari Privacy Report Shield.",credits:c,caption:"\u003Cp\u003EThe Sheild icon is how you access the Privacy Report in Safari.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F03\u002F01\u002Fdb3a392d-0cee-4fd8-81dc-364e6825168e\u002Fzd-data-protection-and-privacy.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1200,height:800,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-check-the-privacy-report-for-website-tracking-in-safari",startYear:c,summary:b,title:"How to check the Privacy Report for website tracking in Safari",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"d0aee31d-965e-4a8b-97f0-5c7c1b8bf7f1",slug:"mac-os",name:"Mac OS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"ef13e739-804e-498a-a30e-b90dfc158417\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Amazon\" data-image-alt-text=\"Lenovo Flex 5i 13 Chromebook\" data-image-filename=\"71kdehgnnfs-ac-sl1500.jpg\" data-image-date-created=\"2022-07-25 17:37:30.000000\" data-image-width=\"1500\" data-image-height=\"1000\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EChrome OS is, hands down, the easiest operating system to use. It really is. Even better, Chrome OS makes it incredibly simple to use your account on different devices and even do a complete factory restore of the OS while only losing data saved to the local storage. \u003C\u002Fp\u003E\u003Cp\u003EIt's just so simple. \u003C\u002Fp\u003E\u003Cp\u003EHowever, there's a particular setting within Chrome OS you should pay attention to. That setting is \"Sync and Google services.\" \u003C\u002Fp\u003E\u003Cp\u003EWithin that setting, you tell Chrome OS what you want to sync in your account -- which, in turn, syncs across your devices. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-fiber-touts-100gbps-broadband-in-multi-gig-challenge-to-rival-isps\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EGoogle Fiber touts 100Gbps broadband in challenge to rival ISPs\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EOut of the box, Chrome OS syncs everything: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EBookmarks\u003C\u002Fli\u003E\u003Cli\u003EExtensions\u003C\u002Fli\u003E\u003Cli\u003EHistory\u003C\u002Fli\u003E\u003Cli\u003ESettings\u003C\u002Fli\u003E\u003Cli\u003ETheme\u003C\u002Fli\u003E\u003Cli\u003EReading list\u003C\u002Fli\u003E\u003Cli\u003EOpen tabs\u003C\u002Fli\u003E\u003Cli\u003EPasswords\u003C\u002Fli\u003E\u003Cli\u003EAddresses\u003C\u002Fli\u003E\u003Cli\u003EPayment methods, offers, and addresses using \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ffinance\u002Fgoogle-pay-vs-samsung-pay\u002F\" target=\"_blank\"\u003EGoogle Pay\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EMany of these are innocuous and helpful to sync. You probably want all of your bookmarks, settings, and even open tabs synced. The more problematic ones are extensions, passwords, and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-payment-app\u002F\" target=\"_blank\"\u003Epayment methods\u003C\u002Fa\u003E. Passwords and payment methods are sensitive information that you might not want to sync across devices. On top of this, you really shouldn't have Google saving your passwords anyway (use a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-protect-and-secure-your-password-manager\u002F\" target=\"_blank\"\u003Epassword manager\u003C\u002Fa\u003E instead). \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-password-manager\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe 6 best password managers: Easily maintain all your logins\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EAs far as extensions are concerned, although this setting might not contain sensitive information, I have run into a situation where I've installed an extension that resulted in unexpected consequences. Had I allowed extensions to sync, that same extension would have been added to any Chrome OS device I logged in to and wreaked the same kind of havoc. Because of that incident, I prefer to disable the syncing of extensions. \u003C\u002Fp\u003E\u003Cp\u003ENow, how do you manage the sync options in Chrome OS? Let me show you. \u003C\u002Fp\u003E\u003Ch2\u003E How to manage Chrome OS syncing for better portability and security \u003C\u002Fh2\u003E\u003Ch2\u003E Requirements \u003C\u002Fh2\u003E\u003Cp\u003EThe only thing you'll need to manage these settings is a working \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"62b83a1c-4b59-4d8a-8dbf-69df9b4e97ac\" data-raw-url=\"https:\u002F\u002Fwww.bestbuy.com\u002Fsite\u002Fall-laptops\u002Fchromebooks\u002Fpcmcat244900050010.c?id=pcmcat244900050010\" data-link-shortcode-text=\"Chromebook\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. That's it. Let's configure those sync options. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"db7822b2-dd2e-4fa5-a5a6-524e5ea5723a\" data-edition=\"us\" data-description=\"\u003Cp\u003ELog in to your Chromebook and open the Chrome web browser. Click the three-dot menu in the upper right corner and select Settings.\u003C\u002Fp\u003E\" data-hed=\"1. Open Chrome Settings\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fc665bd5-333f-4126-bc28-9c59e1262e6a\" data-edition=\"us\" data-description=\"\u003Cp\u003EFrom within the Settings app, go to You and Google \u003E Sync and Google services \u003E Manage what you sync.\u003C\u002Fp\u003E\" data-hed=\"2. Open the Sync manager\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"462bc8e4-9db6-4f6f-ad7d-64c2e1cb233e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EManaging your sync items is just a few clicks away.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome Sync and Google Services settings window.\" data-image-filename=\"chromesync1.jpg\" data-image-date-created=\"2022\u002F09\u002F28\" data-image-width=\"1422\" data-image-height=\"764\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"df810cf0-11a2-4fc3-ac52-9e7388ed8c21\" data-edition=\"us\" data-description=\"\u003Cp\u003EFrom the "Manage what you sync" window, select "Customize sync," and then disable any of the options that you don't want to sync across devices. To disable a service, set the on\u002Foff slider for that service to the off position. Once you've made your selections, close out Settings, and you're done.\u003C\u002Fp\u003E\" data-hed=\"3. Customize your sync options\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"260214a1-8b60-4d7b-a41c-7c02812d0206\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EYou have plenty of items to enable and disable here.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome Manage what you sync window.\" data-image-filename=\"chromesync2.jpg\" data-image-date-created=\"2022\u002F09\u002F28\" data-image-width=\"1800\" data-image-height=\"1088\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffive-reasons-chromebooks-are-the-perfect-laptop\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003E5 reasons Chromebooks are the perfect laptop (for most users)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EAt this point, Chrome will only sync those items you've left enabled to your account. One other thing to keep in mind is that these settings do not just apply to the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fheres-how-googles-using-ml-to-improve-chrome\u002F\" target=\"_blank\"\u003EChrome web browser\u003C\u002Fa\u003E on Chrome OS but to any Chrome browser you have linked to your Google Account. Just keep that in mind when you start disabling options for syncing. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"73acd149-be52-4594-aa01-295e1bc9507b\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F73acd149-be52-4594-aa01-295e1bc9507b\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-29 18:00:49",timezone:"UTC",updated:c,published:c},description:"Here's how to get the most out of Chrome OS Sync for an all-around better experience.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"9236be28-26a5-41fb-8db4-a6bdc3b24494",image:{id:"ef13e739-804e-498a-a30e-b90dfc158417",filename:"71kdehgnnfs-ac-sl1500.jpg",dateCreated:{created:c,date:"2022-07-25 17:37:30",timezone:"UTC",updated:c,published:c},alt:"Lenovo Flex 5i 13 Chromebook",credits:"Amazon",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F07\u002F25\u002Fef13e739-804e-498a-a30e-b90dfc158417\u002F71kdehgnnfs-ac-sl1500.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1500,height:1000,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-manage-chome-os-syncing-for-better-portability-and-security",startYear:c,summary:b,title:"How to manage Chrome OS syncing for better portability and security",topic:{id:"df75c005-715d-4ff8-82e7-88bbd1c4e6c3",slug:"operating-systems",name:"Operating Systems",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"df75c005-715d-4ff8-82e7-88bbd1c4e6c3",slug:"operating-systems",name:"Operating Systems",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1050fa4d-ec91-11e3-95d2-02911863765e",slug:"google",name:"Google",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EOnce upon a time, VPNs were pieces of technology that made it possible for you to work remotely and still have access to internal files and directories (as if you were local). VPNs of today serve a much different purpose. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-how-does-it-work\u002F\" target=\"_blank\"\u003EWhat modern VPNs do\u003C\u002Fa\u003E is mask your IP address and encrypt your data.\u003C\u002Fp\u003E\u003Cp\u003EThis is absolutely crucial for some users and use cases. Consider you're working on a public wireless network and you have to transmit sensitive data over a network and you're not exactly certain how secure that network is. What do you do? Do you just go ahead and risk transmitting that data as you normally would? \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"867a8602-6dd8-4cb6-b32e-449daea83709\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F867a8602-6dd8-4cb6-b32e-449daea83709\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ENot if security and privacy are important. If that's the case, a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Etop VPN service\u003C\u002Fa\u003E will be your best friend. \u003C\u002Fp\u003E\u003Ch2\u003EWhy you should be using a VPN\u003C\u002Fh2\u003E\u003Cp\u003EAs I said earlier, a VPN not only masks your location but also encrypts the data you send from your browser. That's an important distinction, as the \u003Ca href=\"https:\u002F\u002Fwww.opera.com\u002Ffeatures\u002Ffree-vpn\" target=\"_blank\"\u003EOpera VPN\u003C\u002Fa\u003E only works within the browser. This isn't a global VPN that masks and encrypts all data leaving either a computer or mobile device. For that, you would have to make use of another service. But given the majority of users do the majority of their work within a browser, a built-in VPN is a great option. \u003C\u002Fp\u003E\u003Cp\u003EBut why should you care about masking your IP address or location? This is simple -- privacy. If someone intercepts unencrypted non-anonymized data from your computer or mobile device, they could locate you. When you use a VPN, your location can be masked to look like it's in a completely different country. Couple that with the data encryption and the big question should be, \"Why have you put off using a VPN for this long?\"\u003C\u002Fp\u003E\u003Cp\u003EWith that said, I want to show you how to use the Opera VPN on both the mobile and desktop versions. I'll be demonstrating this on the Android and Linux versions of the browser, but the process should be similar, regardless of what platform you use.\u003C\u002Fp\u003E\u003Ch2\u003EUsing the VPN on Opera mobile\u003C\u002Fh2\u003E\u003Cp\u003ELet's first take a look at how to enable the VPN on Opera mobile. To do this, open Opera on your device. From the Opera main window (\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E), tap the profile icon at the bottom right of the display.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"1e79d968-df81-4caa-9059-684a69f2a3c4\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Opera mobile main window as seen on Android 12.\u003C\u002Fp\u003E\" data-image-alt-text=\"operavpn1.jpg\" data-image-filename=\"operavpn1.jpg\" data-image-date-created=\"2022\u002F05\u002F17\" data-image-width=\"369\" data-image-height=\"800\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn the resulting popup, tap the gear icon in the upper left corner. You should then see the listing for the VPN (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"82ee8fa4-5f0c-460b-9f52-6e6ef1ee095d\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe VPN is currently disabled.\u003C\u002Fp\u003E\" data-image-alt-text=\"operavpn2.jpg\" data-image-filename=\"operavpn2.jpg\" data-image-date-created=\"2022\u002F05\u002F17\" data-image-width=\"369\" data-image-height=\"800\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETap the ON\u002FOFF slider until it's in the ON position. And now, everything you transmit from within the Opera browser is anonymized and encrypted.\u003C\u002Fp\u003E\u003Ch2\u003EUsing the VPN on Opera desktop\u003C\u002Fh2\u003E\u003Cp\u003ETo enable the VPN on Opera desktop, you need to click the Opera icon in the top left corner and then click Settings. In the left navigation, click Privacy & security, where you'll see the entry for Enable VPN (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"4c8dfa56-67ea-4d34-bc34-fb09ad31181d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnabling the VPN on Opera desktop running on Pop!_OS Linux.\u003C\u002Fp\u003E\" data-image-alt-text=\"operavpn3.jpg\" data-image-filename=\"operavpn3.jpg\" data-image-date-created=\"2022\u002F05\u002F17\" data-image-width=\"1374\" data-image-height=\"359\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EClick the ON\u002FOFF slider until it's in the ON position, which will place a small VPN icon to the left of the address bar (\u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"6134a018-0dda-4ab4-9df6-1e598af1691c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EWith the VPN icon showing, you know the VPN is on.\u003C\u002Fp\u003E\" data-image-alt-text=\"operavpn4.jpg\" data-image-filename=\"operavpn4.jpg\" data-image-date-created=\"2022\u002F05\u002F17\" data-image-width=\"759\" data-image-height=\"145\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ETesting the VPN connection\u003C\u002Fh2\u003E\u003Cp\u003EThere's a simple way to test if the VPN connection is working. First, turn off the VPN and go to \u003Ca href=\"http:\u002F\u002Fwww.whatismyipaddress.com\" target=\"_blank\"\u003Ewhatismyipaddress.com\u003C\u002Fa\u003E. The results should not only show your current IP address, but also the location of your IP address. \u003C\u002Fp\u003E\u003Cp\u003ENext, turn on the VPN and go back to the same site. You should see both a different IP address and location. With the Opera VPN off, my connection was listed correctly. With the VPN on, my connection was listed in Colima Mexico. \u003C\u002Fp\u003E\u003Cp\u003ESuccess!\u003C\u002Fp\u003E\u003Cp\u003EAnd that's all there is to using the Opera VPN on both the mobile and desktop versions. If you value your security and privacy, you should seriously consider making use of this feature.\u003C\u002Fp\u003E\u003Cp\u003EOne thing to keep in mind when using any free VPN service is that they generally aren't nearly as private as a paid service. Although Opera claims to not collect any data, some privacy-focused sites (such as \u003Ca href=\"https:\u002F\u002Frestoreprivacy.com\u002Fvpn\u002Freviews\u002Fopera-vpn\u002F\" target=\"_blank\"\u003ERestorePrivacy\u003C\u002Fa\u003E) claim that Opera does collect usage logs from users). If you're serious about your privacy and security, you might want to consider subscribing to a commercial VPN service. However, if cost is an issue, even a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F\" target=\"_blank\"\u003Efree VPN\u003C\u002Fa\u003E is better than no VPN.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"867a8602-6dd8-4cb6-b32e-449daea83709\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F867a8602-6dd8-4cb6-b32e-449daea83709\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-05-17 20:59:00",timezone:"UTC",updated:c,published:c},description:"Opera has a very good built-in VPN feature on both its mobile and desktop versions. Jack Wallen shows you how to use the VPN and explains why you should.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"7018677a-5693-4acf-b4f7-090e357634ca",image:{id:"acb4de69-6cff-4d36-8274-9e74c5e52695",filename:"zdnet-best-vpns.jpg",dateCreated:{created:c,date:"2021-12-23 20:34:58",timezone:"UTC",updated:c,published:c},alt:"operavpn1.jpg",credits:c,caption:"\u003Cp\u003EThe Opera mobile main window as seen on Android 12.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F12\u002F23\u002Facb4de69-6cff-4d36-8274-9e74c5e52695\u002Fzdnet-best-vpns.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1200,height:800,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security^VPN",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-use-the-opera-vpn-and-why-you-should",startYear:c,summary:b,title:"How to use the Opera VPN (and why you should)",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10e2a445-ec91-11e3-95d2-02911863765e",slug:"networking",name:"Networking",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"3edc0faa-226b-4980-9b4a-f614df49135d",username:"tiernan1",profileUrl:c,email:c,firstName:"Tiernan",lastName:"Ray",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"c2f70f95-253a-47e8-969f-8313ff044e89",filename:"tiernan-ray.jpg",dateCreated:{created:c,date:"2022-08-05 17:33:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fc2f70f95-253a-47e8-969f-8313ff044e89\u002Ftiernan-ray.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Tiernan Ray has been covering technology and business for 28 years. He was most recently technology editor for Barron's where he wrote daily market coverage for the Tech Trader blog and wrote the weekly print column of that name. He has also worked for Bloomberg and SmartMoney, and for the prestigious ComputerLetter newsletter covering venture capital investments in tech. His work has been published in the New York Times, Fortune magazine, and CNN Money. He is a graduate of Princeton University and a native of New York City.",profile:c,title:"Contributing Writer",bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"video\" data-uuid=\"e71057d5-34be-4cdb-abe3-7d79c52a7de7\" data-size=\"large\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"cb41dd68-8747-46ca-98c0-faeec625afa6\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fcb41dd68-8747-46ca-98c0-faeec625afa6\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou could be forgiven for wondering whether there's anything actually legitimate about cryptocurrencies. \u003C\u002Fp\u003E\u003Cp\u003EIf 2017 was the year that Bitcoin, and other cryptocurrencies such as \"Ether,\" broke big as mainstream phenomena, 2018 was the year crypto's risks became commonplace. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F2018s-most-high-profile-cryptocurrency-catastrophes-ico-failures-and-cyberattacks\u002F\" target=\"_blank\"\u003EAs ZDNet's Charlie Osborne has related\u003C\u002Fa\u003E, crackers last year increasingly broke into \"wallets,\" the software programs that store Bitcoin and other currencies, absconding with funds, and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmonex-to-revamp-coincheck-cryptocurrency-exchange-within-two-months\u002F\" target=\"_blank\"\u003Ecompromised exchanges\u003C\u002Fa\u003E, where traders of currency meet to place buy and sell orders. \u003C\u002Fp\u003E\u003Cp\u003EIn a sign of the spread of confusion and chaos, one cryptocurrency software startup, Taylor, which has been trying to create improved programs for trading currencies, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fall-of-cryptocurrency-trading-app-taylors-funds-have-been-stolen\u002F\" target=\"_blank\"\u003Ewas entirely cleaned out of its investment backing\u003C\u002Fa\u003E, all held in virtual currency, by a cracking attack. The craze for \"initial coin offerings,\" or ICOs -- the issuance of novel currencies -- ran into serious trouble in 2018 as some efforts collapsed amidst \u003Ca href=\"https:\u002F\u002Fwww.finder.com.au\u002Funpaid-kodakcoin-developers-reportedly-holding-code-ransom\" target=\"_blank\"\u003Eaccusations of fraud\u003C\u002Fa\u003E on the part of the offering parties. \u003C\u002Fp\u003E\u003Cp\u003EThe chaos caused the price of Bitcoin, which soared at the end of 2017, to plunge in 2018, dropping from a high price for each Bitcoin equivalent to over $19,000 to a low of under $4,000. Bitcoin is the coin of the realm, as they say, and represents over half of all trades by value, so it sets the standard. Other currencies followed the decline. The COVID-19 pandemic really pumped up Bitcoin, whose spot price has rebounded strongly: as of December, 2020, it currently trades for just under $23,000. Nvidia, a computer chip maker, and competitor Advanced Micro Devices, both of whose graphics processing units are the basis of crunching the codes for crypto, saw their publicly-traded stocks buffeted in the past year by the volatility in the crypto market. \u003C\u002Fp\u003E\u003Cp\u003EIn spite of that chaos and in spite of what seems outright fraud, a lot of activity still happens with cryptocurrencies, billions of it on a daily basis, in fact. \u003Ca href=\"https:\u002F\u002Fcoinmarketcap.com\u002Fcharts\u002F\" target=\"_blank\"\u003EThere is an estimated $643 billion worth of all cryptocurrencies in circulation\u003C\u002Fa\u003E, and over $184 billion worth of the things changing hands around the world every day. Crypto potentially has tons of benefits for business: the ability to create trading technologies for conducting transactions unique to a given industry, without the need for a central authority, is one of the biggest promises. \u003C\u002Fp\u003E\u003Cp\u003EIt makes sense to keep an eye on the action, as the sheer volume of activity means that crypto will find some role in business and society for years to come. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffacebook-debuts-libra-cryptocurrency-a-bitcoin-killer\u002F\" target=\"_blank\"\u003EThe announcement by Facebook\u003C\u002Fa\u003E that it will introduce its own cryptocurrency, the \"Libra,\" some time next year, cements the significance of the field. \u003C\u002Fp\u003E\u003Cp\u003EWhat follows is a review of the basics and the leading edge of crypto that you need to know. \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESee also: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcryptocurrencies-you-need-to-know\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EBitcoin and 11 more cryptocurrencies you need to know\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch3\u003EBenefits: What is cryptocurrency?\u003C\u002Fh3\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"de2397e0-a6da-45c3-b85c-16e205f44569\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fde2397e0-a6da-45c3-b85c-16e205f44569\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe best way to think about Bitcoin, and Ether, and other currencies, is as a contract between buyer and seller. They represent tacit agreements to conduct an exchange between counterparties, just as the U.S. dollar and other \u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FFiat_money\" target=\"_blank\"\u003Efiat currencies\u003C\u002Fa\u003E have always been representations of the implicit promise of governments to uphold transactions. \u003C\u002Fp\u003E\u003Cp\u003EThe big appeal is that crypto money doesn't need to be issued by banks, and exchange rates don't need to be controlled by a central bank. A company can create its own contracts, just like creating a new programming language. As long as counterparties will agree to uphold the contract, a whole system of transactions can be set in motion without having to be ruled by the processes of normal monetary and banking authorities. \u003C\u002Fp\u003E\u003Cp\u003EIt's often said that Bitcoin is three things all rolled into one:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EIt's a store of value, first, in that one can convert fiat currencies -- money issued by governments, such as the U.S. dollar -- into a corresponding amount of Bitcoin, as well as storing the value of other items by exchanging them for Bitcoin. \u003C\u002Fli\u003E\u003Cli\u003EIt's a means of enacting transactions, in that one can present Bitcoin in exchange for goods and services, where it is accepted. \u003C\u002Fli\u003E\u003Cli\u003EAnd thirdly, it's a record of transactions, given that each Bitcoin comes out of the operation of computers that track the global flow of all transactions in Bitcoin, via the digital ledger software called blockchain. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003ESee: \u003Ca href=\"https:\u002F\u002Fcoin.dance\u002Fresources\" target=\"_blank\"\u003ECoin Dance's resources for getting started with \u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003EBitcoin and things like it are dubbed \"crypto\" because at the heart of the global software system of the blockchain is a cryptographic function that encodes successive transactions as \"hashes,\" which are codes formed with cryptographic functions that transform the data of successive transactions in such a way that no single computer can reverse the process. It is this transformation, by multiple computer users, that \u003Ca href=\"http:\u002F\u002Ffinancialcryptography.com\u002Fmt\u002Farchives\u002F001325.html\" target=\"_blank\"\u003Eserves as a third set of books\u003C\u002Fa\u003E to keep two parties to a transaction honest without a central authority. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9469973b-62c3-4651-a361-d5dd29b134f9\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe idea that started everything: all the world's bitcoin transactions recorded one after another in a long chain of interlocking cryptographic hashes. This is the underlying technology that maintains the integrity of crypto-currencies.\u003C\u002Fp\u003E\" data-image-credit=\"Bitcoin.org\" data-image-alt-text=\"blockchain-illustration.jpg\" data-image-filename=\"blockchain-illustration.jpg\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"2187\" data-image-height=\"955\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EBitcoin alternatives\u003C\u002Fh3\u003E\u003Cp\u003EAlthough Bitcoin dominates cryptocurrency activity, like any software program, it has strengths and weaknesses; some would prefer a contract between participants that has different attributes from what Bitcoin has. Some don't like it as a store of value, or a means of transactions, and so alternatives have been proposed. There are now thousands of new currencies, and more keep being made, including another version of Bitcoin, called \"\u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FBitcoin_Cash\" target=\"_blank\"\u003EBitcoin Cash\u003C\u002Fa\u003E\"; \u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FEthereum\" target=\"_blank\"\u003EEther\u003C\u002Fa\u003E, introduced in 2014 by a developer Vitaly Dmitriyevich as part of a new distributed application platform; \"\u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FEOS.IO\" target=\"_blank\"\u003EEOS\u003C\u002Fa\u003E,\" a coin that comes with a new computing protocol, from the Hong Kong-based startup Block.one; \"\u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FLitecoin\" target=\"_blank\"\u003ELitecoin\u003C\u002Fa\u003E,\" created by a Google engineer; and \"\u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FRipple_(payment_protocol)\" target=\"_blank\"\u003ERipple\u003C\u002Fa\u003E,\" created by startup Ripple Labs, to name just a few of the most prominent. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-tiny-tutorial-on-cryptocurrencies\u002F\" target=\"_blank\"\u003EA tiny tutorial on cryptocurrencies\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"abd77eda-a229-4e08-983d-8ac461bca0a1\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fabd77eda-a229-4e08-983d-8ac461bca0a1\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EEach of these has its appeal, the same way one or another programming language attracts followers. According to data gathered by popular news site \u003Ca href=\"https:\u002F\u002Fwww.coindesk.com\u002F\" target=\"_blank\"\u003ECoinDesk\u003C\u002Fa\u003E in its \"\u003Ca href=\"https:\u002F\u002Fwww.coindesk.com\u002Fdata\" target=\"_blank\"\u003ECrypto-Economics Explorer\u003C\u002Fa\u003E,\" a kind of almanac of crypto, there are only a few currencies whose volume of trading, total value, and interest by developers comes anywhere close to Bitcoin, among them EOS, Ether, and Ripple. Most others have tiny fractions of the market capitalization as measured in dollar-denominated assets placed into them. The various offerings can have different advantages, such as being able to transact faster. \u003C\u002Fp\u003E\u003Cp\u003EOne big thing to keep in mind is that less-popular currencies will naturally have lower liquidity in cryptocurrency exchanges. As a result, it may be harder to cash out of them when you want to exchange them back for fiat currencies. \u003C\u002Fp\u003E\u003Cp\u003EAccepting Bitcoin at some point will be an important decision for many businesses simply because of the sheer volume of fiat currencies placed into these instruments. $260 billion or so worth of dollars and euros and pounds sterling means there is opportunity for a business that accepts payment in crypto to reap some of the money looking to be transacted.\u003C\u002Fp\u003E\u003Ch3\u003EGetting started with wallets\u003C\u002Fh3\u003E\u003Cp\u003EThe easiest way to get involved with Bitcoin, Ether or another currency is to get some digital wallet software. The wallet program gives you a unique \"public key,\" a string of characters, which serves as an address you can give to a counter-party to which they can send you Bitcoin or other money, much the way you would give out an email address. Wallets such as \u003Ca href=\"https:\u002F\u002Fwallet.mycelium.com\u002F\" target=\"_blank\"\u003EMycelium\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.coinomi.com\u002Fen\u002F\" target=\"_blank\"\u003ECoinomi\u003C\u002Fa\u003E are available on mobile devices running Android and iOS. \u003C\u002Fp\u003E\u003Cp\u003EThere are also desktop programs such as \u003Ca href=\"https:\u002F\u002Felectrum.org\u002F#home\" target=\"_blank\"\u003EElectrum\u003C\u002Fa\u003E, and web-based wallets you can use through a browser, such as the one offered for free by a Google-backed, \u003Ca href=\"https:\u002F\u002Fwww.blockchain.com\u002Fwallet\" target=\"_blank\"\u003ESilicon Valley startup named Blockchain\u003C\u002Fa\u003E. (Blockchain also has a mobile app version of the wallet.) \u003C\u002Fp\u003E\u003Cp\u003EFacebook's forthcoming wallet software, for use with its proposed Libra currency, will be called \"Calibra,\" \u003Ca href=\"https:\u002F\u002Fnewsroom.fb.com\u002Fnews\u002F2019\u002F06\u002Fcoming-in-2020-calibra\u002F\" target=\"_blank\"\u003Ethe company said\u003C\u002Fa\u003E. It's useful to try out some wallets to get a sense of what's involved before Facebook's offering lands.\u003C\u002Fp\u003E\u003Cp\u003EBecause you can load these wallets up with tiny amounts of money, you try several of them for a nominal expense and see how you like the user interface. Testing the user interface is an important element in selecting a program given that you want to be very clear about how and when you are placing orders to purchase or sell crypto. \u003C\u002Fp\u003E\u003Cp\u003EIn the wallet you will see a list of accounts. This starts with an initial public key address, but you can have the program create new public keys if you want to store money received in separate keys. Some wallets, in fact, propose generating multiple addresses as a way to separate and to cloak transactions, a practice that will be useful to anyone wanting to obscure their total record of transactions, given that the global blockchain records transactions by public key address. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"57cd1fa8-03e9-414b-a90c-47db98d4740d\" data-size=\"medium\" data-float=\"right\" data-image-caption=\"\u003Cp\u003ESplash screen for the Coinomi mobile wallet for iOS. The first task will be to create the wallet words that will secure your wallet and then to back them up.&nbsp;\u003C\u002Fp\u003E\" data-image-alt-text=\"coinomi-wallet-startup.png\" data-image-filename=\"coinomi-wallet-startup.png\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"1242\" data-image-height=\"2208\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"711c18b8-7da8-46d8-9141-52af6ae37a02\" data-size=\"medium\" data-float=\"right\" data-image-caption=\"\u003Cp\u003ECoinomi generation of random wallet words — record them somewhere else so you can always recall them if needed, and don't show them to anyone! (Unlike this article is doing!)\u003C\u002Fp\u003E\" data-image-alt-text=\"coinomi-wallet-words.png\" data-image-filename=\"coinomi-wallet-words.png\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"1242\" data-image-height=\"2208\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen you first install a wallet program such as Mycelium or Coinomi, they will ask you to record a unique string of several words whose combination will be used if you ever need to recover a wallet, such as if you lose your phone with the program on it. You should carefully note the words and record them in a safe place, as these words are the only way to recover a wallet, and without them, your wallet account and any money you have in the wallet will be lost. Once you're through that procedure, you will create a password of your own invention, which is the normal kind of procedure. The password is what you use with the wallet on a day-to-day basis, and is separate from your recovery set of words. \u003C\u002Fp\u003E\u003Cp\u003ETo receive bitcoin, you give someone your public key or keys, a string of characters you can see in the program. To send money, you enter into the program a public key that someone provides to you. In this way, you can also use multiple wallet programs and transfer funds between them. \u003C\u002Fp\u003E\u003Cp\u003EWith each transaction, either sending or receiving, a fee is extracted. The fee goes to the global \"mining\" community, those \u003Ca href=\"https:\u002F\u002Fwww.techrepublic.com\u002Farticle\u002Fblockchain-cheat-sheet\u002F\" target=\"_blank\"\u003Ecomputer users who form the third party, the blockchain\u003C\u002Fa\u003E, that participate in verifying all transactions for a given currency. When you send or receive, it takes some time for the amounts to be verified by miners, hence, your wallet may show grayed-out amounts until they are final. This can take up to several minutes for each transaction. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"f0a68808-365f-4c59-bb96-66dbde9f8676\" data-size=\"medium\" data-float=\"right\" data-image-caption=\"\u003Cp\u003EThe public key, which you give to a counter-party, either by reading off the combinations of characters at the top of the screen or by having them scan the barcode.&nbsp;\u003C\u002Fp\u003E\" data-image-alt-text=\"coinomi-wallet-public-key.png\" data-image-filename=\"coinomi-wallet-public-key.png\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"1242\" data-image-height=\"2208\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EGiven that the spot price for a single Bitcoin is around $23,000 today, your first purchase will show only a fraction of one bitcoin in your wallet, something like \"0.001\" Bitcoin for a $10 purchase, after fees. Other currencies are cheaper but it still can cost hundreds of dollars for a single coin of any currency. \u003C\u002Fp\u003E\u003Cp\u003EBe aware that that software wallets can be hacked. Crackers have used approaches such as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fusers-report-losing-bitcoin-in-clever-hack-of-electrum-wallets\u002F\" target=\"_blank\"\u003Esending false notice of software updates, to install malicious code\u003C\u002Fa\u003E. A wallet can be secured via two-factor authentication, such as a one-time passcode sent to a phone, however, crackers have compromised such authentication by \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwave-of-sim-swapping-attacks-hit-us-cryptocurrency-users\u002F\" target=\"_blank\"\u003Ewhat's known as \"SIM swapping,\"\u003C\u002Fa\u003E getting a phone company to assign your cellular account to them, so that they can intercept such one-time codes. There's no way to absolutely prevent such attacks, one just has to be vigilant for any sign of things irregular, such as sudden notices of password renewal messages or sudden interruptions in phone service. As explained in the next section, such attacks can be limited or they can be exacerbated by the use of crypto exchanges. \u003C\u002Fp\u003E\u003Ch3\u003EThe world of Bitcoin ATMs\u003C\u002Fh3\u003E\u003Cp\u003EWallets only allow you to send and receive the crypto-currencies, they are not for converting fiat money into crypto. If you don't have a counter-party from whom to receive your first Bitcoins or Ether coins, an easy way to get some is to locate one of the several thousand crypto ATMs installed in various cities, which will convert bills of fiat currency into crypto of your choice, depending on what the machine offers. These things often hang out in small shops, such as grocery stores, similar to normal ATMs. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0aa64d8c-8c47-4dbc-a35c-9c584c72a1f5\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EA General Bytes Bitcoin ATM.\u003C\u002Fp\u003E\" data-image-alt-text=\"general-bytes-batmtwo-bitcoin-atm.jpg\" data-image-filename=\"general-bytes-batmtwo-bitcoin-atm.jpg\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"1000\" data-image-height=\"665\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fcoinatmradar.com\u002Fblog\u002Fcheck-and-report-bitcoin-atm-status\u002F\" target=\"_blank\"\u003EA directory of such machines is maintained by CoinATMRdar\u003C\u002Fa\u003E, with details about the features of the machines and whether a machine is in working order, updated by crowd-sourced reports. Using the machine starts with inserting money just like a slot machine. You then take out your smartphone wallet and bring up the bar code in the app that represents your public key. You hold the screen of the phone up to the machine's barcode reader for it to be scanned. Within a few seconds, your crypto shows up in the wallet, with a record of the details of the transaction including the fees charge, and lots of technical details about the blockchain process that probably will not be that interesting to you in the beginning. \u003C\u002Fp\u003E\u003Cp\u003ESuch machines can vary quite a bit, but you can get a sense of the features by \u003Ca href=\"https:\u002F\u002Fwww.generalbytes.com\u002Fbatmtwo\u002F\" target=\"_blank\"\u003Echecking out the product literature\u003C\u002Fa\u003E of one popular manufacturer, General Bytes. Most machines are one-way, bills to crypto only, so you can't cash out of Bitcoin and the rest, although newer machines from General Bytes incorporate that option. \u003C\u002Fp\u003E\u003Ch3\u003EThe cold storage alternative\u003C\u002Fh3\u003E\u003Cp\u003EBecause accounts can be compromised, you may want to consider turning to what's known as \"cold storage,\" a device that's not connected to a network. Startups have created physical USB tokens, similar to a thumb drive, such as \u003Ca href=\"https:\u002F\u002Fshop.trezor.io\u002F\" target=\"_blank\"\u003ETrezor\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fkeepkey.zendesk.com\u002Fhc\u002Fen-us\" target=\"_blank\"\u003EKeepKey\u003C\u002Fa\u003E that you plug into a computer, and that ingest your crypto assets, acting as a hardware wallet that can be kept physically remote from your day-to-day activities. \u003C\u002Fp\u003E\u003Cp\u003EBear in mind that the companies offering such devices have somewhat vague and incomplete user documentation, which means knowing who is selling you the device and all the details about how it works can involve some extra web searches or Reddit discussions. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"083f2161-1a29-4b16-89ac-06d3301b5f43\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Denarium gold coin comes pre-loaded with specified amounts of Bitcoin, as a "hard wallet" that's off the grid, for cold storage of your money.&nbsp;\u003C\u002Fp\u003E\" data-image-alt-text=\"denarium-gold-coin.jpg\" data-image-filename=\"denarium-gold-coin.jpg\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"900\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EFinnish startup Prasos has a somewhat unique take on the whole matter: \u003Ca href=\"https:\u002F\u002Fdenarium.com\u002Fproduct\u002Fdenarium-1-btc-gold-bitcoin-wallet\" target=\"_blank\"\u003Esilver, platinum and gold coins, called \"Denarium,\u003C\u002Fa\u003E\" that are shipped by the company with an embedded hologram that counts as the tamper-resistant record of your collected coins. These are one-time devices, as once you rip open the cover of the hologram, if you want to spend it, the physical token loses its crypto value (though it's still precious metal, for what that's worth.) \u003C\u002Fp\u003E\u003Cp\u003EAnother curious artifact is the \"\u003Ca href=\"https:\u002F\u002Fcryptosteel.com\u002Fhow-it-works\u002F\" target=\"_blank\"\u003ECryptoSteel\u003C\u002Fa\u003E,\" from British firm Sword Ltd. The $79 steel slab, about the size of a credit card, comes with a set of tiny metal characters. You assemble the wallet words for your digital wallet by placing the type pieces into the grooves in the slab, rather like an old-fashioned type-setter laying out a print newspaper. It's a durable, simple way to make a record of wallet words that secures your wallet. \u003C\u002Fp\u003E\u003Ch3\u003EWorking with exchanges \u003C\u002Fh3\u003E\u003Cp\u003EAt some point, being strictly peer-to-peer, exchanging Bitcoin and the other money with single individuals, may seem too limiting. You may be ready to check out one of the numerous exchanges that bring together buyers and sellers, places such as \u003Ca href=\"https:\u002F\u002Fwww.bitstamp.net\u002F\" target=\"_blank\"\u003EBitstamp\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.kraken.com\u002F\" target=\"_blank\"\u003EKraken\u003C\u002Fa\u003E, and \u003Ca href=\"https:\u002F\u002Fwww.coinbase.com\u002F\" target=\"_blank\"\u003ECoinbase\u003C\u002Fa\u003E. (\u003Ca href=\"https:\u002F\u002Fbitcoincharts.com\u002Fmarkets\u002F\" target=\"_blank\"\u003EBitcoincharts\u003C\u002Fa\u003E is one starting place to see the selection of exchanges out there.) \u003C\u002Fp\u003E\u003Cp\u003EThese institutions theoretically inject liquidity into the system, by making it possible for counter-parties to come together, although they carry a whole other set of risks as well. \u003C\u002Fp\u003E\u003Cp\u003EConnecting from your wallet to an exchange is a matter of setting up an account on the exchange and then copying a unique public key address as the address to use in the wallet as the target for transferring your coins. \u003C\u002Fp\u003E\u003Cp\u003EYou may have to wait up to two months to deposit fiat currencies while your identity is verified by the exchange. This is so the exchange can comply with anti-money laundering and similar rules. For individuals, it's a matter of standard proof of identification, proof of bank account, and proof of address. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0c9a2225-673c-4d5c-a96d-2557b410cea4\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EExample trading screen from exchange Bitstamp.&nbsp;\u003C\u002Fp\u003E\" data-image-alt-text=\"bitstamp-example-trade-screen.jpg\" data-image-filename=\"bitstamp-example-trade-screen.jpg\" data-image-date-created=\"2019\u002F06\u002F13\" data-image-width=\"2387\" data-image-height=\"1454\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOnce your account is set up, depositing money with which to buy and sell on the exchange introduces its own wait time. A wire transfer is required to put U.S. dollars and other fiat currencies into your exchange account. It can take 48 hours to submit the paperwork just to get the ball rolling, and another five business days for the wire transfer to actually go through and the funds to show up in your account. \u003C\u002Fp\u003E\u003Cp\u003EThe exchange method can vary quite a bit. Places such as Bitstamp feature \"Buy\" and \"Sell\" buttons for placing trades, much like online trading software. These exchanges support trading in a variety of different coins, not just Bitcoin, and they offer different quotes for both the spot price of a given coin -- its value in fiat currency -- as well as the fees that will be charged for each transaction. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.techrepublic.com\u002Farticle\u002Fwant-a-job-in-bitcoin-or-blockchain-these-10-companies-have-the-most-openings\u002F?ftag=CMG-01-10aaa1b\" target=\"_blank\"\u003E\u003Cstrong\u003EWant a job in bitcoin or blockchain? These 10 companies have the most openings\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E TechRepublic \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EA somewhat different approach is a service called \u003Ca href=\"https:\u002F\u002Flocalbitcoins.com\u002Fabout\" target=\"_blank\"\u003ELocalBitcoins\u003C\u002Fa\u003E. It's a kind of marketplace of buyers and sellers rather than a true exchange. It lets sellers of currency post listings of what currencies they will sell and for how much. When you go to buy the currency, or if you become a seller, any exchange of fiat currency with the other party is done via a variety of transfer mechanisms that can include Western Union, MoneyGram, or traditional bank transfers, so it expands your options for funding your trades. You can drill down into details about the counter-parties as well, if you want to geek out on the reputations of the other party. \u003C\u002Fp\u003E\u003Cp\u003ETaking out funds when you want to cash out to fiat currencies can take a week to two weeks, depending on the internal processes of the exchange you use. It's especially important to keep in mind these time frames for opening, funding, and cashing out, as they will be a drag to your momentum. \u003C\u002Fp\u003E\u003Cp\u003EIn addition to individual trading, exchanges have been adding capabilities for enterprise accounts. These can include dedicated network connections and co-located server equipment for trade processing. \u003C\u002Fp\u003E\u003Ch3\u003EHow to pick exchanges\u003C\u002Fh3\u003E\u003Cp\u003EThere are tons of different exchanges, and picking one will involve a mix of assessing features and assessing operating history. On the first score, exchanges vary by the currencies they support, the prices they list for buying and selling, the volume of trading they offer (a proxy of liquidity), and, for companies, the enterprise features they offer. \u003C\u002Fp\u003E\u003Cp\u003EIn the latter case, some time spent with the exchanges is required to get a sense of the true security they can offer over time. \u003C\u002Fp\u003E\u003Cp\u003EExchanges bring both safety and risk. On the one hand, professionals who manage infrastructure could keep your holdings safer than you would as an individual or a company, because it's their job. And some exchanges can insure deposits as a practice. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwill-blockchain-be-mainstream-by-2025\u002F\" target=\"_blank\"\u003EWill blockchain be mainstream by 2025?\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EOne the other hand, it is possible for the virtual currencies of exchanges to be compromised, something that has happened with many exchanges on numerous occasions. Just last month, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhackers-steal-41-million-from-cryptocurrency-exchange-binance\u002F\" target=\"_blank\"\u003Ean exchange named Binance was cleaned out of $41 million\u003C\u002Fa\u003E worth of Bitcoin because of a massive security breach, echoing attacks in past such as the 2013, $350-million theft that shut down exchange Mt. Gox. \u003C\u002Fp\u003E\u003Cp\u003EIn many cases, exchanges continue to function, despite past problems. The example of \u003Ca href=\"https:\u002F\u002Fwww.bitfinex.com\u002F\" target=\"_blank\"\u003EBitfinex\u003C\u002Fa\u003E, an operation run by Hong Kong-based iFinex Inc., is salutary. The company in the summer of 2016 \u003Ca href=\"https:\u002F\u002Fwww.coindesk.com\u002Fbitfinex-bitcoin-hack-know-dont-know\" target=\"_blank\"\u003Esuffered a loss of over $60 million\u003C\u002Fa\u003E in customer funds. Bitfinex has \u003Ca href=\"https:\u002F\u002Fwww.bloomberg.com\u002Fnews\u002Farticles\u002F2018-11-20\u002Fbitcoin-rigging-criminal-probe-is-said-to-focus-on-tie-to-tether\" target=\"_blank\"\u003Ealso been accused of artificially inflating the price of Bitcoin\u003C\u002Fa\u003E, and the New York Attorney General \u003Ca href=\"https:\u002F\u002Fcryptoslate.com\u002Fbitfinex-tethers-cover-850-million-lost-funds\u002F\" target=\"_blank\"\u003Eobtained a court order in April\u003C\u002Fa\u003E against parent iFinex enjoining the company against continuing certain actions that may have defrauded customers. \u003C\u002Fp\u003E\u003Ch3\u003ERisks: How to make cryptocurrency safer\u003C\u002Fh3\u003E\u003Cp\u003EGiven risks to both individual wallets and exchanges, it's important to consider best practices to mitigate the disasters that can happen. Those best practices include starting with only nominal amounts in crypto, to gain a convincing history of the quality of both wallet software and trading platforms. Consider experimenting with the offerings over a period of time that may be several months to a year. As a contract, a cryptocurrency, including both Bitcoin and newer offerings, is established via the evidence of stability over time. \u003C\u002Fp\u003E\u003Cp\u003EGiven that the biggest risks have come from things that are all too common in the software world, such as cracked passwords and backdoor software installs, it's important to both observe best practices in the maintenance of secrets but also to test out various offerings to establish the quality of programs and platforms.\u003C\u002Fp\u003E\u003Cp\u003EAnd perhaps the best thing one can do is to avoid the mindless urge known as \"fear of missing out,\" or FOMO. A good part of the danger in crypto comes from the continually shifting nature of currencies and technologies. Jumping into anything increases risk. Avoiding rushing into anything crypto that is new simply because it is new will most likely greatly reduce the headaches and the heartache.\u003C\u002Fp\u003E\u003Ch3\u003EThe future of crypto: An evolving landscape\u003C\u002Fh3\u003E\u003Cp\u003EUnderstanding the landscape of crypto is only ever partial, as things continue to evolve. The currencies are evolving, the technology is evolving, and the rule of law is trying to evolve. \u003C\u002Fp\u003E\u003Cp\u003EOn the currency front, people continue to come up with new coins, especially for the purposes of supposed stability. Startup \u003Ca href=\"https:\u002F\u002Ftether.to\u002F\" target=\"_blank\"\u003ETether, Ltd.\u003C\u002Fa\u003E, which is owned by iFinex, promised to back all \"Tether\" coins in circulation with \u003Ca href=\"https:\u002F\u002Ftether.to\u002Fwp-content\u002Fuploads\u002F2018\u002F06\u002FFSS1JUN18-Account-Snapshot-Statement-final-15JUN18.pdf\" target=\"_blank\"\u003Emore hard currency than the dollar value of the coins, over $2 billion in assets\u003C\u002Fa\u003E. With the A.G.'s action in New York, others are rushing in to propose alternative ways to make such \"stable coins,\" as they're called. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.techrepublic.com\u002Farticle\u002Fyour-systems-their-profit-how-it-rights-can-be-abused-for-shadow-mining-of-cryptocurrency\u002F?ftag=CMG-01-10aaa1b\" target=\"_blank\"\u003E\u003Cstrong\u003EYour systems, their profit: How IT rights can be abused for shadow mining of cryptocurrency\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E TechRepublic \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EA competitor, \u003Ca href=\"https:\u002F\u002Ftheanchor.io\u002F\" target=\"_blank\"\u003EAnchor AG\u003C\u002Fa\u003E, claims the real challenge is to make trading more stable. It proposes to do so by tying its novel currency, the \"Anchor\" coin, to the total economic production of the world. Anchor is promoting something called the \"Monetary Measurement Unit,\" or MMU, which the company claims is calculated based on global gross domestic product using a unique, proprietary algorithm. \u003C\u002Fp\u003E\u003Cp\u003EThat's all well and good, but as mentioned with Facebook's Libra, larger parties are getting into the crypto game. The company's \u003Ca href=\"https:\u002F\u002Flibra.org\u002Fen-US\u002F\" target=\"_blank\"\u003Eblog post claims\u003C\u002Fa\u003E Libra will be \"stable\" because it is \"backed by a reserve.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Flibra.org\u002Fen-US\u002Fwhite-paper\u002F#the-libra-currency-and-reserve\" target=\"_blank\"\u003EA companion white paper offers a lot more detail\u003C\u002Fa\u003E. The reserve will be created via a private placement of a second class of coin, which is a way to inject initial funds into the reserve. Facebook says this reserve will limit the extent of the fluctuations in Libra, though whether it prevents the wild swings seen with Bitcoin and the rest is an open question.\u003C\u002Fp\u003E\u003Cp\u003EThere are whole other bunch of changes coming with Libra. Facebook's crypto will come with a whole new programming language, called \"Move,\" and there will be an association of founding member companies, such as Visa and Mastercard and Vodafone, that will control the mining of new coins, unlike Bitcoin, where anyone with enough computing power can mint new currency.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBottom line, Facebook's entry looks to be a seminal event for crypto, and will have an impact on the other coins in circulation and the future directions for existing wallet software and exchanges. With other tech giants besides Facebook offering technology related to crypto, such as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Famazon-managed-blockchain-now-generally-available\u002F\" target=\"_blank\"\u003EAmazon's blockchain service\u003C\u002Fa\u003E, and Apple's \"\u003Ca href=\"https:\u002F\u002Fthenextweb.com\u002Fhardfork\u002F2019\u002F06\u002F05\u002Fapple-cryptokit-blockchain-apps\u002F\" target=\"_blank\"\u003ECryptoKit\u003C\u002Fa\u003E,\" there could be a wave of major-party crypto offerings. After all, cryptocurrencies are little more than a digital contract, something big tech should be able to provide to its loyal user base. That could lead to a fractured landscape, or perhaps some organization like Libra's will unite the various efforts.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Famazon-managed-blockchain-now-generally-available\u002F\" target=\"_blank\"\u003EAmazon Managed Blockchain now generally available\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003EThe evolution of the mining community, those computer users who spend compute cycles on maintaining the blockchain, will be another continuing matter in coming years. Recent years have seen the concentration of compute power in the hands of single parties such as AntPool, Bixin, and CoinGeek. Their dominance of the blockchain for currencies feels long in the tooth and ripe for innovation. \u003C\u002Fp\u003E\u003Ch3\u003ERegulation and taxes\u003C\u002Fh3\u003E\u003Cp\u003EAnd then there's regulation. The wave of popularity in 2018 has resulted in a wave of scrutiny. The city of Vancouver, British Columbia, the site of the very first Bitcoin ATM, \u003Ca href=\"https:\u002F\u002Fwww.thestar.com\u002Fvancouver\u002F2019\u002F06\u002F04\u002Fbitcoin-atms-are-ideal-for-money-laundering-vancouver-police-warn-but-businesses-are-eager-for-regulation.html\" target=\"_blank\"\u003Eis considering a ban on crypto ATMs\u003C\u002Fa\u003E, which police say is an \"ideal money-laundering vehicle,\" following a raft of theft incidents with the machines. \u003C\u002Fp\u003E\u003Cp\u003EChina, whose government has banned crypto trading, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fchina-could-soon-ban-cryptocurrency-mining-report\u002F\" target=\"_blank\"\u003Eis reportedly considering outlawing mining activity\u003C\u002Fa\u003E, which would be a big development, given that China is where the majority of mining takes place. \u003C\u002Fp\u003E\u003Cp\u003EAnd don't forget taxes. \u003Ca href=\"https:\u002F\u002Fwww.forbes.com\u002Fsites\u002Fmatthougan\u002F2019\u002F06\u002F11\u002Fhow-bitcoin-is-taxed\u002F\" target=\"_blank\"\u003ECrypto today is treated as capital gains\u003C\u002Fa\u003E, which basically means a 15% tax on users' profits. The U.S. Internal Revenue Service \u003Ca href=\"https:\u002F\u002Fwww.coindesk.com\u002Fthe-irs-just-issued-its-first-cryptocurrency-tax-guidance-in-5-years\" target=\"_blank\"\u003Eissued long-awaited guidance on crypto in October of 2019\u003C\u002Fa\u003E. The IRS \u003Ca href=\"https:\u002F\u002Fwww.coindesk.com\u002Feven-the-irs-admits-some-crypto-tax-regulations-are-not-ideal\" target=\"_blank\"\u003Ehas been getting more aggressive this year\u003C\u002Fa\u003E in going after people about their holdings. If you exchanged Bitcoin, or another crypto currency, into fiat currency, you will have a complex process of calculating a \"cost basis\" for your holdings. \u003Ca href=\"https:\u002F\u002Fwww.irs.gov\u002Findividuals\u002Finternational-taxpayers\u002Ffrequently-asked-questions-on-virtual-currency-transactions\" target=\"_blank\"\u003EYou may want to start with the IRS's FAQ\u003C\u002Fa\u003E to know what's expected of you.\u003C\u002Fp\u003E\u003Cp\u003EIt's entirely possible that tax rates will change as legislation evolves to reflect the expanding practice of trading in crypto. \u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to crypto, keep an open mind but be careful. This is an immature technology, and an immature marketplace, so keeping your head amidst the chaos is essential. \u003C\u002Fp\u003E\u003Ch3\u003ERelated coverage\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.cnet.com\u002Fnews\u002Ffacebooks-libra-cryptocurrency-reportedly-boasts-big-name-backers\u002F?ftag=CMG-01-10aaa1b\" target=\"_blank\"\u003EFacebook's Libra cryptocurrency reportedly boasts big-name backers\u003C\u002Fa\u003E \u003Cstrong\u003ECNET\u003Cbr\u003E\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwave-of-sim-swapping-attacks-hit-us-cryptocurrency-users\u002F\" target=\"_blank\"\u003EWave of SIM swapping attacks hit US cryptocurrency users\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.techrepublic.com\u002Fresource-library\u002Fwhitepapers\u002Fcryptocurrency-an-insider-s-guide-free-pdf-copy1\u002F?ftag=CMG-01-10aaa1b\" target=\"_blank\"\u003ECryptocurrency: An insider's guide (free PDF)\u003C\u002Fa\u003E \u003Cstrong\u003ETechRepublic\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-03-30 15:41:00",timezone:"UTC",updated:c,published:c},description:"There’s promise and peril in the still-evolving world of cryptocurrencies such as Bitcoin and Ether. Here's everything individuals and businesses need to know about the basics of wallets, exchanges, and the next directions in this expanding ecosystem.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"847cfb09-c81c-46c1-b404-ccb52797492e",image:{id:"4b3a2e33-9129-49fc-96b9-dcc9aae95fcb",filename:"bitcoin.jpg",dateCreated:{created:c,date:"2018-05-28 02:16:26",timezone:"UTC",updated:c,published:c},alt:"bitcoin.jpg",credits:"Sebaztian Barns",caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2018\u002F05\u002F28\u002F4b3a2e33-9129-49fc-96b9-dcc9aae95fcb\u002Fbitcoin.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1319,height:760,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"guide",hubTopicPathString:"Finance^Blockchain",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"cryptocurrency-101-what-every-business-needs-to-know",startYear:c,summary:b,title:"What is crypto? A guide for getting started",topic:{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"7743b704-6c7c-42d8-b888-5811e7667d05",slug:"blockchain",name:"Blockchain",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"103a5e4f-ec91-11e3-95d2-02911863765e",slug:"e-commerce",name:"E-Commerce",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"108f2b14-ec91-11e3-95d2-02911863765e",slug:"ios",name:"iOS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"73cc194f-d555-4dde-9954-530bc9c225f8",slug:"executive-guides",name:"Executive Guides",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"87ec6ace-0121-41fb-b122-922dab341f69",slug:"finance",name:"Finance",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"661ec493-76d3-49b3-9ccd-e52e44947136\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"By Karen Roach -- Shutterstock\" data-image-alt-text=\"romance-scam.jpg\" data-image-filename=\"romance-scam.jpg\" data-image-date-created=\"2021\u002F09\u002F20\" data-image-width=\"1600\" data-image-height=\"1069\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you were one of the millions of people who watched Netflix's \u003Cem\u003EThe Tinder Swindler\u003C\u002Fem\u003E, you may have shaken your head in wonder at how women could be allegedly hoodwinked out of millions of dollars. \u003C\u002Fp\u003E\u003Cp\u003ESurely they should have known better, some say. In reality, it's not that simple. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EPeople fall for these scams for the same reasons that they fall prey to cold-call scam texts claiming that their loved one is in hospital and fees urgently need to be paid: When emotions are involved, rational thinking can go out of the window.\u003C\u002Fp\u003E\u003Cp\u003ESimon Leviev, born Shimon Hayut, is an Israeli man accused of conning women in an elaborate pyramid scheme to fund his luxury lifestyle. \u003C\u002Fp\u003E\u003Cp\u003EAccording to the documentary and the women who say they were Leviev's victims, this is how the alleged scam worked: \u003C\u002Fp\u003E\u003Cp\u003ELeviev would match with women on the Tinder dating app and take them on luxurious dates, claiming that he was part of a family of billionaires in the diamond business. \u003C\u002Fp\u003E\u003Cp\u003EHe would pretend interest for an extended time and continue the charade with consistent voice notes, messages, and calls. \u003C\u002Fp\u003E\u003Cp\u003EWhen he believed the woman trusted him enough, he would ask to borrow money, just for a short while. But, of course, his \"enemies\" were making life difficult and the check was always \"on its way.\"\u003C\u002Fp\u003E\u003Cp\u003EThe funds would then pay for other dates, luxury goods, and travel. As such, you could consider the apparent scam a pyramid, and an unbelievably elaborate one, at that. Leviev has denied the accusations.\u003C\u002Fp\u003E\u003Cp\u003EWhether or not you consider those involved in this story at fault, there are countless love scams taking place that will never reach the news or become a hit show on a streaming service platform. \u003C\u002Fp\u003E\u003Cp\u003EAnd each one is after your \u003Cstrong\u003Emoney, assets, \u003C\u002Fstrong\u003Eor\u003Cstrong\u003E information\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Ch2\u003ERomance scams, by the numbers\u003C\u002Fh2\u003E\u003Cp\u003EAccording to the US Federal Trade Commission (FTC), romance scams are outstripping every other fraud category in consumer losses. \u003C\u002Fp\u003E\u003Cp\u003EIn the \u003Ca href=\"https:\u002F\u002Fwww.ftc.gov\u002Fnews-events\u002Fdata-visualizations\u002Fdata-spotlight\u002F2022\u002F02\u002Freports-romance-scams-hit-record-highs-2021\" target=\"_blank\"\u003Epast five years\u003C\u002Fa\u003E, consumers reported losses of $1.3 billion, reaching $547 million in 2021 alone -- and this number, in real terms, could be far higher. By age category, victims are often over 60 years old but this bracket is also the least likely to report losses due to romance fraud, according to \u003Ca href=\"https:\u002F\u002Fwww.ftc.gov\u002Fsystem\u002Ffiles\u002Fdocuments\u002Freports\u002Fprotecting-older-consumers-2019-2020-report-federal-trade-commission\u002Fp144400_protecting_older_adults_report_2020.pdf\" target=\"_blank\"\u003EFTC research\u003C\u002Fa\u003E (.PDF). \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cc5b1775-43e1-4b2f-bbfd-67f4e186100b\" data-edition=\"us\" data-description=\"\u003Cp\u003ERomance scams continue to evolve, not in a small part due to social media and the popularity of online dating. With our lives becoming increasingly busy, not to mention the COVID-19 pandemic and stay-at-home orders, apps dedicated to online romance -- or casual dating -- have flourished.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETinder, Grindr, Plenty of Fish, Bumble, Match, and Hinge are some of the most popular apps out there, and each can be an avenue for scammers to strike.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ERomance scams vary, but they all have one of two purposes: stealing your cash or your information. Scams include:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EOutright requests for money\u003C\u002Fstrong\u003E: Scammers might start small and even pay you back to build trust. However, it wouldn't be long before they would ask for far more -- and then vanish.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ERequests might be made to purchase a flight or travel to see you, pay off customs charges, buy a new laptop or phone to keep communicating with you, pay outstanding medical bills, among other things.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYour scammer may also say they are expecting a cash gift or an inheritance, so they ask to 'borrow' money for a short while.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAn emergency or disaster\u003C\u002Fstrong\u003E: For some, being a romance scammer is a full-time job, so spending time building trust with multiple victims is simply part of their working day.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESuppose enough of an emotional connection is cruelly created, and then they say there is a sudden emergency. There's been an accident, they are in trouble and their physical safety is threatened, or they are in hospital with looming medical bills.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis can create enough of a panic that the victim sends cash without a second thought, as the fraudster has already taken the time to build up trust.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMembers of the military\u003C\u002Fstrong\u003E: The military scam is a popular one. A profile is set up with fake images -- often the stolen photos of actual soldiers -- and the use military jargon, titles, and known army deployment areas to appear more plausible.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThey may say they are either just about to ship out or are soon to return and may also try to add some mystery by refusing to give details in the name of confidentiality.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EA personal example of a military scam\u003C\u002Fstrong\u003E:\u003C\u002Fp\u003E\u003Cp\u003EI spoke to someone on Tinder in 2019 who said he was part of the US military. At the time, I'd had my fill of catfish and scammers, so I decided to have some fun and see how long I could drag it out.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMy romance scammer, set with all-American-boy photos, was apparently based in Afghanistan on deployment but would be "coming home soon" to the UK.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAfter shifting to a secondary, throwaway WhatsApp number, he said he would ask his "commanding officer" for permission to video chat. Playing along with it, I was sent a video of a soldier saying hello. &nbsp;\u003C\u002Fp\u003E\u003Cp\u003EI'd asked him to say my name in it to prove that it was real-time footage. This, of course, didn't happen.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe footage was the type of generic clip you'd find on TikTok, but if you weren't on the lookout for red flags, it could have been believable and considered genuine.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt wasn't long before he said he was running out of phone credit but he really wanted to keep talking to me. So he asked to "borrow" £20 to top up his phone.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EHow about… no.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThat wouldn't have been the end of it. In my opinion, this request was akin to a test payment you'd see when your card details have been stolen on your bank statement -- in which criminals make small requests, no more than a few dollars, to see if a bank account is active and has funds.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to romance scams, a small amount can very quickly turn into an avalanche that could financially bury a victim.\u003C\u002Fp\u003E\u003Cp\u003EMilitary scams have become so common that the US Army itself has provided&nbsp;\u003Ca href="https:\u002F\u002Fwww.army.mil\u002Fsocialmedia\u002Fscams\u002F" target="_blank"\u003Ean online fact sheet\u003C\u002Fa\u003E&nbsp;on these schemes.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E"The most common scheme involves criminals, often from other countries -- most notably from West African countries -- pretending to be US soldiers serving in a combat zone or other overseas location," the organization says. "These crooks often present documents and other 'proof' of their financial need when asking their victims to wire money to them."\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EInvestments\u003C\u002Fstrong\u003E: Last year,&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Finterpol-warns-of-romance-scam-artists-using-dating-apps-to-sign-victims-up-to-fake-investment-schemes\u002F" target="_blank"\u003EInterpol warned\u003C\u002Fa\u003E&nbsp;that fraudsters are encouraging their matches to join them in financial "ventures."\u003C\u002Fp\u003E\u003Cp\u003EThe cybercriminal begins by building trust and offering tips and advice on stocks, shares, and investments. They will then try to lure their victim into signing up for a fake financial product, normally hosted through a malicious investment app or fraudulent website.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAn incentive is essential to this scam being a success. For example, your new love interest may offer you VIP status and personal instruction in the world of investing.\u003C\u002Fp\u003E\u003Cp\u003EA victim could then submit their payment card details, which can then be stolen and used by the cybercriminals to make fraudulent purchases. Or they could load cash onto a fake platform -- only to be locked out of the account.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe fraudster blocks them and disappears.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E"They're left confused, hurt, and worried that they'll never see their money again," Interpol noted. Most of the time, victims won't.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECryptocurrency\u003C\u002Fstrong\u003E: Cryptocurrency-related scams are a new twist on older investment scams. Scam artists take advantage of a general lack of understanding surrounding cryptocurrency to hoodwink their victims. This may include signing them up for fake cryptocurrency trading apps.\u003C\u002Fp\u003E\u003Cp\u003ESophos researchers published an advisory on&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiphone-android-users-lose-life-savings-to-romance-fraud-cryptocurrency-operation\u002F" target="_blank"\u003ECryptoRom in 2021\u003C\u002Fa\u003E, a cybercriminal ring that targeted Tinder and Bumble users. Victims lost thousands of dollars after falling prey to these romance scams, and fake cryptocurrency trading apps were promoted not only on these dating apps, but also on social media networks and cold-call WhatsApp solicitations.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What are the types of romance scams?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"youtube_video\" data-size=\"large\" data-float=\"none\" data-oembed=\"{"author_name":"FBI \\u2013 Federal Bureau of Investigation","author_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fuser\\\u002Ffbi","height":113,"html":"\u003Ciframe width=\\"200\\" height=\\"113\\" src=\\"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fembed\\\u002FBmIvqOYwGGU?autoplay=0&amp;loop=0&amp;fs=1&amp;start=0&amp;rel=1&amp;feature=oembed\\" frameborder=\\"0\\" allow=\\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\\" allowfullscreen\u003E\u003C\\\u002Fiframe\u003E","provider_name":"YouTube","provider_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F","thumbnail_height":360,"thumbnail_url":"https:\\\u002F\\\u002Fi.ytimg.com\\\u002Fvi\\\u002FBmIvqOYwGGU\\\u002Fhqdefault.jpg","thumbnail_width":480,"title":"Special Agent Christine Beining Describes Romance Scams","type":"video","version":"1.0","width":200}\" data-url=\"https:\u002F\u002Fyoutu.be\u002FBmIvqOYwGGU\" data-autoplay=\"false\" data-loop=\"false\" data-start=\"0\" data-fs=\"true\" data-rel=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5d5f219f-554f-475b-9834-892476387aaf\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003ECatfishing\u003C\u002Fstrong\u003E: The most basic technique is known as catfishing – the use of stolen or otherwise fake photos on a dating profile. Scammers may also use a fake name, location, age, and profession.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWhile in some situations, it's just a case of someone not looking much like the photos they selected, in others, catfishing can be used to target the more vulnerable users of dating services.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EI've found stolen photos of models -- commercial, catalog, and even in telecoms promotions -- as well as members of the military and social media influencers in the past. Fake, but complete with profiles stating they were genuine and looking for a relationship.\u003C\u002Fp\u003E\u003Cp\u003EA survey conducted by&nbsp;\u003Ca href="https:\u002F\u002Fwww.ukfinance.org.uk\u002Fpress\u002Fpress-releases\u002Fover-half-those-looking-love-online-vulnerable-romance-scams" target="_blank"\u003EUK Finance\u003C\u002Fa\u003E&nbsp;revealed that 27% of people who use online dating services had been catfished in the last 12 months.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EStolen videos\u003C\u002Fstrong\u003E: Alongside stolen images, fraudsters may steal videos from social networks and the person's account they are impersonating, whether from Facebook, TikTok, or other platforms. The use of videos -- when they are available -- can make the catfish appear more trustworthy.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ELove bombing\u003C\u002Fstrong\u003E: To try and show romantic interest quickly, the scam artist may bombard you with compliments and conversation starters -- and part of this is designed to try and find out as much information about their target as possible. The more they know, the more likely it is they can steal from you.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMoving you away from the app\u003C\u002Fstrong\u003E: Dating apps and services, on the whole, are restrictive when it comes to sharing videos and images, and they tend to limit how a scam artist can operate. Shifting you quickly to a platform like WhatsApp makes their job easier.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ETeams\u003C\u002Fstrong\u003E: While the romance scam needs to be one-on-one and intimate to work, this doesn't mean only one victim is in play at a time. Romance scams have become such a lucrative business that it is difficult to police, so cybercriminal gangs are profiteering by "working" in this way. One scam artist could be playing countless connections at the same time, all to make money for the overall group.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBlackmail\u003C\u002Fstrong\u003E: Fraudsters may also use blackmail to force their victims to pay up. In 2021, UK police warned of an&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fuk-police-warn-of-sextortion-attempts-in-intimate-online-dating-chats\u002F" target="_blank"\u003Euptick in online sextortion\u003C\u002Fa\u003E, in which individuals on dating websites and apps would be lured into steamy webcam sessions.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWithout their knowledge, these intimate encounters were recorded -- and then the fraudsters would use the information they had gained about their mark, as well as social media, to find their family, friends, and colleagues. The victim is then threatened with the footage being leaked unless they paid up.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What are the techniques of today's romance con artist?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a8809cfb-be92-43cf-904c-22775edff8ac\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003EWire, bank transfers\u003C\u002Fstrong\u003E:&nbsp;\u003Ca href="https:\u002F\u002Fwww.comparitech.com\u002Fblog\u002Finformation-security\u002Fromance-scam-statistics\u002F" target="_blank"\u003EScamwatch\u003C\u002Fa\u003E&nbsp;has found that close to 34% of losses due to romance fraud are made through bank and wire transfers.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt can be hard to prove that you've had money stolen from you if you perform these transactions willingly, and unless a romance scam case winds up in court, you may never see your money again.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBanks and financial services are not generally obligated to return your funds to you. Indeed, many banks are now adopting "are you sure this isn't a scam?" notices before you authorize a transaction -- demonstrating your consent, and removing them from liability.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGift cards\u003C\u002Fstrong\u003E: Gift cards for services including Google Play, iTunes, and Steam are also popular ways scammers adopt to steal funds. Scamwatch says that these types of payment methods represent almost 31% of losses.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EGift cards may be chosen as they are quick and an anonymous form of payment.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPrepaid, reloadable debit cards may also be requested instead of wire transfers or company-specific gift cards.\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECashApp\u003C\u002Fstrong\u003E: CashApp is a quick way to transfer cash and pay for services and may be used by fraudsters to request money from their love interests. For example, they&nbsp;\u003Ca href="https:\u002F\u002Fwww.utahbusiness.com\u002Fcashapp-scam\u002F" target="_blank"\u003Emay ask for help\u003C\u002Fa\u003E&nbsp;in paying for car repairs (in order to see you, of course), a new phone, urgent bills, or food.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf the scammer thinks you would be amendable to sending you more funds, they will carry on the charade. If not, once a payment is sent, victims are immediately blocked.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECryptocurrency\u003C\u002Fstrong\u003E: Direct cryptocurrency transfers and theft can be more difficult to manage and so cybercriminals will usually push their victims to "invest" in crypto such as Bitcoin (BTC).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis may be achieved by walking a victim through purchases on legitimate exchanges, including Coinbase, before luring them into transferring coins from their wallet to a third-party site controlled by fraudsters.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EChecks\u003C\u002Fstrong\u003E: In some cases, scammers may ask their victims to support business ventures by opening bank accounts and writing checks for them. Money is wired by the scam artist and then the victim&nbsp;\u003Ca href="https:\u002F\u002Fwww.theverge.com\u002F21366576\u002Fdating-app-scams-romance-women-quarantine-coronavirus-scheme" target="_blank"\u003Ewill write checks\u003C\u002Fa\u003E&nbsp;to "pay vendors," but eventually, wires will be reversed.\u003C\u002Fp\u003E\u003Cp\u003EWhen these accounts are opened they are in the victim's name and so it is they who are liable -- and potentially placing themselves at risk of prosecution for fraud.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf (or when) banks detect these activities, the victim is on the hook to pay for the amount on the fraudulent checks.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ELaundering\u003C\u002Fstrong\u003E: Scammers are often not independent and are part of a wider team. Therefore, gifts, loans, or payments made by victims have to be cleaned up somehow. Funds&nbsp;\u003Ca href="https:\u002F\u002Fwww.justice.gov\u002Fusao-ndtx\u002Fpr\u002F11-romance-scammers-charged-money-laundering-wire-fraud-conspiracies" target="_blank"\u003Emay be laundered\u003C\u002Fa\u003E&nbsp;through bank accounts opened using fake names or businesses, or via cryptocurrency "washing" services on the Dark Web.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMoney mules\u003C\u002Fstrong\u003E: To make matters worse, victims of romance scams may also find themselves becoming unwitting&nbsp;\u003Cstrong\u003Emoney mules\u003C\u002Fstrong\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIn a case documented&nbsp;\u003Ca href="https:\u002F\u002Fwww.fbi.gov\u002Fvideo-repository\u002Fsl-money-mule-psa-110221.mp4\u002Fview" target="_blank"\u003Eby the FBI\u003C\u002Fa\u003E, an 81-year-old woman became a money mule after being targeted by a man in Nigeria through an online dating scam. For five years, she accepted mobile devices to sell for her "love" and opened both personal and business bank accounts at his request.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDespite multiple warnings by law enforcement that she was being scammed, the woman didn't stop and ended up pleading guilty to felony charges.\u003C\u002Fp\u003E\" data-hed=\"Trust turns to theft: How does money change hands in romance scams?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"youtube_video\" data-size=\"large\" data-float=\"none\" data-oembed=\"{"author_name":"FBI \\u2013 Federal Bureau of Investigation","author_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fuser\\\u002Ffbi","height":113,"html":"\u003Ciframe width=\\"200\\" height=\\"113\\" src=\\"https:\\\u002F\\\u002Fwww.youtube.com\\\u002Fembed\\\u002FvthPmLORVrM?autoplay=0&amp;loop=0&amp;fs=1&amp;start=0&amp;rel=1&amp;feature=oembed\\" frameborder=\\"0\\" allow=\\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\\" allowfullscreen\u003E\u003C\\\u002Fiframe\u003E","provider_name":"YouTube","provider_url":"https:\\\u002F\\\u002Fwww.youtube.com\\\u002F","thumbnail_height":360,"thumbnail_url":"https:\\\u002F\\\u002Fi.ytimg.com\\\u002Fvi\\\u002FvthPmLORVrM\\\u002Fhqdefault.jpg","thumbnail_width":480,"title":"Victim of Romance Scam Who Became Money Mule Tells Story","type":"video","version":"1.0","width":200}\" data-url=\"https:\u002F\u002Fyoutu.be\u002FvthPmLORVrM\" data-autoplay=\"false\" data-loop=\"false\" data-start=\"0\" data-fs=\"true\" data-rel=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4eaba156-58c5-439f-8d91-4832984865fb\" data-edition=\"us\" data-description=\"\u003Cp\u003E\u003Cstrong\u003ERequests for cash\u003C\u002Fstrong\u003E: If someone on a dating app asks you for money or offers you an 'investment' opportunity as their special friend, especially if you haven't met in person, they are trying to scam you. Block and ghost to stay safe.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EOutlandish stories\u003C\u002Fstrong\u003E: Stories of woe, terrible luck, accidents, and tragedy are often created by scam artists to try and gain sympathy and an emotional reaction from their victims.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EInconsistency\u003C\u002Fstrong\u003E: Telling lies can cause memory difficulties, and unless they believe their own stories, inconsistencies in their activities and past can indicate that something isn't right.&nbsp; &nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESuspicious images\u003C\u002Fstrong\u003E: If you want to check to see if you are being catfished, save their profile picture and paste it into a&nbsp;\u003Ca href="https:\u002F\u002Ftineye.com\u002F" target="_blank"\u003Ereverse image\u003C\u002Fa\u003E&nbsp;search. It takes mere seconds and is one of the first indicators that you are talking to someone who isn't who they appear to be.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBroken phones, webcams\u003C\u002Fstrong\u003E: If your new love interest refuses to meet you in person or their webcam\u002Fmobile phone camera has conveniently developed a glitch, this may be a sign you are being duped.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EYour safety should always come first\u003C\u002Fstrong\u003E: Whenever you use a dating app, you should always be mindful of your safety. Even if someone seems genuine, it's best practice not to allow them to meet you at your home on your first encounter and to stay in public places.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere are recorded cases of assault and murder due to individuals meeting through dating apps. For example, the US Department of Justice (DoJ) prosecuted&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthree-texan-men-jailed-for-using-grindr-to-find-targets-for-theft-kidnap-assault\u002F" target="_blank"\u003Ethree men in 2021\u003C\u002Fa\u003E&nbsp;for committing violent crimes against homosexual men in "bias-motivated violence."\u003C\u002Fp\u003E\" data-hed=\"What are the signs I'm in a romance scam?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-18 13:00:01",timezone:"UTC",updated:c,published:c},description:"Love bombing, catfishing, blackmail, and more: Here are common tactics criminals use to lure you into parting with cash or private information.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"a48a0c78-f942-4cad-b757-4f8e85a608cc",image:{id:"17454dd2-b3e5-4e64-a656-e964e2d517b9",filename:"best-dating-app.jpg",dateCreated:{created:c,date:"2022-05-17 16:17:50",timezone:"UTC",updated:c,published:c},alt:"Best dating app",credits:"Getty",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F05\u002F17\u002F17454dd2-b3e5-4e64-a656-e964e2d517b9\u002Fbest-dating-app.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1910,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"guide",hubTopicPathString:"Finance",relatedItems:[]},name:b,promoTitle:"How Tinder scammers steal your heart, then your money",section:b,slug:"todays-tinder-swindlers-how-scammers-steal-your-heart-then-your-money",startYear:c,summary:b,title:"Tinder Swindlers: How scammers steal your heart, then your money",topic:{id:"87ec6ace-0121-41fb-b122-922dab341f69",slug:"finance",name:"Finance",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"87ec6ace-0121-41fb-b122-922dab341f69",slug:"finance",name:"Finance",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EI know that a lot of you use Google Chrome. Despite its faults -- I'm talking about \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmake-google-chrome-use-less-ram-2019-edition\u002F\"\u003Ehow it devours RAM\u003C\u002Fa\u003E -- it's a good browser with a great ecosystem of extensions.\u003C\u002Fp\u003E\u003Cp\u003EAnd it's pretty secure.\u003C\u002Fp\u003E\u003Cp\u003EBut you can do your bit to make it more secure.\u003C\u002Fp\u003E\u003Cp\u003ELike clicking the \u003Cstrong\u003ESafety check\u003C\u002Fstrong\u003E button.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMust read: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-wish-id-bought-this-10-magnifier-years-ago\u002F\"\u003EI wish I'd bought this $10 magnifier years ago\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"gallery\" data-uuid=\"89641792-3915-4502-8bf9-91d33d642e05\" data-float=\"none\" data-size=\"large\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESo, where's the \u003Cstrong\u003ESafety check\u003C\u002Fstrong\u003E button? The easiest way to find it is to type this into your address bar and hit enter:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Echrome:\u002F\u002Fsettings\u002FsafetyCheck\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EAlternatively, you can go into \u003Cstrong\u003ESettings\u003C\u002Fstrong\u003E and click on \u003Cstrong\u003ESecurity and Privacy\u003C\u002Fstrong\u003E and then click on \u003Cstrong\u003ECheck now\u003C\u002Fstrong\u003E on the right-hand side under \u003Cstrong\u003ESafety Check\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2dcdedc4-5366-4819-b3b4-65ab9219b684\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EGoogle Chrome Safety check\u003C\u002Fp\u003E\" data-image-alt-text=\"Google Chrome Safety check\" data-image-filename=\"2022-05-06-18-53-31.jpg\" data-image-date-created=\"2022\u002F05\u002F06\" data-image-width=\"2002\" data-image-height=\"1330\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe \u003Cstrong\u003ESafety check\u003C\u002Fstrong\u003E button is right there. Clicking on it does four things:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EChecks for Google Chrome updates\u003C\u002Fli\u003E\u003Cli\u003EChecks if any of your stored passwords have been compromised\u003C\u002Fli\u003E\u003Cli\u003EChecks if Safe Browsing is enabled, and gives you a link to tweak these settings\u003C\u002Fli\u003E\u003Cli\u003EChecks for harmful extensions (not a bad idea given the latest debacle with \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-kills-the-great-suspender-heres-what-you-should-do-next\u002F\"\u003EThe Great Suspender\u003C\u002Fa\u003E)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a9bd3ca8-b454-4ac6-8722-6ef4bbbc5b56\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ERunning Google Chrome Safety check\u003C\u002Fp\u003E\" data-image-alt-text=\"Running Google Chrome Safety check\" data-image-filename=\"2022-05-06-18-57-55.jpg\" data-image-date-created=\"2022\u002F05\u002F06\" data-image-width=\"1432\" data-image-height=\"778\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you want more protection, you can enable \u003Cstrong\u003EEnhances protection\u003C\u002Fstrong\u003E under \u003Cstrong\u003ESafe Browsing\u003C\u002Fstrong\u003E, and that will give you much greater security, but it does involve consenting to having your browsing data sent to Google. \u003C\u002Fp\u003E\u003Cp\u003ECarrying out a \u003Cstrong\u003ESafety check\u003C\u002Fstrong\u003E is quick, and gives you additional piece of mind. \u003C\u002Fp\u003E\u003Cp\u003EDo it now.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-05-06 18:02:00",timezone:"UTC",updated:c,published:c},description:"Whether you're using Google Chrome on a Windows system or on a Mac, you should go find and click this button now.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"b7235383-7d92-46d5-a174-665c2fc7cc87",image:{id:"90b5c165-da57-4fdf-a36a-6647e7b9189a",filename:"2021-02-02-16-29-49x.jpg",dateCreated:{created:c,date:"2021-02-05 11:56:10",timezone:"UTC",updated:c,published:c},alt:"Google Chrome Safety check",credits:c,caption:"\u003Cp\u003EGoogle Chrome Safety check\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F02\u002F05\u002F90b5c165-da57-4fdf-a36a-6647e7b9189a\u002F2021-02-02-16-29-49x.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:384,height:336,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"every-google-chrome-user-should-click-this-button",startYear:c,summary:b,title:"Every Google Chrome user should click this button now",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"84c80962-0502-4067-9086-e3ecc62c8559\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"iStockphoto\u002FGetty Images\" data-image-alt-text=\"Woman sitting on couch with paper calendar and laptop\" data-image-filename=\"istock-1281725866.jpg\" data-image-date-created=\"2021\u002F03\u002F19\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI'm one of those people who depend on email communication. I have for years, and I cannot imagine I'll ever not rely heavily on email. As I communicate with different people, I have to do so in different ways. For example, with certain contacts, I have to share sensitive information. When that's the case, I tend to use encryption with my email. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhy? Simple. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-encrypt-your-email-and-why-you-should\u002F\" target=\"_blank\"\u003EEncrypting an email\u003C\u002Fa\u003E prevents a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fwhat-is-cybersecurity-and-why-cybersecurity-matters\u002F\" target=\"_blank\"\u003Ethird party from intercepting a communication\u003C\u002Fa\u003E and accessing the information within. \u003C\u002Fp\u003E\u003Cp\u003EAn unencrypted email could be very easy to view by a bad actor. The more \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-use-confidential-mode-in-gmail-to-protect-sensitive-information\u002F\" target=\"_blank\"\u003Esensitive the information, the more you should protect it\u003C\u002Fa\u003E, and there's no better way (when working with email) than to make use of encryption. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-encryption-software\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best encryption software: Protect your data\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHere's how encryption works:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EFirst, you set up encryption on your email client.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003ENext, you import a public encryption key from a recipient into your email client.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYou compose an email to that contact for which you've imported the public key.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EBefore sending, you enable encryption.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EWhen you do this, only the recipient can read the email because they have the private key that matches the public key. Without that private key, the recipient cannot decrypt the email.\u003C\u002Fp\u003E\u003Cp\u003EIt's that simple. However, you do have to first set up encryption with your email client of choice. For me, that's Thunderbird. Thankfully, over the past few years, the Thunderbird developers have made the setup fairly simple. Let me show you how it's done.\u003C\u002Fp\u003E\u003Ch2\u003EHow to encrypt email in Thunderbird (and why you should)\u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"aed3a9ab-bec7-46d2-83a5-cedaeeec8f13\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe first thing to do is open Thunderbird. With the app open, click the three horizontal line menu button and then select \u003Cstrong\u003EAccount Settings\u003C\u002Fstrong\u003E. In the resulting window, make sure to select the email account you want to work with.\u003C\u002Fp\u003E\" data-hed=\"1. Open Thunderbird and go to the Settings window\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-encrypted-messaging-app\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe 5 best encrypted messaging apps: Keep your chats private\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5a53d93f-1249-44ad-88db-c6a4cc2c8374\" data-edition=\"us\" data-description=\"\u003Cp\u003EClick \u003Cstrong\u003EEnd-to-End Encryption\u003C\u002Fstrong\u003E in the left pane, and then click \u003Cstrong\u003EAdd Key\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\" data-hed=\"2. Open End-to-End encryption\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"6c47211b-9da3-4c70-ba8e-6495bae28f97\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EYou must first create a GPG key to use encryption in Thunderbird.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Add Key button in the Thunderbird End-To-End Encryption window.\" data-image-filename=\"tbirde2e1.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"798\" data-image-height=\"262\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"89ca1ce0-1857-48cd-bd4f-ce122ae49cfb\" data-edition=\"us\" data-description=\"\u003Cp\u003ESelect \u003Cstrong\u003ECreate a new OpenPGP Key\u003C\u002Fstrong\u003E and click \u003Cstrong\u003EContinue\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\" data-hed=\"3. Create a new key\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"cab1631b-4f59-490f-879e-89f8f13bc0e6\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EMake sure to select Create a new OpenPGP key.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The create and import OpenPGP key window.\" data-image-filename=\"tbirde2e2.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"786\" data-image-height=\"342\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b6e94a20-6765-423b-b72e-c7f6abcde3bb\" data-edition=\"us\" data-description=\"\u003Cp\u003ESelect the email address to associate with the key and then select an expiration date, key type, and key size. I would recommend going with \u003Cstrong\u003EKey does not expire\u003C\u002Fstrong\u003E, \u003Cstrong\u003ERSA\u003C\u002Fstrong\u003E for the key type, and \u003Cstrong\u003E3027\u003C\u002Fstrong\u003E as the key size. Once you've taken care of those options click \u003Cstrong\u003EGenerate k\u003C\u002Fstrong\u003E\u003Cstrong\u003Eey\u003C\u002Fstrong\u003E. In the next window, click \u003Cstrong\u003EConfirm\u003C\u002Fstrong\u003E to generate the key.\u003C\u002Fp\u003E\" data-hed=\"4. Configure the GPG Key\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fd1b9b28-f1ba-4104-a734-5af9ed33f723\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EMake sure to configure you key as needed.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Thunderbird GPG key configuration window.\" data-image-filename=\"tbirde2e3.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"771\" data-image-height=\"1001\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-enable-end-to-end-encryption-for-facebook-messenger-chats\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to enable end-to-end encryption for Facebook Messenger chats\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EHow to use encryption in Thunderbird\u003C\u002Fh2\u003E\u003Cp\u003EOkay, the next thing you have to do is import the public key for the recipient you want to send the encrypted mail. After you've acquired their public key, click \u003Cstrong\u003EEnd-to-End encryption\u003C\u002Fstrong\u003E for the email account in question (from within Thunderbird Settings), and then click \u003Cstrong\u003EOpenPGP Manager\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"73621408-bf0e-451b-b768-66cd99e521c5\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAccessing the OpenPGP manager from Thunderbird.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The OpenPGP Key Manager button within Thunderbird settings.\" data-image-filename=\"tbirde2e4.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"770\" data-image-height=\"109\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EFrom the resulting window, click \u003Cstrong\u003EFile\u003C\u002Fstrong\u003E > \u003Cstrong\u003EImport Public Keys from File\u003C\u002Fstrong\u003E. Navigate to the key in question and import it. \u003C\u002Fp\u003E\u003Cp\u003ENow that you have the public key imported, compose an email to that recipient. In the compose window, you should see an OpenPGP drop-down. Click that drop-down and select \u003Cstrong\u003EEncrypt\u003C\u002Fstrong\u003E to encrypt the email. Also, when you type the email address of a recipient with an associated public key stored, you'll see an \u003Cstrong\u003EEncrypt\u003C\u002Fstrong\u003E button at the bottom right of the compose window. Click that button to encrypt the email.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fd5c5c67-70ef-473a-81ba-a2aaf6efd228\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEncrypting a new email in Thunderbird.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Thunderbird encryption drop-down in the compose window.\" data-image-filename=\"tbirde2e5.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"435\" data-image-height=\"272\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen the recipient receives the email, as long as they have the matching private key, the email can be decrypted and read.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-10-31 20:03:21",timezone:"UTC",updated:c,published:c},description:"Here's how to protect your sensitive information from third parties.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"12d1d56b-b307-450d-a1f7-1961f470e308",image:{id:"84c80962-0502-4067-9086-e3ecc62c8559",filename:"istock-1281725866.jpg",dateCreated:{created:c,date:"2021-03-19 09:50:27",timezone:"UTC",updated:c,published:c},alt:"Woman sitting on couch with paper calendar and laptop",credits:"iStockphoto\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F03\u002F19\u002F84c80962-0502-4067-9086-e3ecc62c8559\u002Fistock-1281725866.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-encrypt-email-in-thunderbird-and-why-you-should",startYear:c,summary:b,title:"How to encrypt email in Thunderbird (and why you should)",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"457a36ec-88ff-4576-98a1-244e342b8628\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Jason Cipriani\u002FZDNET\" data-image-alt-text=\"Apple MacBook Pro 13.3-inch M1 on a table.\" data-image-filename=\"macbook-pro1.jpg\" data-image-date-created=\"2022\u002F11\u002F07\" data-image-width=\"1920\" data-image-height=\"1080\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI'll preface this by saying you should really adopt a true \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-export-your-bitwarden-vault-for-safekeeping\u002F\" target=\"_blank\"\u003Epassword manager, such as Bitwarden\u003C\u002Fa\u003E, for this. However, there are a lot of users who aren't ready to add yet another application to the mix.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"7098396a-45dc-4f31-8567-d4b310457b81\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F7098396a-45dc-4f31-8567-d4b310457b81\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf you're a MacOS user, you don't have to toss in a third-party tool for this, because the OS has one built right in. Every time you save a password in MacOS, it is saved, locked behind another password, and still easily accessible to you. \u003C\u002Fp\u003E\u003Cp\u003EWhat does that mean? First off, it means you can be \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-a-strong-password-youre-probably-still-doing-it-the-wrong-way\u002F\" target=\"_blank\"\u003Eusing very strong passwords\u003C\u002Fa\u003E, knowing that they are just a few clicks away. \u003C\u002Fp\u003E\u003Cp\u003EAnd by using the MacOS password suggestion tool, which pops up any time you have to create a new password for a service, you can be sure those passwords can always be very hard to crack.\u003C\u002Fp\u003E\u003Cp\u003EIt also means you don't have to memorize your passwords, which is really how passwords should work in this modern age. If you can memorize it, chances are pretty good it'll be easier to crack.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcybersecurity-these-are-the-new-things-to-worry-about-in-2023\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThese are the new things to worry about in cybersecurity in 2023\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWith all this said, how do you use this feature in MacOS? It's actually quite simple. And before you think that could lead to an insecure situation, the passwords are encrypted and you must enter your user password to access the feature. So even if you accidentally walk away from your laptop or desktop and leave it unlocked, those passwords are still hidden behind a layer of security.\u003C\u002Fp\u003E\u003Ch2\u003EHow to view your saved passwords in MacOS\u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003EEnough said. How do you make use of the feature? Let me show you.\u003C\u002Fp\u003E\u003Ch2\u003ERequirements\u003C\u002Fh2\u003E\u003Cp\u003EThe only thing you'll need for this is a device running MacOS. I'll be demonstrating on a \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"e91134db-4915-4191-aa98-74fc303cfb01\" data-raw-url=\"https:\u002F\u002Fwww.apple.com\u002Fmacbook-pro-13\u002F\" data-link-shortcode-text=\"MacBook Pro\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E running MacOS Ventura 13.0, but this process should be the same on most modern instances of the OS. If you are running a version of MacOS older than Ventura, the UI will be slightly different, but the steps should be the same.\u003C\u002Fp\u003E\u003Cp\u003EReady? Let's do this.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b951b076-d0c9-435b-a953-ec1ed3963fa7\" data-edition=\"us\" data-description=\"\u003Cp\u003EClick on the Apple button in the top left corner of your desktop and click System Settings.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"1. Open System Settings\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8ca352a2-2458-41f2-9c2e-7feacd8750bf\" data-edition=\"us\" data-description=\"\u003Cp\u003ENear the bottom of the left sidebar, you should see the Passwords entry. Click that and then, when prompted, either type your user password or use the biometric login for the device (such as the fingerprint scanner).\u003C\u002Fp\u003E\" data-hed=\"2. Go to the Passwords section\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"4c84c7ea-e5e4-47db-90a7-c90fae4854bb\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe MacOS Passwords feature is found in System Settings.\u003C\u002Fp\u003E\" data-image-credit=\"Jack Wallen\u002FZDNET\" data-image-alt-text=\"MacOS System Settings showing the Passwords option.\" data-image-filename=\"macospword1.jpg\" data-image-date-created=\"2022\u002F11\u002F16\" data-image-width=\"1460\" data-image-height=\"450\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7a60f8b0-2262-4465-8b6b-310ac4624c6c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn the resulting window, scroll through the list of entries until you find what you're looking for. When you locate the item, double-click it to reveal the information.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe password will be hidden but all you need to do is hover your cursor over the dots hiding your password to reveal it. If you click the password, you'll see a Copy Password button appear. Click that to copy the password to your clipboard.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-configure-apps-to-start-upon-login-with-macos\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to configure apps to start upon login with MacOS\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"3. Locate the password you want to view\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"5ff70046-4caa-4bd6-8cf6-d6224b321412\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EClick the Edit button and you can edit or add details to the entry.\u003C\u002Fp\u003E\" data-image-credit=\"Jack Wallen\u002FZDNET\" data-image-alt-text=\"A sample password entry in MacOS.\" data-image-filename=\"macospword2.jpg\" data-image-date-created=\"2022\u002F11\u002F16\" data-image-width=\"1460\" data-image-height=\"1278\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOnce you're finished with the password, make sure to click Done to close the window. If you leave that window open, anyone could view the password without having to authenticate against your account.\u003C\u002Fp\u003E\u003Cp\u003EYou can also edit those entries, which gives you access to the MacOS random password generator, the ability to add notes, and even to add verification codes for an account.\u003C\u002Fp\u003E\u003Cp\u003EAnd that's all there is to viewing your saved passwords on MacOS. Use this tool wisely but also consider adopting an actual password manager for this purpose. Not only will you gain the benefits offered within MacOS, but most password managers on the market offer considerably more in the way of bells and whistles.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-11-16 21:50:00",timezone:"UTC",updated:c,published:c},description:"Here's what to do when you want to access any of the saved passwords on your MacOS device.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"342bb94e-29e6-4769-a8a0-a95315471c23",image:{id:"457a36ec-88ff-4576-98a1-244e342b8628",filename:"macbook-pro1.jpg",dateCreated:{created:c,date:"2022-11-07 15:41:07",timezone:"UTC",updated:c,published:c},alt:"Apple MacBook Pro 13.3-inch M1 on a table.",credits:"Jason Cipriani\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F11\u002F07\u002F457a36ec-88ff-4576-98a1-244e342b8628\u002Fmacbook-pro1.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1920,height:1080,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems^Mac OS",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-view-your-saved-passwords-in-macos",startYear:c,summary:b,title:"How to view your saved passwords in MacOS",topic:{id:"d0aee31d-965e-4a8b-97f0-5c7c1b8bf7f1",slug:"mac-os",name:"Mac OS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"d0aee31d-965e-4a8b-97f0-5c7c1b8bf7f1",slug:"mac-os",name:"Mac OS",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"5d91f1e7-c1b6-4798-abda-400ef7b51584\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Getty Images\" data-image-alt-text=\"Person collapsed on desk under pile of papers that say spam\" data-image-filename=\"gettyimages-sb10069987c-001-dorewning-in-spam-2.jpg\" data-image-date-created=\"2022\u002F06\u002F02\" data-image-width=\"4183\" data-image-height=\"2353\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOnce upon a midnight dreary, I was \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fim-drowning-in-spam-how-do-i-make-it-stop-ask-zdnet\u002F\" target=\"_blank\"\u003Einundated with a deluge of spam\u003C\u002Fa\u003E and malicious messages on Android. Every morning I'd wake up wondering how many such messages would pummel my phone.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"9ca186b4-3225-4447-b49a-74e548e9109d\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F9ca186b4-3225-4447-b49a-74e548e9109d\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBut then \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-to-stop-phishing-and-malware-were-changing-our-comment-notifications\u002F\" target=\"_blank\"\u003EGoogle got smart and added features\u003C\u002Fa\u003E that would help prevent that never-ending rain of unwanted missives. It took Google a while to get it right, but since the platform has evolved, the amount of spam and possibly malicious messages I receive has been reduced dramatically. \u003C\u002Fp\u003E\u003Cp\u003EYou might be asking yourself, isn't it enough to simply swipe away and delete those messages? \u003C\u002Fp\u003E\u003Cp\u003EOf course, to some degree. However, there are instances where those messages aren't just annoying but can possibly be dangerous. The number of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\" target=\"_blank\"\u003Ephishing\u003C\u002Fa\u003E and smishing attempts I receive on a daily basis would be unbearable were it not for the ability to enable suspicious message alerts in Android.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-configure-android-to-handle-incoming-spam-calls\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to configure Android to handle incoming spam calls\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat does suspicious message alerts do?\u003C\u002Fh2\u003E\u003Cp\u003EGood question. The answer is simple. Suspicious message alerts will inform you if a text message includes a suspicious request or a fake link, or is some other type of potential scam. In many cases, Android will automatically act on those alerts and move those messages immediately to your spam folder (so you don't have to do anything with them).\u003C\u002Fp\u003E\u003Cp\u003EIf that sounds like a feature you want to enable, follow me, and I'll show you the way.\u003C\u002Fp\u003E\u003Ch2\u003EHow to enable suspicious message alerts\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ab015dbe-02ac-41b9-92cf-229952038cee\" data-edition=\"us\" data-description=\"\u003Cp\u003EOn your Android device, open the Settings app. From there, go to Security &gt; Advanced Settings. In that window, you should see a listing for "Suspicious message alerts."\u003C\u002Fp\u003E\" data-hed=\"1. Navigate to the Advanced Settings for Security\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9ae1dfab-228a-4dda-af1d-48d08399f704\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnabling suspicious message alerts is far simpler than you probably thought.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The suspicious message alerts entry in Android Settings.\" data-image-filename=\"suss1.jpg\" data-image-date-created=\"2022\u002F10\u002F11\" data-image-width=\"1440\" data-image-height=\"774\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a9612526-ca66-42a2-8009-f93ab2028bca\" data-edition=\"us\" data-description=\"\u003Cp\u003EOn the resulting page, tap the ON\u002FOFF slider for "Allow alerts."&nbsp;\u003C\u002Fp\u003E\" data-hed=\"2. Enable suspicious message alerts\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"28cb5f6f-2f55-4150-a29e-b85a67bdbf2e\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnabling Suspicious Message Alerts in Android 13.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The suspicious message alerts ON\u002FOFF slider.\" data-image-filename=\"suss2.jpg\" data-image-date-created=\"2022\u002F10\u002F11\" data-image-width=\"1440\" data-image-height=\"936\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-get-a-bit-more-security-out-of-android-messages\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to get more security out of Android messages\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EEnable spam protection\u003C\u002Fh2\u003E\u003Cp\u003EThere's one other feature you'll want to enable, which is spam protection. Although enabling suspicious message alerts is a great start, you'll want to also enable the spam protection feature, which automatically detects spam and sends Google the necessary data, so it can continually improve the functionality that protects your device from spam. \u003C\u002Fp\u003E\u003Cp\u003ETo do this, open the Messages app, tap the three-dot menu at the right of the search bar, tap Settings, and then tap \"Spam protection.\" In the resulting page, set the ON\u002FOFF slider to the ON position.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"7bf694a8-5e17-4ffb-9e01-b786c6ada3b6\" data-size=\"medium\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEnabling spam protection in Android 13.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The spam protection ON\u002FOFF Slider.\" data-image-filename=\"suss3.jpg\" data-image-date-created=\"2022\u002F10\u002F11\" data-image-width=\"1434\" data-image-height=\"813\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAnd there you go, you've just given your Android device a helping hand so that it can, in turn, help you avoid the onslaught of spam and malicious messages.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unsubscribe-from-emails-on-gmail-outlook-and-more\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to unsubscribe from emails in Gmail, Outlook and more\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut even with the added protection, I would be remiss if I didn't warn you to never tap on a link or reply to a message from an unknown sender. Even if you only reply to that sender to say, \"Wrong person,\" you've given them everything they need to then hit you with an even more dangerous attack. If you don't recognize a name or phone number, that message should be \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-mark-text-messages-as-spam-and-block-the-sender-on-android\u002F\"\u003Emarked as spam and blocked\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-10-11 18:36:00",timezone:"UTC",updated:c,published:c},description:"Duck and dodge spam and malicious messages easily by enabling this easy feature in Android 13.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"32b193f4-43c8-4ef8-89c5-ba57e54a8862",image:{id:"5d91f1e7-c1b6-4798-abda-400ef7b51584",filename:"gettyimages-sb10069987c-001-dorewning-in-spam-2.jpg",dateCreated:{created:c,date:"2022-06-02 18:43:47",timezone:"UTC",updated:c,published:c},alt:"The Suspicious Message Alerts entry in Android Settings.",credits:"Getty Images",caption:"\u003Cp\u003EEnabling Suspicious message alerts is far simpler than you probably thought.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F02\u002F5d91f1e7-c1b6-4798-abda-400ef7b51584\u002Fgettyimages-sb10069987c-001-dorewning-in-spam-2.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4183,height:2353,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems^Mobile OS^Android",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-enable-suspicious-message-alerts-and-protect-yourself-from-spam-in-android-13",startYear:c,summary:b,title:"How to enable suspicious message alerts and protect yourself from spam in Android 13",topic:{id:"b0fb3d1e-3e24-473d-9325-eaaf1980f7c7",slug:"android",name:"Android",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"b0fb3d1e-3e24-473d-9325-eaaf1980f7c7",slug:"android",name:"Android",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"b13ba3a7-1ed0-4e72-bccc-420b511d3bf3\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Oscar Wong\u002FGetty Images\" data-image-alt-text=\"Woman working on laptop with headphones.\" data-image-filename=\"remote-worker.jpg\" data-image-date-created=\"2022\u002F09\u002F16\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-basics-of-ssh-usage\u002F\" target=\"_blank\"\u003ESecure Shell (SSH)\u003C\u002Fa\u003E is the de facto standard for gaining access to remote Linux machines. SSH took the place of telnet long ago, to add a much-needed layer of security for remote logins.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"a79e7679-c6c7-4a8a-b132-d9c5800e2976\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fa79e7679-c6c7-4a8a-b132-d9c5800e2976\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThat doesn't mean, however, that the default SSH configuration is the best option for those who are a bit more concerned about the security of their systems. Out of the box, SSH works with traditional user and password logins. And even though those logins are far more secure than they were with telnet, you're still typing and sending a password across the internet. \u003C\u002Fp\u003E\u003Cp\u003EShould anyone intercept that password, they could access your machines (so long as they also knew your username). \u003C\u002Fp\u003E\u003Cp\u003EThere's a much better way. Said way is SSH Key Authentication. With Key Authentication, you bypass the username and password authentication, and replace it with a key pair. Why is this important? The primary reason this adds extra security is that the only way to access those servers (when they are configured properly for SSH key authentication) is by having the matching key pair.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-make-ssh-even-easier-to-use-with-config-files\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to make SSH even easier to use with config files\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHere's how it works:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EYou generate an SSH key.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYou upload the public key to a remote server.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYou configure SSH to only allow key authentication.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYou log in from a desktop that contains the private key that matches the public key on the server.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EOnce configured properly, the only way you'll be allowed remote access to the server is if you have the matching private key. Without that key, you cannot gain access. So long as you keep that private key private, all is well.\u003C\u002Fp\u003E\u003Cp\u003EBut how do you pull this off? Let me show you.\u003C\u002Fp\u003E\u003Ch2\u003ERequirements\u003C\u002Fh2\u003E\u003Cp\u003ETo set up SSH key authentication, you'll need at least two Linux machines, one you log in to and one you log in from. I'll demonstrate with Pop!_OS as my desktop and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fubuntu-linux-tries-for-the-office-desktop\u002F\" target=\"_blank\"\u003EUbuntu\u003C\u002Fa\u003E Server as my remote server. This should, however, work the same on nearly any \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-linux-desktops-for-beginners\u002F\" target=\"_blank\"\u003ELinux distribution\u003C\u002Fa\u003E. You'll also need a user with sudo privileges. You'll also want to make sure you have the same username on both local and remote machines.\u003C\u002Fp\u003E\u003Cp\u003EThat's it. Let's make some SSH magic.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-install-ubuntu-server-in-less-than-30-minutes\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to install Ubuntu server in less than 30 minutes\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EHow to set up SSH key authentication in Linux for more secure logins\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c55b2e31-daae-44ce-a876-1acb49b39608\" data-edition=\"us\" data-description=\"\u003Cp\u003EOn your desktop operating system, open a terminal window.\u003C\u002Fp\u003E\" data-hed=\"1. Open the terminal window\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4324d98a-203a-43e6-ade6-14e3c357506a\" data-edition=\"us\" data-description=\"\u003Cp\u003EAt the terminal window, generate your SSH key pair with the command:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Essh-keygen\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EYou'll first be asked where you want to save the key. I suggest saving it to the default location, so just hit Enter when prompted. You'll then be asked to type and verify a password for the key pair. \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-a-strong-password-youre-probably-still-doing-it-the-wrong-way\u002F" target="_blank"\u003EMake sure this password is strong and unique\u003C\u002Fa\u003E. Do not go with an empty password, as that isn't secure.\u003C\u002Fp\u003E\" data-hed=\"2. Generate your SSH key pair\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdont-use-these-passwords-these-are-the-most-popular-log-in-details-found-for-sale-online\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EDon't use these passwords: These are the 10 logins most regularly found for sale online\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8a163617-df8b-4fc8-b7f6-bcc286d4c2db\" data-edition=\"us\" data-description=\"\u003Cp\u003EHere's where it gets slightly tricky. You need to send the public key to the remote server. For that, you'll need to know the IP address of the server. You can get the IP address of the server by logging into it and running the command&nbsp;\u003Cem\u003Eip a\u003C\u002Fem\u003E. You should see the IP address listed. With that information in hand, go back to the desktop and send the public key to the server with the command:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Essh-copy-id SERVER\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhere SERVER is the IP address of the remote server.\u003C\u002Fp\u003E\u003Cp\u003EYou'll be prompted for the password for your user on the remote server. Once you've successfully authenticated, the public key will be copied and SSH key authentication is ready. When you attempt to log into the remote server, you will now be prompted for your SSH key password and not your user password.\u003C\u002Fp\u003E\" data-hed=\"3. Copy your new public key to the remote server\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to configure the remote server for SSH key authentication\u003C\u002Fh2\u003E\u003Cp\u003ENow that you have your key copied, log into the remote machine. What we're going to do now is configure the SSH server to only allow connections via SSH. One thing to keep in mind before you do this is once it's configured, only those with SSH key authentication set up on the machine will be allowed access. Because of this, you'll want to make sure you've copied SSH keys from all the desktop machines you'll use to log into the remote server.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-manage-ssh-connections-on-macos-with-termius\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to manage SSH connections on MacOS with Termius\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWith that out of the way, open the SSH daemon configuration file on the remote server with the command:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"c3VkbyBuYW5vIC9ldGMvc3NoL3NzaGRfY29uZmln\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn that file, look for the line:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"UGFzc3dvcmRBdXRoZW50aWNhdGlvbiB5ZXM=\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EChange that line to:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"UGFzc3dvcmRBdXRoZW50aWNhdGlvbiBubw==\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESave and close the file. Restart SSH with:\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"c3VkbyBzeXN0ZW1jdGwgcmVzdGFydCBzc2hk\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ENow, the only way you can successfully remote into that machine is by way of SSH key authentication. Any machine that doesn't have a matching key pair will be denied access.\u003C\u002Fp\u003E\u003Cp\u003ECongratulations, you've just added another layer of security to your Linux servers. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"cd27c170-17d5-4ac8-be4e-f83e52a86f69\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fcd27c170-17d5-4ac8-be4e-f83e52a86f69\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-10-24 19:06:00",timezone:"UTC",updated:c,published:c},description:"Here's how easy it is to add a layer of security to your secure shell logins on Linux.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"9f8a410a-e631-42f4-9c8b-accde73fcb21",image:{id:"b13ba3a7-1ed0-4e72-bccc-420b511d3bf3",filename:"remote-worker.jpg",dateCreated:{created:c,date:"2022-09-16 11:48:09",timezone:"UTC",updated:c,published:c},alt:"remote-worker",credits:"Image: GettyImages\u002FOscar Wong",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F16\u002Fb13ba3a7-1ed0-4e72-bccc-420b511d3bf3\u002Fremote-worker.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Open Source",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-set-up-ssh-key-authentication-in-linux-for-more-secure-logins",startYear:c,summary:b,title:"How to set up SSH key authentication in Linux for more secure logins",topic:{id:"10f422bf-ec91-11e3-95d2-02911863765e",slug:"open-source",name:"Open Source",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"10f422bf-ec91-11e3-95d2-02911863765e",slug:"open-source",name:"Open Source",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"video\" data-uuid=\"97845557-9e4c-4369-8ed4-2a9220432af4\" data-size=\"large\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EPeople who are buying or selling second-hand laptops, tablets and smartphones are being urged to follow new consumer guidance in order to protect their personal information and prevent it from falling into the hands of cyber criminals.\u003C\u002Fp\u003E\u003Cp\u003EJanuary sales often sees people looking for new personal computing devices while those who've received an upgrade over Christmas could be looking to sell their own model. Buying and selling second-hand devices can provide benefits to users, but the UK's National Cyber Security Centre (NCSC) has warned that if these devices are not properly secured, valuable personal information could be exploited.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EUsers who sell their devices without wiping them first could be handing their personal information and passwords on to others who might be unscrupulous when dealing with that data.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.ncsc.gov.uk\u002Fguidance\u002Fbuying-selling-second-hand-devices\"\u003EThe guidance\u003C\u002Fa\u003E provides instructions on what users should do to reset their Android, Apple, Google or Windows devices to factory settings in order to erase all content and personal data, including messages, contacts, photographs, browsing history, Wi-Fi codes, passwords, and any apps installed.\u003C\u002Fp\u003E\u003Cp\u003EBut it isn't just leaving data on old devices that could put users at risk from cyber criminals – buying a smartphone that is no longer supported by its manufacturer could also lead to problems because it will no longer receive security updates to protect against known vulnerabilities that could be exploited by cyber criminals.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-laptop\u002F\" target=\"_blank\"\u003EThe best laptops: Does Apple take the crown?\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EFor those buying second-hand devices, it's recommended that they perform a factory reset in order to erase all the personal data on it so they can't gain access to any personal data that might have been left behind, or fall foul of previously installed apps that could put their own personal data at risk.\u003C\u002Fp\u003E\u003Cp\u003E\"At this time of year many of us take advantage of the pre-owned tech market, either to grab a bargain or cash in on a device we no longer need.\" said Sarah Lyons, NCSC deputy director for economy and society.\u003C\u002Fp\u003E\u003Cp\u003E\"We want consumers to make the most of this market, but we also want them to be aware of the risks around security and personal data and what they can do to protect themselves.\u003C\u002Fp\u003E\u003Cp\u003EThe NCSC has also urged people who believe they've received suspicious emails to report them to the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fphishing-160000-dodgy-emails-flagged-to-scam-busting-service-in-just-two-weeks\u002F\"\u003ESuspicious Email Reporting Service (SERS)\u003C\u002Fa\u003E to help malicious websites get taken down and provide a better chance for everyone to stay safe online.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EMORE ON CYBERSECURITY\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-software-flaw-is-being-used-to-break-into-networks-now-so-update-fast\u002F\"\u003E\u003Cstrong\u003EThis critical software flaw is now being used to break into networks - so update fast\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.cnet.com\u002Fhow-to\u002Fthink-twice-before-buying-a-refurbished-android-phone-why-it-might-be-unsafe\u002F\"\u003EThink twice before buying a refurbished Android phone: Why it might be unsafe\u003C\u002Fa\u003E CNET\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwfh-leads-to-surge-in-mobile-phishing-and-malware-attacks-targeting-pharmaceuticals-companies\u002F\"\u003E\u003Cstrong\u003EWFH leads to surge in mobile phishing and malware attacks targeting pharmaceuticals companies\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.techrepublic.com\u002Farticle\u002Fpopular-android-apps-still-vulnerable-to-patched-security-flaw\u002F\"\u003EPopular Android apps still vulnerable to patched security flaw\u003C\u002Fa\u003E TechRepublic\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcybersecurity-do-these-things-to-keep-your-business-safe-from-hackers-retailers-told\u002F\"\u003E\u003Cstrong\u003ECybersecurity: Do these things to keep your business safe from hackers, retailers told\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2021-01-05 12:31:00",timezone:"UTC",updated:c,published:c},description:"NCSC issues advice ensuring privacy when buying and selling second-hand devices, warning it's easier to get hacked if you buy an unsupported old model.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"a2b47eb2-a6a2-400e-9f9e-f1e4086501df",image:{id:"1e9aaf00-6f0a-4de4-982c-40818b079d6b",filename:"computeruseristock-1224570384a.jpg",dateCreated:{created:c,date:"2020-12-15 11:04:59",timezone:"UTC",updated:c,published:c},alt:"Computer user resting head on hand using laptop",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003EComputer user resting head on hand using laptop\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2020\u002F12\u002F15\u002F1e9aaf00-6f0a-4de4-982c-40818b079d6b\u002Fcomputeruseristock-1224570384a.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1658,height:1243,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"guide",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"buying-a-second-hand-laptop-heres-how-to-stop-a-bargain-becoming-a-security-disaster",startYear:c,summary:b,title:"Buying a second-hand laptop? Here's how to stop a bargain becoming a security disaster",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"27054999-403d-4c71-83dd-0a7ac28c6e7d\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Trismegist san\u002FShutterstock\" data-image-alt-text=\"Woman whose facial features are being tracked.\" data-image-filename=\"shutterstock-1516856447.jpg\" data-image-date-created=\"2021\u002F09\u002F07\" data-image-width=\"4615\" data-image-height=\"2596\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIncognito mode is a great way to use the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fheres-how-googles-using-ml-to-improve-chrome\u002F\" target=\"_blank\"\u003EChrome browser\u003C\u002Fa\u003E on Android without leaving any breadcrumbs behind for sites and services to track you. I use it regularly, and it rarely fails me. \u003C\u002Fp\u003E\u003Cp\u003EHowever, one thing that has always bothered me about the incognito mode is that if I leave an incognito tab open, anyone who has access to my phone can view it. That always seemed like a privacy disaster waiting in the wings. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso\u003C\u002Fstrong\u003E: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5-quick-tips-for-better-android-phone-security-now-yes-its-this-easy\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003E5 quick tips for better Android phone security now\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf you're serious about your privacy and want to take Chrome's incognito mode to the next level, I've got just the trick for you.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61b2fa86-25ca-4edd-8c79-0a571ebf1336\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhat we're going to do is enable a feature that will require user authentication before active incognito tabs can be viewed. \u003C\u002Fp\u003E\u003Cp\u003EThat's fancy. Let's make it happen.\u003C\u002Fp\u003E\u003Ch2\u003ERequirements\u003C\u002Fh2\u003E\u003Cp\u003ETo make this work, you'll need an updated \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-android-phone\u002F\" target=\"_blank\"\u003EAndroid phone\u003C\u002Fa\u003E with Chrome version 105 or newer. That's all you need, let's do it.\u003C\u002Fp\u003E\u003Ch2\u003EHow to lock Android Chrome active incognito tabs for heightened privacy\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"7757e615-f829-4643-9633-e21bfaa0931a\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis is a bit tricky because we have to set a Chrome flag. To do that, open Chrome on your Android device and either type or copy and paste the following URL into the address bar:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003Echrome:\u002F\u002Fflags\u002F#incognito-reauthentication-for-android\u003C\u002Fem\u003E\u003C\u002Fp\u003E\" data-hed=\"1. Open the necessary flag\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4d2385cb-9aaf-4f7a-86b2-cfa63e76e84a\" data-edition=\"us\" data-description=\"\u003Cp\u003EAt the top of the resulting page, you'll see a drop-down marked Default. Tap that drop-down and select Enabled.\u003C\u002Fp\u003E\" data-hed=\"2. Enable the flag\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"04457676-952f-4af4-829c-ef6c520f1753\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ELocating the correct flag to enable the feature.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome flags window in Android.\" data-image-filename=\"incognito1.jpg\" data-image-date-created=\"2022\u002F09\u002F27\" data-image-width=\"1440\" data-image-height=\"891\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0dc19f06-b0cf-432a-94a4-29ec70cf152c\" data-edition=\"us\" data-description=\"\u003Cp\u003ENext, you should see a Relaunch button at the bottom of the page. Tap that and Chrome will close and restart.\u003C\u002Fp\u003E\" data-hed=\"3. Restart Chrome\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"465a5198-a70d-4493-8448-dfcd6f49764d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ERestarting Chrome on Android from the flags page.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Chrome Relaunch button on Android.\" data-image-filename=\"incognito3.jpg\" data-image-date-created=\"2022\u002F09\u002F27\" data-image-width=\"1440\" data-image-height=\"411\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d9b50b81-d0b5-4ab6-b230-952f3911eb20\" data-edition=\"us\" data-description=\"\u003Cp\u003ETap the three dot menu button and then tap settings. Tap Privacy and Security. You should now see a new entry labeled Lock Incognito tabs when you leave Chrome. Tap the ON\u002FOFF slider until it's in the ON position. You will then be prompted for either your fingerprint, facial recognition, or PIN. Once you've successfully authenticated, you can start using Chrome in such a way that when you leave incognito tabs open, you'll have to authenticate before you can view them.\u003C\u002Fp\u003E\" data-hed=\"4. Enable the feature\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b1663d36-f837-4090-bc97-9628a3e437d8\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe final step to enable the feature.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The Lock incognito mode ON\u002FOFF switch.\" data-image-filename=\"incognito4.jpg\" data-image-date-created=\"2022\u002F09\u002F27\" data-image-width=\"1440\" data-image-height=\"597\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOne thing to remember, however, is that this doesn't work if you actually close Chrome (as that will automatically close your incognito tabs). This only works if you leave Chrome running in memory (such as when you open a new app or go to the home screen).\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-browser-for-privacy\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe 5 best browsers for privacy: Secure web browsing\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThere you go, you've just added an extra layer of privacy to Android such that when you leave Chrome open, any incognito tabs will be locked behind user authentication.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"9ca186b4-3225-4447-b49a-74e548e9109d\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F9ca186b4-3225-4447-b49a-74e548e9109d\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-28 15:18:41",timezone:"UTC",updated:c,published:c},description:"Here's how to to lock up your Android Chrome incognito tabs behind your password, fingerprint, and facial recognition to increase your mobile privacy.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"1bcff796-eb51-4187-9458-f57fa4988229",image:{id:"27054999-403d-4c71-83dd-0a7ac28c6e7d",filename:"shutterstock-1516856447.jpg",dateCreated:{created:c,date:"2021-09-07 10:59:25",timezone:"UTC",updated:c,published:c},alt:"The Chrome flags window in Android.",credits:"Shutterstock \u002F Trismegist san",caption:"\u003Cp\u003ELocating the correct flag to enable the feature.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F09\u002F07\u002F27054999-403d-4c71-83dd-0a7ac28c6e7d\u002Fshutterstock-1516856447.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4615,height:2596,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Services & Software^Operating Systems^Mobile OS^Android",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-to-lock-active-incognito-tabs-on-android-chrome-for-more-privacy",startYear:c,summary:b,title:"How to lock active incognito tabs on Android Chrome for more privacy",topic:{id:"b0fb3d1e-3e24-473d-9325-eaaf1980f7c7",slug:"android",name:"Android",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"b0fb3d1e-3e24-473d-9325-eaaf1980f7c7",slug:"android",name:"Android",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1050fa4d-ec91-11e3-95d2-02911863765e",slug:"google",name:"Google",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EDNS stands for Domain Name System and makes it such that can type google.com instead of 142.251.32.14. What DNS does is map the URL you type to the correct IP address associated with the address. In the example I just mentioned, 142.251.32.14 is one of the IP addresses mapped to google.com.\u003C\u002Fp\u003E\u003Cp\u003EWithout DNS, you'd have to remember IP addresses, which is not user-friendly.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBy default, DNS isn't terribly secure. Every time you search in your web browser, that search is sent in plain text. That means anyone intercepting the search data you send from your Chromebook can be read. However, if you make use of secure DNS, that search data is encrypted, so it's far more challenging to read. Because it's so easy to enable secure DNS in ChromeOS, this should be considered a must-do for anyone who's adamant about security and privacy.\u003C\u002Fp\u003E\u003Cp\u003EHow do you enable secure DNS in your Chromebook? I'll show you how. \u003C\u002Fp\u003E\u003Cp\u003EFortunately, Google has actually built this into ChromeOS, such that all you have to do is enable it and then select a DNS service that supports secure DNS. I'm going to do this using Cloudflare's 1.1.1.1 DNS service, which is free to use. \u003C\u002Fp\u003E\u003Cp\u003EI'll be demonstrating on ChromeOS 103.0.5045.0. Let's get to work.\u003C\u002Fp\u003E\u003Ch2\u003EEnabling secure DNS on ChromeOS\u003C\u002Fh2\u003E\u003Col\u003E\u003Cli\u003ELog into your Chromebook and click the system tray at the bottom right of your display. \u003C\u002Fli\u003E\u003Cli\u003EFrom that popup (Figure 1), click the gear icon to open the Settings app.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0637c7a5-5ec3-4fd1-91cb-8283ac3433f0\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAccessing the Settings app from within the system tray on ChromeOS.\u003C\u002Fp\u003E\" data-image-alt-text=\"securedns1.jpg\" data-image-filename=\"securedns1.jpg\" data-image-date-created=\"2022\u002F05\u002F18\" data-image-width=\"1380\" data-image-height=\"1007\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E3. In the resulting window (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E), click Security and Privacy.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"04b297e7-b696-45b9-b2fe-8763db47385d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe ChromeOS Settings app is where most of your configurations take place.\u003C\u002Fp\u003E\" data-image-alt-text=\"securedns2.jpg\" data-image-filename=\"securedns2.jpg\" data-image-date-created=\"2022\u002F05\u002F18\" data-image-width=\"2400\" data-image-height=\"1600\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E4. In the Security and Privacy section (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E), you'll see the Use secure DNS option.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"56a1a619-852c-4b56-931d-38c637860c06\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EBy default, secure DNS is not enabled. \u003C\u002Fp\u003E\" data-image-alt-text=\"securedns3.jpg\" data-image-filename=\"securedns3.jpg\" data-image-date-created=\"2022\u002F05\u002F18\" data-image-width=\"1411\" data-image-height=\"174\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E5. Click the ON\u002FOFF slider for Use secure DNS until it's in the ON position. \u003C\u002Fp\u003E\u003Cp\u003E5. Once secure DNS has been enabled, click the check box for With and then select Cloudflare 1.1.1.1 from the drop-down (\u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"03856278-27a5-4a69-bcda-c0918b095a9a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ESelect Cloudflare for your secure DNS usage. \u003C\u002Fp\u003E\" data-image-alt-text=\"securedns4.jpg\" data-image-filename=\"securedns4.jpg\" data-image-date-created=\"2022\u002F05\u002F18\" data-image-width=\"2400\" data-image-height=\"1600\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou can then close the Settings app, open Chrome, and start browsing to your heart's content, knowing your DNS queries will be sent over a secure connection. Congratulations on adding another layer of security to your Chromebook.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F99a9cd9f-54bf-4f53-ac7f-f1c5243e66da\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-05-19 23:00:51",timezone:"UTC",updated:c,published:c},description:"Jack Wallen shows you how to add another layer of security to your Chromebook with the help of secure DNS.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d4062642-4377-4090-beeb-bf18f4b4faee",image:{id:"0637c7a5-5ec3-4fd1-91cb-8283ac3433f0",filename:"securedns1.jpg",dateCreated:{created:c,date:"2022-05-18 17:54:04",timezone:"UTC",updated:c,published:c},alt:"securedns1.jpg",credits:"Samsung",caption:"\u003Cp\u003EAccessing the Settings app from within the system tray on ChromeOS.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F05\u002F18\u002F0637c7a5-5ec3-4fd1-91cb-8283ac3433f0\u002Fsecuredns1.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1380,height:1007,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"how-to",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-you-should-be-using-secure-dns-on-your-chromebook",startYear:c,summary:b,title:"Why you should be using secure DNS on your Chromebook",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:"Practical tips, tricks, and advice for getting things done",description:c,filters:c,paging:c,slug:"dynamic-topic-3-story-carousel-how-to",title:"How-to Guides",label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c},{id:"58d3384f-a0d7-4628-acc1-a44626a03c4e",meta:{componentName:"58d3384f-a0d7-4628-acc1-a44626a03c4e",componentDisplayName:"Analysis & Opinion",componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F58d3384f-a0d7-4628-acc1-a44626a03c4e\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=58d3384f-a0d7-4628-acc1-a44626a03c4e"}},items:[{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"20129da4-c9fc-47f6-ab8e-884c002910d4\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"SEAN GLADWELL\u002FGetty Images\" data-image-alt-text=\"virus icon\" data-image-filename=\"gettyimages-1211997725.jpg\" data-image-date-created=\"2024\u002F10\u002F08\" data-image-width=\"2067\" data-image-height=\"1450\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn June, the United States Department of Commerce \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-us-bans-kaspersky-products-citing-security-risks-what-this-means-for-you\u002F\"\u003Eannounced a ban on Kaspersky software\u003C\u002Fa\u003E. As ZDNET's Lance Whitney reported, as of September 29, Kaspersky is no longer able to provide antivirus signature updates and code updates for the banned products to customers in the US. The company even \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fone-million-us-kaspersky-customers-to-be-migrated-to-this-lesser-known-alternative\u002F\" target=\"_blank\"\u003Emigrated a million customers\u003C\u002Fa\u003E to a lesser-known replacement product.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyou-should-protect-your-windows-pc-data-with-strong-encryption-heres-how-and-why\u002F\"\u003EYou should protect your Windows PC data with strong encryption - here's how and why\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhen I read that news, I was as shocked as anyone. Did someone accidentally press a button that transported us back to 1999? People still pay for third-party antivirus software?\u003C\u002Fp\u003E\u003Cp\u003EApparently, people do, but good luck finding reliable information on the market for antivirus software in 2024. Most of the data I was able to uncover came from the developers of said software, which is not the most reliable source.\u003C\u002Fp\u003E\u003Ch2\u003EAntivirus software by the numbers\u003C\u002Fh2\u003E\u003Cp\u003EA \u003Ca href=\"https:\u002F\u002Fwww.security.org\u002Fantivirus\u002Fantivirus-consumer-report-annual\u002F\"\u003Erecent survey by Security.org\u003C\u002Fa\u003E revealed some believable numbers about the US market. It found that roughly 54% of Americans use the default virus protection that comes with their device, while 46% use third-party antivirus programs.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F7-password-rules-to-live-by-in-2024-according-to-security-experts\u002F\"\u003E7 password rules to live by in 2024, according to security experts\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, of those who install extra protection, only a little more than half (33 million households) pay for the privilege. Norton and McAfee collectively account for 52% of those paying customers, with Kaspersky accounting for a mere 4% of the market. If those numbers are accurate, 1.3 million Americans should be able to demand a refund from Kaspersky later this year.\u003C\u002Fp\u003E\u003Cp\u003EHere's the part that jumped out at me from that report:\u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EOlder Americans are significantly more likely to use third-party antivirus programs and pay for the software. Those over 65 are twice as likely to subscribe to paid antivirus services than those under 45.\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cp\u003EFull disclosure here: I'm in the over-65 demographic, with a full head of gray hair, and I haven't used third-party antivirus software in decades. But my silver-haired peers are still paying. Why? For the same reason they still use checkbooks. It's what they grew up with, and it makes them feel comfortable.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-cracks-down-on-windows-11-upgrades-for-incompatible-pcs-but-theres-a-fix-for-now\u002F\"\u003EMicrosoft cracks down on Windows 11 upgrades for 'incompatible' PCs, but there's a fix\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIt's also a colossal waste of money.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to protect your tech in 2024\u003C\u002Fh2\u003E\u003Cp\u003ERegardless of which device category we're talking about here, you're likely to be just fine with the default protection that's included as part of the platform. On a mobile device (iOS or Android), that means the app store that the OS developer manages. On a Mac, the XProtect antimalware technology has been around for over a decade and is effective against mainstream threats.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsick-of-ads-on-android-change-these-5-settings-for-more-privacy\u002F\"\u003ESick of ads on Android? Change these 5 settings for more privacy - fast\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs for Windows? Well, Microsoft Defender Antivirus, which is included with every Windows PC, routinely aced the tests from third-party labs that measure the effectiveness of security software. The leveling-up process started about seven years ago, and the Microsoft solution has \u003Ca href=\"https:\u002F\u002Fwww.av-test.org\u002Fen\u002Fantivirus\u002Fhome-windows\u002Fmanufacturer\u002Fmicrosoft\u002F\" target=\"_blank\"\u003Eregularly scored between 99% and 100%\u003C\u002Fa\u003E since then, making it every bit as effective as third-party rivals, free or paid.\u003C\u002Fp\u003E\u003Cp\u003EEven that result understates the case.\u003C\u002Fp\u003E\u003Cp\u003EAt the turn of the 21st century, when the Windows PC landscape was at its wildest and wooliest, most malware arrived on people's PCs as email attachments or over networks. Today, those vectors are effectively closed off. \u003C\u002Fp\u003E\u003Cp\u003EAutomatic updates protect against newly discovered vulnerabilities. Your modern email client blocks any kind of executable file attachment, including script-based files. Network firewalls have come a long way since (checks calendar) 2002. And recent test results show that Microsoft Defender is \u003Ca href=\"https:\u002F\u002Fwww.av-test.org\u002Fen\u002Fnews\u002Fdisguise-and-deception-how-brand-new-malware-attacks-are-carried-out-on-windows-systems\u002F\" target=\"_blank\"\u003Eeffective at blocking all of the most popular attack vectors\u003C\u002Fa\u003E for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-ransomware-everything-you-need-to-know-and-how-to-reduce-your-risk\u002F\" target=\"_blank\"\u003Eransomware\u003C\u002Fa\u003E and info stealers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-use-public-wi-fi-safely\u002F\"\u003EHow to use public Wi-Fi safely: 5 things to know before you connect\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EOn average, a modern antivirus app blocks 99.2% of the very few incoming threats that get past the other layers of protection. And even then, your own instincts (\"Don't click that link!\") are also effective. This is why the modern, fully patched consumer PC isn't really a target of the criminal gangs responsible for modern malware.\u003C\u002Fp\u003E\u003Ch2\u003EThe main targets \u003C\u002Fh2\u003E\u003Cp\u003EMost attacks are launched by sophisticated criminal gangs and aimed at businesses, using vulnerabilities that are more likely to be in third-party software than they are in the OS itself. Russian hackers \u003Ca href=\"https:\u002F\u002Fwww.npr.org\u002F2021\u002F04\u002F16\u002F985439655\u002Fa-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack\"\u003Eused SolarWinds management software\u003C\u002Fa\u003E to hack Microsoft and other high-value targets. A widely-used app called \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-new-moveit-vulnerability-is-igniting-hacking-attempts-companies-should-patch-asap\u002F\" target=\"_blank\"\u003EMOVEit\u003C\u002Fa\u003E, from Progress Software, was \u003Ca href=\"https:\u002F\u002Farstechnica.com\u002Finformation-technology\u002F2023\u002F06\u002Fmass-exploitation-of-critical-moveit-flaw-is-ransacking-orgs-big-and-small\u002F\"\u003Eexploited in a breach that affected thousands of big companies and government agencies\u003C\u002Fa\u003E last year, and a \u003Ca href=\"https:\u002F\u002Farstechnica.com\u002Fsecurity\u002F2024\u002F06\u002Fcritical-moveit-vulnerability-puts-huge-swaths-of-the-internet-at-severe-risk\u002F\"\u003Enew vulnerability\u003C\u002Fa\u003E was reported in June.\u003C\u002Fp\u003E\u003Cp\u003EShell, British Airways, the BBC, and the Canadian province of Nova Scotia were the victims of the MOVEit attack, not random PC users. These days, big-time cybercriminals are focusing on that kind of target. A signature-based antivirus app isn't going to provide protection against those targeted attacks. Instead, IT departments in large organizations need sophisticated network-based software that allows administrators to monitor for signs of an intrusion in real time.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\"\u003EThe best VPN services of 2024: Expert tested and reviewed\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ESmall-fry users are reasonably well protected via default security measures, mostly because determined attackers see no financial benefit in picking on such puny victims. If you're still paying Norton, McAfee, or Kaspersky for antivirus protection on your home PC, it's time to let that subscription expire. But if your IT department at work says they want you to install an endpoint monitoring app, take them at their word.\u003C\u002Fp\u003E\u003Cp\u003EJust make sure it's not from Kaspersky.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThis article was originally published on July 1, 2024, and last updated on Oct. 8, 2024. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-10-08 18:55:00",timezone:"UTC",updated:c,published:c},description:"Americans over 65 are twice as likely to pay for third-party antivirus software than those under 45. If you're still doing it, here's why you can stop.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"f45b2697-cf23-4341-942a-3ca07e51c757",image:{id:"20129da4-c9fc-47f6-ab8e-884c002910d4",filename:"gettyimages-1211997725.jpg",dateCreated:{created:c,date:"2024-10-08 18:53:07",timezone:"UTC",updated:c,published:c},alt:"virus icon",credits:"SEAN GLADWELL\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F08\u002F20129da4-c9fc-47f6-ab8e-884c002910d4\u002Fgettyimages-1211997725.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2067,height:1450,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-you-dont-need-to-pay-for-antivirus-software-anymore",startYear:c,summary:b,title:"Why you don't need to pay for antivirus software anymore",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"3fdfd730-f820-461b-ae32-4ec0ddfd2e7b\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"MirageC\u002FGetty Images\" data-image-alt-text=\"money signs\" data-image-filename=\"gettyimages-1147839022.jpg\" data-image-date-created=\"2024\u002F10\u002F31\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAs Windows 10 begins its final year of official support, Microsoft is executing a familiar game plan for its business customers. \u003C\u002Fp\u003E\u003Cp\u003ELast April, in separate posts on the \u003Ca href=\"https:\u002F\u002Ftechcommunity.microsoft.com\u002Ft5\u002Fwindows-it-pro-blog\u002Fwhen-to-use-windows-10-extended-security-updates\u002Fba-p\u002F4102628\"\u003EWindows IT Pro Blog\u003C\u002Fa\u003E and on the \u003Ca href=\"https:\u002F\u002Feducationblog.microsoft.com\u002Fen-us\u002F2024\u002F04\u002Fwindows-10-end-of-support-updates-for-education\"\u003EMicrosoft Education Blog\u003C\u002Fa\u003E, the company revealed its price list for commercial and education customers who want to continue receiving security updates for Windows 10 after the end-of-support deadline arrives on October 14, 2025. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-your-incompatible-windows-10-pc-to-windows-11-two-ways\u002F\"\u003EHow to upgrade your 'incompatible' Windows 10 PC to Windows 11: Two ways\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003EThe company had previously confirmed that it plans to offer a version of this program for consumers, but waited six additional months, until October 31, 2024, to offer an explanation of how that program would work. The details are buried near the end of a \u003Ca href=\"https:\u002F\u002Fblogs.windows.com\u002Fwindowsexperience\u002F2024\u002F10\u002F31\u002Fhow-to-prepare-for-windows-10-end-of-support-by-moving-to-windows-11-today\u002F\" target=\"_blank\"\u003Elong-winded post\u003C\u002Fa\u003E that sings the praises of Windows 11 and encourages business customers to upgrade or buy new PCs. \u003C\u002Fp\u003E\u003Cp\u003EIf you plan to keep using Windows 10, here's what you can expect to pay. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"57ad7387-224e-49af-9011-540edcda78d4\" data-edition=\"us\" data-description=\"\u003Ch2\u003EBusiness customers\u003C\u002Fh2\u003E\u003Cp\u003EBusiness customers will need to pay dearly to stick with Windows 10. A license for the Extended Security Updates (ESU) program is sold as a subscription. For the first year, the cost is $61. For year two, the price doubles, and it doubles again for year three. That Microsoft blog post doesn't do the math on those, probably because the total is uncomfortably high. A three-year ESU subscription will cost $61 + $122 + $244, for a total of $427 per PC.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhave-a-windows-10-pc-that-cant-be-upgraded-you-have-5-options-before-support-ends-next-year\u002F"\u003EHave a Windows 10 PC that can't be upgraded? You have 5 options\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe program closely resembles what Microsoft offered for Windows 7's end-of-support date in 2020, although the Windows 10 price is 22% higher than the $350 total cost of that program, which started at $50 for year one.\u003C\u002Fp\u003E\u003Cp\u003EDon't think you can game the system by jumping into the program after sitting out for a year or two. "ESUs are cumulative," Microsoft said, and you can't buy year two unless you've already paid for year one.\u003C\u002Fp\u003E\u003Cp\u003EAs was the case with Windows 7, Redmond really wants business customers to upgrade to Windows 11, which explains the high price tag. Microsoft's April announcements talk just as much about what you don't get with an ESU license as they do about the updates themselves.\u003C\u002Fp\u003E\" data-hed=\"How much will Windows 10 updates cost?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cblockquote\u003E\u003Cp\u003EExtended Security Updates are not intended to be a long-term solution but rather a temporary bridge. ESUs do not include new features, non-security fixes, or design change requests. The ESU program does not extend technical support for Windows 10. Technical support is limited to the activation of the ESU licenses, installation of ESU monthly updates, and addressing issues that may have been caused due to an update itself. \t \t\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d0226dab-b2c1-43b0-8e57-5be57ea1d30c\" data-edition=\"us\" data-description=\"\u003Cp\u003EEducation customers are getting off much easier. The rules are the same, but the price for the first year is $1. It doubles to $2 in the second year and doubles again to $4 in the third and final year, for a grand total of ... $7 per PC.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyou-can-still-upgrade-old-pcs-to-windows-11-even-if-microsoft-says-no-readers-prove-it\u002F"\u003EYou can still upgrade old PCs to Windows 11, even if Microsoft says no: Readers prove it\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAdministrators who want to get a head start can sign up for the first year of an ESU license as early as October 2024, one year before the actual end-of-support date.\u003C\u002Fp\u003E\u003Ch2\u003E\u003Cbr\u003E\u003C\u002Fh2\u003E\" data-hed=\"Education customers\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2ae42de3-4ee9-4a52-ad7d-fc8e49aed9e1\" data-edition=\"us\" data-description=\"\u003Cp\u003EOn the page that announced details of the ESU program for commercial customers, a Microsoft spokesperson wrote that details and prices for consumers "will be shared at a later date" on the company's \u003Ca href="https:\u002F\u002Fwww.microsoft.com\u002Fen-us\u002Fwindows\u002Fend-of-support" target="_blank"\u003Econsumer end-of-support page\u003C\u002Fa\u003E. Six months later, those details are finally available.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-windows-laptop\u002F"\u003EThe best Windows laptop you can buy\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EConsumers will be able to sign up for a one-year ESU subscription for $30. That's roughly half what businesses will pay for that first year. That deal comes with two significant restrictions, however. \u003C\u002Fp\u003E\u003Cp\u003EFirst, it's available only for "personal use," a move that's obviously designed to discourage business customers from trying to get security updates at a discount. Second, the subscription can't be renewed after that first year. On October 25, 2026, security updates will stop for good on those consumer PCs.\u003C\u002Fp\u003E\u003Cp\u003EStill, the fact that Microsoft is even offering a consumer option is noteworthy. The Windows 7 ESU program was messy. It was \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fso-you-want-to-keep-running-windows-7-good-luck-with-that-small-businesses\u002F"\u003Enot exactly friendly to small businesses\u003C\u002Fa\u003E and there was no option at all for consumers. The difference, of course, is that those customers had a straightforward option to upgrade their Windows 7 PCs to the successor OS, Windows 10. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-blocked-your-windows-11-upgrade-this-trusty-tool-can-fix-that\u002F"\u003EMicrosoft blocked your Windows 11 upgrade? This trusty tool can fix that\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EMicrosoft says that ESU program enrollment for consumers will be available closer to the end of support date. It's unclear how many consumers will be willing to fork over $30, but the number of eligible PCs will be \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-has-a-big-windows-10-problem-and-only-one-year-to-solve-it\u002F" target="_blank"\u003Efrightfully large\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"Consumers\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d558e088-706b-4f3a-b4b6-436e119b48b1\" data-edition=\"us\" data-description=\"\u003Cp\u003EBusinesses that use one of Microsoft's official cloud-based update management services, like Microsoft Intune and Windows AutoPatch, get a discount that takes the first year cost down to $45, but Microsoft doesn't specify what happens in the second and third years. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fwork-life\u002Fis-onedrive-moving-all-your-files-how-to-take-back-control-of-your-windows-storage-3-ways\u002F"\u003EIs OneDrive moving all your files? How to take back control of your Windows storage - 3 ways\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThose solutions are mainly applicable to very large organizations that pay for Windows Enterprise edition licenses and manage them in the cloud. It's worth noting that the option applies only to devices owned by an organization; personal (BYOD) devices aren't eligible. \u003C\u002Fp\u003E\u003Cp\u003EThere's also an option for businesses that sign up for Windows 365. Subscribers who access a Windows 11 Cloud PC on Windows 365 from a physical device running Windows 10 automatically get an ESU license for their Windows 10 PC. Similar discounts are available for devices running Azure Virtual Desktop.\u003C\u002Fp\u003E\u003Cp\u003EMicrosoft also says it plans to offer discounts to nonprofit organizations, but details aren't available on that yet either.\u003C\u002Fp\u003E\" data-hed=\"What discounts are available for Windows 10 updates?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003ENote: This post was originally published in April 2024. The most recent update was on October 31, 2024.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"bc4074e0-359d-459b-b3db-941877b80949\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fbc4074e0-359d-459b-b3db-941877b80949\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-10-31 17:47:00",timezone:"UTC",updated:c,published:c},description:"Businesses can expect to pay a shockingly high sum for Windows 10 Extended Security Updates. Educators will fare better. And for the first time, consumers can sign up - but there's a catch.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"1d99bafb-0d67-49e6-a44f-c0d81ed99e0f",image:{id:"3fdfd730-f820-461b-ae32-4ec0ddfd2e7b",filename:"gettyimages-1147839022.jpg",dateCreated:{created:c,date:"2024-10-31 17:43:31",timezone:"UTC",updated:c,published:c},alt:"money signs",credits:"MirageC\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F3fdfd730-f820-461b-ae32-4ec0ddfd2e7b\u002Fgettyimages-1147839022.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Tech^Services & Software^Operating Systems^Windows",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"cant-quit-windows-10-microsoft-will-charge-for-updates-next-year-heres-how-much",startYear:c,summary:b,title:"Can't quit Windows 10? Microsoft will charge for updates next year. Here's how much",topic:{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10c1d40e-ec91-11e3-95d2-02911863765e",slug:"microsoft",name:"Microsoft",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"5a09f531-5d09-11e4-b6a0-d4ae52e95e57",slug:"windows-10",name:"Windows 10",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"4fad2a75-66a6-4204-a2db-28b7e0946989\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"natatravel\u002FGetty Images\" data-image-alt-text=\"TPM chip\" data-image-filename=\"gettyimages-1485827984.jpg\" data-image-date-created=\"2024\u002F09\u002F25\" data-image-width=\"2127\" data-image-height=\"1409\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen Microsoft introduced \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-11-faq-heres-everything-you-need-to-know\u002F\" target=\"_blank\"\u003EWindows 11\u003C\u002Fa\u003E in 2021, its new, stringent hardware compatibility test included checking for the presence of a Trusted Platform Module (TPM) -- specifically, one that meets the TPM 2.0 standard.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-your-incompatible-windows-10-pc-to-windows-11\u002F\"\u003EHow to upgrade your 'incompatible' Windows 10 PC to Windows 11\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ESo, what is a TPM, and why does Windows insist that you need one? \u003C\u002Fp\u003E\u003Cp\u003EThe simple answer is that a TPM is a secure cryptoprocessor, a dedicated microcontroller designed to handle security-related tasks and manage \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbeyond-passwords-4-key-security-steps-youre-probably-forgetting\u002F\" target=\"_blank\"\u003Eencryption keys\u003C\u002Fa\u003E in a way that minimizes the ability of attackers to break into a system. Windows uses that hardware for a variety of security-related features, including Secure Boot, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwheres-your-bitlocker-recovery-key-how-to-save-a-copy-before-the-next-windows-meltdown\u002F\" target=\"_blank\"\u003EBitLocker\u003C\u002Fa\u003E, and Windows Hello.\u003C\u002Fp\u003E\u003Cp\u003EBut the full answer is, as with anything related to computer security, slightly more complicated.\u003C\u002Fp\u003E\u003Cp\u003EThe TPM architecture is defined by an international standard (formally known as \u003Ca href=\"https:\u002F\u002Fwww.iso.org\u002Fstandard\u002F66510.html\" target=\"_blank\"\u003EISO\u002FIEC 11889\u003C\u002Fa\u003E), which was created by the Trusted Computing Group more than 20 years ago. The standard deals with how different cryptographic operations are implemented, with an emphasis on \"integrity protection, isolation and confidentially.\"\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyes-you-can-upgrade-that-old-pc-to-windows-11-even-if-microsoft-says-no-these-readers-proved-it\u002F\"\u003EYes, you can upgrade that old PC to Windows 11, even if Microsoft says no. These readers proved it\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EA TPM can be implemented as a discrete chip soldered onto a computer motherboard, or it can be implemented within the firmware of a PC chipset or the CPU itself, as Intel, AMD, and Qualcomm have done over the past decade. If you use a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-create-linux-virtual-machine-with-virtualbox\u002F\" target=\"_blank\"\u003Evirtual machine\u003C\u002Fa\u003E, you can even build a virtual TPM chip into it. \u003C\u002Fp\u003E\u003Cp\u003ESo, does your PC have a TPM? If it was designed in 2016 and sold with Windows preinstalled, the answer is almost certainly yes. That's the year Microsoft began requiring manufacturers to ship PCs with TPM 2.0 available and enabled by default. Intel CPUs from that era include a TPM 2.0 that's embedded in firmware (Intel calls this feature Platform Trust Technology, or PTT). Also in 2016, AMD began incorporating a firmware-based TPM 2.0 called fTPM.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIf your PC is older than that, it still might contain a TPM. Intel started including the feature in its 4th Generation Core processors (Haswell) in 2014, but in general that technology was only available and enabled in PCs built for the business market. Computers built in 2013 or earlier might include discrete TPMs that are separate from the CPU; for the most part, pre-2014 TPMs followed the TPM 1.2 standard, which is not officially supported by Windows 11.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fstill-have-a-windows-10-pc-you-have-5-options-before-support-ends-next-year\u002F\"\u003EStill have a Windows 10 PC? You have 5 options before support ends next year\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ETo complicate things even more, your PC might have a TPM that's disabled in the BIOS or firmware settings. That's certain to be the case on a PC that's been configured to use a Legacy BIOS instead of UEFI. You can check the configuration of your Windows PC by using the System Information tool (Msinfo32.exe).\u003C\u002Fp\u003E\u003Cp\u003EA TPM is meant to be a super-secure location for processing cryptographic operations and storing the private keys that make strong encryption possible. The TPM works with the Windows \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-11-has-advanced-hardware-security-heres-how-to-get-it-in-windows-10-today\u002F\" target=\"_blank\"\u003ESecure Boot feature\u003C\u002Fa\u003E, for example, which verifies that only signed, trusted code runs when the computer starts up. If someone tries to tamper with the operating system -- to add a rootkit, for example -- Secure Boot prevents the changed code from executing. (Chromebooks have a similar feature called Verified Boot, which also uses the TPM to ensure that a system hasn't been tampered with.)\u003C\u002Fp\u003E\u003Cp\u003EThe TPM also enables biometric authentication with Windows Hello, and it holds the BitLocker keys that encrypt the contents of a Windows system disk, making it nearly impossible for an attacker to break that encryption and access your data without authorization. For a detailed technical explanation, you can \u003Ca href=\"https:\u002F\u002Fdocs.microsoft.com\u002Fen-us\u002Fwindows\u002Fsecurity\u002Finformation-protection\u002Ftpm\u002Fhow-windows-uses-the-tpm\" target=\"_blank\"\u003Eread this primer\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F7-password-rules-to-live-by-in-2024-according-to-security-experts\u002F\"\u003E7 password rules to live by in 2024, according to security experts\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWindows 10 and Windows 11 initialize and take ownership of the TPM as part of the installation process. You don't need to do anything special to set up or use a TPM beyond making sure it's enabled for use by the PC. And it's not just a Windows feature. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-linux-laptop\u002F\" target=\"_blank\"\u003ELinux PCs\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\u002F\" target=\"_blank\"\u003EIoT\u003C\u002Fa\u003E devices can initialize and use a TPM as well. \u003C\u002Fp\u003E\u003Cp\u003EApple devices use a different hardware design called the \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fguide\u002Fsecurity\u002Fsecure-enclave-sec59b0b31ff\u002Fweb\" target=\"_blank\"\u003ESecure Enclave\u003C\u002Fa\u003E, which performs some of the same cryptographic operations as a TPM, and also provides secure storage of sensitive user data.\u003C\u002Fp\u003E\u003Cp\u003EThe extra level of security that a TPM enforces in tamper-resistant hardware is a very good thing. To see details about the TPM in your Windows PC, open Device Manager and look under the Security Devices heading.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-debloating-windows-is-a-bad-idea-and-what-to-do-instead\u002F\"\u003EWhy 'debloating' Windows is a bad idea (and what to do instead)\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EOn a PC running Windows 10 that includes any version of TPM, you can upgrade to Windows 11 by making a simple change to the registry. If your PC doesn't include a TPM, you'll need to use an unofficial hack to bypass the hardware compatibility checks and install Windows 11. The easiest way to do this is with the help of a free, open-source utility called Rufus. For details, see \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-your-incompatible-windows-10-pc-to-windows-11\u002F\" target=\"_blank\"\u003E\"How to upgrade your 'incompatible' Windows 10 PC to Windows 11.\"\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThis article was originally published on January 18, 2024, and last updated on September 25, 2024. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-09-25 22:56:00",timezone:"UTC",updated:c,published:c},description:"Windows 11 officially requires a Trusted Platform Module. Here's what it does and how you can work around that requirement if your old PC doesn't have one.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"6240d28b-f82d-41df-9cf0-9a91cec530f7",image:{id:"4fad2a75-66a6-4204-a2db-28b7e0946989",filename:"gettyimages-1485827984.jpg",dateCreated:{created:c,date:"2024-09-25 22:52:52",timezone:"UTC",updated:c,published:c},alt:"TPM chip",credits:"natatravel\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F09\u002F25\u002F4fad2a75-66a6-4204-a2db-28b7e0946989\u002Fgettyimages-1485827984.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2127,height:1409,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-windows-11-requires-a-tpm-and-how-to-get-around-that",startYear:c,summary:b,title:"Why Windows 11 requires a TPM - and how to get around that",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"110769e8-ec91-11e3-95d2-02911863765e",slug:"pcs",name:"PCs",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"9a23272b-10d6-11e4-9732-00505685119a",username:"David Gewirtz",profileUrl:c,email:c,firstName:"David",lastName:"Gewirtz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"de4475ef-be59-4858-beb8-6f7696c85945",filename:"david-gewirtz.jpg",dateCreated:{created:c,date:"2022-08-05 15:19:52",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fde4475ef-be59-4858-beb8-6f7696c85945\u002Fdavid-gewirtz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"In addition to hosting the ZDNET Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.\r\n\r\nDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"b13e2c52-cdd7-466c-b65f-8503544f5e93\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"filo\u002FGetty Images\" data-image-alt-text=\"AI eye concept\" data-image-filename=\"gettyimages-1478400170.jpg\" data-image-date-created=\"2024\u002F08\u002F08\" data-image-width=\"2108\" data-image-height=\"1423\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen I first looked at whether it's possible to fight back against \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-ai-heres-everything-you-need-to-know-about-artificial-intelligence\u002F\" target=\"_blank\"\u003EAI-generated\u003C\u002Fa\u003E plagiarism, and how that might work, it was January 2023, just a few months into the world's exploding awareness of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-generative-ai-and-why-is-it-so-popular-heres-everything-you-need-to-know\u002F\" target=\"_blank\"\u003Egenerative AI\u003C\u002Fa\u003E. More than a year later, it feels like we've been exploring \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-generative-ai-and-why-is-it-so-popular-heres-everything-you-need-to-know\u002F\" target=\"_blank\"\u003Egenerative AI\u003C\u002Fa\u003E for years, but we've only looked at the issue for about 18 months.\u003C\u002Fp\u003E\u003Cp\u003EIn any case, this is an updated version of that original January 2023 article. When I first tested GPT detectors, I used three: the \u003Ca href=\"https:\u002F\u002Fopenai-openai-detector.hf.space\u002F\" target=\"_blank\"\u003EGPT-2 Output Detector\u003C\u002Fa\u003E (this is a different URL than we published before), \u003Ca href=\"https:\u002F\u002Fwriter.com\u002Fai-content-detector\u002F\" target=\"_blank\"\u003EWriter.com AI Content Detector\u003C\u002Fa\u003E, and \u003Ca href=\"https:\u002F\u002Fcontentatscale.ai\u002Fai-content-detector\u002F\" target=\"_blank\"\u003EContent at Scale AI Content Detection\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-use-chatgpt\u002F\"\u003EHow to use ChatGPT: Everything you need to know\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe best result was 66% correct, from the GPT-2 Output Detector. I did another test in October 2023 and added three more: \u003Ca href=\"https:\u002F\u002Fgptzero.me\" target=\"_blank\"\u003EGPTZero\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zerogpt.com\" target=\"_blank\"\u003EZeroGPT\u003C\u002Fa\u003E (yes, they're different), and \u003Ca href=\"https:\u002F\u002Fx.writefull.com\u002Fgpt-detector\" target=\"_blank\"\u003EWritefull's GPT Detector\u003C\u002Fa\u003E. Now, in the summer of 2024, I'm adding \u003Ca href=\"https:\u002F\u002Fquillbot.com\u002Fai-content-detector\" target=\"_blank\"\u003EQuillBot\u003C\u002Fa\u003E and a commercial service, \u003Ca href=\"https:\u002F\u002Foriginality.ai\u002F\" target=\"_blank\"\u003EOriginality.ai\u003C\u002Fa\u003E, to the mix. \u003C\u002Fp\u003E\u003Cp\u003EIn October 2023, I removed the Writer.com AI Content Detector from our test suite because it failed back in January 2023, it failed again in October, and it failed now. See below for a comment from the company, which their team sent me after the original article was published in January.\u003C\u002Fp\u003E\u003Cp\u003EBefore I go on, though, we should discuss plagiarism and how it relates to our problem. Merriam-Webster defines \"\u003Ca href=\"https:\u002F\u002Fwww.merriam-webster.com\u002Fdictionary\u002Fplagiarizing\" target=\"_blank\"\u003Eplagiarize\u003C\u002Fa\u003E\" as \"to steal and pass off (the ideas or words of another) as one's own; use (another's production) without crediting the source.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThis definition fits AI-created content well. While someone using an AI tool like \u003Ca href=\"https:\u002F\u002Fwww.notion.so\u002Fproduct\u002Fai\"\u003ENotion AI\u003C\u002Fa\u003E or \u003Ca href=\"https:\u002F\u002Fchat.openai.com\u002F\"\u003EChatGPT\u003C\u002Fa\u003E isn't stealing content, if that person doesn't credit the words as coming from an AI and claims them as their own, it still meets the dictionary definition of plagiarism. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-ai-art-generator\u002F\"\u003EThe best AI image generators to try\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn this experimental article, I've asked ChatGPT to help out. My words are in normal and bold text. The AI's words are italicized. After each AI-generated section, I'll show the results of the detectors. At the end of the article, we'll look at how well the detectors performed overall. \u003C\u002Fp\u003E\u003Cp\u003EHere are the test results for the above text, which I wrote myself: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EGPT-2 Output Detector:\u003C\u002Fstrong\u003E 99.98% real \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContent at Scale AI Content Detection:\u003C\u002Fstrong\u003E 100% highly likely to be human!\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGPTZero: \u003C\u002Fstrong\u003EYour text is likely to be written entirely by a human\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EZeroGPT:\u003C\u002Fstrong\u003E 22% AI GPT Your Text is Most Likely Human written\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWritefull GPT Detector: \u003C\u002Fstrong\u003E1% likely this comes from GPT-3, GPT-4 or ChatGPT\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOriginality.ai:\u003C\u002Fstrong\u003E 84% Original 16% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EQuillBot:\u003C\u002Fstrong\u003E 45% of text is likely AI-generated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EHuman-written content: \u003C\u002Fstrong\u003E5-of-7 correct \u003C\u002Fp\u003E\u003Cp\u003EBefore we move on, let's discuss what I'll consider a \"correct\" analysis. If the score is numeric, anything above 80% will be counted as a correct analysis, and that's being generous. If the score has a summary, I'll look at the summary and make a judgment. \u003C\u002Fp\u003E\u003Cp\u003EWith that, let's dig in some more. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExplain why ChatGPT can be a real problem for teachers and editors when it comes to plagiarism\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EChatGPT is a variant of the GPT (Generative Pre-trained Transformer) language model developed by OpenAI. It is designed to generate human-like text by predicting the next word or phrase in a given input sequence. While ChatGPT can be a useful tool for generating text and responding to prompts, it can also be a problem for teachers and editors when it comes to plagiarism.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F4-ways-to-overcome-your-biggest-worries-about-generative-ai\u002F\"\u003E4 ways to overcome your biggest worries about generative AI\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EOne of the main reasons why ChatGPT can be a problem for teachers and editors is that it can generate text that is very similar to that of real human writers. This means that students or other individuals could potentially use ChatGPT to generate text that they could then submit as their own work, thereby committing plagiarism.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EFor teachers and editors, detecting whether a given piece of text was generated by ChatGPT or written by a human can be very difficult, as the generated text may not contain any obvious errors or discrepancies that would reveal its artificial origin. This can make it difficult for teachers and editors to identify and prevent plagiarism, as they may not be able to tell whether a given piece of text is original or copied from another source.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EOverall, ChatGPT and other similar language models can be a problem for teachers and editors when it comes to plagiarism because they can generate text that is difficult to distinguish from that written by humans, making it easier for students and other individuals to commit plagiarism without being detected.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EGPT-2 Output Detector:\u003C\u002Fstrong\u003E 99.69% real\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContent at Scale AI Content Detection:\u003C\u002Fstrong\u003E Hard to tell\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGPTZero: \u003C\u002Fstrong\u003E100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EZeroGPT:\u003C\u002Fstrong\u003E 100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWritefull GPT Detector: \u003C\u002Fstrong\u003E12% likely this comes from GPT-3, GPT-4 or ChatGPT\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOriginality.ai: \u003C\u002Fstrong\u003E100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EQuillBot:\u003C\u002Fstrong\u003E 83% of text is likely AI-generated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAI-written content: \u003C\u002Fstrong\u003E4-of-7 correct \u003C\u002Fp\u003E\u003Cp\u003ERemember, text shown in \u003Cem\u003Eitalics\u003C\u002Fem\u003E was generated by the AI. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EShow me at least three ways that I can detect ChatGPT was used to produce a piece of text\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThere are several ways that you can potentially detect whether ChatGPT or another language model was used to produce a piece of text. Here are three potential approaches you could use:\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003ELook for repetitive or unusual patterns in the text:\u003C\u002Fstrong\u003E One way to detect whether a language model was used to generate a piece of text is to look for repetitive or unusual patterns in the writing. For example, language models may repeat certain phrases or word combinations, or use unusual or inconsistent sentence structures.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003ECheck for lack of originality:\u003C\u002Fstrong\u003E Another way to detect whether a language model was used to generate a piece of text is to check for a lack of originality in the writing. If a piece of text appears to be copied from another source, or if it contains information that is widely available on the internet or in other sources, it could be a sign that it was generated by a language model.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003EUse a plagiarism checker:\u003C\u002Fstrong\u003E Finally, you can use a plagiarism checker to check whether a piece of text appears to be copied from another source. While a plagiarism checker may not be able to definitively determine whether a language model was used to generate a piece of text, it can help you identify instances of copying or paraphrasing from other sources.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ENote when the answer is obviously wrong:\u003C\u002Fstrong\u003E I talked about this in my \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcan-notion-ai-writing-helper-write-this-article\u002F\" target=\"_blank\"\u003ENotion AI review\u003C\u002Fa\u003E, where I spotlighted some text the AI wrote with seeming authority, but which was blatantly wrong. If a student or writer doesn't have full command of the topic being discussed, they may not spot the inaccuracies and leave them in the AI-generated response. Of course, incorrect statements aren't just the purview of an AI writing tool. Many bloggers and commenters, for example, repeat statements made by other bloggers, creating an \u003Ca href=\"https:\u002F\u002Fieeexplore.ieee.org\u002Fdocument\u002F4755503\"\u003Eecho chamber\u003C\u002Fa\u003E of completely \"false facts\", showing that while intelligence may be artificial, stupidity is a universal trait.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003E\u003Cem\u003EKeep in mind that it can be difficult to definitively determine whether a language model was used to generate a piece of text, and these methods may not always be effective. However, they can be useful tools to help you identify potential instances of language model-generated text.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EIn this set of tests, only the italicized content above was run through the checker suite.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EGPT-2 Output Detector:\u003C\u002Fstrong\u003E 99.98% fake\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContent at Scale AI Content Detection:\u003C\u002Fstrong\u003E Passes as human\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGPTZero: \u003C\u002Fstrong\u003E100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EZeroGPT:\u003C\u002Fstrong\u003E 99.69% AI GPT Your Text is AI\u002FGPT Generated\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWritefull GPT Detector: \u003C\u002Fstrong\u003E79% likely this comes from GPT-3, GPT-4 or ChatGPT\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOriginality.ai:\u003C\u002Fstrong\u003E 100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EQuillBot:\u003C\u002Fstrong\u003E 100% of text is likely AI-generated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAI-written content: \u003C\u002Fstrong\u003E5-of-7 correct \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EList three plagiarism checkers that can detect ChatGPT text\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EIt is worth noting that there is currently no plagiarism checker that is specifically designed to detect text generated by ChatGPT or other language models. While some plagiarism checkers may be able to identify certain characteristics of language model-generated text that could indicate its artificial origin, there is no guarantee that they will be able to definitively determine whether a piece of text was generated by a language model.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EWith that said, here are three plagiarism checkers that you might consider using to help identify potential instances of language model-generated text:\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003ETurnitin:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.turnitin.com\u002F\"\u003ETurnitin\u003C\u002Fa\u003E is a popular plagiarism checker that is widely used by schools and universities. It compares a piece of text to a database of other texts to identify instances of copying or paraphrasing. While it may not be able to definitively determine whether a piece of text was generated by a language model, it could potentially identify certain characteristics of language model-generated text that could indicate its artificial origin.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003EPlagScan:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.plagscan.com\u002Fen\u002F\"\u003EPlagScan\u003C\u002Fa\u003E is another plagiarism checker that compares a piece of text to a database of other texts to identify instances of copying or paraphrasing. Like Turnitin, it may be able to identify certain characteristics of language model-generated text that could indicate its artificial origin, but it is not specifically designed to detect language model-generated text.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cem\u003E\u003Cstrong\u003ECopyleaks:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fcopyleaks.com\u002F\"\u003ECopyleaks\u003C\u002Fa\u003E is a plagiarism checker that uses advanced machine learning algorithms to scan a piece of text and compare it to a database of other texts to identify instances of copying or paraphrasing. While it may be able to identify certain characteristics of language model-generated text, it is not specifically designed to detect language model-generated text.\u003C\u002Fem\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003E\u003Cem\u003EIt is worth noting that no plagiarism checker is completely foolproof, and there is always the possibility that a piece of language model-generated text could escape detection. Therefore, it is important to use plagiarism checkers as just one part of a larger strategy to detect and prevent plagiarism.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EGPT-2 Output Detector:\u003C\u002Fstrong\u003E 99.58% real\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContent at Scale AI Content Detection:\u003C\u002Fstrong\u003E Passes as human\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGPTZero: \u003C\u002Fstrong\u003E100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EZeroGPT:\u003C\u002Fstrong\u003E 100% AI GPT\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWritefull GPT Detector: \u003C\u002Fstrong\u003E86% likely this comes from GPT-3, GPT-4 or ChatGPT\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOriginality.ai: \u003C\u002Fstrong\u003E100% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EQuillBot:\u003C\u002Fstrong\u003E 100% of text is likely AI-generated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAI-written content: \u003C\u002Fstrong\u003E5-of-7 correct \u003C\u002Fp\u003E\u003Ch2\u003E Online AI plagiarism checkers \u003C\u002Fh2\u003E\u003Cp\u003EMost plagiarism detectors are used to compare writing against a corpus of other writing. For example, when a student turns in an essay, a product like Turnitin scans the submitted essay against a huge library of essays in its database, and other documents and text on the internet to determine if the submitted essay contains already-written content. \u003C\u002Fp\u003E\u003Cp\u003EHowever, the AI-writing tools generate original content, at least in theory. Yes, they build their content from whatever they've been trained on, but the words they construct are somewhat unique for each composition. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fopenai-pulls-its-own-ai-detection-tool-because-it-was-performing-so-poorly\u002F\"\u003EOpenAI pulls its own AI detection tool because it was performing so poorly\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs such, the plagiarism checkers mentioned above probably won't work because the AI-generated content probably didn't exist in, say, another student's paper. \u003C\u002Fp\u003E\u003Cp\u003EIn this article, we're just looking at GPT detectors. But plagiarism is a big problem, and as we've seen, some choose to define plagiarism as something you claim as yours that you didn't write, while others choose to define plagiarism as something written by someone else that you claim is yours. \u003C\u002Fp\u003E\u003Cp\u003EThat distinction was never a problem until now. Now that we have non-human writers, the plagiarism distinction is more nuanced. It's up to every teacher, school, editor, and institution to decide exactly where that line is drawn. \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EGPT-2 Output Detector:\u003C\u002Fstrong\u003E 99.56% real\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContent at Scale AI Content Detection:\u003C\u002Fstrong\u003E Passes as human\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGPTZero:\u003C\u002Fstrong\u003E 98% human\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EZeroGPT:\u003C\u002Fstrong\u003E 16.82 AI Your text is human written\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWritefull GPT Detector: \u003C\u002Fstrong\u003E7% likely this comes from GPT-3, GPT-4 or ChatGPT\u003Cbr\u003E \u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOriginality.ai:\u003C\u002Fstrong\u003E 84% Original 16% AI\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EQuillBot:\u003C\u002Fstrong\u003E 0% of text is likely AI-generated\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EHuman-written content: \u003C\u002Fstrong\u003E7-of-7 correct \u003C\u002Fp\u003E\u003Ch2\u003E Overall results \u003C\u002Fh2\u003E\u003Cp\u003EOverall, test results this time are dramatically better than they have been with previous tests. \u003C\u002Fp\u003E\u003Cp\u003EIn our previous runs, none of the tests got everything right. This time, three of the seven services tested got the results correct 100% of the time. \u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003ETest\u003C\u002Ftd\u003E\u003Ctd\u003EOverall\u003C\u002Ftd\u003E\u003Ctd\u003EHuman\u003C\u002Ftd\u003E\u003Ctd\u003EAl\u003C\u002Ftd\u003E\u003Ctd\u003EAl\u003C\u002Ftd\u003E\u003Ctd\u003EAl\u003C\u002Ftd\u003E\u003Ctd\u003EHuman\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EGPT-2 Output Detector\u003C\u002Ftd\u003E\u003Ctd\u003E60%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EContent at Scale Al Content Detection\u003C\u002Ftd\u003E\u003Ctd\u003E40%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EGPTZero\u003C\u002Ftd\u003E\u003Ctd\u003E100%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EZeroGPT\u003C\u002Ftd\u003E\u003Ctd\u003E100%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EWritefull GPT Detector\u003C\u002Ftd\u003E\u003Ctd\u003E80%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EOriginality.ai\u003C\u002Ftd\u003E\u003Ctd\u003E100%\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EQuillBot\u003C\u002Ftd\u003E\u003Ctd\u003E80%\u003C\u002Ftd\u003E\u003Ctd\u003EFail\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003Ctd\u003ECorrect\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003EWhile the overall results have improved dramatically, I would not be comfortable relying solely on these tools to validate a student's content. As has been shown, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcould-someone-falsely-accuse-you-of-using-ai-generated-text-this-could-be-why\u002F\" target=\"_blank\"\u003Ewriting from non-native speakers often gets rated as generated by an AI\u003C\u002Fa\u003E, and even though my hand-crafted content has no longer been rated as AI, there were a few paragraphs flagged by the testers as possibly being AI-based. So, I would advocate caution before relying on the results of any (or all) of these tools. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcould-someone-falsely-accuse-you-of-using-ai-generated-text-this-could-be-why\u002F\"\u003ECould someone falsely accuse you of using AI-generated text? This could be why\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003ELet's look at the individual testers and see how each performed. \u003C\u002Fp\u003E\u003Ch2\u003EGPT-2 Output Detector (Accuracy 60%) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fopenai-openai-detector.hf.space\u002F\"\u003EThis first tool\u003C\u002Fa\u003E was built using a machine-learning hub managed by New York-based AI company \u003Ca href=\"https:\u002F\u002Fhuggingface.co\u002F\"\u003EHugging Face\u003C\u002Fa\u003E. While the \u003Ca href=\"https:\u002F\u002Ftechcrunch.com\u002F2021\u002F03\u002F11\u002Fhugging-face-raises-40-million-for-its-natural-language-processing-library\u002F\"\u003Ecompany has received $40 million in funding\u003C\u002Fa\u003E to develop its natural language library, the GPT-2 detector appears to be a user-created tool using the Hugging Face Transformers library. Of the six tests I ran, it was accurate for four of them. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"d9848b43-deb2-41c6-9b92-a6b297ed9145\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"GPT-2 Output Detector\" data-image-filename=\"gpt-2-output-detector-2023-01-08-17-59-34.jpg\" data-image-date-created=\"2023\u002F01\u002F11\" data-image-width=\"1039\" data-image-height=\"689\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EWriter.com AI Content Detector (Accuracy N\u002FA) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"http:\u002F\u002FWriter.com\"\u003EWriter.com\u003C\u002Fa\u003E is a service that generates AI writing, oriented towards corporate teams. Its \u003Ca href=\"https:\u002F\u002Fwriter.com\u002Fai-content-detector\u002F\"\u003EAI Content Detector\u003C\u002Fa\u003E tool can scan for generated content. Unfortunately, I found this tool unreliable, and it failed to generate results -- exactly the same way it did in January 2023. \u003C\u002Fp\u003E\u003Cp\u003EAfter this article was originally published in January, the folks at Writer.com reached out to ZDNET. CEO May Habib had this comment to share: \u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EDemand for the AI detector has skyrocketed. Traffic has grown 2-3x per week since we launched it a couple months ago. We've now got the necessary scaling behind it to make sure it doesn't go down, and our goal is to keep it free - and up to date to catch the latest models' outputs, including ours. If AI output is going to be used verbatim, it absolutely should be attributed. \t \t \t\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fdaeb8b9-91bb-483c-9ae0-2021a634604f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"Writer.com AI Content Detector\" data-image-filename=\"ai-content-detector-gpt-3-chatgpt-writer-2023-01-08-18-07-07.jpg\" data-image-date-created=\"2023\u002F01\u002F11\" data-image-width=\"1675\" data-image-height=\"1086\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EContent at Scale AI Content Detection (Accuracy 40%) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fcontentatscale.ai\u002Fai-content-detector\u002F\" target=\"_blank\"\u003EThe third tool\u003C\u002Fa\u003E I found was also produced by an AI content generation firm. \u003Ca href=\"https:\u002F\u002Fcontentatscale.ai\u002F\" target=\"_blank\"\u003EContent at Scale\u003C\u002Fa\u003E pitches itself as \"We Help SEO-Focused Content Marketers by Automating Content Creation.\" Its marketing call to action is, \"Upload a list of keywords and get 2,600+ word blog posts that bypass AI content detection -- all with no human intervention!\" Disturbingly, the results got worse from January -- back then, it was 50% accurate. It has not improved since. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"5479207f-2eb2-4689-ba47-8c74f8504d9e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"Content at Scale AI Content Detection\" data-image-filename=\"free-ai-detector-ai-content-detection-for-gpt-3-chatgpt-2023-01-08-18-12-18.jpg\" data-image-date-created=\"2023\u002F01\u002F11\" data-image-width=\"1633\" data-image-height=\"1072\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EGPTZero (Accuracy 100%) \u003C\u002Fh2\u003E\u003Cp\u003EIt's not entirely clear what drives \u003Ca href=\"https:\u002F\u002Fgptzero.me\" target=\"_blank\"\u003EGPTZero\u003C\u002Fa\u003E. The company is hiring engineers and sales folks, and it runs on AWS, so there are expenses and sales involved. However, all I could find about a service offering was a place where you could register for a free account to scan more than the 5,000 words offered without login. If you're interested in this service for GPT detection, you'll have to see if they'll respond to you with more details. Accuracy has increased since the last time I ran these tests. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"8a4ad1b9-0761-4822-89f1-69ee1cf4d12f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"gptzero\" data-image-filename=\"gptzero.jpg\" data-image-date-created=\"2023\u002F07\u002F26\" data-image-width=\"1986\" data-image-height=\"2034\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EZeroGPT (Accuracy 100%) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zerogpt.com\u002F\" target=\"_blank\"\u003EZeroGPT\u003C\u002Fa\u003E seems to have matured as a service since we last looked at it. When we last looked, no company name was listed, and the site was peppered with Google ads with no apparent strategy for monetization. The service worked fairly well but seemed sketchy as heck. \u003C\u002Fp\u003E\u003Cp\u003EThat sketchy-as-heck feeling is now gone. ZeroGPT presents as any other SaaS service, complete with pricing, company name, contact information, and all the rest. It still performs quite well, so perhaps the developers decided to turn their working code into more of a working business. Accuracy increased as well. Good for them.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"4479d3ae-e086-41ed-9d08-b8010b85844c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"zerogpt\" data-image-filename=\"zerogpt.jpg\" data-image-date-created=\"2023\u002F07\u002F27\" data-image-width=\"1844\" data-image-height=\"1421\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EWritefull GPT Detector (Accuracy 80%) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fx.writefull.com\" target=\"_blank\"\u003EWritefull\u003C\u002Fa\u003E sells writing support services, as well as a free taste of its tools. The \u003Ca href=\"https:\u002F\u002Fx.writefull.com\u002Fgpt-detector\" target=\"_blank\"\u003EGPT detector\u003C\u002Fa\u003E is fairly new and worked fairly well. Although not fully accurate, it did improve from 60% accurate to 80% accurate with my tests. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"3efd4d2e-dd62-4fca-942d-c3b2cd693ac2\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"writefull\" data-image-filename=\"writefull.jpg\" data-image-date-created=\"2023\u002F07\u002F27\" data-image-width=\"2588\" data-image-height=\"1506\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EOriginality.ai (Accuracy 100%, sort of) \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Foriginality.ai\u002F\" target=\"_blank\"\u003EOriginality.ai\u003C\u002Fa\u003E is a commercial service that bills itself as both an AI checker and a plagiarism checker. The company sells its services based on usage credits. To give you an idea, all the scans I did for this article used a total of 30 usage credits. The company sells 2,000 credits a month for $12.95 per month. I pumped about 1,400 words through the system and used only 1.5% of the monthly allocation. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9988a013-879c-480a-a76e-fe1b9b1e3eb5\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"originality-ai\" data-image-filename=\"originality-ai.jpg\" data-image-date-created=\"2024\u002F06\u002F20\" data-image-width=\"3680\" data-image-height=\"2032\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EResults were great for the AI checker, but they failed 3 out of 5 times when it came to using the service as a plagiarism checker. The following screenshot claims that the text pasted in was 0% plagiarised: \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2b9c0e96-7b7d-4b5b-b107-e2feaadf738e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"plag1\" data-image-filename=\"plag1.jpg\" data-image-date-created=\"2024\u002F06\u002F20\" data-image-width=\"3696\" data-image-height=\"1678\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThat's wrong since all the text pasted into it was from this article, which has been published online for 18 months. I thought, perhaps, that the plagiarism scanner couldn't read ZDNET content, but that's not the case, as this screenshot shows: \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0c3dee5d-7c21-4ab9-aaf6-3798afea3f30\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"plag2\" data-image-filename=\"plag2.jpg\" data-image-date-created=\"2024\u002F06\u002F20\" data-image-width=\"3100\" data-image-height=\"1676\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETo be fair, I didn't set out to check plagiarism checkers in this article. But since I'm using source material I know I pulled from my existing article, I figured the plagiarism checker would have slammed all of them as 100% plagiarized. In any case, Originality.ai did well on the part we set out to test, the AI checker. They get points for that. \u003C\u002Fp\u003E\u003Ch2\u003E QuillBot (Accuracy 80%-ish) \u003C\u002Fh2\u003E\u003Cp\u003ENothing is ever easy. The first time I ran my first test through \u003Ca href=\"https:\u002F\u002Fquillbot.com\u002Fai-content-detector\" target=\"_blank\"\u003EQuillBot\u003C\u002Fa\u003E, it said that 45% of the text was likely generated by an AI. It wasn't. I wrote it. But then, after completing all the other tests, I returned to QuillBot to grab a screenshot for this section, fed it the same text that generated the 45% score, and, as you can see, it now reports 0% AI. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9a2bffb3-b4cc-433a-bdae-e8b1d94cb1a9\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Screenshot by David Gewirtz\u002FZDNET\" data-image-alt-text=\"cleanshot-2024-08-07-at-14-09-582x\" data-image-filename=\"cleanshot-2024-08-07-at-14-09-582x.jpg\" data-image-date-created=\"2024\u002F08\u002F07\" data-image-width=\"2972\" data-image-height=\"1684\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESo, what are we to make of this result? Sadly, I didn't grab a screenshot of the first time I tested this text, but it highlights the concern with relying too much on AI detectors because they are also quite capable of hallucination. \u003C\u002Fp\u003E\u003Ch2\u003EWhat about OpenAI's own ChatGPT detector?\u003C\u002Fh2\u003E\u003Cp\u003EWell, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fopenai-pulls-its-own-ai-detection-tool-because-it-was-performing-so-poorly\u002F\" target=\"_blank\"\u003EOpenAI pulled it\u003C\u002Fa\u003E last year because the detector wasn't particularly accurate. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwill-openais-new-ai-detection-tool-put-an-end-to-student-cheating\u002F\" target=\"_blank\"\u003ENow, it's supposed to be 99% accurate\u003C\u002Fa\u003E. That's a little tough to believe because ChatGPT itself is far from 100% accurate. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwill-openais-new-ai-detection-tool-put-an-end-to-student-cheating\u002F\"\u003EWill OpenAI's new AI detection tool put an end to student cheating?\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut, in any case, as my ZDNET buddy Steven Vaughan-Nichols writes, it's not available yet. We'll give it a spin when it's released for public use. Stay tuned.\u003C\u002Fp\u003E\u003Ch2\u003E Final thoughts\u003Cbr\u003E \u003C\u002Fh2\u003E\u003Cp\u003EFirst, I'll let ChatGPT have its say: \u003Cem\u003EAI-driven plagiarism is a growing problem, as AI tools like Notion AI and ChatGPT can generate text that is difficult to distinguish from that written by humans. There are several ways to detect whether a piece of text was generated by an AI, such as looking for repetitive or unusual patterns, checking for a lack of originality, or using a plagiarism checker. Plagiarism checkers like Turnitin, PlagScan, and Copyleaks may be able to identify certain characteristics of language model-generated text, but they are not foolproof.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EEven the specialty tools I found were woefully unsuited to the task. There was some limited improvement over my tests in January. However, I certainly wouldn't feel comfortable threatening a student's academic standing or accusing them of cheating based on the results of these tools. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsurprise-ai-chatbots-dont-increase-student-cheating-afterall-new-research-finds\u002F\"\u003ESurprise! AI chatbots don't increase student cheating after all, research finds\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E \u003C\u002Fp\u003E\u003Cp\u003EAt this point, I don't think we're ready to let AI fight AI. Instead, we'll have to rely on human perception (which means folks have to pay attention) to identify works generated by an AI. \u003C\u002Fp\u003E\u003Cp\u003EDon't immediately assume that something is machine-generated. Just because something is stupid, or wildly inaccurate, doesn't mean it was not written by a human. As we all know, humans can write some bad stuff on their own. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcan-perplexity-pro-help-you-code-it-aced-my-programming-tests-thanks-to-gpt-4\u002F\"\u003ECan Perplexity Pro help you code? It aced my programming tests - thanks to GPT-4\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ESo, what do you think? Can you tell if a piece is AI-generated? Have you used these AI writing tools in the months since they suddenly became available? Do you think they're a help or hindrance to education and journalism? Let us know in the comments below. Here's how ChatGPT answered this:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAs a language model, I can't see or interact with physical pieces of writing, so I can't tell if a piece is AI-generated or not. However, I can tell you that there are several AI writing tools that are available, and they can be used to generate a wide range of written content, including news articles, fiction, poetry, and more.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EI don't have personal experience using these tools since I am just a computer program and don't have the ability to browse the internet or use physical tools. However, I can tell you that some people have found AI writing tools to be helpful in education and journalism, as they can save time and effort by automating certain tasks. Others have expressed concerns about the potential for these tools to be used to produce misleading or biased content or to replace human writers. Ultimately, whether AI writing tools are a help or hindrance depends on how they are used and the context in which they are used.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003ESo, yeah, there's that. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003EYou can follow my day-to-day project updates on social media. Be sure to subscribe to \u003Ca href=\"https:\u002F\u002Fadvancedgeekery.substack.com\u002F\"\u003Emy weekly update newsletter\u003C\u002Fa\u003E, and follow me on Twitter\u002FX at \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fdavidgewirtz\"\u003E@DavidGewirtz\u003C\u002Fa\u003E, on Facebook at \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fdavidgewirtz\"\u003EFacebook.com\u002FDavidGewirtz\u003C\u002Fa\u003E, on Instagram at \u003Ca href=\"https:\u002F\u002Fwww.instagram.com\u002FDavidGewirtz\u002F\"\u003EInstagram.com\u002FDavidGewirtz\u003C\u002Fa\u003E, and on YouTube at \u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FDavidGewirtzTV\"\u003EYouTube.com\u002FDavidGewirtzTV\u003C\u002Fa\u003E.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"c1c64b97-f918-4f5b-acae-43981f87d8e6\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fc1c64b97-f918-4f5b-acae-43981f87d8e6\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-08-08 14:50:00",timezone:"UTC",updated:c,published:c},description:"Three of the seven AI detectors I tested correctly identified AI-generated content 100% of the time. This is up from zero during my last round of tests.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"6255e7b1-7fe3-4692-8acb-f2d94517934d",image:{id:"b13e2c52-cdd7-466c-b65f-8503544f5e93",filename:"gettyimages-1478400170.jpg",dateCreated:{created:c,date:"2024-08-08 14:45:48",timezone:"UTC",updated:c,published:c},alt:"AI eye concept",credits:"filo\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F08\u002Fb13e2c52-cdd7-466c-b65f-8503544f5e93\u002Fgettyimages-1478400170.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2108,height:1423,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Artificial Intelligence",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"i-tested-7-ai-content-detectors-theyre-getting-dramatically-better-at-identifying-plagiarism",startYear:c,summary:b,title:"I tested 7 AI content detectors - they're getting dramatically better at identifying plagiarism",topic:{id:"3414bf30-82eb-4a6a-a561-f193482f1643",slug:"artificial-intelligence",name:"Artificial Intelligence",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"3414bf30-82eb-4a6a-a561-f193482f1643",slug:"artificial-intelligence",name:"Artificial Intelligence",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9d3e6108-0023-11e4-95d2-02911863765e",slug:"innovation",name:"Innovation",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6835195a-fcd2-43b2-918b-8f61bcdb9fd2",filename:"lance-31.png",dateCreated:{created:c,date:"2023-05-12 19:35:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F05\u002F12\u002F6835195a-fcd2-43b2-918b-8f61bcdb9fd2\u002Flance-31.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"59c1dea7-9d68-4bd4-9c3b-9fd6e95569d9\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Brooks Kraft LLC\u002FCorbis via Getty Images\" data-image-alt-text=\"NSA logo on rug\" data-image-filename=\"gettyimages-525591674.jpg\" data-image-date-created=\"2024\u002F10\u002F21\" data-image-width=\"4992\" data-image-height=\"3328\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYour pricey \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-phone\u002F\" target=\"_blank\"\u003Esmartphone\u003C\u002Fa\u003E can be hit by many security threats, from \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F#link={\" target=\"_blank\"\u003Ephishing\u003C\u002Fa\u003E to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F#link={\" target=\"_blank\"\u003Emalware\u003C\u002Fa\u003E to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-and-remove-spyware-from-your-phone\u002F#link={\" target=\"_blank\"\u003Espyware\u003C\u002Fa\u003E. All it takes is one successful attack to clobber your phone, compromise your data, and even steal your identity. So, how do you protect yourself?\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcash-app-users-have-less-than-a-month-to-claim-up-to-a-2500-settlement-payout\u002F\"\u003ECash App users have less than a month to claim up to a $2,500 settlement payout\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn a \u003Ca href=\"https:\u002F\u002Fs3.documentcloud.org\u002Fdocuments\u002F21018353\u002Fnsa-mobile-device-best-practices.pdf\"\u003EMobile Device Best Practices report\u003C\u002Fa\u003E, the National Security Agency (NSA) offers tips to thwart hackers and attackers from assaulting your mobile device. One method is as simple as turning your phone off and on.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"95f9c15b-bc63-4ed0-84fd-8d4f80058e60\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EClick the box in the upper right to enlarge.\u003C\u002Fp\u003E\" data-image-credit=\"National Security Agency\" data-image-alt-text=\"Additional mobile phone threats and advice\" data-image-filename=\"figure-1-the-nsa-advises-you-to-turn-your-phone-off-and-back-on-once-a-week-heres-why.jpg\" data-image-date-created=\"2024\u002F05\u002F31\" data-image-width=\"1261\" data-image-height=\"647\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\"\u003ESpearphishing attacks\u003C\u002Fa\u003E can target your phone to install malware, while \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-this-zero-click-iphone-attack-was-incredible-and-terrifying\u002F\"\u003Ezero-click exploits\u003C\u002Fa\u003E can infect your device without any interaction on your part. The NSA's advice? Power your phone off and then back on at least once a week. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-you-dont-need-to-pay-for-antivirus-software-anymore\u002F\"\u003EWhy you don't need to pay for antivirus software anymore\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis simple action can make it more difficult for hackers to steal information from your phone, though the agency cautions that this will not always prevent an attack.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"f7b4464f-1bec-4662-9092-75eebe3c07c2\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"National Security Agency\" data-image-alt-text=\"Additional mobile phone threats and advice\" data-image-filename=\"figure-2-the-nsa-advises-you-to-turn-your-phone-off-and-back-on-once-a-week-heres-why.jpg\" data-image-date-created=\"2024\u002F05\u002F31\" data-image-width=\"1248\" data-image-height=\"762\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"enabled\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe NSA cited several other threats that can impact your mobile device in its report. \u003C\u002Fp\u003E\u003Cp\u003EMalicious apps can infect your phone. Malicious Wi-Fi networks can intercept and redirect traffic from your device. Spyware can monitor the audio and video conversations on your phone. Hackers with remote access to your device can collect calling or texting data. Someone with physical access to your phone, even briefly, would, of course, be able to install malware or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-and-remove-spyware-from-your-phone\u002F#link={\" target=\"_blank\"\u003Espyware\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EThere are several ways to protect yourself. The NSA suggests:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EUpdate your apps. Be sure to update your apps and operating system with the latest security patches.\u003C\u002Fli\u003E\u003Cli\u003EUse official app stores. Install apps only from official stores, such as Apple's App Store or the Google Play Store.\u003C\u002Fli\u003E\u003Cli\u003EAvoid clicking on links or file attachments in emails and text messages, as those are common ways to trigger malware.\u003C\u002Fli\u003E\u003Cli\u003EWatch out for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-use-public-wi-fi-safely\u002F\" target=\"_blank\"\u003Epublic Wi-Fi networks\u003C\u002Fa\u003E and avoid joining them when possible. To add to the NSA's advice here, I recommend \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Eusing a VPN\u003C\u002Fa\u003E whenever you join a public network.\u003C\u002Fli\u003E\u003Cli\u003EDisable Bluetooth. Turn off Bluetooth when you're not using it to prevent an unauthorized device from connecting to your phone.\u003C\u002Fli\u003E\u003Cli\u003EUse a secure passcode. Create a strong passcode with at least six digits to lock and unlock your phone.\u003C\u002Fli\u003E\u003Cli\u003ELeverage biometrics. Enable your device's built-in facial or fingerprint scanning for greater security and convenience.\u003C\u002Fli\u003E\u003Cli\u003EUse trusted accessories. Use only original charging cords or charging accessories from a trusted manufacturer. Avoid public USB charging stations.\u003C\u002Fli\u003E\u003Cli\u003ETurn off location services when not needed.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBeyond adopting the NSA's suggestions, you can also turn to a dedicated app to help with your mobile security. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmake-your-iphone-super-secure-this-app-shows-you-how\u002F\"\u003EOne app worth installing is iVerify\u003C\u002Fa\u003E, a security scanner that will scour your device for malware and make sure you're using the basic security features on your \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\" target=\"_blank\"\u003EiPhone\u003C\u002Fa\u003E or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-android-phone\u002F\" target=\"_blank\"\u003EAndroid phone\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F7-password-rules-to-live-by-in-2024-according-to-security-experts\u002F\"\u003E7 password rules to live by in 2024, according to security experts\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\"Threats to mobile devices are more prevalent and increasing in scope and complexity,\" the NSA said in its report. \"Users of mobile devices desire to take full advantage of the features available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.\"\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThis article was originally published on May 31, 2024, and updated on October 21, 2024. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-10-21 15:01:00",timezone:"UTC",updated:c,published:c},description:"Turning off your phone regularly is one of the NSA's top cybersecurity recommendations. Here's why and what else to know.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"93d1cf5f-fce6-4567-9258-4af1397527e5",image:{id:"59c1dea7-9d68-4bd4-9c3b-9fd6e95569d9",filename:"gettyimages-525591674.jpg",dateCreated:{created:c,date:"2024-10-21 14:54:27",timezone:"UTC",updated:c,published:c},alt:"nsa-phone",credits:"NurPhoto\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F21\u002F59c1dea7-9d68-4bd4-9c3b-9fd6e95569d9\u002Fgettyimages-525591674.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4992,height:3328,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-you-should-power-off-your-phone-at-least-once-a-week-according-to-the-nsa",startYear:c,summary:b,title:"Why you should power off your phone at least once a week - according to the NSA",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1147b242-ec91-11e3-95d2-02911863765e",slug:"smartphones",name:"Smartphones",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EIt's May 5, the first Thursday in May, which means that it's World Password Day. The day was created by security researcher Mark Burnett to raise awareness of the importance of having secure passwords.\u003C\u002Fp\u003E\u003Cp\u003EWell, how secure are your passwords?\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere are a lot of hints and tips and tricks out there for creating and maintaining secure passwords. I'm pretty comfortable with tech and keeping my accounts secure, but I find most of these tips too complicated to follow. \u003C\u002Fp\u003E\u003Cp\u003EIt's better to keep things simple. \u003C\u002Fp\u003E\u003Cp\u003EAnd I'm going to simplify things for you.\u003C\u002Fp\u003E\u003Cp\u003EThis is the 21st century, and people don't need to create and remember their passwords.\u003C\u002Fp\u003E\u003Cp\u003EMy advice is simple -- use a password manager.\u003C\u002Fp\u003E\u003Cp\u003EWhat is a password manager? A password manager is an app, usually tied to an online service, that safely and securely stores your passwords. It's also used to securely distributes these passwords to all your devices, no matter whether you are on a desktop, laptop, tablet, or smartphone.\u003C\u002Fp\u003E\u003Cp\u003EGood password managers not only store your passwords and securely transfer them to your browser or apps as needed, but they can also help you generate strong passwords, and even search the internet for any of your passwords that might be leaked on the internet.\u003C\u002Fp\u003E\u003Cp\u003ESome password managers also allow you to secure your passwords with high-security features such as hardware authentication, making it almost impossible for hackers to get access to your data and informing you if you try to use duplicate passwords.\u003C\u002Fp\u003E\u003Cp\u003ESo, what are the best password managers?\u003C\u002Fp\u003E\u003Cp\u003EMy ZDNet colleague Ed Bott has a list of the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-password-manager\u002F\"\u003Ebest password managers\u003C\u002Fa\u003E, and it's a good list. Of the services there, \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"2e54e53b-0836-4a3d-8fb0-3b750898c3fd\" data-raw-url=\"https:\u002F\u002Fbitwarden.com\u002F\" data-link-shortcode-text=\"Bitwarden\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ad01cfb6-acf4-424c-8523-1050843a0a94\" data-raw-url=\"https:\u002F\u002F1password.com\u002F\" data-link-shortcode-text=\"1Password\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, and \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"dd7aae85-1082-478b-9d65-319ad4ea2f0b\" data-raw-url=\"https:\u002F\u002Fwww.lastpass.com\u002F\" data-link-shortcode-text=\"LastPass\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E are my top choices. They're fully featured, offer solid security, and encompass a broad range of platforms and operating systems.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a no-cost solution, the Bitwarden offers a free option, and even the paid option ($10 per year for a single user, $40 annually for a family of up to six users) is great.\u003C\u002Fp\u003E\u003Cp\u003EBut you might already have a password manager and not know about it. For example, if you use a Mac or iPhone, or iPad, then you can use Apple's Keychain password manager. The only downside here is that you have to be on an Apple device to access your passwords, but it's a superb solution for those in the Apple ecosystem.\u003C\u002Fp\u003E\u003Cp\u003EIf you use Google Chrome, then there's a password manager built right into that. The downside here is that it's quite basic, and you can only access your passwords from the browser.\u003C\u002Fp\u003E\u003Cp\u003EBoth these are great options. But they have their limitations.\u003C\u002Fp\u003E\u003Cp\u003ESo, my advice for World Password Day is that you make sure to use a password manager, not only to store your passwords but also to generate secure passwords when needed. \u003C\u002Fp\u003E\u003Cp\u003EAnd secure your password manager with a good, unique password.\u003C\u002Fp\u003E\u003Cp\u003EAlso, a bonus tip -- if your password manager tells you that you're using duplicate passwords on different websites, or that one of your passwords has been leaked in a company data breach, then pay attention to this and take the actions that your password manager recommends, because using duplicate passwords or passwords that have leaked into the wild is a surefire way to get your online accounts compromised.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-05-05 16:10:54",timezone:"UTC",updated:c,published:c},description:"This is really all you need to know.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"0bca37ca-67c3-4453-880c-82e2e12f1d3f",image:{id:"fcea35fd-2d24-4933-9460-3005f7028f3e",filename:"zd-lifetime-password-manager.jpg",dateCreated:{created:c,date:"2022-01-26 15:39:45",timezone:"UTC",updated:c,published:c},alt:"460630045.jpg",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F01\u002F26\u002Ffcea35fd-2d24-4933-9460-3005f7028f3e\u002Fzd-lifetime-password-manager.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1200,height:800,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"its-world-password-day-heres-the-one-simple-tip-you-need-to-keep-your-accounts-secure-online",startYear:c,summary:b,title:"It's World Password Day! Here's the one simple tip you need to keep your accounts secure online",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"7358f1a7-10d7-11e4-9732-00505685119a",username:"Forrester Research",profileUrl:c,email:c,firstName:"Forrester",lastName:"Research",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"da2ec7f9-15a3-4db7-8de4-133974ed5777",filename:"forrester-rgblogo.png",dateCreated:{created:c,date:"2016-09-15 20:35:45",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2016\u002F09\u002F15\u002Fda2ec7f9-15a3-4db7-8de4-133974ed5777\u002Fforrester-rgblogo.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Forrester (Nasdaq: FORR) is one of the most influential research and advisory firms in the world. We help leaders across technology, marketing, customer experience, product and sales functions use customer obsession to accelerate growth. Through Forrester's proprietary Research, Consulting, and Events, leaders from around the globe are empowered to be bold at work - to navigate change and put their customers at the center of their leadership, strategy, and operations. Our unique insights are grounded in annual surveys of more than 675,000 consumers, business leaders, and technology leaders worldwide; rigorous and objective research methodologies, including Forrester Wave™ evaluations; over 45 million real-time feedback votes; and the shared wisdom of our clients. To learn more, visit Forrester.com.",profile:c,title:b,bio:b,bureau:c,awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EPrivacy has become a priority for virtually every company regardless of size, vertical, and geography. Privacy regulations have popped up around the world, including Europe, the US, and China. \u003Ca href=\"https:\u002F\u002Fiapp.org\u002Fnews\u002Fa\u002Findias-data-privacy-bill-under-committee-review\u002F\" target=\"_blank\"\u003EIndia\u003C\u002Fa\u003E will \u003Ca href=\"https:\u002F\u002Fwww.natlawreview.com\u002Farticle\u002Findia-s-draft-data-protection-bill-moves-closer-to-passage\" target=\"_blank\"\u003Esoon\u003C\u002Fa\u003E be added to the list. Rising customers' and employees' privacy expectations are also converging to force businesses to prioritize privacy and will keep doing so in the future. Companies are responding by maturing their privacy programs, developing best practices, and sharpening their respective toolkits. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003ECompanies are investing in privacy \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61aa0134-e712-4a1f-9a9f-2180fd896f9c\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61aa0134-e712-4a1f-9a9f-2180fd896f9c\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAccording to Forrester survey data, most companies worldwide have adopted a formal privacy program and have a chief privacy officer (CPO) in place. Half of these CPOs report directly to the company's CEO. While privacy programs are primarily set up to deliver on compliance requirements, one of the key benefits companies report as a result of their program is increased customer trust. With the volume of individuals' privacy rights requests on the rise, new requirements being discussed, and emerging risks to tackle, privacy decision-makers expect to increase their privacy budgets in the next 12 months. \u003C\u002Fp\u003E\u003Cp\u003EThe appetite for adopting new technology is also rising. While most teams are still relying on spreadsheets to manage their programs, privacy teams are progressively investing in more sophisticated and automated technology to support their efforts. Encryption is one of the main technologies being implemented today. Privacy-preserving technologies, as well as software for privacy training, top the list of new tools privacy decision-makers are planning to adopt in the next future. \u003C\u002Fp\u003E\u003Cp\u003EThe reliance on automated technology helps privacy organizations perform better. However, to solve their most significant challenges, they need to think about processes, governance, and policies on top of technology. And they need to establish strategic collaboration with others in the organization. In fact, when asked about the biggest challenges to effectively protect the personal data of their customers and\u002For employees, most privacy decision-makers reported that the fear of worsening the experience of their customers and\u002For employees is their biggest challenge. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Feurope-privacy-predictions-2022\u002F\" target=\"_blank\"\u003EPrivacy predictions for Europe\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EEmployee privacy expectations are greater than most assume \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003ECompanies have learned that EX -- the employee experience -- directly influences the quality of their customer experience (CX). As such, they are prioritizing efforts to improve their EX. But employee privacy is still too often left out from the list of key EX -- and privacy -- initiatives. This is a mistake. \u003C\u002Fp\u003E\u003Cp\u003EHow companies treat their personal information has a significant impact on how employees feel about and trust their employers and on how they perform. Employees have strong privacy expectations at work. In fact, data from Forrester's new Privacy Segmentation shows that as many as 72% of employees globally do not want their personal data used as part of workforce analytics projects without their consent. Additionally, more than half wish they had more privacy protections in the workplace. About the same number take active measures to limit the amount of personal data they share with their employers. \u003C\u002Fp\u003E\u003Cp\u003ECompanies and their privacy leaders must learn how their employees feel about their personal data at work and develop privacy practices that meet these expectations. Those that understand employee privacy only as a compliance requirement should upgrade their existing practices to address employees' privacy attitudes beyond mere compliance. Compliance is the floor, not the ceiling. And those that have existing strong employee privacy practices in place must ensure that they continuously improve them to align with changing employee privacy expectations. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EOrganizations can help empower employees with privacy at home \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EEmployee privacy concerns and interests intersect with their personal lives. The lines start to blur between work and home as companies move to an anywhere work model and have a remote workforce. Companies will have a ceiling when it comes to applying cybersecurity controls that reach into the home. Employees have expectations of privacy; employers have liability concerns, and privacy and labor laws are non-negotiable. \u003C\u002Fp\u003E\u003Cp\u003ETo keep privacy top of mind and engage your workforce, you can be a resource for information to empower your employees to level up their personal privacy posture. For example, point to how a \u003Ca href=\"https:\u002F\u002Fwww.consumer.ftc.gov\u002Farticles\u002Fwhat-know-about-credit-freezes-and-fraud-alerts\" target=\"_blank\"\u003Ecredit freeze\u003C\u002Fa\u003E can help prevent identity theft. This can also include education about tools like VPNs and identity theft monitoring and protection services. You can also highlight privacy and anti-surveillance tools. For example, email and credit card masking tools like Abine and MySudo; secure messaging apps like Signal; and popup blockers and script blockers like Adblock, Ghostery, NoScript, and uBlock Origin. \u003C\u002Fp\u003E\u003Cp\u003EMany ISPs also offer home cybersecurity services today as well. These services are typically delivered via the home router and include capabilities like network and device security, Wi-Fi\u002Fnetwork management and optimization, parental controls, and privacy features. Concierge cybersecurity and privacy services like BlackCloak and Cypient Black will take a tailored approach to protect individuals (typically executives and VIPs) from targeted attacks aimed at their home environment. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsoftware-development-will-adapt-to-a-new-normal-in-2022\u002F\" target=\"_blank\"\u003ESoftware development will adapt to a new normal\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile technologies and services can help, privacy-minded behaviors and habits will have the most day-to-day impact. Forrester data shows that US online adults' common actions to protect their privacy include clearing Internet browsing history and adjusting permissions for specific apps. This is where an organization's efforts to update and invest in their privacy awareness training programs will help to empower employees the most. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThis post was written by Principal Analysts Enza Iannopollo and Heidi Shey, and it originally appeared \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Fwww.forrester.com\u002Fblogs\u002Fthe-future-of-work-employee-privacy\u002F?utm_source=zdnet&utm_medium=pr&utm_campaign=sr\" target=\"_blank\"\u003E\u003Cem\u003Ehere\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-01-28 15:45:00",timezone:"UTC",updated:c,published:c},description:"Rising customers' and employees' privacy expectations are also converging to force businesses to prioritize privacy and will keep doing so in the future.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"07c48c74-d71c-4f50-a260-6d9ef8d2fe63",image:{id:"59b26ba5-08b3-48e4-a94c-bd8410804458",filename:"sf-data-privacy-thumb.jpg",dateCreated:{created:c,date:"2020-07-22 16:00:34",timezone:"UTC",updated:c,published:c},alt:"Cybersecurity and data privacy protection concept, lock, binary digits background",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003ECyber security and data privacy protection concept with icon of a shield and lock over binary digits background\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2020\u002F07\u002F22\u002F59b26ba5-08b3-48e4-a94c-bd8410804458\u002Fsf-data-privacy-thumb.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:770,height:578,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"the-future-of-work-employee-privacy",startYear:c,summary:b,title:"The future of work: Employee privacy",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"video\" data-uuid=\"afb2408d-c8ad-482e-9499-29e6632f0e1a\" data-size=\"large\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EUkraine has created what is describes as an \"IT army\" to defend against Russian hackers and to launch counter operations against cyber threats.\u003C\u002Fp\u003E\u003Cp\u003ERussia's invasion of Ukraine has been accompanied by cyberattacks targeting the country's services and infrastructure, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fukrainian-govt-sites-banks-disrupted-by-ddos-amid-invasion-fears\u002F\"\u003Eincluding DDoS attacks and destructive wiper malware campaigns\u003C\u002Fa\u003E – leading to the Ukrainian government calling for volunteers to aid with cybersecurity. But it has also asked for support in conducting offensive cyber operations back at Russia.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"900d5ad4-9774-4f52-b0ff-712023f8e4d7\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F900d5ad4-9774-4f52-b0ff-712023f8e4d7\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"We are creating an IT army,\" Mykhailo Fedorov, vice prime minister of Ukraine \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002FFedorovMykhailo\u002Fstatus\u002F1497642156076511233\"\u003Esaid in a tweet\u003C\u002Fa\u003E at the weekend. \"There will be tasks for everyone. We continue to fight on the cyber front. The first task is on the channel for cyber specialists,\" he added, alongside a Telegram link to join the 'IT Army of Ukraine', which now has tens of thousands of subscribers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fcybersecurity-lets-get-tactical\u002F#link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fcybersecurity-lets-get-tactical\u002F%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%23link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fcybersecurity-lets-get-tactical\u002F%23link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fcybersecurity-lets-get-tactical\u002F%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003ECybersecurity: Let's get tactical\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E (ZDNet special report)\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn addition to helping to protect Ukrainian critical infrastructure and services from attacks, supporters were provided with a list of websites of 31 Russian targets. \u003C\u002Fp\u003E\u003Cp\u003EThey include organisations in both the state-backed and private sectors, including government agencies, banks, critical infrastructure and energy providers, including Gazprom and Lukoil, as well Russian email provider and search engine, Yandex. The list of targets is also being circulated in some underground forums.\u003C\u002Fp\u003E\u003Cp\u003EThis IT army is just one of the online efforts taking place during the conflict; hacktivist collective Anonymous has said it is taking action in support of Ukraine and against Russia, while Russia-based cyber-criminal groups have also indicated that they'll take offensive action in support of Vladimir Putin's invasion.\u003C\u002Fp\u003E\u003Cp\u003EThis includes the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fanonymous-hacktivists-ransomware-groups-get-involved-in-ukraine-russia-conflict\u002F\"\u003Eransomware group Conti, which announced\u003C\u002Fa\u003E \"full support of Russian government\" and the intention to \"strike back at the critical infrastructure of an enemy\" in response to cyberattacks against Russia. A later statement by Conti claimed it doesn't support any government, but it will strike back against the West and \"American cyber aggression\". Conti has since seen many of its internal documents leaked in what appears to be another act of retaliation. Meanwhile, the BBC has also reported how Russian hackers – without direct orders from the state – are also attempting to hack Ukrainian websites and services.\u003C\u002Fp\u003E\u003Cp\u003EAccording to analysis by Check Point, there's a 196% increase in \u003Ca href=\"https:\u002F\u002Fblog.checkpoint.com\u002F2022\u002F02\u002F27\u002Fhow-the-eastern-europe-conflict-polarized-cyberspace\u002F\"\u003Ecyberattacks targeting \u003C\u002Fa\u003E\u003Ca href=\"https:\u002F\u002Fblog.checkpoint.com\u002F2022\u002F02\u002F27\u002Fhow-the-eastern-europe-conflict-polarized-cyberspace\u002F\"\u003EUkraine's government and military\u003C\u002Fa\u003E since Russia sent troops in last week. It's likely that cyberattacks will continue in both directions, particularly as more and more people join Ukraine's cyber army.\u003C\u002Fp\u003E\u003Cp\u003E\"We're now witnessing a concentrated attack to take down major websites and services in Russia and other surrounding countries, much like a community-driven effort. They have to deal with waves of DDoS attacks that are likely to worsen as time goes by,\" says Silviu Stahie, a security analyst at Bitdefender.\u003C\u002Fp\u003E\u003Cp\u003EIt's much too early to understand the impact of any of these developments. Something on the scale of Ukraine's IT army has never been tried before, so it's hard to know what kind of impact it will have, although it may play an important part simply in rallying support in broader terms. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"5eb465ed-9683-4fb3-94e4-66688d1a456b\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F5eb465ed-9683-4fb3-94e4-66688d1a456b\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere's also the concern that civilians launching their own hacking attempts could have unexpected consequences. And the rise of offensive cyberattacks carried out by civilians raises a whole host of new questions – particularly as, in many countries, engaging in hacking is illegal.\u003C\u002Fp\u003E\u003Cp\u003E\"Conducting or participating in cyberattacks, even in what could be considered a noble effort to support Ukraine against the Russian aggression and invasion, could be subject to how different countries interpret hacking laws,\" says Jens Monrad, head of threat intelligence, EMEA, at Mandiant.\u003C\u002Fp\u003E\u003Cp\u003E\"Another risk associated with this operation is how well each individual can protect themselves and how Russia might perceive it if they identify a foreign person suddenly hacking Russian targets,\" says Monrad.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EA%20winning%20strategy%20for%20cybersecurity%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003EA winning strategy for cybersecurity\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E (ZDNet special report)\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThere's also the risk that cyberattacks, intentionally or not, could cause disruption outside Ukraine and Russia. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-to-boost-you-cybersecurity-here-are-ten-steps-you-can-take-to-improve-your-defenses-now\u002F\"\u003EAs \u003C\u002Fa\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-to-boost-you-cybersecurity-here-are-ten-steps-you-can-take-to-improve-your-defenses-now\u002F\"\u003EUK National Cyber Security Centre (NCSC) CEO Lindy Cameron commented\u003C\u002Fa\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-to-boost-you-cybersecurity-here-are-ten-steps-you-can-take-to-improve-your-defenses-now\u002F\"\u003Erecently\u003C\u002Fa\u003E: \"Cyberattacks do not respect geographic boundaries\". International consensus \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Frussian-military-behind-notpetya-attacks-uk-officially-names-and-shames-kremlin\u002F\"\u003Ealso suggests the Russian military\u003C\u002Fa\u003E was behind the widespread and disruptive \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-the-key-lesson-maersk-learned-from-battling-the-notpetya-attack\u002F\"\u003ENotPetya malware attack\u003C\u002Fa\u003E of June 2017. The malware attack was designed to disrupt financial, energy and government sectors in Ukraine, but the malware spread to organisations around the world, costing an estimated \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-warning-a-global-attack-could-cause-200bn-in-damage-and-were-just-not-ready\u002F\"\u003Ebillions of dollars in damages\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\"As a combat veteran, I'm in total awe of the courage of the Ukrainian people. While there are no specific threats to the US, we must be prepared for spillover effects of Russian cyber ops or an uptick in ransomware,\" Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002FCISAJen\u002Fstatus\u002F1497972766443769857\"\u003Esaid on Twitter.\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ECISA, along with the UK's NCSC, are among those cybersecurity agencies that have published advice on defending against cyber threats. In this environment, organisations around the world would be wise to examine their cybersecurity defences – because what comes next could be unpredictable. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EMORE ON CYBERSECURITY\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fukraine-crisis-russian-cyberattacks-could-affect-organisations-around-the-world-so-take-action-now\u002F\"\u003E\u003Cstrong\u003EUkraine crisis: Russian cyberattacks could affect organisations around the world, so take action now\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-to-boost-you-cybersecurity-here-are-ten-steps-you-can-take-to-improve-your-defenses-now\u002F\"\u003E\u003Cstrong\u003EWant to boost your cybersecurity? Here are 10 steps to improve your defences now\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fukraine-security-agency-warns-of-ghostwriter-threat-group-activity-phishing-campaigns\u002F\"\u003E\u003Cstrong\u003EUkraine security agencies warn of Ghostwriter threat activity, phishing campaigns\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsecurity-warning-hackers-are-using-this-new-malware-to-target-firewall-appliances\u002F\"\u003E\u003Cstrong\u003ESecurity warning: Hackers are using this new malware to target firewall appliances\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fuk-security-centre-urges-companies-to-boost-their-defences-after-cyberattacks-on-ukraine\u002F\"\u003E\u003Cstrong\u003EUK security centre urges companies to boost their defences after cyberattacks on Ukraine\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-03-01 12:50:00",timezone:"UTC",updated:c,published:c},description:"Russia's invasion of Ukraine has been accompanied by cyberattacks and now Ukraine is recruiting volunteers to defend networks - and hack back.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"0aa4b382-19cb-41e1-91e9-ba3a4c4ccb15",image:{id:"6604d540-9eb0-41c2-9f00-6fbf24d996f7",filename:"hacker-hands-on-a-keyboard.jpg",dateCreated:{created:c,date:"2021-01-08 11:51:34",timezone:"UTC",updated:c,published:c},alt:"close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003EClose up of hands typing on a keyboard\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F01\u002F08\u002F6604d540-9eb0-41c2-9f00-6fbf24d996f7\u002Fhacker-hands-on-a-keyboard.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"ukraine-is-building-an-it-army-of-volunteers-something-thats-never-been-tried-before",startYear:c,summary:b,title:"Ukraine is building an 'IT army' of volunteers, something that's never been tried before",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"752c47eb-6324-4d5a-9d19-9eba1037b1cc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Getty\u002FShannon Fagan\" data-image-alt-text=\"a-man-looking-at-a-laptop-in-the-office-at-night\" data-image-filename=\"a-man-looking-at-a-laptop-in-the-office-at-night.jpg\" data-image-date-created=\"2022\u002F07\u002F21\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYou're asked about the biggest cybersecurity threats faced by business – which ones spring to mind first?\u003C\u002Fp\u003E\u003Cp\u003EMaybe it's relentless \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\u002F\" target=\"_blank\"\u003Eransomware\u003C\u002Fa\u003E attacks, with cyber criminals encrypting networks and demanding vast sums for a decryption key – even from hospitals. Or maybe it's a sneaky \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F\" target=\"_blank\"\u003Emalware attack\u003C\u002Fa\u003E, which lets hackers hide inside the network for months on end, stealing everything from usernames and passwords to bank details. \u003C\u002Fp\u003E\u003Cp\u003EBoth of these are on the list, for sure. These are awful attacks to experience and can cause terrible damage. But there's another much simpler form of cyber crime that makes scammers the most money by far – and doesn't get much attention.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe scale of business email compromise (BEC) attacks is clear: according to the FBI, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-email-fraud-keeps-getting-worse-heres-how-to-protect-yourself\u002F\" target=\"_blank\"\u003Ethe combined total lost to BEC attacks is $43 billion and counting\u003C\u002Fa\u003E, with attacks reported in at least 177 countries. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-next-big-security-threat-is-staring-us-in-the-face-tackling-it-is-going-to-be-tough\u002F\"\u003E\u003Cstrong\u003EThe next big security threat is staring us in the face. Tackling it is going to be tough\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhat makes BEC such a rich opportunity for scammers is there's rarely a need to be a highly skilled hacker. All someone really needs is a laptop, an internet connection, a bit of patience – and some nefarious intent.\u003C\u002Fp\u003E\u003Cp\u003EAt the most basic level, all scammers need to do is find out who the boss of a company is and set up a spoofed, fake email address. From here, they send a request to an employee saying they need a financial transaction to be carried out quickly – and quietly.\u003C\u002Fp\u003E\u003Cp\u003EIt's a very basic \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Faverage-organization-targeted-by-over-700-social-engineering-attacks-each-year-report\u002F\" target=\"_blank\"\u003Esocial-engineering attack\u003C\u002Fa\u003E, but often, it works. An employee keen to do as their boss demands could be quick to approve the transfer, which could be tens of thousands of dollars or more – particularly if they think they'll be chastised for delaying an important transaction.\u003C\u002Fp\u003E\u003Cp\u003EIn more advanced cases, the attackers will break into the email of a colleague, your boss or a client and use their actual email address to request a transfer. Not only are staff more inclined to believe \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwatch-out-for-this-phishing-attack-that-hijacks-your-email-chats-to-spread-malware\u002F\" target=\"_blank\"\u003Esomething that really does come from the account of someone they know\u003C\u002Fa\u003E, scammers can watch inboxes, wait for a real financial transaction to be requested, then send an email from the hacked account that contains their own bank details. \u003C\u002Fp\u003E\u003Cp\u003EBy the time the victim realises something is wrong, the scammers have made off with the money and are long gone. \u003C\u002Fp\u003E\u003Cp\u003EWhat's most challenging about BEC attacks is that while it's a cyber crime that is based around abusing technology, there's actually very little that technology or software can do to help stop attacks because it's fundamentally a human issue. \u003C\u002Fp\u003E\u003Cp\u003EAnti-virus software and a good email spam filter can prevent emails containing malicious links or malware from arriving in your inbox. But if a legitimate hacked account is being used to send out requests to victims using messages in emails, that's a problem – because as far as the software is concerned, there's nothing nefarious to detect, and it's just another email from your boss or your colleague. \u003C\u002Fp\u003E\u003Cp\u003EAnd the money isn't stolen by clicking a link or using malware to drain an account – it's transferred by the victim to an account they've been told is legitimate. No wonder it's so hard for people to realise they're making a mistake. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbrazen-crooks-are-now-posing-as-cybersecurity-companies-to-trick-you-into-installing-malware\u002F\"\u003E\u003Cstrong\u003EBrazen crooks are now posing as cybersecurity companies to trick you into installing malware\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut victim blaming isn't the answer and isn't going to help – if anything, it will make the problem worse. \u003C\u002Fp\u003E\u003Cp\u003EWhat's important in the battle against BEC attacks is ensuring that people understand what these attacks are and to have processes in place that can prevent money being transferred. \u003C\u002Fp\u003E\u003Cp\u003EIt should be explained that it's very unlikely that your boss will email you out of the blue asking for a very urgent transfer to be made with no questions asked. And if you do have concerns, ask a colleague – or even talk to your boss to ask if the request is legitimate or not. It might seem counterintuitive, but it's better to be safe than sorry. \u003C\u002Fp\u003E\u003Cp\u003EBusinesses should also have procedures in place around financial transactions, particularly large ones. Should a single employee be able to authorise a business transaction valued at tens of thousands of dollars? Probably not. \u003C\u002Fp\u003E\u003Cp\u003EBusinesses should ensure multiple people have to approve the process – yes, it might mean transferring finances takes a little longer, but it will help ensure that money isn't being sent to scammers and cyber criminals. That business deal can wait a few more minutes. \u003C\u002Fp\u003E\u003Cp\u003ETechnology can help to a certain extent, but the reality is these attacks exploit human nature. \u003C\u002Fp\u003E\u003Ch3\u003EZDNET'S MONDAY OPENER \u003C\u002Fh3\u003E\u003Cp\u003E\u003Cem\u003EZDNet's Monday Opener is our opening take on the week in tech, written by members of our editorial team. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch3\u003EPREVIOUSLY ON ZDNET'S MONDAY OPENER : \u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-next-big-security-threat-is-staring-us-in-the-face-tackling-it-is-going-to-be-tough\u002F\" target=\"_blank\"\u003EThe next big security threat is staring us in the face. Tackling it is going to be tough\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fprofessional-development\u002Flove-it-or-loath-it-gen-zers-are-driving-the-push-to-work-in-the-office\u002F\"\u003ELove it or loathe it, Gen Zers are driving the push to work in the office\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fprofessional-development\u002Fremote-work-or-hybrid-why-employers-have-changed-their-minds\u002F\"\u003ERemote work or in the office? Why the tide could turn again\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-four-day-week-will-solve-some-works-biggest-problems-but-only-if-companies-can-adapt\u002F\"\u003EThe four-day week will solve some of work's biggest problems - but only if companies can adapt\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-work-or-back-to-the-office-the-calculation-just-shifted-again\u002F\"\u003ERemote work or back to the office? The calculation just shifted again\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhen-it-comes-to-paying-remote-workers-some-companies-are-still-getting-it-wrong\u002F\"\u003EWhen it comes to paying remote workers, some companies are still getting it wrong\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmusks-twitter-goal-of-authenticating-all-users-is-good-for-ending-bots-but-bad-for-humans\u002F\"\u003EMusk's Twitter goal of authenticating all users is good for ending bots but bad for humans\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-work-or-back-to-the-office-the-government-just-picked-the-wrong-side-of-this-argument\u002F\"\u003ERemote work or back to the office? The government just picked the wrong side of this argument\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-24 22:00:00",timezone:"UTC",updated:c,published:c},description:"One type of cyber threat is costing us all billions, and it's all to do with manipulating people rather than machines.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"00a89cc9-3658-4ea8-ad86-a3f16a6bcbe8",image:{id:"752c47eb-6324-4d5a-9d19-9eba1037b1cc",filename:"a-man-looking-at-a-laptop-in-the-office-at-night.jpg",dateCreated:{created:c,date:"2022-07-21 14:21:31",timezone:"UTC",updated:c,published:c},alt:"a-man-looking-at-a-laptop-in-the-office-at-night",credits:"Image: Getty\u002FShannon Fagan",caption:"\u003Cp\u003EA man looking at a laptop in the office at night.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F07\u002F21\u002F752c47eb-6324-4d5a-9d19-9eba1037b1cc\u002Fa-man-looking-at-a-laptop-in-the-office-at-night.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"your-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology",startYear:c,summary:b,title:"Your biggest cyber-crime threat has almost nothing to do with technology",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"371a7418-10d6-11e4-9732-00505685119a",username:"sjvn",profileUrl:c,email:c,firstName:"Steven",lastName:"Vaughan-Nichols",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e2171bd1-84f6-4ca8-9801-2abdeb61a365",filename:"steven-vaughan-nichols.jpg",dateCreated:{created:c,date:"2022-08-05 18:47:37",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe2171bd1-84f6-4ca8-9801-2abdeb61a365\u002Fsteven-vaughan-nichols.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Steven J. Vaughan-Nichols is a freelance writer and technology analyst. Besides ZDNET, he works with Foundry (Formerly IDG Communications), The Register, The New Stack, and Cathey Communications. He does not own stocks or other investments in any technology company.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ESoftware Bill of Materials (SBOM)s aren't optional anymore. If we really want the applications we're running in containers to be secure, we must know what's what within them. To make that easier, \u003Ca href=\"https:\u002F\u002Fcodenotary.com\u002F\" target=\"_blank\"\u003ECodenotary\u003C\u002Fa\u003E, a leading software supply chain security company, is launching its new \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fckotzbauer\u002Fsbom-operator\"\u003ESBOM Operator\u003C\u002Fa\u003E for Kubernetes in both its open-source \u003Ca href=\"https:\u002F\u002Fcas.codenotary.com\u002F\" target=\"_blank\"\u003ECommunity Attestation Service\u003C\u002Fa\u003E and its flagship service, Codenotary's \u003Ca href=\"https:\u002F\u002Fcodenotary.com\u002Fproducts\u002Fci-cd\u002F\" target=\"_blank\"\u003ETrustcenter\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"cd27c170-17d5-4ac8-be4e-f83e52a86f69\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fcd27c170-17d5-4ac8-be4e-f83e52a86f69\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAn SBOM (pronounced S-Bomb) is a record containing the details and supply chain relationships of the components used in building software. Since most programs today are made by assembling existing open-source and commercial software components, it's essential to know the name and specific versions of all these elements. For instance, a program using Apache Log4j2 versions 2.17.0 is vulnerable to \u003Ca href=\"https:\u002F\u002Fthenewstack.io\u002Flog4shell-we-are-in-so-much-trouble\u002F\" target=\"_blank\"\u003ELog4Shell attacks\u003C\u002Fa\u003E. One using \u003Ca href=\"https:\u002F\u002Flogging.apache.org\u002Flog4j\u002F2.x\u002Fsecurity.html\" target=\"_blank\"\u003ELog4j2 2.17.1 or newer is as safe as houses\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003ENow, you could check for that and thousands of other potential vulnerabilities by hand, or you could turn to a service like Codenotary's new offering. I know which one I'd pick. \u003C\u002Fp\u003E\u003Cp\u003EThe SBOM Operator for Kubernetes mitigates the risk of software supply chain attacks by tracking all software and software dependencies running in Kubernetes. It does this by generating SBOMs of your running container images and maintaining up-to-date records of all builds, and dependencies. SBOM Operator builds its SBOMs using its own SBOM generator. When a new vulnerability shows up -- and trust me, one will -- this lets you know that it's time to make a fix when dangerous or vulnerable artifacts are detected.\u003C\u002Fp\u003E\u003Cp\u003ETo make this keep working properly, Codenotary continuously updates its SBOM records, This data is kept in its open-source speedy, immutable database, \u003Ca href=\"https:\u002F\u002Fcodenotary.com\u002Ftechnologies\u002Fimmudb\u002F\" target=\"_blank\"\u003EImmudb\u003C\u002Fa\u003E. This is a zero-trust tamper-proof, auditable database. The container image files are kept in a Git repository.\u003C\u002Fp\u003E\u003Cp\u003ECodenotary claims this information is instantly available for search. With it, you can locate the software artifacts in your code in seconds. The program also keeps a history of verified image content changes.\u003C\u002Fp\u003E\u003Cp\u003E\"By itself, the SBOM is not very useful without continuously being updated and maintained as the information is deprecated with every new deployment or update,\" said Dennis Zimmer, Codenotary's co-founder and CTO. \"Now, users know exactly what is running in containers, with the most recent information, so they have the ability to immediately remediate something if necessary.\"\u003C\u002Fp\u003E\u003Cp\u003ESBOM Operator's chief programmer, Christian Kotzbauer, said, \"I am pleased to contribute to the wider adoption and use of SBOMs with the Codenotary integration in my Kubernetes operator, especially the additional security, timestamp, and search capabilities across the infrastructure were key to developing the extension. \u003C\u002Fp\u003E\u003Cp\u003EThis is another step forward in Codenotary's efforts to provide comprehensive tools for cataloging and securing the software development lifecycle. Its programs and services, both free and paid, deserve Kubernetes developers' attention.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERelated Stories:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-alpha-and-omega-of-software-supply-chain-security\u002F\"\u003EThe Alpha and Omega of software supply chain security\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsecuring-the-open-source-ecosystem-sboms-are-no-longer-optional\u002F\"\u003ESecuring the open-source ecosystem: SBOMs are no longer optional\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcodenotary-open-source-notarization-service-for-software-bill-of-material-arrives\u002F\"\u003ECodenotary: Notarize and verify your software bill of materials\u003C\u002Fa\u003E\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-28 13:46:00",timezone:"UTC",updated:c,published:c},description:"Codenotary's new service enables you to monitor what's running in your Kubernetes-managed container clusters -- vital knowledge for security.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"07109d62-1ad9-49d6-ac3e-8d5526786622",image:{id:"0e12b766-4bc9-4d43-b610-e80b107ac54e",filename:"kubernetes-class.jpg",dateCreated:{created:c,date:"2017-07-12 18:47:31",timezone:"UTC",updated:c,published:c},alt:"Christian Kotzbauer",credits:"Christian Kotzbauer",caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2017\u002F07\u002F12\u002F0e12b766-4bc9-4d43-b610-e80b107ac54e\u002Fkubernetes-class.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:770,height:526,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Business^Enterprise Software",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"codenotary-introduces-software-bill-of-materials-service-for-kubernetes",startYear:c,summary:b,title:"Codenotary introduces Software Bill of Materials service for Kubernetes",topic:{id:"1048432a-ec91-11e3-95d2-02911863765e",slug:"enterprise-software",name:"Enterprise Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"1048432a-ec91-11e3-95d2-02911863765e",slug:"enterprise-software",name:"Enterprise Software",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"101518dd-ec91-11e3-95d2-02911863765e",slug:"cloud",name:"Cloud",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"10b2a4fa-ec91-11e3-95d2-02911863765e",slug:"linux",name:"Linux",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"10f422bf-ec91-11e3-95d2-02911863765e",slug:"open-source",name:"Open Source",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"11d72d67-ec91-11e3-95d2-02911863765e",slug:"virtualization",name:"Virtualization",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"5d68ddc2-d682-11e4-9a74-d4ae52e95e57",slug:"developer",name:"Developer",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"9a23272b-10d6-11e4-9732-00505685119a",username:"David Gewirtz",profileUrl:c,email:c,firstName:"David",lastName:"Gewirtz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"de4475ef-be59-4858-beb8-6f7696c85945",filename:"david-gewirtz.jpg",dateCreated:{created:c,date:"2022-08-05 15:19:52",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fde4475ef-be59-4858-beb8-6f7696c85945\u002Fdavid-gewirtz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"In addition to hosting the ZDNET Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.\r\n\r\nDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"df3f4ea4-96cf-4f2f-913b-d4f2c945d4ca\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EEugene Krupnov: "A day after we left, an enemy rocket hit a high-rise building not far from our home in Kyiv."\u003C\u002Fp\u003E\" data-image-credit=\"Image: Eugene Krupnov\" data-image-alt-text=\"image4.jpg\" data-image-filename=\"image4.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1999\" data-image-height=\"824\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"Our daughter kept asking if we would die.\" \u003C\u002Fp\u003E\u003Cp\u003EEugene Krupnov, developer of the popular Mac application \u003Ca href=\"https:\u002F\u002Funclutterapp.com\u002F\"\u003EUnclutter\u003C\u002Fa\u003E, found himself answering his eight-year-old daughter with a bit of pop-culture gallows humor. \"Not today, we joked, quoting Arya from \u003Cem\u003EGame of Thrones\u003C\u002Fem\u003E.\" \u003C\u002Fp\u003E\u003Cp\u003EOn February 24, Krupnov and his family evacuated from Kyiv. \"As we were fleeing the city, we heard how the shelling escalated, we saw unthinkable traffic across the highways and endless lines at every gas station. It was night time. And it seemed like an apocalypse.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pullquote\" data-alignment=\"right\" data-quote=\""The first days we had more confusion, panic and anxiety. Now you almost get used to things, and just have to care less. I try to consume less news, as it often brings stress and sadness." \" data-author=\"Unclutter's Bohdan Toporivsky \"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EKrupnov told ZDNet, \"A day after we left, an enemy rocket hit a high-rise building not far from our home in Kyiv.\" \u003C\u002Fp\u003E\u003Cp\u003EUkraine has a very large tech sector. \u003Ca href=\"https:\u002F\u002Fwww.bloomberg.com\u002Fnews\u002Farticles\u002F2022-03-01\u002Fukraine-outsourcing-is-a-major-part-of-global-tech-supply-chain\" target=\"_blank\"\u003EAccording to Bloomberg\u003C\u002Fa\u003E, the country boasts a quarter of a million tech professionals, many of whom provide coding services to major players like Apple, Google, Lyft, Ubisoft, Daimler, BMW, Citi, and JPMorgan, among many others. According to the trade group IT Ukraine Association, as \u003Ca href=\"https:\u002F\u002Fwww.wsj.com\u002Farticles\u002Fukraines-booming-tech-outsourcing-sector-at-risk-after-russian-invasion-11645749755\" target=\"_blank\"\u003Ereported in the Wall Street Journal\u003C\u002Fa\u003E, IT export volume, \"increased 36% to $6.8 billion last year, up from $5 billion in 2020 and $4.2 billion in 2019.\" According to Ukrainian developer outsource firm \u003Ca href=\"https:\u002F\u002Fwww.daxx.com\u002Fblog\u002Foutsourcing-ukraine\u002Fwhy-ukraine-best-it-outsourcing-destination\" target=\"_blank\"\u003EDaxx\u003C\u002Fa\u003E, via research from SkillValue, Ukraine's developers rank 5th worldwide in terms of overall competence. There are also thousands of entrepreneurial companies building their own software products. We spoke to eight of them this week. \u003C\u002Fp\u003E\u003Cp\u003ETanya Vert is a PR specialist at \u003Ca href=\"https:\u002F\u002Fwww.belightsoft.com\u002F\"\u003EBeLight Software\u003C\u002Fa\u003E. I've spoken to her over the years, particularly when I reviewed \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcool-tool-live-home-3d-can-bring-your-workspace-and-personal-spaces-to-life\u002F\"\u003ELive Home 3D\u003C\u002Fa\u003E. The idea for this article occurred to me when I was using Live Home 3D last week to rearrange my home workshop. Here I was using a product to rearrange my home, when the developers were losing theirs. The BeLight team is spread across Ukraine now, with half of the team staying in Odesa. \u003C\u002Fp\u003E\u003Cp\u003EWhen I checked in with Vert, she told me, \"There are air raid alarms several times a day, explosions are heard all the time. People spend several hours every day in shelters. There is no subway in Odesa, so underground parking lots, basements and corridors inside buildings serve as shelters. Every night, we enjoy missiles, drones and air defense performance in the sky over the sea.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"909eadd4-0a6b-4dd3-9979-475e1bc4e9b6\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EHeadway startup team in the first days of the war.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Headway startup\" data-image-alt-text=\"headway.jpg\" data-image-filename=\"headway.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1741\" data-image-height=\"1696\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBohdan Toporivsky is SEO and Content Manager, also at Unclutter. He shared what he calls \"our life these days\" with me. \"The first days we had more confusion, panic and anxiety. Now you almost get used to things, and just have to care less. I try to consume less news, as it often brings stress and sadness.\" \u003C\u002Fp\u003E\u003Cp\u003EIn his email, he told me, \"We are happy to have enough food and clothes – too many Ukrainians don't have that luxury. Most of my other friends I text with are holding up relatively well too. It's rather hard to sleep, air raid alert wakes us up once or twice a night (more during the day) and we go to the basement a.k.a. bomb shelter.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"85876c5f-d9fc-4c69-aab3-c6e25a3353bd\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EBohdan Toporivsky: "It's rather hard to sleep, air raid alert wakes us up once or twice a night (more during the day) and we go to the basement a.k.a. bomb shelter."\u003C\u002Fp\u003E\" data-image-credit=\"Image: Bohdan Toporivsky\" data-image-alt-text=\"image4a.jpg\" data-image-filename=\"image4a.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1280\" data-image-height=\"960\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ERight now, he's living in a refugee\u002Fguest house of a local church. \"We settled there,\" he said, \"not knowing for how long. It's been almost a month now.\" \u003C\u002Fp\u003E\u003Cp\u003EIn the past week, I've spoken to eight companies either based in Ukraine or with large teams who work there. Amidst the horror of war, there were two themes that became apparent during our conversations: their efforts to maintain business continuity, and the Ukrainian spirit of their team members. \u003C\u002Fp\u003E\u003Ch2\u003E Business continuity and data security \u003C\u002Fh2\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fskylum.com\u002Fluminar\"\u003ESkylum\u003C\u002Fa\u003E is a company known for its \u003Ca href=\"https:\u002F\u002Fskylum.com\u002Fluminar\"\u003ELuminar\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fskylum.com\u002Faurorahdr\"\u003EAurora HDR\u003C\u002Fa\u003E photo editing products. Many in the Mac community know them by their original name, MacPhun. According to \u003Ca href=\"https:\u002F\u002Fskylum.com\u002Fblog\u002Fhow-the-war-in-ukraine-affects-skylums-operations-\"\u003Ea post\u003C\u002Fa\u003E by CEO Ivan Kutanin, his team of 130 is currently scattered across Ukraine and the world. \u003C\u002Fp\u003E\u003Cp\u003EDespite all the pressures he and his company are facing, one of the most important messages he wants his customers to hear is one of reassurance, \"Rest assured that we securely host all of our infrastructure and user data on Amazon Web Services. All servers for this cloud service are located in the European Union and are not in Ukraine, so you can be confident that your data is securely stored.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"a289b23e-0529-4b87-9719-299199d79ab2\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EImage: Anna Ustynova\u003C\u002Fp\u003E\" data-image-alt-text=\"headway2.jpg\" data-image-filename=\"headway2.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1729\" data-image-height=\"1132\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe CEO of a software company is doing his best to reassure his customers about their security, while his own team is working out of \"bomb shelters, on the road, or in the homes of relatives and friends in safer locations.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fmacpaw.com\u002F\"\u003EMacPaw\u003C\u002Fa\u003E is another company very familiar to Mac users. They make \u003Ca href=\"https:\u002F\u002Fmacpaw.com\u002Fcleanmymac\"\u003ECleanMyMac X\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fmacpaw.com\u002Fgemini-photos\"\u003EGemini\u003C\u002Fa\u003E \u003Ca href=\"https:\u002F\u002Fmacpaw.com\u002Fgemini-photos\"\u003EPhotos\u003C\u002Fa\u003E, and the \u003Ca href=\"https:\u002F\u002Fmacpaw.com\u002Fsetapp\"\u003ESetapp Mac software subscription service\u003C\u002Fa\u003E. In a letter to ZDNet, Oleksandr Kosovan, MacPaw's CEO and founder told us, \"MacPaw is a company from Ukraine and operates primarily in Kyiv. Part of our team decided to stay in Ukraine to defend our country and help people in need. Some team members moved abroad to safer places with their families and kids.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pullquote\" data-alignment=\"right\" data-quote=\""There are many different situations being experienced by our people. Some have returned to 80-100% work capacity, others are still in shock, while others are experiencing air-raid alarms every few hours."\" data-author=\"Readdle's Maria Henyk\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAccording to Kosovan, \"Those team members who are already outside of Ukraine are working to maintain MacPaw products and the stability of the company's services. While preparing for the massive invasion, the company also organized an office in Ivano-Frankivsk, Western Ukraine. We prepared the company to work completely autonomously.\" \u003C\u002Fp\u003E\u003Cp\u003EKosovan told us he is staying in Kyiv, \"to protect Ukraine and stop the war in any way possible.\" \u003C\u002Fp\u003E\u003Cp\u003ESo is MacPaw CTO Vera Tkachenko. In \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002FiVira\u002Fstatus\u002F1498981943911792641\u002Fphoto\u002F2\"\u003Ea tweet\u003C\u002Fa\u003E, she says, \"Seventh day of a war. I'm staying in Kyiv and have to move to a shelter several times a day. Food and medicine supplies are limited. Civilians in suburbs are attacked with bombs several times a day. But our defense forces are real heros and we'll win!\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"b95c3cfe-3f4b-4df3-89df-9abb100aa8a0\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EImage: Bohdan Toporivsky\u003C\u002Fp\u003E\" data-image-alt-text=\"image2.jpg\" data-image-filename=\"image2.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"720\" data-image-height=\"1280\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Freaddle.com\u002F\"\u003EReaddle\u003C\u002Fa\u003E is a Ukrainian-founded company that produces \u003Ca href=\"https:\u002F\u002Fsparkmailapp.com\u002F\"\u003ESpark email\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fpdfexpert.com\u002F\"\u003EPDF Expert\u003C\u002Fa\u003E. In an email conversation with Maria Henyk, Readdle's PR & marketing manager, she told us, \"We're equipping a location in Odesa as a shelter for the team, their families, and their pets. The company is providing financial help for all Ukrainian employees, along with assistance for those who can and want to move abroad.\" \u003C\u002Fp\u003E\u003Cp\u003E\"There are many different situations being experienced by our people,\" Henyk told us. \"Some have returned to 80-100% work capacity, others are still in shock, while others are experiencing air-raid alarms every few hours.\" \u003C\u002Fp\u003E\u003Cp\u003EHenyk asked us to share this message, \"As for our customers, nothing has changed for them. For many years, we've been investing in the safety and security of our systems and products, so everything customer-facing is up and running. Millions of people worldwide rely on our products, receiving timely updates and customer support.\" \u003C\u002Fp\u003E\u003Cp\u003EAnna Ustynova provides communications and global PR for \u003Ca href=\"https:\u002F\u002Fapps.get-headway.com\u002F\"\u003EHeadway\u003C\u002Fa\u003E, a maker of a motivational app. In an email, she told ZDNet, \"Since the beginning of the invasion, the top priority of Headway has been to ensure the safety and well-being of our employees and their families in Ukraine. We have launched an emergency plan, and now over 95% of the Ukrainian Headway teammates and their families, who desired to move, are in a safe place.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"26ef474d-61c3-4188-af73-1fabe11a22d6\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EImage: Anna Ustynova\u003C\u002Fp\u003E\" data-image-alt-text=\"headway3.jpg\" data-image-filename=\"headway3.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1673\" data-image-height=\"960\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EShe continued: \"Our Kyiv R&D unit settled down partly in the west of Ukraine, partly abroad. No employee was fired; instead, Headway is going to hire more Ukrainian talents and all previously sent offers were secured and already two employees have joined us since 24th February.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fajax.systems\u002F\"\u003EAjax System\u003C\u002Fa\u003E makes smart alarms popular in Europe. Valentine Hrytsenko, chief marketing officer at Ajax Systems told ZDNet, \"Since the outbreak of the war in Ukraine, our company is doing everything necessary to ensure the protection and safety of its people, business, and supplies to partners.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pullquote\" data-alignment=\"right\" data-quote=\""To protect the safety of our team members, we won't be providing further details of our contingency plans or team member locations."\" data-author=\"Grammarly's Jen Dakin\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAs with the other companies seeking to retain some level of normality in the midst of war, Hrytsenko sought to reassure customers, \"The Ajax server infrastructure functions without interruption, so users and partners don't have to worry about the stability of already installed systems. Ajax's servers are geographically dispersed throughout Europe in Amazon data centers in Ireland and Germany.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.grammarly.com\u002F\"\u003EGrammarly\u003C\u002Fa\u003E makes a well-known cloud-based writing assistant. According to Jen Dakin, consumer PR manager, \"Grammarly's first priority remains the safety and well-being of our team members. We have implemented our contingency plans that include relocating team members and their families to help them remain safe.\" \u003C\u002Fp\u003E\u003Cp\u003EBeyond that, Dakin was keeping operational security for Grammarly, telling us only, \"To protect the safety of our team members, we won't be providing further details of our contingency plans or team member locations.\" \u003C\u002Fp\u003E\u003Cp\u003EThese developers are doing their best to reassure their customers that their services will continue, even as their world is being blown apart around them. Each of these teams spent years building their companies and products into successes, and ensuring continuity of their businesses – in the worst and most scary of conditions -- is also about survival. If their companies suffer or shutter, they lose their livelihoods too. \u003C\u002Fp\u003E\u003Cp\u003EBut there's so much more. Each of these companies shared with me their contributions to the war effort. \u003C\u002Fp\u003E\u003Ch2\u003E Ukrainian spirit \u003C\u002Fh2\u003E\u003Cp\u003EJen Dakin told us, \"Grammarly will donate all of the net revenue earned from Russia and Belarus since the war started in 2014 through 2022 to causes supporting Ukraine—totaling over $5 million.\" \u003C\u002Fp\u003E\u003Cp\u003EHrytsenko of Ajax Systems told us about work the company is doing with the Ministry of Digital Transformation of Ukraine. He described an app Ajax built called Air Alert that \"instantly informs about the beginning and end of a civil defense alert. The app generates a loud critical alert warning of an airstrike, chemical attack, or other types of civil defense alerts. The app receives signals first-hand from Ukrainian regional administrations, allowing people to react as quickly as possible.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"ce4c71d0-c332-4061-b094-2375f1068550\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EImage: Anna Ustynova\u003C\u002Fp\u003E\" data-image-alt-text=\"headway-4.jpg\" data-image-filename=\"headway-4.jpg\" data-image-date-created=\"2022\u002F03\u002F28\" data-image-width=\"1695\" data-image-height=\"1649\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EReaddle's Henyk told ZDNet about the dedication of the company's employees and how the company is supporting them, \"Many people are taking part in volunteering projects, and some have joined territorial defense forces. We are proud of our team and such strength and bravery and are keeping their positions open and paying all salaries for all people as normal.\" \u003C\u002Fp\u003E\u003Cp\u003EIn her email to us, she continued: \"Readdle employees themselves have donated tens of thousands of dollars to the Ukrainian defense, and the company has matched this amount.\" \u003C\u002Fp\u003E\u003Cp\u003EMacPaw's Kosovan shared his pride in his team: \"MacPaw team members volunteer to provide food and medicine, support Ukrainian Army, donate blood and money to Ukrainian charities like other Ukrainian citizens all over the country. Some of us are fighting in the Ukrainian Army, Territorial Defense, and the Ukrainian IT Army.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pullquote\" data-alignment=\"right\" data-quote=\""We try and do what we can. Our warriors need all the support they can get, on all fronts." \" data-author=\"Bohdan Toporivsky \"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EKosovan also tells us that since the beginning of the war, MacPaw has been actively involved in delivering humanitarian aid to Ukrainians in need through the MacPaw Development Fund. In an email to ZDNet he said, \"The MacPaw Development Fund is able to quickly source and distribute large quantities of food, medical supplies, hygiene products, and other humanitarian aid to those in need. The Fund can do it faster than most larger organizations and this can help save lives when every moment counts. Through the Fund, to date, MacPaw has spent over $4M to provide food, medical supplies, and other necessities to Ukrainians in the war zones.\" \u003C\u002Fp\u003E\u003Cp\u003EBeLight's Vert told us a little more about how her team is supporting the war effort: \"We keep working from home now and help Ukraine in every way we can. Some with donations, others are helping Territorial Defense with supplies, or with the preparation of Molotov cocktails (a special explosive substance used by civilians to fight the occupants), some joined the regional branch of the Red Cross in Uzhhorod, Western Ukraine, as a volunteer.\" \u003C\u002Fp\u003E\u003Cp\u003EFor Unclutter's Toporivsky, it's all about volunteering. He told ZDNet, \"A few days after the war began and we moved to that safer place, we understood that we could not just wait, read awful news, and take no action anymore.\" \u003C\u002Fp\u003E\u003Cp\u003E\"And four of us began doing whatever we could to somehow help our Ukrainian defenders and victims of war. Then six of us, then many more in different cities of Ukraine and beyond,\" Toporivsky said in an email. \"Thanks to various friends with connections to the Ukrainian army, volunteers, and funds, we started arranging humanitarian help from Poland, Slovakia, Czech Republic, and other European countries. Food, medicines, clothes, hygiene products, etc. Military equipment and protection too, when possible.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"4676b5b7-220a-4e10-bc1e-7a3ce40d2232\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F4676b5b7-220a-4e10-bc1e-7a3ce40d2232\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"There aren't many of us, and the scale could be much bigger – we still try and do what we can,\" says Toporivsky. \"It's hardly possible to do regular work nowadays. Hoping I'll get back to it later, when things slow down. After all, our warriors need all the support they can get, on all fronts.\" \u003C\u002Fp\u003E\u003Ch2\u003E Life in Ukraine \u003C\u002Fh2\u003E\u003Cp\u003EUnclutter CEO Krupnov told us, \"We've been planning to release a major update this fall. And minor updates this spring. But now all the development has come to a halt. We're only able to provide user support.\" \u003C\u002Fp\u003E\u003Cp\u003E\"Imagine that your life has completely changed in just a few days,\" Krupnov said. \"It's emptiness, fear for your loved ones, and shame you feel because you don't do enough for your country. It's a sensation of overwhelming despair each time you read about murdered civilians and children or soldiers who died protecting their homeland. It's also destroyed cities - the places you loved and felt connected to.\" \u003C\u002Fp\u003E\u003Cp\u003EStill, he's hopeful. \"Though we're scattered across the globe now, we still keep in touch and support each other. Some day, after the victory, we will get together once again to continue our work after a great celebration.\" \u003C\u002Fp\u003E\u003Cp\u003EIf you want to help, we've provided a number of donation sites and resources you can explore in the companion article, \"\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-you-can-help-ukraine-donation-sites-and-resources\u002F\" target=\"_blank\"\u003EUkraine: How you can help\u003C\u002Fa\u003E.\" \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"5eb465ed-9683-4fb3-94e4-66688d1a456b\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F5eb465ed-9683-4fb3-94e4-66688d1a456b\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003EYou can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fdavidgewirtz\"\u003E@DavidGewirtz\u003C\u002Fa\u003E, on Facebook at \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fdavidgewirtz\"\u003EFacebook.com\u002FDavidGewirtz\u003C\u002Fa\u003E, on Instagram at \u003Ca href=\"https:\u002F\u002Fwww.instagram.com\u002FDavidGewirtz\u002F\"\u003EInstagram.com\u002FDavidGewirtz\u003C\u002Fa\u003E, and on YouTube at \u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FDavidGewirtzTV\"\u003EYouTube.com\u002FDavidGewirtzTV\u003C\u002Fa\u003E.\u003C\u002Fem\u003E \u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-03-30 13:45:00",timezone:"UTC",updated:c,published:c},description:"Eight coders based in Ukraine spoke to ZDNet about how they're holding up in the face of war. These are their stories.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"2ee81ed9-defd-4812-b920-f2d7b9078c0e",image:{id:"4c1704ed-07c7-433f-8a3f-2493d97b2349",filename:"headway-4-thumb.jpg",dateCreated:{created:c,date:"2022-03-30 12:29:42",timezone:"UTC",updated:c,published:c},alt:"headway-4-thumb.jpg",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F03\u002F30\u002F4c1704ed-07c7-433f-8a3f-2493d97b2349\u002Fheadway-4-thumb.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1482,height:1111,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"ukrainian-software-developers-share-their-stories-and-photos-from-the-war-zone",startYear:c,summary:b,title:"Ukrainian software developers share their stories and photos from the war zone",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"56442b72-924c-4356-a0bc-a95049d2997e\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Getty Images\" data-image-alt-text=\"getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg\" data-image-filename=\"getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg\" data-image-date-created=\"2022\u002F05\u002F25\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ECloud applications and services provide access to business tools, information and software from anywhere, allowing employees to be productive whether they are \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-work-or-back-to-the-office-the-calculation-just-shifted-again\u002F\" target=\"_blank\"\u003Eworking in the office, remotely or a combination of the two\u003C\u002Fa\u003E. Location doesn't matter; everything they need is\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-cloud-computing-everything-you-need-to-know-about-the-cloud\u002F\" target=\"_blank\"\u003E just in 'the cloud\u003C\u002Fa\u003E'.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"41d596b3-7824-4ef0-a9e1-ed85f1326716\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F41d596b3-7824-4ef0-a9e1-ed85f1326716\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBut it isn't only employees and businesses who have benefited from the use of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-is-evolving-heres-where-its-going-next\u002F\" target=\"_blank\"\u003Ecloud computing\u003C\u002Fa\u003E and the shift towards remote working – it's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhybrid-cloud-brings-benefits-but-also-additional-cybersecurity-risks-heres-how-to-securely-manage-your-cloud\u002F\" target=\"_blank\"\u003Eproving useful for cyber criminals\u003C\u002Fa\u003E and malicious hackers too, giving them a new set of opportunities to steal sensitive data such as credit card information, passwords, secret intellectual property and more from unwary cloud users. \u003C\u002Fp\u003E\u003Cp\u003EMalicious hackers have found ways to break into networks to gain access to this information, often via \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\" target=\"_blank\"\u003Ephishing attacks\u003C\u002Fa\u003E or by \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F\" target=\"_blank\"\u003Esecretly planting trojan malware\u003C\u002Fa\u003E – and these were, and remain, common techniques used by cyber criminals to access corporate networks. Cloud computing can provide new targets for these old attacks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fterrible-cloud-security-is-leaving-the-door-open-for-hackers-heres-what-youre-doing-wrong\u002F\" target=\"_blank\"\u003EAccording to research\u003C\u002Fa\u003E, more than half of companies are enabling poor password security for cloud accounts, allowing \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-terrible-passwords-that-people-are-still-using-heres-how-to-do-better\u002F\" target=\"_blank\"\u003Eweak passwords\u003C\u002Fa\u003E consisting of under 14 characters, while 44% of cloud accounts allow the user to reuse a password that's linked to another account. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cstrong\u003EZDNET SPECIAL FEATURE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fsecuring-the-cloud\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fsecuring-the-cloud\u002F%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22SECURING%20THE%20CLOUD%22%7D\"\u003E\u003Cstrong\u003ESECURING THE CLOUD\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-dominates-but-security-is-now-its-biggest-challenge\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-dominates-but-security-is-now-its-biggest-challenge\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECloud%20computing%20dominates.%20But%20security%20is%20now%20the%20biggest%20challenge%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003ECloud computing dominates. But security is now the biggest challenge\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-security-where-it-is-where-its-going\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-security-where-it-is-where-its-going\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECloud%20computing%20security:%20Where%20it%20is,%20where%20it's%20going%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003ECloud computing security: Where it is, where it's going\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-security-five-things-you-are-probably-doing-wrong\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-security-five-things-you-are-probably-doing-wrong\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECloud%20computing%20security:%20Five%20things%20you%20are%20probably%20doing%20wrong%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003ECloud computing security: Five things you are probably doing wrong\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-cloud-security-matters-and-why-you-cant-ignore-it\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-cloud-security-matters-and-why-you-cant-ignore-it\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EWhy%20cloud%20security%20matters%20and%20why%20you%20can't%20ignore%20it%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003EWhy cloud security matters and why you can't ignore it\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003EWeak passwords on cloud accounts are an inviting prospect for attackers, who look for applications with internet-facing login portals and then use \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-systems-are-facing-billions-of-attacks-every-month-as-hackers-try-to-guess-passwords\u002F\" target=\"_blank\"\u003Eautomated brute-force attacks\u003C\u002Fa\u003E to cycle through lists of simple and commonly used passwords in an effort to breach accounts. Weak passwords make it easier for these techniques to work. \u003C\u002Fp\u003E\u003Cp\u003EThere's also the prospect of cyber criminals \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-security-researcher-told-me-my-passwords-and-more-how-15-years-of-digital-footprints-left-me-exposed\u002F\" target=\"_blank\"\u003Egetting hold of leaked passwords for users' other accounts\u003C\u002Fa\u003E, such as their personal email address, online shopping or streaming service, and trying their luck with those against corporate cloud accounts. As it's still common for people to reuse passwords, this tactic could also provide cyber criminals with a means of accessing cloud application suites and other enterprise services.\u003C\u002Fp\u003E\u003Cp\u003EAnd because the cyber criminals are using legitimate usernames and passwords to access legitimate accounts used by people who are likely to be working remotely in some capacity, access to the services is unlikely to be questioned as suspicious.\u003C\u002Fp\u003E\u003Cp\u003EFor example, criminals could use access to a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwatch-out-for-this-phishing-attack-that-hijacks-your-email-chats-to-spread-malware\u002F\" target=\"_blank\"\u003Elegitimate account to take control of the user's emails and send malicious links to their contacts\u003C\u002Fa\u003E, which are designed to steal sensitive information, or plant malware or even ransomware. The target may not question the link because it comes from someone they know and trust. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBut they might not even need to trick a middle-party to launch a cyberattack; research suggests that as many as 99% of cloud users, services and resources provide excessive permissions. In the vast majority of cases, these permissions, like admin rights, are never required, especially for standard users. \u003C\u002Fp\u003E\u003Cp\u003EBut if \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ftwo-thirds-of-cloud-attacks-could-be-stopped-by-checking-configurations-research-finds\u002F\" target=\"_blank\"\u003Ecloud services are misconfigured\u003C\u002Fa\u003E and admin rights are available where they shouldn't be, hackers can use a simple password as a stepping stone to modify, create or delete cloud environment resources, as well as using them to move around networks to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-sneaks-in-with-remote-workers-and-cloud-based-it-says-cyberrisk-alliance-survey\u002F\" target=\"_blank\"\u003Ehelp expand the scope of attacks\u003C\u002Fa\u003E. And if they hide any accounts they create, the affected organisation will be none the wiser. \u003C\u002Fp\u003E\u003Cp\u003EThis isn't some theoretical scenario: cyber criminals are actively abusing cloud services to infect networks with trojan malware, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-access-trojans-spread-through-microsoft-azure-aws-cloud-service-abuse\u002F\" target=\"_blank\"\u003Eincluding Nanocore, Netwire, and AsyncRAT\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003Ca href=\"http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F\"\u003E\u003Cstrong\u003EA winning strategy for cybersecurity\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E (ZDNet special report)\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cbr\u003E \u003Cbr\u003EMeanwhile, ransomware campaigns have also been known to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-vs-wfh-how-remote-working-is-making-cyberattacks-easier-to-pull-off\u002F\" target=\"_blank\"\u003Eexploit exposed or improperly secured cloud services\u003C\u002Fa\u003E to gain initial access into networks before encrypting as much data as possible and then demanding a multi-million dollar ransom in exchange for the decryption key. \u003C\u002Fp\u003E\u003Cp\u003EAnd it isn't just common cyber criminals who've taken advantage of the rise of remote working and the increase in use of cloud applications: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-office-365-is-becoming-the-core-of-many-businesses-and-hackers-have-noticed\u002F\" target=\"_blank\"\u003Estate-backed hacking and cyber-espionage groups are also exploiting vulnerabilities in cloud\u003C\u002Fa\u003E as a launchpad for campaigns.\u003C\u002Fp\u003E\u003Ch2\u003EClosing the door\u003C\u002Fh2\u003E\u003Cp\u003EBut it doesn't have to be this way, and there are several steps that businesses can take to boost the cybersecurity of their cloud applications and software.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"fe07e774-77b4-4a0e-908a-c22934474f6e\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Ffe07e774-77b4-4a0e-908a-c22934474f6e\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOne of the key aspects of cloud applications that cyber criminals abuse is weak passwords, so IT departments should do their best to ensure that employees are \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwant-a-strong-password-youre-probably-still-doing-it-the-wrong-way\u002F\" target=\"_blank\"\u003Eusing strong passwords\u003C\u002Fa\u003E that can't easily be guessed and that, ideally, aren't used elsewhere. This approach makes it much harder for cyber criminals to breach accounts with brute-force attacks. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-security-researcher-told-me-my-passwords-and-more-how-15-years-of-digital-footprints-left-me-exposed\u002F\"\u003E\u003Cstrong\u003EA security researcher easily found my passwords and more: How my digital footprints left me surprisingly over-exposed\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EYet having a strong password won't stop attacks alone, which is why this strategy should be combined with \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmulti-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\u002F\" target=\"_blank\"\u003Emulti-factor authentication\u003C\u002Fa\u003E (MFA) on all cloud-associated accounts. MFA provides an additional barrier to attacks that requires app-based, SMS-based or hardware-key verification from the user to ensure the attempted login is valid. \u003C\u002Fp\u003E\u003Cp\u003EWith multi-factor authentication, even if the attacker has the correct password, they can be stopped from getting in – and receiving an alert about an unexpected login attempt should act as a catalyst for the user to change their password. \u003C\u002Fp\u003E\u003Cp\u003EIt's also important for IT departments to remember that, like other software, cloud applications and services receive security updates and patches; when these are issued, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\u002F\" target=\"_blank\"\u003Eit's vital to install them as soon as possible\u003C\u002Fa\u003E because this can prevent cyber criminals from exploiting known vulnerabilities to access cloud services.\u003C\u002Fp\u003E\u003Cp\u003EAnd it's imperative for information security teams to have a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike\u002F\" target=\"_blank\"\u003Egood grasp of what consists of a regular usage pattern for their users\u003C\u002Fa\u003E. If an employee's cloud account is accessed from an unusual location or at a strange time outside their usual working hours, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-even-when-the-attackers-are-in-your-network-its-not-too-late-to-fight-back\u002F\" target=\"_blank\"\u003Eit could be an indication that their account is being accessed by an intruder\u003C\u002Fa\u003E and that action needs to be taken.\u003C\u002Fp\u003E\u003Cp\u003ECloud services can provide significant benefits for both businesses and their employees, but it's vital that the right choices are made to ensure on-demand IT is used in a productive and secure way.\u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EMORE ON CYBERSECURITY\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhackers-are-using-tech-services-companies-as-a-launchpad-for-attacks-on-customers\u002F\"\u003E\u003Cstrong\u003EHackers are using tech services companies as a 'launchpad' for attacks on customers\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcloud-computing-security-new-guidance-aims-to-keep-your-data-safe-from-cyberattacks-and-breaches\u002F\"\u003E\u003Cstrong\u003ECloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fterrible-cloud-security-is-leaving-the-door-open-for-hackers-heres-what-youre-doing-wrong\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003ETerrible \tcloud security is leaving the door open for hackers. Here's what \tyou're doing wrong\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003Cbr\u003E\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThese \tresearchers wanted to test cloud security. They were shocked by what \tthey found\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003Cbr\u003E\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Funsecured-servers-and-cloud-services-how-remote-work-has-increased-the-attack-surface-that-hackers-can-target\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EUnsecured \tservers and cloud services: How remote work has increased the attack \tsurface that hackers can target\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E \u003Cbr\u003E\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-01 14:53:00",timezone:"UTC",updated:c,published:c},description:"Cloud software and applications allow staff to work from anywhere. But if your cloud security is poor, cyber criminals can also get in.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"8cc8550a-6774-4ed2-844a-dc51662ec25e",image:{id:"56442b72-924c-4356-a0bc-a95049d2997e",filename:"getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg",dateCreated:{created:c,date:"2022-05-25 13:18:46",timezone:"UTC",updated:c,published:c},alt:"getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg",credits:"Image: Getty",caption:"\u003Cp\u003EPeople in an office looking at a computer screen with worry on their faces.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F05\u002F25\u002F56442b72-924c-4356-a0bc-a95049d2997e\u002Fgetty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"dont-let-your-cloud-cybersecurity-choices-leave-the-door-open-for-hackers",startYear:c,summary:b,title:"Don't let your cloud cybersecurity choices leave the door open for hackers",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"101518dd-ec91-11e3-95d2-02911863765e",slug:"cloud",name:"Cloud",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"d87dd592-287c-4a03-99a7-e61544b589b0\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EA woman looking stressed out in front of a laptop in an office meeting room.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Getty\u002FVioletaStoimenova\" data-image-alt-text=\"a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room\" data-image-filename=\"a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room.jpg\" data-image-date-created=\"2022\u002F09\u002F09\" data-image-width=\"2141\" data-image-height=\"1401\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ERansomware is one of the most significant cybersecurity issues facing us today, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more in order to encrypt files and demand a ransom payment for the decryption key. \u003C\u002Fp\u003E\u003Cp\u003EDespite warnings not to, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-warning-to-law-firms-stop-encouraging-victims-to-pay-ransoms-to-cyber-criminals\u002F\" target=\"_blank\"\u003Emany victims pay these ransoms\u003C\u002Fa\u003E, under the impression that it's the quickest way to restore their network, particularly if the cyber criminals are also \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fone-in-seven-ransomware-extortion-attempts-leak-key-business-operation-data\u002F\" target=\"_blank\"\u003Ethreatening to leak stolen data\u003C\u002Fa\u003E. But all this means is that the attack cycle continues, with ransomware groups using their ill-gotten gains to finance more ambitious attacks.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EBeyond this there's another problem. Many of ransomware incidents are simply kept under wraps, so it's hard to get a good picture of what's really happening in the world. Even when companies do admit to a cyberattack they are very often vague about what has happened, and seem most reluctant to describe any incident as a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\u002F\" target=\"_blank\"\u003Eransomware attack\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\u002F\"\u003E\u003Cstrong\u003ERansomware: Why it's still a big threat, and where the gangs are going next\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EA 'serious cyber attack', a 'cyber incident that has caused some disruption' and 'data being encrypted by a third-party' – those are just some of the statements put out by victims of ransomware attacks to describe what happened – but never mentioning ransomware.\u003C\u002Fp\u003E\u003Cp\u003ESome victims eventually become more open about what happened, but only months or years after the incident – and some never publicly acknowledge it was ransomware at all. \u003C\u002Fp\u003E\u003Cp\u003EIt's frustrating not being able to get a comprehensive and clear picture about what's going on – even if by reading between the lines of the vague statements about a 'sophisticated cyber incident' that has 'disrupted services', it's clear that it's a ransomware attack.\u003C\u002Fp\u003E\u003Cp\u003EAnd the lack of transparency about ransomware attacks and other cyber incidents is damaging to everyone. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fongoing-ransomware-attack-leaves-systems-badly-affected-says-scottish-environment-agency\u002F\" target=\"_blank\"\u003ESome victims are very quick to disclose that it's ransomware\u003C\u002Fa\u003E and I've interviewed victims of ransomware attacks who, after the incident has passed, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-company-was-hit-with-ransomware-but-didnt-have-to-pay-up-heres-how-they-did-it\u002F\" target=\"_blank\"\u003Eare willing to speak on the record about what happened\u003C\u002Fa\u003E and it's interesting to hear CIOs and CISOs open up about what happened. \u003C\u002Fp\u003E\u003Cp\u003EThe common thread among these cybersecurity leaders choosing to speak up about the organisations being hit by ransomware is that they want to help prevent others from becoming the next victim by detailing the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-how-the-nhs-learned-the-lessons-of-wannacry-to-protect-hospitals-from-attack\u002F\" target=\"_blank\"\u003Elessons they learned around bolstering cyber defences\u003C\u002Fa\u003E to prevent future incidents. \u003C\u002Fp\u003E\u003Cp\u003ELessons like \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\u002F\" target=\"_blank\"\u003Eapplying security patches on time\u003C\u002Fa\u003E, providing users across the network with \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\u002F\" target=\"_blank\"\u003Emulti-factor authentication\u003C\u002Fa\u003E (MFA), plus regularly updating backups, are moves that can help stop ransomware attacks in their tracks. And the best time to take action is before the attack takes place. \u003C\u002Fp\u003E\u003Cp\u003ERansomware isn't just a tech problem: ultimately, these cyberattacks impact everyone, and we are often left in the dark about why the services we rely on aren't working. \u003C\u002Fp\u003E\u003Cp\u003EIn some cases, it looks like this is already changing; recently, Los Angeles Unified (LAUSD), \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-second-biggest-school-district-in-the-us-was-hit-with-ransomware\u002F\" target=\"_blank\"\u003Ethe second biggest school district in the US, was hit by a ransomware attack,\u003C\u002Fa\u003E immediately disclosing the incident to the authorities, as well as keeping the wider general public up to date about the situation. \u003C\u002Fp\u003E\u003Cp\u003ETheir approach was praised by director of the Cybersecurity & Infrastructure Security Agency (CISA) Jen Easterly, \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002FCISAJen\u002Fstatus\u002F1567275850956939265?t=fJA0uQdAmExWkEIdU8D5LA&s=19\" target=\"_blank\"\u003Ewho said\u003C\u002Fa\u003E LAUSD \"clearly knows the value of transparency when responding to a cyber incident – their speed, clarity & focus on partnership is commendable\" and described them as a \"Great example of how to keep stakeholders informed, including potential impacts & what to expect next.\" \u003C\u002Fp\u003E\u003Cp\u003EDealing with a ransomware attack is a challenge, but the way organisations frame the experience is just as important as the technical response. By detailing what has happened and how the incident is resolved, they can actually generate positive feedback and show that the ransomware gangs do not always have to be feared. \u003C\u002Fp\u003E\u003Cp\u003EAnd it just might prevent others from suffering the same fate. In the fight against ransomware, it's going to be better for everyone if there's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbusinesses-dont-talk-about-being-victims-of-cyberattacks-that-needs-to-change\u002F\" target=\"_blank\"\u003Emore transparency around attacks\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Ch3\u003EZDNET'S MONDAY OPENER \u003C\u002Fh3\u003E\u003Cp\u003E\u003Cem\u003EZDNet's Monday Opener is our opening take on the week in tech, written by members of our editorial team. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch3\u003EPREVIOUSLY ON ZDNET'S MONDAY OPENER:\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fapples-new-iphones-will-sparkle-but-the-magic-lies-in-older-models\u002F\"\u003EApple's new iPhones will sparkle, but the magic lies in older models\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fprofessional-development\u002Fquiet-quitting-has-nothing-to-do-with-rejecting-work-its-about-saying-no-to-toxic-work-culture\u002F\"\u003EQuiet \tquitting' has nothing to do with lazy employees. It's about \trejecting broken work culture\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcritical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\u002F\"\u003ECritical \tinfrastructure is under attack from hackers. Securing it needs to be \ta priority - before it's too late\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-work-or-back-to-the-office-why-the-biggest-challenges-are-still-ahead\u002F\"\u003ERemote \twork or back to the office: Why the biggest challenges are still \tahead\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnasa-is-blazing-an-inspirational-trail-we-need-to-make-sure-everyone-can-follow-it\u002F\"\u003ENASA \tis blazing an inspirational trail. We need to make sure everyone can \tfollow it\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyour-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology\u002F\"\u003EYour \tbiggest cyber-crime threat has almost nothing to do with technology\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-next-big-security-threat-is-staring-us-in-the-face-tackling-it-is-going-to-be-tough\u002F\"\u003EThe \tnext big security threat is staring us in the face. Tackling it is \tgoing to be tough\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cul\u003E \t\u003Cbr\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-11 22:05:00",timezone:"UTC",updated:c,published:c},description:"Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"96279497-e23d-4197-92e0-6a2bb1e9c5d2",image:{id:"d87dd592-287c-4a03-99a7-e61544b589b0",filename:"a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room.jpg",dateCreated:{created:c,date:"2022-09-09 14:05:50",timezone:"UTC",updated:c,published:c},alt:"a-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room",credits:"Image: Getty\u002FVioletaStoimenova",caption:"\u003Cp\u003EA woman looking stressed out in front of a laptop in an office meeting room.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F09\u002Fd87dd592-287c-4a03-99a7-e61544b589b0\u002Fa-woman-looking-stressed-out-in-front-of-a-laptop-in-an-office-meeting-room.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2141,height:1401,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"the-ransomware-problem-wont-get-better-until-we-change-one-thing",startYear:c,summary:b,title:"The ransomware problem won't get better until we change one thing",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than two decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (scheduled for publication in 2022).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"bf1fc5fa-8a77-44cb-94d2-d2b56bcb14c3\" data-size=\"small\" data-float=\"right\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"ask-zd-270.jpg\" data-image-filename=\"ask-zd-270.jpg\" data-image-date-created=\"2022\u002F04\u002F07\" data-image-width=\"270\" data-image-height=\"185\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWelcome to the latest installment of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fblog\u002Fask-zdnet\u002F\" target=\"_blank\"\u003EAsk ZDNet\u003C\u002Fa\u003E, where we answer the questions that make your IT guy reach for the Tums. \u003C\u002Fp\u003E\u003Cp\u003EIn the mailbag this week: Is the latest, greatest iPhone really worth the higher price tag? \u003C\u002Fp\u003E\u003Cp\u003EIf you've got a question for the Ask ZDNet editors, we're all ears. Send your questions to ask(at)zdnet(dot)com.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4cdb4ee7-6560-45c9-8994-a2d0172775c2\" data-edition=\"us\" data-description=\"\u003Cp\u003EFor iPhone owners, this is always a tricky question. It's always worth checking the incentives offered by your carrier, which might end up making the cost of one model significantly better than you think. If you're considering changing carriers, now is a good time to see what kind of enticements they're offering to get you to switch. You might end up with a new phone for significantly less than you'd pay otherwise.\u003C\u002Fp\u003E\u003Cp\u003EWhich model is right for you? We asked ZDNet's iPhone expert, Jason Cipriani, to help spell out the differences:\u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EDeciding between an iPhone 12 and iPhone 13 can be tough. Both phones are very similar. They both have two rear-facing cameras, the same core display tech, support 5G connectivity and run the latest version of iOS. However, there are some key differences that are sure to help you make your final decision one way or another.\u003C\u002Fp\u003E\u003Cp\u003EThose differences distill down to a new processor, battery life, storage, camera features and -- if it's important to you -- color options. The iPhone 13 comes with Apple's A15 processor while the iPhone 12 has the A14. Those numbers might not mean much, and even though my experience is that the iPhone 13 does perform better, it's not something you should specifically seek out unless your budget allows.\u003C\u002Fp\u003E\u003Cp\u003EThe iPhone 13 has slightly better battery life (19 hours for the iPhone 13 versus 17 hours for the iPhone 12), and the base storage for the non-Pro models has doubled to start at 128GB, instead of the iPhone 12's 64GB starting point.\u003C\u002Fp\u003E\u003Cp\u003EThe iPhone 13's camera also has a few new camera tricks, including Cinematic Mode, which adds depth to your videos. There's also a difference in color options, with the 12's colors being brighter and more vibrant while the iPhone 13's colors are darker, but still look fantastic.\u003C\u002Fp\u003E\u003Cp\u003EAll told, the iPhone 12 is a very similar device to the iPhone 13. If you don't care about the colors, storage, or a couple extra hours of battery and a performance bump, I think you'd be happy with the iPhone 12. However, if any of those factors are important to you, the iPhone 13 is the better investment.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESide note:\u003C\u002Fstrong\u003E For those struggling with a similar decision regarding the iPhone 12 Pro and iPhone 13 Pro, then you should know there are some big differences between the two, especially when it comes to display technology.\u003C\u002Fp\u003E\u003Cp\u003ESpecifically, the iPhone 13 Pro line has what Apple calls a ProMotion display, which means that the refresh rate of the screen maxes out at 120Hz compared to 60Hz on the iPhone 12 Pro. The impact of the faster refresh rate is that scrolling through long documents, in apps and even gaming all look smoother. Battery life goes from 17 hours on the iPhone 12 Pro to 22 hours on the iPhone 13 Pro, and you gain the ability to take macro photos using the rear cameras.\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\" data-hed=\"I need a new iPhone. Is last year's model good enough?\" data-superlative=\"My three-year-old iPhone suddenly started flaking out on me. If I buy a new one, should I get the latest and greatest? Or should I save a few bucks by getting last year's model?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso see:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\" target=\"_blank\"\u003EThe 8 best iPhone models: Which is right for you?\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAnd don't forget, this year's model will become last year's model in September or October. As you approach the launch of a new model, it might be worth waiting to see what surprises the new edition will bring.\u003C\u002Fp\u003E\u003Cp\u003EGood luck!\u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003ESend your questions to ask(at)zdnet(dot)com. Due to the volume of submissions, we can't guarantee a personal reply, but we do promise to read every letter and respond right here to the ones that we think our readers will care about. Be sure to include a working email address in case we have follow-up questions. We promise not to use it for any other purpose. \u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"734f1f41-08e0-4fd8-932e-a858274833f8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F734f1f41-08e0-4fd8-932e-a858274833f8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003E \u003Cbr\u003E \u003C\u002Fem\u003E \u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-26 13:24:44",timezone:"UTC",updated:c,published:c},description:"Got a tech question? Ed Bott and ZDNet's squad of editors and experts probably have the answer.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"bb8822a3-6ef9-49c1-86e4-d00895cc0b8f",image:{id:"98124677-f336-421a-883e-b11ef4f5f9f6",filename:"iphone-13-mini.jpg",dateCreated:{created:c,date:"2022-07-11 15:23:20",timezone:"UTC",updated:c,published:c},alt:"Upset man fingers on keyboard",credits:"Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F07\u002F11\u002F98124677-f336-421a-883e-b11ef4f5f9f6\u002Fiphone-13-mini.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:729,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Services & Software^Productivity",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"i-need-a-new-iphone-is-last-years-model-good-enough-ask-zdnet",startYear:c,summary:b,title:"I need a new iPhone. Is last year's model good enough? [Ask ZDNet]",topic:{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10a72f10-ec91-11e3-95d2-02911863765e",slug:"laptops",name:"Laptops",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"8d600230-8175-11e2-9d12-0018fe8a00b0",username:"Jack Wallen",profileUrl:c,email:c,firstName:"Jack",lastName:"Wallen",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"f03bef9a-858a-451d-bc30-8c603c2ba899",filename:"jack-wallen.jpg",dateCreated:{created:c,date:"2022-08-05 15:04:34",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Ff03bef9a-858a-451d-bc30-8c603c2ba899\u002Fjack-wallen.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Jack Wallen is what happens when a Gen Xer mind-melds with present-day snark. Jack is a seeker of truth and a writer of words with a quantum mechanical pencil and a disjointed beat of sound and soul. An award-winning writer and novelist, Jack has been covering Linux, open-source, and other topics since the late 1990s for numerous publications such as ZDNET, CNET, TechRepublic, Linux.com, The New Stack, Linode, TechTarget, and Linux New Media. Jack's also written over 50 novels of fiction, at least one of which focuses on the Linux operating system. For more news about Jack Wallen, visit his website jackwallen.com.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EThere are trackers everywhere. Their goal is to glom onto your network behavior and inform businesses of your: browsing habits, visited websites, time spent on websites, purchases, and clicks on advertisements. The result is a full-blown advertising profile for you. \u003C\u002Fp\u003E\u003Cp\u003EThanks to trackers, I've experienced some rather disturbing behavior on mobile devices. I've witnessed someone just pause over an ad on Facebook, only to get that product pushed to their email account and even via SMS. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F378bb9df-dd4b-4075-bf01-4162d0cc12be\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIt's not just disturbing; it could be dangerous to the wellbeing of your data and privacy. Unfortunately, neither Android nor iOS is very successful when preventing trackers on a global scale. There is hope for you, however, hope that comes in the form of the DuckDuckGo web browser. \u003C\u002Fp\u003E\u003Cp\u003EFor those that don't know, DuckDuckGo started out as an alternative search engine, offering considerably more privacy than Google. The company then released its own web browser for both \u003Ca href=\"https:\u002F\u002Fplay.google.com\u002Fstore\u002Fapps\u002Fdetails?id=com.duckduckgo.mobile.android&hl=en_US&gl=US\" target=\"_blank\"\u003EAndroid\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fapps.apple.com\u002Fus\u002Fapp\u002Fduckduckgo-privacy-browser\u002Fid663592361\" target=\"_blank\"\u003EiOS\u003C\u002Fa\u003E that focused on user privacy and online trust. By default, this browser collects no data nor shares any data with third parties. On top of that, DuckDuckGo as a straight-up web browser is quite good, with plenty of user customization options.\u003C\u002Fp\u003E\u003Cp\u003EBut there's one particular feature that should prompt you to immediately make the switch from your default: App Tracking Protection.\u003C\u002Fp\u003E\u003Cp\u003EAt this time, you have to actually request an invitation to gain access to the feature. This will be the case until the feature is out of beta, so you must join the waitlist for the feature in-app (from Settings - \u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 1\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"508c49d8-cdbe-4125-959e-0b78e26f84e0\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ERequesting to get onto the App Tracking feature waitlist in DuckDuckGo.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The App Tracking Protection Waitlist request page screenshot\" data-image-filename=\"duckduckgo1.jpg\" data-image-date-created=\"2022\u002F07\u002F19\" data-image-width=\"1080\" data-image-height=\"756\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOnce you are accepted, you'll receive an invite code that you can enter to enable the feature. \u003C\u002Fp\u003E\u003Cp\u003EAfter you've enabled the feature, you'll discover DuckDuckGo reports all blocked tracking attempts in your Notification Shade. And you'll also have access to a well-designed dashboard that displays all blocked trackers in the past seven days (\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 2\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"33dd9819-5904-46d4-9217-46c225567fcf\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003ENo app is safe to track you with DuckDuckGo on the watch.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"The DuckDuckGo App Tracking Protection Dashboard screenshot\" data-image-filename=\"duckduckgo2.jpg\" data-image-date-created=\"2022\u002F07\u002F19\" data-image-width=\"1431\" data-image-height=\"1188\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003E\u003Cstrong\u003EAllowing applications to track you\u003C\u002Fstrong\u003E\u003C\u002Fh2\u003E\u003Cp\u003EYou might find, over days or weeks, that certain applications no longer work as expected. This could be because an app requires trackers in order to function properly. If this is the case you have two options: uninstall the app (which is what I'd recommend -- unless you absolutely need it) or allow that application to track you.\u003C\u002Fp\u003E\u003Cp\u003ETo allow an app to track you, locate it under RECENT ACTIVITY and tap the entry. In the resulting page (\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E), tap the ON\u002FOFF slider until it's in the OFF position. DuckDuckGo will no longer prevent trackers within that app.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 3\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"7dfe5000-29c9-4e1d-9695-f8362f815a29\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EUnless you absolutely need the app, I'd suggest uninstalling it to remain safe.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"Disabling App Tracking Protection for Slack in DuckDuckGo screenshot\" data-image-filename=\"duckduckgo3.jpg\" data-image-date-created=\"2022\u002F07\u002F19\" data-image-width=\"1437\" data-image-height=\"1494\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003E\u003Cstrong\u003EThe caveat to DuckDuckGo\u003C\u002Fstrong\u003E\u003C\u002Fh2\u003E\u003Cp\u003EBefore I mention the lone caveat to using DuckDuckGo's App Tracking Protection, know that it's worth using -- even with this one issue. The problem is that (at least with the latest update) I've noticed DuckDuckGo seriously draining my Pixel 6 Pro battery (to the tune of 26% usage over a 14-hour period - \u003Cstrong\u003EFigure 4\u003C\u002Fstrong\u003E).\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFigure 4\u003Cbr\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"40cb1d75-4771-490e-b588-53f9a1d81efc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EBattery life takes a serious hit, thanks to DuckDuckGo App Tracking Protection.\u003C\u002Fp\u003E\" data-image-credit=\"Image: Jack Wallen\" data-image-alt-text=\"DuckDuckGo battery life report in Android 12 screenshot\" data-image-filename=\"duckduckgo4.jpg\" data-image-date-created=\"2022\u002F07\u002F19\" data-image-width=\"1434\" data-image-height=\"459\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhen I disable App Tracking Protection, battery life returns to normal. However, this has been isolated to the latest update. Prior to this most recent release, battery life was hardly affected by the app. Hopefully, the developers of DuckDuckGo will fix this issue in the next release. Until then, you can at least request to join the private waitlist and, once accepted, make sure you're installing a version newer than 5.130.0 (which is the version that is causing problems with my battery). \u003C\u002Fp\u003E\u003Cp\u003EIf you take your privacy seriously and are looking to block as much app tracking as possible on your Android device, DuckDuckGo App Tracking Protection is the best path I've found to success. Give it a try and see if you don't find your apps less capable of tracking your online behavior.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"1d11a65c-977c-4f6a-82e0-a6abcfd960ff\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F1d11a65c-977c-4f6a-82e0-a6abcfd960ff\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-19 20:20:07",timezone:"UTC",updated:c,published:c},description:"If you take your privacy seriously and are looking to block as much app tracking as possible on your Android device, DuckDuckGo App Tracking Protection may be just what you're looking for.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c8f6d41e-b33d-44eb-ad77-782cc46b3f6a",image:{id:"60530a00-a298-478c-8692-b97e877d8edf",filename:"saferthanpasswordsbehaviorrecognition.jpg",dateCreated:{created:c,date:"2017-07-20 16:29:33",timezone:"UTC",updated:c,published:c},alt:"The App Tracking Protection Waitlist request page.",credits:"Getty Images",caption:"\u003Cp\u003ERequesting to get onto the App Tracking feature waitlist in DuckDuckGo.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2017\u002F07\u002F20\u002F60530a00-a298-478c-8692-b97e877d8edf\u002Fsaferthanpasswordsbehaviorrecognition.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:700,height:466,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"want-to-block-third-party-trackers-on-your-android-device-try-duckduckgos-new-feature",startYear:c,summary:b,title:"Want to block third-party trackers on your Android device? Try DuckDuckGo's new feature",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"b0fb3d1e-3e24-473d-9325-eaaf1980f7c7",slug:"android",name:"Android",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"25139207-2139-4a8d-8343-bc3744208c0f",username:"RossRubin",profileUrl:c,email:c,firstName:"Ross",lastName:"Rubin",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6a5590cf-f3c4-4e5a-aadf-99894c4e385d",filename:"rossrubinsmileweb-square.jpg",dateCreated:{created:c,date:"2020-09-28 19:03:19",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2020\u002F09\u002F28\u002F6a5590cf-f3c4-4e5a-aadf-99894c4e385d\u002Frossrubinsmileweb-square.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ross Rubin is the founder and principal analyst at Reticle Research, editor of the Reticle Research Report newsletter, and co-host of the Techspansive podcast. Ross has been an industry analyst focusing on innovation in the technology, media and telecom markets for over 20 years. Prior to founding Reticle Research, he was executive director and principal analyst at The NPD Group. Prior to NPD, he founded and developed the consumer access and technology service at Jupiter Research (acquired by Forrester Research), where he served as vice president and chief research fellow. He has written hundreds of articles and columns for publications such as CNET, Fast Company, Engadget, and ABCNews.com and is a graduate of Cornell University.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"7a149045-12a0-4664-8b7e-2588c1cfcba1\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"By Rawpixel.com -- Shutterstock\" data-image-alt-text=\"fraud.jpg\" data-image-filename=\"fraud.jpg\" data-image-date-created=\"2021\u002F09\u002F16\" data-image-width=\"1600\" data-image-height=\"1069\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAccording to the Federal Trade Commission, U.S. consumers reported losing more than $5.8 billion to fraud in 2021, an increase of 70% from the previous year. As anyone who's gotten a fraud alert from their credit card company knows, tech has long played a role in stopping fraudulent transactions. Now, though, machine learning is helping retailers and carriers offer consumers more confidence that the products and services being offered to them are legitimate.\u003C\u002Fp\u003E\u003Ch2\u003EA jungle out there\u003C\u002Fh2\u003E\u003Cp\u003EIn the first place, many consumers go to find products; Amazon has a central role to play in keeping the purchase process as safe and reliable as possible. And as with so much about the company, it does so on a staggering scale. According to a \u003Ca href=\"https:\u002F\u002Fbrandservices.amazon.com\u002Fprogressreport\" target=\"_blank\"\u003Ebrand protection report released in June\u003C\u002Fa\u003E, the company notes it has over 12,000 people working on brand protection efforts. That includes a dedicated Counterfeit Crimes Unit that investigates suspected fraudsters, shuts down their accounts, and even helps in efforts to prosecute perpetrators. Amazon scans more than eight billion attempted changes to product pages each day and blocked more than four billion attempts to create fake seller accounts last year.\u003C\u002Fp\u003E\u003Cp\u003EIn addition to working with owners of big brands such as Procter & Gamble, GoPro, Yeti and Whirlpool to pursue counterfeiters, the company operates an IP accelerator to help small businesses connect with legal help to protect their intellectual property. And if it finds that a customer has purchased a counterfeit product on its website that slipped through, Amazon will proactively contact the customer and refund the purchase price regardless of which merchant sold it and without requiring any further action by the customer.\u003C\u002Fp\u003E\u003Ch2\u003EWhen company calls\u003C\u002Fh2\u003E\u003Cp\u003EScam calls have become such a scourge that many consumers now don't answer their phones unless they recognize the caller. A few months into the pandemic, T-Mobile rolled out \u003Ca href=\"https:\u002F\u002Fwww.cnet.com\u002Ftech\u002Fmobile\u002Ft-mobile-scam-shield-app-will-cut-down-on-those-scam-likely-calls-heres-how\u002F\" target=\"_blank\"\u003EScam Shield\u003C\u002Fa\u003E, a set of services to help protect callers from potential fraud. However, consumers' wariness has also gotten in the way of companies contacting consumers with updates on topics they care about, such as, for example, an appointment or reservation opening. Now, the company that powers Scam Shield, \u003Ca href=\"https:\u002F\u002Ffirstorion.com\u002F\" target=\"_blank\"\u003EFirst Orion\u003C\u002Fa\u003E, is taking steps to not only offer consumers more confidence that a company calling them is what it purports to be.\u003C\u002Fp\u003E\u003Cp\u003EFirst Orion's Inform services allow companies to replace the standard numeric Caller ID message with up to 32 characters that can include the company's verified name and even the reason it's calling. So if, for example, your preferred hotel chain calls you about a reservation update, you might be more inclined to answer the call than if it's reaching out to promote a timeshare program. While the branding extends into a consumer's call log, inform can't offer the same level of verification for texts, a means of fraud initiation for which the company says it's seeing high demand for a solution.\u003Cbr\u003E\u003Cbr\u003EFirst Orion's other branded communications program, Engage, allows companies to have even more branding, including their logos, on the call screen. Inform can work with any smartphone that connects with a carrier partner, Engage, on the other hand, requires that consumers have the partner company's app installed on their smartphone but can work regardless of carrier. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-12 21:06:46",timezone:"UTC",updated:c,published:c},description:"Efforts from Amazon and First Orion are among the ways that companies are cracking down on perpetrators of consumer fraud.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"b2716d15-2b39-4887-aaa4-a8dd0805583e",image:{id:"7a149045-12a0-4664-8b7e-2588c1cfcba1",filename:"fraud.jpg",dateCreated:{created:c,date:"2021-09-16 13:08:15",timezone:"UTC",updated:c,published:c},alt:"fraud.jpg",credits:"By Rawpixel.com -- Shutterstock",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2021\u002F09\u002F16\u002F7a149045-12a0-4664-8b7e-2588c1cfcba1\u002Ffraud.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:1069,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"fraud-protection-efforts-target-fake-corporate-identities-online-and-offline",startYear:c,summary:b,title:"Fraud protection efforts target fake corporate identities online and offline",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"103a5e4f-ec91-11e3-95d2-02911863765e",slug:"e-commerce",name:"E-Commerce",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"d17ddd02-232e-4fbe-84af-201e48b9b852",slug:"companies",name:"Companies",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than two decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (scheduled for publication in 2022).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fd216892-97a3-4886-b449-d9130444b717\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFor those who prefer a single email account, the answer is ... aliases.&nbsp;\u003C\u002Fp\u003E\" data-image-credit=\"Getty Images\" data-image-alt-text=\"email alias symbol\" data-image-filename=\"gettyimages-465070386-email-alias.jpg\" data-image-date-created=\"2022\u002F06\u002F15\" data-image-width=\"2720\" data-image-height=\"1530\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"bf1fc5fa-8a77-44cb-94d2-d2b56bcb14c3\" data-size=\"small\" data-float=\"right\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"ask-zd-270.jpg\" data-image-filename=\"ask-zd-270.jpg\" data-image-date-created=\"2022\u002F04\u002F07\" data-image-width=\"270\" data-image-height=\"185\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWelcome to the latest installment of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fblog\u002Fask-zdnet\u002F#link={%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Fblog\u002Fask-zdnet\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22Ask%20ZDNet%22}\" target=\"_blank\"\u003EAsk ZDNet\u003C\u002Fa\u003E, where we know that the answer to every question isn't \"Have you tried turning it off and back on again?\" \u003C\u002Fp\u003E\u003Cp\u003EIn the mailbag this week: What's the best way to filter out marketing mail, newsletters, and other clutter without using a separate email account? \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"401073e6-b713-44e3-a990-533b527eb1fa\" data-edition=\"us\" data-description=\"\u003Cp\u003EFor those who missed the earlier Ask ZDNet column, here's a quick refresher:&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fim-drowning-in-spam-how-do-i-make-it-stop-ask-zdnet\u002F" target="_blank"\u003E"I'm drowning in spam! How do I make it stop?"\u003C\u002Fa\u003E&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Is there a way to keep junk email out of my inbox without having to juggle two or more email accounts? \" data-superlative=\"A few weeks ago, you recommended setting up a secondary email account as the best way to keep your inbox free of clutter. I'd rather stick with one email account, though. Do you have any options to recommend? \" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"9bbaf691-f316-4277-87dd-972993f7244d\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F9bbaf691-f316-4277-87dd-972993f7244d\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAnd, yes, we understand the desire to keep things simple. For those who prefer a single email account, the answer is ... aliases. \u003C\u002Fp\u003E\u003Cp\u003EAn alias is an alternate email address that is different from your \"real\" one but is still associated with your account and deposits messages sent to that alias into your regular inbox, without forwarding. Combining an alias with filters or rules lets you automatically move messages out of your inbox to a folder of your choosing as a way to manage less important email traffic. \u003C\u002Fp\u003E\u003Cp\u003EGmail has the most limited approach to aliases, which are based on your primary address. To create an alias on the fly, just put a plus sign at the end and tack on whatever you want as a suffix. If your address is \u003Ca href=\"mailto:AskZDNet@gmail.com\" target=\"_blank\"\u003EAskZDNet@gmail.com\u003C\u002Fa\u003E, for example, you could use \u003Ca href=\"mailto:AskZDNet+news@gmail.com\" target=\"_blank\"\u003EAskZDNet+news@gmail.com\u003C\u002Fa\u003E as the address for subscribing to email newsletters. Then create a filter that applies the Newsletter label and skips the Inbox. Marie Kondo would be proud. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"cce67a1a-6848-4f69-bee4-4f5c80613d1b\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fcce67a1a-6848-4f69-bee4-4f5c80613d1b\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EOne problem with Gmail's plus-sign aliases is that they give away your primary address. A spammer can just strip away the plus sign and everything after and begin cluttering up your inbox. \u003C\u002Fp\u003E\u003Cp\u003EA free Outlook.com account has much more versatile alias options. You can create up to 10 aliases that don't have to have any connection to your primary address. (Go to \u003Ca href=\"https:\u002F\u002Faccount.live.com\u002Fnames\u002Fmanage\" target=\"_blank\"\u003Ehttps:\u002F\u002Faccount.live.com\u002Fnames\u002Fmanage\u003C\u002Fa\u003E and sign in with your Microsoft account to create a new alias or remove an existing one.) Messages sent to an alias arrive in the same inbox as those sent to the primary email address and can be moved out of the Inbox and into custom folders using Outlook rules. If you're getting too much spam at an alias, you can delete it (and open up a slot for a new one). Any email sent to a deleted alias gets bounced back to the sender and is never forwarded. \u003C\u002Fp\u003E\u003Cp\u003EIf neither of those options is attractive, consider using \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"29400f32-5bf0-4e2c-858f-c8bab64dde1e\" data-raw-url=\"https:\u002F\u002Fsimplelogin.io\u002Fpricing\u002F\" data-link-shortcode-text=\"SimpleLogin\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, an open-source alternative that lets you create aliases that can be associated with any mailbox. (If you run your own mail server, you can even self-host the software.) The free Simple Login plan allows up to 15 aliases for one mailbox. Upgrading to the Premium plan for $4 a month (or $30 a year) unlocks unlimited aliases, unlimited mailboxes, unlimited custom domains, and PGP encryption. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003ESend your questions to \u003C\u002Fem\u003E\u003Ca href=\"mailto:ask@zdnet.com\" target=\"_blank\"\u003E\u003Cem\u003Eask@zdnet.com\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E. Due to the volume of submissions, we can't guarantee a personal reply, but we do promise to read every letter and respond right here to the ones that we think our readers will care about. Be sure to include a working email address in case we have follow-up questions. We promise not to use it for any other purpose. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"734f1f41-08e0-4fd8-932e-a858274833f8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F734f1f41-08e0-4fd8-932e-a858274833f8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003E \u003Cbr\u003E\u003C\u002Fem\u003E\u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-21 11:00:02",timezone:"UTC",updated:c,published:c},description:"Got a tech question? Ed Bott and ZDNet's squad of editors and experts probably have the answer.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c4befa33-a84d-4644-a6fb-8b7ec9f487ea",image:{id:"fd216892-97a3-4886-b449-d9130444b717",filename:"gettyimages-465070386-email-alias.jpg",dateCreated:{created:c,date:"2022-06-15 17:46:21",timezone:"UTC",updated:c,published:c},alt:"email alias symbol",credits:"Getty Image",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F15\u002Ffd216892-97a3-4886-b449-d9130444b717\u002Fgettyimages-465070386-email-alias.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2720,height:1530,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Services & Software^Productivity",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-can-i-keep-junk-email-out-of-my-inbox-without-juggling-two-or-more-email-accounts-ask-zdnet",startYear:c,summary:b,title:"How can I keep junk email out of my inbox without juggling two or more email accounts? [Ask ZDNet]",topic:{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10a72f10-ec91-11e3-95d2-02911863765e",slug:"laptops",name:"Laptops",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"9c2d6ccd-a89f-4131-b26d-7c028ca2379d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Yuichiro Chino \u002F GettyImages\" data-image-alt-text=\"Future Internet cybersecurity\" data-image-filename=\"future-internet-cybersecurity.jpg\" data-image-date-created=\"2022\u002F09\u002F12\" data-image-width=\"1540\" data-image-height=\"866\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWhile the internet has undoubtedly brought new benefits, it's also brought new problems as cyber criminals look to exploit our seemingly ever-growing reliance on connectivity.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e2f3a92b-89ac-4447-be15-4893872020b1\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe2f3a92b-89ac-4447-be15-4893872020b1\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\" target=\"_blank\"\u003EPhishing emails\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F\" target=\"_blank\"\u003Emalware\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\u002F\" target=\"_blank\"\u003Eransomware attacks\u003C\u002Fa\u003E, or getting your \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmy-stolen-credit-card-details-were-used-4500-miles-away-i-tried-to-find-out-how-it-happened\u002F\" target=\"_blank\"\u003Ebank details\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fa-security-researcher-told-me-my-passwords-and-more-how-15-years-of-digital-footprints-left-me-exposed\u002F\" target=\"_blank\"\u003Epasswords and other personal information stolen\u003C\u002Fa\u003E – the internet has provided malicious hackers with a variety of new ways to make money and cause disruption. Just look, for example, at how \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcritical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\u002F\" target=\"_blank\"\u003Ecritical infrastructure,\u003C\u002Fa\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-second-biggest-school-district-in-the-us-was-hit-with-ransomware\u002F\" target=\"_blank\"\u003Eschools\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-ransomware-attacks-are-piling-up-the-pressure-on-public-services\u002F\" target=\"_blank\"\u003Ehospitals\u003C\u002Fa\u003E have been affected by cyberattacks.\u003C\u002Fp\u003E\u003Cp\u003EWe're yet to fully secure networks against \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-biggest-cybersecurity-threats-make-sure-you-arent-ignoring-them\u002F\" target=\"_blank\"\u003Etoday's internet threats\u003C\u002Fa\u003E, yet technology is moving on already, bringing new threats that we must somehow prepare for.\u003C\u002Fp\u003E\u003Ch2\u003EQuantum: crypto cracking and mining\u003C\u002Fh2\u003E\u003Cp\u003EOne of the most significant technological breakthroughs heading our way is \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-quantum-computing-everything-you-need-to-know-about-the-strange-world-of-quantum-computers\u002F\" target=\"_blank\"\u003Equantum computing\u003C\u002Fa\u003E, which promises to be able to quickly solve complex problems that have defeated classical computers.\u003C\u002Fp\u003E\u003Cp\u003EWhile this advance will bring benefits to scientific research and society, it will also create new challenges. Most notably, the power of quantum computing could make quick work of cracking the encryption algorithms we've used for decades to secure a range of areas, including online banking, secure communications and digital signatures. \u003C\u002Fp\u003E\u003Cp\u003ECurrently, quantum computing is expensive and the expertise required to develop it is restricted to large technology companies, research institutions and governments. But like any innovative technology, it will eventually become more commercially available and easier to access – and cyber criminals will be looking to take advantage of quantum.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"ca801408-3739-41b4-9ca2-b89e9246a7d7\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fca801408-3739-41b4-9ca2-b89e9246a7d7\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"There's some things over the horizon that you can see coming; notably quantum computing being able to crack current encryption algorithms,\" says Martin Lee, technical lead of security research at Cisco Talos.\u003C\u002Fp\u003E\u003Cp\u003E\"What was an entirely appropriate encryption key length 20 years ago is no longer appropriate\". \u003C\u002Fp\u003E\u003Cp\u003EThe US Cybersecurity and Infrastructure Security Agency (CISA) \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fquantum-computing-poses-cyber-threats-to-critical-infrastructure-action-to-secure-it-is-needed-now-warns-cisa\u002F\" target=\"_blank\"\u003Ehas already warned that action must be taken now to help protect networks from cyberattacks powered by quantum computing\u003C\u002Fa\u003E, particularly those that support critical national infrastructure. \u003C\u002Fp\u003E\u003Cp\u003EBut while disruptive cyberattacks powered by quantum computing are a key cybersecurity threat of the future, quantum computers could themselves be a lucrative target of hackers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-stakes-could-not-be-any-higher-cisa-chief-talks-about-the-tech-challenges-ahead\u002F\"\u003E\u003Cstrong\u003EThe stakes 'could not be any higher': CISA chief talks about the tech challenges ahead\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ELet's think of the specific example of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-sneaky-cryptocurrency-mining-malware-hides-on-windows-pc-for-a-month-before-launching\u002F\" target=\"_blank\"\u003Ecrypto-mining malware\u003C\u002Fa\u003E. This is a form of malware that attackers install on computers and servers to secretly use the power of someone else's network to mine for cryptocurrency and pocket the profits – all without needing to pay for the resources or the power being consumed.\u003C\u002Fp\u003E\u003Cp\u003ECryptocurrencies, such as Bitcoin, are generated by computers by solving complex mathematical problems – the sort of mathematical problems that could be relatively trivial for a network of quantum computers to solve. That means that if cyber criminals were able to plant crypto-mining malware on quantum computers, they could get very rich very quickly – at almost no cost to themselves. \u003C\u002Fp\u003E\u003Cp\u003E\"Infecting one of those would allow somebody to start calculating very complex algorithms,\" says David Sancho, senior antivirus researcher at Trend Micro. \u003C\u002Fp\u003E\u003Cp\u003E\"If you have a crypto miner on a quantum computer, that's going to tremendously speed up your mining capabilities – those things becoming a target of trivial cyberattacks, it's a very easy prediction to make.\"\u003C\u002Fp\u003E\u003Ch2\u003EExploiting AI and ML\u003C\u002Fh2\u003E\u003Cp\u003EBut quantum computing isn't the only emerging technology that cyber criminals will look to take advantage of: we can expect them to exploit developments in \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-ai-heres-everything-you-need-to-know-about-artificial-intelligence\u002F\" target=\"_blank\"\u003Eartificial intelligence (AI) and machine learning (ML)\u003C\u002Fa\u003E, too.\u003C\u002Fp\u003E\u003Cp\u003ELike quantum computing, AI and ML look set to power \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5-exciting-applications-for-artificial-intelligence\u002F\" target=\"_blank\"\u003Einnovations in a range of areas\u003C\u002Fa\u003E, including robotics and driverless cars, speech and language recognition, healthcare and more.\u003C\u002Fp\u003E\u003Cp\u003EAI that can adapt and learn can be used for good, but ultimately, once it becomes more widely available, it's only a matter of time before cyber criminals are using it to help make cyberattacks more effective.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"c1c64b97-f918-4f5b-acae-43981f87d8e6\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fc1c64b97-f918-4f5b-acae-43981f87d8e6\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"We will start seeing malware campaigns, ransomware operations and phishing campaigns being run totally automated by machine-learning frameworks. It hasn't been done yet but it wouldn't be very hard at all to do,\" says Mikko Hyppönen, chief research officer at WithSecure. \u003C\u002Fp\u003E\u003Cp\u003EOne means of exploiting this technology would be programming a text-based generation algorithm to send out, and reply to, common spam emails or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-biggest-cyber-crime-threat-is-also-the-one-that-nobody-wants-to-talk-about\u002F\" target=\"_blank\"\u003Ebusiness email compromise (BEC) campaigns\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ERather than needing a human to take time out to write and reply to messages, criminals could rely on an algorithm that can also analyse which responses are most likely to be real victims that are worth replying to, rather than people who remain unconvinced, or those who send prank replies back to the spammer. That reality means in future you could end up being scammed – by a bot.\u003C\u002Fp\u003E\u003Cp\u003EThere's also the potential that cyber criminals could use advancements in ML to develop self-programming smart malware which, rather than needing a developer to support it, could update itself by automatically reacting to the cyber defences it meets to have the greatest chance of being effective.\u003C\u002Fp\u003E\u003Cp\u003E\"You could imagine when self-programming programs become more capable than right now where they can finish functions created by humans – that sounds great until you give it ransomware,\" says Hyppönen. \u003C\u002Fp\u003E\u003Cp\u003E\"It could change the code, make it more complex to understand, make it so it's different every time, it could try to create undetectable versions. All of that is technically doable, we simply haven't seen it yet – and I think we will,\" he warns. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fspy-chiefs-warning-our-foes-are-now-pouring-money-into-quantum-computing-and-ai\u002F\"\u003E\u003Cstrong\u003ESpy chief's warning: Our foes are now 'pouring money' into quantum computing and AI\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EDeepfakes\u003C\u002Fh2\u003E\u003Cp\u003EBut AI being abused to power cyber threats isn't a just a future problem for the internet – \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-next-big-security-threat-is-staring-us-in-the-face-tackling-it-is-going-to-be-tough\u002F\" target=\"_blank\"\u003Eit's already happening now\u003C\u002Fa\u003E, with deep learning being used to power deepfakes, which are videos that look like they're real people or events but are actually fake.\u003C\u002Fp\u003E\u003Cp\u003EThey've been used in political misinformation campaigns, pranks to fool politicians – and they're already being used to enhance BEC and other fraud attacks, with cyber criminals using deepfake audio to convince employees to authorise significant financial transfers to accounts owned by the attackers. \u003C\u002Fp\u003E\u003Cp\u003E\"We're entering this brave new world around deepfake video that will be used to commit crimes. Not just manipulation, but also in disinformation and misinformation,\" says Theresa Payton, CEO of Fortalice Solutions and former CIO at the White House. \u003C\u002Fp\u003E\u003Cp\u003ETake the example of CEOs who are in the public-facing realm. They appear on television, they give speeches, are there are videos of them online, so it's relatively simple to find recordings of what they sound like – and it's already possible for scammers to run those resources through deepfake technology to mimic their voice.\u003C\u002Fp\u003E\u003Cp\u003EAfter all, if an employee gets a call from the head of the company telling them to do something, they're likely to do it – and the cyber criminals behind these attacks know this fact. \u003C\u002Fp\u003E\u003Cp\u003E\"I already know of three cases where deepfake audio was used to successfully convince somebody to transfer money to a place they shouldn't have transferred it. That is stunning to me that as a sample size of one, I already know of three cases,\" says Payton. \u003C\u002Fp\u003E\u003Cp\u003EAnd as the technology behind deepfakes continues to improve, it means that it will only get harder to tell what's real from what's fake. \u003C\u002Fp\u003E\u003Cp\u003E\"I grow increasingly concerned about our lack of ability to really shut down manipulation campaigns,\" says Payton.\u003C\u002Fp\u003E\u003Ch2\u003EInternet of compromised Things\u003C\u002Fh2\u003E\u003Cp\u003EDeepfakes aren't the only area where cyber threats could impact our everyday lives if the future of the internet isn't secured properly. Increasingly, smart Internet of Things (IoT) devices are becoming a bigger part of our daily existence, with a variety of sensors, appliances, wearable devices and other connected products appearing in homes, offices, factories, and more. \u003C\u002Fp\u003E\u003Cp\u003EWhile there are certain advantages to connecting IoT devices to our home and workplace networks, this increased level of networking is also \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyour-insecure-internet-of-things-devices-are-putting-everyone-at-risk-of-attack\u002F\" target=\"_blank\"\u003Ecreating a larger attack surface for cyber criminals to try to exploit\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\"When you add functionality and connectivity into everyday devices, they become hackable. Devices that were unhackable become hackable. It might be very hard. Nevertheless, it is always doable. There is no secure computer. There is no unhackable device,\" explains Hyppönen. \u003C\u002Fp\u003E\u003Cp\u003E\"This is the thing that's happening now during our time, and there's no stopping it. It doesn't matter what we think about it, it's going to happen anyway, and it's going to be increasingly invisible.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"dc986618-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fdc986618-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThink about your home appliances: it's increasingly likely they're 'smart' and connected to the internet. Anything from your television to your toothbrush could now be internet-connected. \u003C\u002Fp\u003E\u003Cp\u003EBut for appliance manufacturers, building internet-connected devices is a relatively new phenomenon and many won't have needed to think about cybersecurity threats before. Some vendors might not even think about it in the design process at all, leaving the products vulnerable to hackers. \u003C\u002Fp\u003E\u003Cp\u003EWhile hackers coming after \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcoffee-machines-cuddly-toys-and-cars-the-internet-of-things-devices-which-could-put-you-at-risk-from-hackers\u002F\" target=\"_blank\"\u003Eyour coffee machine or your fish tank\u003C\u002Fa\u003E might not sound like a concern, it's a point on the network that can be accessed and used as a gateway to attack more important devices and sensitive data.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcritical-iot-security-camera-vulnerability-allows-attackers-to-remotely-watch-live-video-and-gain-access-to-networks\u002F\"\u003E\u003Cstrong\u003ECritical IoT security camera vulnerability allows attackers to remotely watch live video - and gain access to networks\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile IoT security should (hopefully) improve as it becomes more widespread, there's also another problem to consider. There's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-iot-is-getting-a-lot-bigger-but-security-is-still-getting-left-behind\u002F\" target=\"_blank\"\u003Ealready millions and millions of IoT devices out there that lack security\u003C\u002Fa\u003E – and these might not even be supported with security updates.\u003C\u002Fp\u003E\u003Cp\u003EThink about how many smartphones can't receive security updates after just a few years. Then scale that reality up to the fast-growing IoT – what's going to happen if devices that aren't regularly replaced, such as a refrigerator or a car, can continue to be used for decades? \u003C\u002Fp\u003E\u003Cp\u003E\"There's no software vendor on the planet that would support software written 20 years ago. It's just not happening,\" says Hyppönen, who suggests that when manufacturers no longer support updates for their devices, they should open source it to allow others to do so. \u003C\u002Fp\u003E\u003Cp\u003E\"You would get the security patches for your old, outdated legacy things by paying for the service just like you pay for any other service.\"\u003C\u002Fp\u003E\u003Cp\u003EConnected devices are already becoming ubiquitous throughout society, with no sign of this trend slowing down – \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsmart-cities-will-track-our-every-move-we-will-need-to-keep-them-in-check\u002F\" target=\"_blank\"\u003Ewhole smart cities\u003C\u002Fa\u003E will become the norm. But if cybersecurity and compliance isn't a key force driving this trend, it could lead to negative consequences for everyone. \u003C\u002Fp\u003E\u003Cp\u003E\"If you don't resolve these issues, you're going to have attacks happen at a scale and speed you've never seen before – bad things will be faster. That is incredibly concerning,\" says Payton, who believes it's only a matter of time \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-its-only-a-matter-of-time-before-an-iot-smart-city-falls-victim-to-an-attack-if-action-isnt-taken-now\u002F\" target=\"_blank\"\u003Ebefore a ransomware attack holds a smart city hostage\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\"They will be a target – and we will experience some level of sustained disruption,\" she adds.\u003C\u002Fp\u003E\u003Ch2\u003ECyber security arms race\u003C\u002Fh2\u003E\u003Cp\u003EDespite the potential threats on the horizon, Payton is optimistic about the future of the internet. While cyber criminals are going to be using new technologies to help improve their attacks, those responsible for defending networks will also be deploying the same technologies to help prevent attacks. \u003C\u002Fp\u003E\u003Cp\u003E\"I'm pretty energized about our continuing ability to model nefarious behaviors, then use artificial intelligence, big data, analytics, and different types of machine learning algorithms to continue to refine technology,\" she explains \u003C\u002Fp\u003E\u003Cp\u003E\"Now, will it block everything? No, because cyber criminals are always adapting their tactics. But I do have a lot of optimism for being able to block more of the basic-to-medium types of threats that seem to get through today.\"\u003C\u002Fp\u003E\u003Cp\u003EThat sense of optimism is shared by Hyppönen, who looks back on how technology has evolved in recent years. He believes cybersecurity is improving and that even with new technologies on the horizon, it doesn't mean cyber criminals and other malicious hackers will simply have it easy. \u003C\u002Fp\u003E\u003Cp\u003E\"Computer security has never been in better shape than today. That's a controversial comment – people on the street would most likely think that data security has never been worse because they only see the failures. They only see the headlines about yet another hack,\" he says. \u003C\u002Fp\u003E\u003Cp\u003E\"But the fact is, if you compare the security of our computers today and a decade ago, it's like night and day. We're getting much, much better at security – attackers have a much, much harder time breaking through.\"\u003C\u002Fp\u003E\u003Cp\u003ELet's hope that situation remains the case – the future stability of the internet depends on it being true.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F6765f19d-41fe-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-13 13:36:48",timezone:"UTC",updated:c,published:c},description:"Innovations including quantum computing, AI and smart cities could bring a range of benefits to everyone - but hackers will also be looking to exploit them.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"b7bc8b03-485c-4bb5-bdec-4d89b44b9697",image:{id:"9c2d6ccd-a89f-4131-b26d-7c028ca2379d",filename:"future-internet-cybersecurity.jpg",dateCreated:{created:c,date:"2022-09-12 17:39:16",timezone:"UTC",updated:c,published:c},alt:"Future Internet cybersecurity",credits:"Yuichiro Chino \u002F GettyImages",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F12\u002F9c2d6ccd-a89f-4131-b26d-7c028ca2379d\u002Ffuture-internet-cybersecurity.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1540,height:866,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"the-scary-future-of-the-internet-how-the-tech-of-tomorrow-will-pose-even-bigger-cybersecurity-threats",startYear:c,summary:b,title:"The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"9d3e6108-0023-11e4-95d2-02911863765e",slug:"innovation",name:"Innovation",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"aa0b6417-744a-420b-ab00-bca94f0f48a2\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Getty\u002FBloom Productions\" data-image-alt-text=\"critical-infrastructure\" data-image-filename=\"critical-infrastructure.jpg\" data-image-date-created=\"2022\u002F08\u002F22\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ECyber attacks don't just affect the virtual world: they can have concerning real-world consequences for everyone, and a recent incident seemingly involving a near miss has demonstrated just how disruptive they can be.\u003C\u002Fp\u003E\u003Cp\u003ESouth Staffordshire Water, which provides drinking water for over 1.6 million people in the UK, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fconfused-cyber-criminals-have-hacked-a-water-company-in-a-bizarre-case-of-mistaken-identity\u002F\" target=\"_blank\"\u003Ewas hit by what it described as \"a criminal cyber attack\"\u003C\u002Fa\u003E which caused disruption to corporate IT networks. \u003C\u002Fp\u003E\u003Cp\u003ECrucially, despite claims by the Clop \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-attacks-are-the-biggest-global-cyber-threat-and-still-evolving-warns-cybersecurity-chief\u002F\" target=\"_blank\"\u003Eransomware\u003C\u002Fa\u003E group that they had access to industrial systems that control chemicals in the water, the company said this wasn't the case and a government statement said there was no impact on South Staffordshire Water's ability to safely supply drinking water. \u003C\u002Fp\u003E\u003Cp\u003EClop also claimed that despite gaining access to the network, they didn't encrypt any data, citing that they \"do not attack critical infrastructure.\" Nonetheless, the hackers said they stole over 5TB of data and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\u002F\" target=\"_blank\"\u003Eattempted to extort a ransom payment in return for not releasing it\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EIt's still unclear how the situation was resolved, but the attack raises a worrying question: what would've happened if cyber criminals had managed to encrypt the networks that control water supplies? \u003C\u002Fp\u003E\u003Cp\u003EFor starters, it's a particularly bad time for something like this to happen: dought has been declared in many areas of the UK following months of heatwaves, and a restriction to the water supply could've made things much worse. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EA%20winning%20strategy%20for%20cybersecurity%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003EA winning strategy for cybersecurity\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E (ZDNET special report)\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThen there's the prospect of what might have happened if cyber criminals really were able to change the chemical balance of the water. In this case, it's unclear if they would've had the power to do so – but it's not a theoretical form of cyber attack, because hackers have already demonstrated they can do this.\u003C\u002Fp\u003E\u003Cp\u003EOne such infamous case of this took place at a water treatment plant in \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-hacking-attacks-can-teach-us-about-defending-networks\u002F\" target=\"_blank\"\u003Ein Florida last year, when an unidentified hacker was able to tamper with chemical levels\u003C\u002Fa\u003E in the water supply to the extent it would've been poisonous to drink. Thankfully, the incident was caught before any contaminated water left the plant – but the consequences could've been dire. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattacks-against-industrial-networks-will-become-a-bigger-problem-we-need-to-fix-security-now\u002F\" target=\"_blank\"\u003ECritical infrastructure is often vulnerable to cyber attacks and cyber criminals know it\u003C\u002Fa\u003E. Just look at last year's \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcolonial-pipeline-ransomware-attack-everything-you-need-to-know\u002F\" target=\"_blank\"\u003EColonial Pipeline ransomware attack\u003C\u002Fa\u003E, an incident that panicked people into rushing to gas stations and attempting to hoard it for themselves: another case of a cyber attack influencing real-world actions. \u003C\u002Fp\u003E\u003Cp\u003EThese networks can be decades old, relying on old operating systems that are unable to receive security updates anymore, making them prime targets. In addition, these networks are \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-industrial-internet-of-things-is-still-big-mess-when-it-comes-to-security\u002F\" target=\"_blank\"\u003Eincreasingly being connected to Internet of Things devices and sensors\u003C\u002Fa\u003E, which can also leave them vulnerable to attacks.\u003C\u002Fp\u003E\u003Cp\u003EPipelines, power grids and water supplies, transport, and even \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-how-the-nhs-learned-the-lessons-of-wannacry-to-protect-hospitals-from-attack\u002F\" target=\"_blank\"\u003Ehospitals\u003C\u002Fa\u003E - all critical infrastructure vital to keep everything running, and therefore all tempting targets for hackers, be they ransomware groups out to make money, or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fukraine-says-it-has-stopped-russian-hackers-who-were-trying-to-attack-its-power-grid\u002F\" target=\"_blank\"\u003Enation-state-backed hacking groups looking to cause disruption\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\"We can limit both the likelihood and impact of these threats by: safeguarding our networks, considering the way they are technically structured and who has access to them,\" says \u003Ca href=\"https:\u002F\u002Fwww.ncsc.gov.uk\u002Fsection\u002Fprivate-sector-cni\u002Fcni\" target=\"_blank\"\u003Eadvice from the National Cyber Security Centre\u003C\u002Fa\u003E (NCSC) which warns that an attack could result in \"major detrimental impact on the availability, delivery or integrity of essential services, leading to severe economic or social consequences or to loss of life.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattacks-on-critical-infrastructure-are-dangerous-soon-they-could-turn-deadly-warns-analyst\u002F\"\u003E\u003Cstrong\u003EAttacks \ton critical infrastructure are dangerous. Soon they could turn \tdeadly, warn analysts\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn order to protect networks – and people – from the consequences of attacks, which could be significant, many of the required security measures are among the most commonly recommended and often simplest practices.\u003C\u002Fp\u003E\u003Cp\u003EThese include ensuring that \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdont-use-these-passwords-these-are-the-most-popular-log-in-details-found-for-sale-online\u002F\" target=\"_blank\"\u003Edefault or easy-to-guess passwords\u003C\u002Fa\u003E aren't being used to secure networks and that \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\u002F\" target=\"_blank\"\u003Emulti-factor authentication\u003C\u002Fa\u003E (MFA) is applied, particularly to critical systems. For critical infrastructure and other organisations, actions like this can help protect against most attacks. \u003C\u002Fp\u003E\u003Cp\u003ECybersecurity can become more complex for critical infrastructure, particularly when dealing with older systems, which is why it's vital that those running them \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike\u002F\" target=\"_blank\"\u003Eknow their own network\u003C\u002Fa\u003E, what's connected to it and who has access. Taking all of this into account, providing access only when necessary can keep networks locked down.\u003C\u002Fp\u003E\u003Cp\u003EIn some cases, that might mean ensuring older systems aren't connected to the outside internet at all, but rather on a separate, air-gapped network, preferably offline. It might make some processes more inconvenient to manage, but it's better than the alternative should a network be breached.\u003C\u002Fp\u003E\u003Cp\u003EIncidents like the South Staffordshire Water attack and the Florida water incident show that cyber criminals are targeting critical infrastructure more and more. Action needs to be taken sooner rather than later to prevent potentially disastrous consequences not just for organizations, but for people too.\u003C\u002Fp\u003E\u003Ch3\u003EZDNET'S MONDAY OPENER \u003C\u002Fh3\u003E\u003Cp\u003E\u003Cem\u003EZDNET's Monday Opener is our opening take on the week in tech, written by members of our editorial team. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch3\u003E PREVIOUSLY ON ZDNET'S MONDAY OPENER : \u003C\u002Fh3\u003E\u003Cul\u003E \t\u003Cbr\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fremote-work-or-back-to-the-office-why-the-biggest-challenges-are-still-ahead\u002F\"\u003ERemote work or back to the office: Why the biggest challenges are still ahead\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnasa-is-blazing-an-inspirational-trail-we-need-to-make-sure-everyone-can-follow-it\u002F\"\u003ENASA is blazing an inspirational trail. We need to make sure everyone can follow it\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyour-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology\u002F\"\u003EYour \tbiggest cyber-crime threat has almost nothing to do with technology\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-next-big-security-threat-is-staring-us-in-the-face-tackling-it-is-going-to-be-tough\u002F\"\u003EThe \tnext big security threat is staring us in the face. Tackling it is \tgoing to be tough\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fprofessional-development\u002Flove-it-or-loath-it-gen-zers-are-driving-the-push-to-work-in-the-office\u002F\"\u003ELove \tit or loathe it, Gen Zers are driving the push to work in the office\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fprofessional-development\u002Fremote-work-or-hybrid-why-employers-have-changed-their-minds\u002F\"\u003ERemote \twork or in the office? Why the tide could turn again\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-four-day-week-will-solve-some-works-biggest-problems-but-only-if-companies-can-adapt\u002F\"\u003EThe \tfour-day week will solve some of work's biggest problems - but only \tif companies can adapt\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cul\u003E \t\u003Cbr\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-08-21 22:00:00",timezone:"UTC",updated:c,published:c},description:"A ransomware gang recently infiltrated a water company, and critical infrastructure providers need to take lessons from it to avoid potentially catastrophic consequences.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"b82d4084-dff6-4825-bfca-7a5084cc1d3a",image:{id:"aa0b6417-744a-420b-ab00-bca94f0f48a2",filename:"critical-infrastructure.jpg",dateCreated:{created:c,date:"2022-08-22 14:17:42",timezone:"UTC",updated:c,published:c},alt:"critical-infrastructure",credits:"Getty\u002FBloom Productions",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F22\u002Faa0b6417-744a-420b-ab00-bca94f0f48a2\u002Fcritical-infrastructure.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now",startYear:c,summary:b,title:"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than two decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (scheduled for publication in 2022).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"70a27718-986e-4ccd-b086-0f0d6a0a3308\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Getty Images\" data-image-alt-text=\"apps sync to multiple devices\" data-image-filename=\"gettyimages-171241293-synced-pcs2.jpg\" data-image-date-created=\"2022\u002F06\u002F08\" data-image-width=\"4155\" data-image-height=\"2337\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"bf1fc5fa-8a77-44cb-94d2-d2b56bcb14c3\" data-size=\"small\" data-float=\"right\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-alt-text=\"ask-zd-270.jpg\" data-image-filename=\"ask-zd-270.jpg\" data-image-date-created=\"2022\u002F04\u002F07\" data-image-width=\"270\" data-image-height=\"185\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWelcome to the latest installment of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fblog\u002Fask-zdnet\u002F\" target=\"_blank\"\u003EAsk ZDNet\u003C\u002Fa\u003E, where we answer the questions that stump Alexa. \u003C\u002Fp\u003E\u003Cp\u003EIn the mailbag this week: A reader works from two homes that are 1,000 miles apart. Is there a way to keep the content on his two PCs identical? \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"946759d6-f849-4616-93ab-a0b1b18be44b\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou're not alone in this request. Lots of people want to keep two PCs in sync (a desktop and laptop, usually) even when those PCs are in different rooms of the same house. It doesn't matter that your PCs are in two different states—the solution is still the same: Use the cloud.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How do I keep two PCs in sync when they're in different locations?\" data-superlative=\"I regularly travel between New York City and Miami Beach, where I have a second home. I have a desktop PC with a big monitor in each location. Is there a way to keep the content on these two PCs identical? My main email account is on Gmail. I have a Microsoft 365 Home account and also use Quicken along with some maritime and sailing and weather apps. I also have several thousand bookmarks.\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EGiven the software and cloud services you listed here, you're already most of the way to achieving most of what you want to do. \u003C\u002Fp\u003E\u003Cp\u003EYour Gmail account is already in the cloud with Google. You can send, receive, and review your email messages from anywhere, using a web browser or a dedicated email app. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"f4799f1a-47ab-4c7a-bad5-805647caecfc\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Ff4799f1a-47ab-4c7a-bad5-805647caecfc\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThousands of bookmarks? Use Google Chrome or Microsoft Edge as your default browser on both PCs, and then sign in with your Google account (for Chrome) or Microsoft account (for Edge) and let the browser take care of keeping your bookmarks in sync. \u003C\u002Fp\u003E\u003Cp\u003EHaving a Microsoft 365 subscription gives you the right to install the Office desktop apps (Word, Excel, Outlook, and the rest) on up to five PCs. Go to the Office home page (\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ec2bd4a4-010c-414c-80ef-e32a4046e9d1\" data-raw-url=\"https:\u002F\u002Fwww.office.com\" data-link-shortcode-text=\"https:\u002F\u002Fwww.office.com\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E), sign in with your Microsoft account, and click the Install Office button. \u003C\u002Fp\u003E\u003Cp\u003EMore importantly, that Microsoft 365 subscription includes 1 TB of storage in OneDrive, which should be more than enough to keep all your data files in sync. If you add, edit, or delete a file on one PC, your changes will automatically synchronize across the Internet to your other PC. \u003C\u002Fp\u003E\u003Cp\u003EYou'll have to do a minimal amount of work to install the remainder of your apps on each PC, but that's a one-time task. \u003C\u002Fp\u003E\u003Cp\u003EYou can streamline the synchronization process by setting up OneDrive so that your Desktop, Documents, and Pictures folders are automatically synced to the cloud. (You'll find this option on the Backup tab in the OneDrive Settings dialog box.) For your traditional apps that aren't cloud-aware, just put their data files in the Documents folder and let OneDrive take care of keeping them in sync. \u003C\u002Fp\u003E\u003Cp\u003EAnd when all that's done, you'll have essentially identical PC setups in both your homes.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-drive-vs-onedrive-which-one-is-better-for-your-business\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EGoogle Drive vs. OneDrive: Which one is better for your business?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003ESend your questions to \u003C\u002Fem\u003E\u003Ca href=\"mailto:ask@zdnet.com\" target=\"_blank\"\u003E\u003Cem\u003Eask@zdnet.com\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E. Due to the volume of submissions, we can't guarantee a personal reply, but we do promise to read every letter and respond right here to the ones that we think our readers will care about. Be sure to include a working email address in case we have follow-up questions. We promise not to use it for any other purpose. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"734f1f41-08e0-4fd8-932e-a858274833f8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F734f1f41-08e0-4fd8-932e-a858274833f8\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003E \u003Cbr\u003E\u003C\u002Fem\u003E\u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-06-10 11:04:26",timezone:"UTC",updated:c,published:c},description:"Got a tech question? Ed Bott and ZDNet's squad of editors and experts probably have the answer.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"99310ea0-9ab0-4234-9fa7-a9ba9334ed8a",image:{id:"70a27718-986e-4ccd-b086-0f0d6a0a3308",filename:"gettyimages-171241293-synced-pcs2.jpg",dateCreated:{created:c,date:"2022-06-08 19:24:51",timezone:"UTC",updated:c,published:c},alt:"apps sync to multiple devices",credits:"Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F06\u002F08\u002F70a27718-986e-4ccd-b086-0f0d6a0a3308\u002Fgettyimages-171241293-synced-pcs2.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4155,height:2337,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Services & Software^Productivity",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"how-do-i-keep-two-pcs-in-sync-when-theyre-in-different-locations-ask-zdnet",startYear:c,summary:b,title:"How do I keep two PCs in sync when they're in different locations? [Ask ZDNet]",topic:{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10a72f10-ec91-11e3-95d2-02911863765e",slug:"laptops",name:"Laptops",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"11ec38e5-ec91-11e3-95d2-02911863765e",slug:"windows",name:"Windows",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"5cae6838-8176-11e2-9d12-0018fe8a00b0",username:"steveranger",profileUrl:c,email:c,firstName:"Steve",lastName:"Ranger",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"cfff1b63-6e97-4f64-b0ff-ffa2d16dc37b",filename:"steve-ranger.jpg",dateCreated:{created:c,date:"2022-08-05 14:20:17",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fcfff1b63-6e97-4f64-b0ff-ffa2d16dc37b\u002Fsteve-ranger.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Steve Ranger is the editorial director of ZDNET. An award-winning journalist, Steve writes about the intersection of technology, business and culture, and regularly appears on TV and radio discussing tech issues. Previously he was the editor of silicon.com.",profile:c,title:"Global News Director",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"d980e593-9593-49ee-bec3-b8273ea8e897\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image Getty Images\u002FBloom Productions\" data-image-alt-text=\"internet\" data-image-filename=\"internet.jpg\" data-image-date-created=\"2022\u002F09\u002F13\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe vision of the internet as a free and open space for exchanging information and innovation was perhaps never much more than that – a utopian dream.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"e2f3a92b-89ac-4447-be15-4893872020b1\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fe2f3a92b-89ac-4447-be15-4893872020b1\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn reality the internet was in many respects a lucky accident, one with its origins in a collection of US government technology projects, that somehow grew into a global network. And the values of some of the early enthusiasts -- who believed in open flows of information, freedom of speech, limited regulation -- seemed, at least initially, to spread as the internet grew. \u003C\u002Fp\u003E\u003Cp\u003EBut that was a long time ago. \u003C\u002Fp\u003E\u003Cp\u003EAs the internet (and the world wide web built on top of it) started to gather momentum, that optimistic if somewhat amateurish ethos started to give way, or rather was elbowed aside, by more powerful forces -- mostly to do with money and power. \u003C\u002Fp\u003E\u003Cp\u003E\"The era of the global internet is over. Washington has worked closely over the last three decades with the private sector and allies to promote a vision of a global, open, secure, and interoperable internet, but the reality of cyberspace is now starkly different. The internet is more fragmented, less free, and more dangerous,\" warns a recent report from the influential \u003Ca href=\"https:\u002F\u002Fwww.cfr.org\u002Freport\u002Fconfronting-reality-in-cyberspace\u002Fintroduction\" target=\"_blank\"\u003ECouncil on Foreign Relations\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EThe dotcom boom-and-bust made both entrepreneurs and governments aware of the opportunities and threats offered by this new network.\u003C\u002Fp\u003E\u003Cp\u003EThe rise of big technology companies over the last two decades has made the internet more usable for most people, but has also lead to the creation of a series of 'walled gardens' controlled by them, within which information is held and not easily relocated. \u003C\u002Fp\u003E\u003Cp\u003EAs a result, a small number of very large companies control what you search for online, or where you share information with your friends, or even do your shopping. \u003C\u002Fp\u003E\u003Cp\u003EEven worse, these companies have done much to develop what is effectively 'surveillance capitalism' -- taking the information we have shared with them (about what we do, where we go and who we know) to sell to advertisers and others. As smartphones have become one of the key ways we access the web, that surveillance capitalism now follows us wherever we go. And while the rise of social media (the so-called 'Web 2.0' era) promised to make it possible for individuals to produce and share their own content, it was still mostly the big tech companies that remained the gatekeepers. \u003C\u002Fp\u003E\u003Cp\u003EA platform that was once about openness seems to be dominated by big tech.\u003C\u002Fp\u003E\u003Cp\u003EFor their part, governments have realised the power of the internet and have become keen to harness it. And while the internet has largely been a US invention, and at least tacitly controlled by the US since, that's changing now. Some governments enact laws and regulations which are understandable and benign, aiming to protect the rights and privacy of their citizens. Meanwhile, other states try to protect their power by preventing people from accessing information and services. Internet shutdowns, where states decide to simply switch off the internet in times of crisis, are increasingly common.\u003C\u002Fp\u003E\u003Cp\u003EAs a result, the internet is increasingly fragmenting into zones of influence – the so-called 'splinternet' effect. \u003C\u002Fp\u003E\u003Cp\u003E\"We cannot let the Internet become a pawn of geopolitics. Politicizing decisions about the Internet's inner workings sets a dangerous precedent that puts us on the fast track to a 'splinternet' -- an Internet artificially carved up along political, economic, and technological boundaries. The effects may be irreversible, opening the door for further restrictions across the globe,\" warned \u003Ca href=\"https:\u002F\u002Fwww.internetsociety.org\u002Fnews\u002Fstatements\u002F2022\u002Fdefend-the-internet-stop-the-splinternet\u002F\" target=\"_blank\"\u003Ethe Internet Society\u003C\u002Fa\u003E earlier this year.\u003C\u002Fp\u003E\u003Cp\u003E\"A world in which digital protectionism creates a 'splinternet' will be a world in which people in different countries lose the ability to learn from each other and interact with each other -- a world in which people will be poorer in every sense of the word. For economic, political and cultural reasons, it is vital that data can continue to flow freely across borders, and that governments work together to make this possible,\" said financial services industry body \u003Ca href=\"https:\u002F\u002Fcms.thecityuk.com\u002Fmedia\u002Fowedzyoh\u002Fdigital-trade-a-commercially-viable-approach.pdf\" target=\"_blank\"\u003ETheCityUK in a recent report\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EProjects such as the Great Firewall of China, which blocks access to many services and data sources hosted in the West, are the most obvious manifestations of this. Russia, too has made efforts to distance itself from the broader internet, cutting off Russians from services like Facebook. \u003C\u002Fp\u003E\u003Cp\u003EThe Council on Foreign Relations points to moves by Beijing and Moscow, in particular, which are trying to create a vision of cyber sovereignty based on state control over the internet. \"The international competition for power is accelerating the fragmentation of technology spheres,\" it warns.\u003C\u002Fp\u003E\u003Cp\u003EBut despite these efforts to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-web-is-under-attack-this-ambitious-project-aims-to-save-it\u002F\" target=\"_blank\"\u003Emanage, commercialise and limit the reach of the internet\u003C\u002Fa\u003E, tech innovation continues, some of which claims to hold the key to reducing the concentration of power in the hands of the big tech companies.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-web3-everything-you-need-to-know-about-the-decentralised-future-of-the-internet\u002F\" target=\"_blank\"\u003EConcepts like Web3 promise a decentralised vision of the internet\u003C\u002Fa\u003E whereby the power of the big tech companies is broken. Instead, it's the individual web user who will once again have the power over what they share and when, and who profits from it. Web3 would use blockchain technologies to effectively create digital assets which you are then able to exchange or trade as you see fit. \u003C\u002Fp\u003E\u003Cp\u003EOf course, the reputation of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Ffinance\u002Fblockchain\u002Fthe-future-of-money-where-blockchain-and-cryptocurrency-will-take-us-next\u002F\" target=\"_blank\"\u003ENFTs, blockchain, Bitcoin and much of the De-Fi world\u003C\u002Fa\u003E has taken a hammering recently, being widely viewed more as a source of dismal get-rich-quick schemes and projects with major security flaws than the future of the internet. However, it's clear that beyond this messy current situation lies the potential for significant disruption.\u003C\u002Fp\u003E\u003Cp\u003EVirtual reality and augmented reality could allow the digital world to become visible around us -- overlaying everyday reality with fantastic creatures or simply serving up reminders of useful information (what was his name again?). \u003C\u002Fp\u003E\u003Cp\u003EBut big tech companies also see the emergence of these metaverse technologies as another opportunity to build their next, and perhaps the final walled garden. Whoever wins out in this new virtual world could find themselves with a permanently defensible near-monopoly on access to this digital universe, where they are making the decisions about what we see and do, and collecting all the money. \u003C\u002Fp\u003E\u003Cp\u003EWeb3 decentralised technologies such as NFTs and blockchain-based digital currencies might be a way of breaking these virtual monopolies by giving back some control. Alternatively, they may simply create a new generation of tolls for us all to pay. Either way, they are likely at least a couple of years to a decade away from the mainstream \u003Ca href=\"https:\u002F\u002Fwww.gartner.com\u002Fen\u002Fnewsroom\u002Fpress-releases\u002F2022-08-30-metaverse-web3-and-crypto-separating-blockchain-hype-from-reality\" target=\"_blank\"\u003Eaccording to tech analyst Gartner\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"f3add986-6ce5-414c-875d-ec12483a3478\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Gartner\" data-image-alt-text=\"screenshot-2022-09-13-at-10-29-10.png\" data-image-filename=\"screenshot-2022-09-13-at-10-29-10.png\" data-image-date-created=\"2022\u002F09\u002F13\" data-image-width=\"898\" data-image-height=\"590\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EJust as virtual and augmented reality could mean the digital world is always in our eyeline, other tech trends may increasingly render the internet invisible to us. \u003C\u002Fp\u003E\u003Cp\u003EAmbient computing aims to embed computing power in the world around us, so that we don't need to be permanently glued to our screens. Smart homes that adapt to our behaviour without us needing to ask are just one example of this. \u003C\u002Fp\u003E\u003Cp\u003EAgain, while there could be big benefits it also means we are again handing over lots of intimate information about our lives. That means privacy and security need to be stronger than ever, which will be a challenge as new innovations always create new security threats -- and we haven't dealt with today's security challenges particularly well. From this perspective the risk is that we are building new technologies on top of an already wobbling stack -- a high-risk digital Jenga, where a false move could see everything come tumbling down.\u003C\u002Fp\u003E\u003Cp\u003EThe internet and everything we build upon it has never been more central to modern societies, but its future has never been less clear. There is still a route to building a fairer and more open internet, but the challenges have never been greater.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"2db6bf39-e9c6-4606-a92b-50d0c4bdc8f7\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F2db6bf39-e9c6-4606-a92b-50d0c4bdc8f7\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-13 13:37:41",timezone:"UTC",updated:c,published:c},description:"Here's what to look forward to - and to fear - in the next evolution of the internet.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"8f460d3f-f432-452f-afea-6c7560fb9c90",image:{id:"d980e593-9593-49ee-bec3-b8273ea8e897",filename:"internet.jpg",dateCreated:{created:c,date:"2022-09-13 10:05:00",timezone:"UTC",updated:c,published:c},alt:"internet",credits:"Image Getty Images\u002FBloom Productions",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F09\u002F13\u002Fd980e593-9593-49ee-bec3-b8273ea8e897\u002Finternet.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Business^Internet of Things",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"the-future-of-the-web-the-good-the-bad-and-the-very-weird",startYear:c,summary:b,title:"The Future of the Web: The good, the bad and the very weird",topic:{id:"54795830-f620-4b12-bd83-5740537be838",slug:"internet-of-things",name:"Internet of Things",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"54795830-f620-4b12-bd83-5740537be838",slug:"internet-of-things",name:"Internet of Things",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9d3e6108-0023-11e4-95d2-02911863765e",slug:"innovation",name:"Innovation",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"a20d8eb8-62de-4b42-9272-580f12fb574d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Image: Getty\u002FBloom Productions\" data-image-alt-text=\"portrait-of-woman-operating-digital-interface-technology\" data-image-filename=\"portrait-of-woman-operating-digital-interface-technology.jpg\" data-image-date-created=\"2022\u002F07\u002F04\" data-image-width=\"2121\" data-image-height=\"1414\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EKeeping on top of cybersecurity risks is a constant challenge. Threats including \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\" target=\"_blank\"\u003Ephishing\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\u002F\" target=\"_blank\"\u003Emalware\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\u002F\" target=\"_blank\"\u003Eransomware\u003C\u002Fa\u003E are continually evolving and adapting, as cyber criminals regularly find new, innovative ways to conduct malicious hacking campaigns, break into computer systems and find a way to stay there. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"72263e9e-9a96-495c-b8e6-44e778f50793\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F72263e9e-9a96-495c-b8e6-44e778f50793\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThis combination is proving difficult for many companies to keep up with, resulting in \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\u002F\" target=\"_blank\"\u003Esecurity holes in networks and vulnerabilities\u003C\u002Fa\u003E left unpatched. These flaws are relatively simple elements of cybersecurity to manage, but ones with which many organisations are still attempting to grapple. \u003C\u002Fp\u003E\u003Cp\u003EEven more bad news: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhacking-gets-dangerously-real-8-cybersecurity-predictions-for-the-years-ahead\u002F\" target=\"_blank\"\u003Ethe way in which cybersecurity and cybersecurity threats keep evolving\u003C\u002Fa\u003E means there's the risk that many businesses could be left behind and dangerously exposed as technology moves forward -- and cyber threats move forward with it. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EQuantum threats \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-quantum-computing-everything-you-need-to-know-about-the-strange-world-of-quantum-computers\u002F\" target=\"_blank\"\u003EQuantum computing\u003C\u002Fa\u003E is increasingly gaining traction, with big tech companies setting out plans to deliver high-powered \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fibm-promises-a-4000-qubit-quantum-computer-by-2025-heres-what-it-means\u002F\" target=\"_blank\"\u003Equantum computing hardware in the next few years\u003C\u002Fa\u003E. The power of quantum computing could provide benefits for society in several ways, particularly when it comes to science, research, analyising algorithms, as well as improving artificial intelligence and machine learning. \u003C\u002Fp\u003E\u003Cp\u003EBut there's the risk that the rise of quantum computing poses a threat to traditional cybersecurity and encryption as we know it because quantum computers could break public-key cryptography -- it's something \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fquantum-computers-could-crack-encryption-warns-white-house-as-it-details-action-plan\u002F\" target=\"_blank\"\u003Ethe White House has warned could be a threat to businesses and national security\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Chr\u003E\u003Ch3\u003E\u003Cstrong\u003EMore on the next big challenges in tech security\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-biggest-cybersecurity-threats-make-sure-you-arent-ignoring-them\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-biggest-cybersecurity-threats-make-sure-you-arent-ignoring-them\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22These%20are%20the%20biggest%20cybersecurity%20threats.%20Make%20sure%20you%20aren't%20ignoring%20them%22%7D\"\u003E\u003Cstrong\u003EThese are the biggest cybersecurity threats. Make sure you aren't ignoring them\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22Ransomware:%20Why%20it's%20still%20a%20big%20threat,%20and%20where%20the%20gangs%20are%20going%20next%22%7D\"\u003E\u003Cstrong\u003ERansomware: Why it's still a big threat, and where the gangs are going next\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-cybersecurity-threats-of-tomorrow-that-you-should-be-thinking-about-today\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthese-are-the-cybersecurity-threats-of-tomorrow-that-you-should-be-thinking-about-today\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22These%20are%20the%20cybersecurity%20threats%20of%20tomorrow%20that%20you%20should%20be%20thinking%20about%20today%22%7D\"\u003E\u003Cstrong\u003EThese are the cybersecurity threats of tomorrow that you should be thinking about today\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fwhat-is-cybersecurity-and-why-cybersecurity-matters\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fwhat-is-cybersecurity-and-why-cybersecurity-matters\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22What,%20exactly,%20is%20cybersecurity?%20And%20why%20does%20it%20matter?%22%7D\"\u003E\u003Cstrong\u003EWhat, exactly, is cybersecurity? And why does it matter?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fbest-cybersecurity-certification\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fbest-cybersecurity-certification\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22The%207%20best%20cybersecurity%20certifications:%20Become%20a%20security%20expert%22%7D\"\u003E\u003Cstrong\u003EThe 7 best cybersecurity certifications: Become a security expert\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fcybersecurity-school\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fcybersecurity-school\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22Best%20cybersecurity%20schools%20and%20programs%22%7D\"\u003E\u003Cstrong\u003EBest cybersecurity schools and programs\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003EFor now, the encryption used to protect data is strong enough, at least when it comes to protecting it from traditional computers. The problem is that with the arrival of quantum computing, those cryptography protocols that date back decades could be challenged by high-performance quantum machines. \u003C\u002Fp\u003E\u003Cp\u003EIt's also easy to imagine \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fstate-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for\u002F\" target=\"_blank\"\u003Enation state-backed hacking groups\u003C\u002Fa\u003E trying to exploit quantum computing to commit cyber espionage (or to decode encrypted data they have stolen in the past). It's even possible that cyber-criminal groups will also look to exploit quantum to help increase the efficiency of financially motivated cyberattacks. \u003C\u002Fp\u003E\u003Cp\u003EThat threat could come in the form of using quantum computing to breach passwords and other cybersecurity defences to enter the network and install ransomware or other malware. Or attackers could deploy quantum-strengthened encryption to encrypt files as part of ransomware attacks, which are impossible to break or reverse using classical computers, meaning that a victim has no choice but to pay a ransom for a decryption key. \u003C\u002Fp\u003E\u003Cp\u003ETechnology companies are \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcryptography-safe-for-now-but-urgent-need-to-build-quantum-skills\u002F\" target=\"_blank\"\u003Eworking on quantum-proof cybersecurity\u003C\u002Fa\u003E -- and it's likely to be something that many governments, businesses and other organisations will need to think about in the coming years. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003ESoftware supply chain attacks \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"a8f4cd3e-d8c1-44ce-aa0b-f386ee9e24b8\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002Fa8f4cd3e-d8c1-44ce-aa0b-f386ee9e24b8\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe world has already seen how disruptive a cyberattack against a major software supplier can be. The attack on \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsolarwinds-heres-how-were-building-everything-around-this-new-cybersecurity-strategy\u002F\" target=\"_blank\"\u003ESolarWinds by, what was later revealed to be the Russian foreign intelligence service\u003C\u002Fa\u003E, saw hackers infiltrating the software-building process and infecting legitimate software updates with malware.\u003C\u002Fp\u003E\u003Cp\u003EUnfortunately, this is likely just a taste of what's to come, especially as more and more organisations turn towards software as a service and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhy-cloud-security-matters-and-why-you-cant-ignore-it\u002F\" target=\"_blank\"\u003Ecloud-based technological solutions\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EYour own network could be as resilient as possible to cyberattacks, but if one of your suppliers gets their network cracked by hackers, they then have an easy way into the network. \u003C\u002Fp\u003E\u003Cp\u003EConcepts like '\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsoftware-development-is-still-ignoring-security-that-needs-to-change-fast\u002F\" target=\"_blank\"\u003Esecure by design\u003C\u002Fa\u003E' can help improve cybersecurity for everyone, but with IT and cybersecurity budgets already facing challenges and software companies making tempting targets for cyber criminals, it's unlikely that software supply chain attacks will become a thing of the past any time soon. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EThe Internet of Things is making us more vulnerable \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EMany different industries are increasingly rolling out \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\u002F\" target=\"_blank\"\u003EInternet of Things\u003C\u002Fa\u003E (IoT) connected devices. From \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-the-iiot-everything-you-need-to-know-about-the-industrial-internet-of-things\u002F\" target=\"_blank\"\u003Ehuge factories connecting IoT devices to production lines\u003C\u002Fa\u003E to monitor wear and tear, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fphilips-study-finds-hospitals-struggling-to-manage-thousands-of-devices\u002F\" target=\"_blank\"\u003Ehospitals using wearable technology to treat and monitor patients\u003C\u002Fa\u003E to smart meters and other smart devices increasingly used in the home, more and more IoT products are being connected to networks. \u003C\u002Fp\u003E\u003Cp\u003EWhile they're being adopted because they provide benefits and services to users, they also risk making users more vulnerable to cyberattacks because \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiot-security-why-everyone-needs-to-step-to-ensure-the-security-of-the-internet-of-things\u002F\" target=\"_blank\"\u003Emany IoT devices are inherently insecure\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003ECyber criminals can search for IoT devices facing the public internet and can exploit the lack of security controls in many devices to gain access to networks. In one example, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcoffee-machines-cuddly-toys-and-cars-the-internet-of-things-devices-which-could-put-you-at-risk-from-hackers\u002F\" target=\"_blank\"\u003Ehackers accessed an internet-connected fish tank at a casino and used it as an entry point to steal information about customers\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003EWhile some steps are being taken to improve IoT security, they're currently very limited, particularly as manufacturers continue to rush products out to the marketplace, seemingly without giving much thought to cybersecurity. Cyber criminals know IoT is an easy target and the problem is likely to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiot-security-why-it-will-get-worse-before-it-gets-better\u002F\" target=\"_blank\"\u003Eget worse before it gets better\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EDeepfakes powering business email compromise attacks \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EBusiness email compromise (BEC) attacks are already one of the most successful forms of cyber crime -- according to the FBI, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-is-scary-but-another-scam-is-costing-victims-much-much-more-says-fbi\u002F\" target=\"_blank\"\u003Eit costs companies billions every single year\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-sneaky-type-of-phishing-is-growing-fast-because-hackers-are-seeing-big-paydays\u002F\" target=\"_blank\"\u003EThe most common way BEC attacks are carried out is via email\u003C\u002Fa\u003E, with cyber criminals hacking into legitimate email accounts \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fphishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\u002F\" target=\"_blank\"\u003Ebelonging to bosses\u003C\u002Fa\u003E and requesting staff make large financial transactions. One of the ways victims are tricked into this attack is that they're told they are working on a secret business deal that needs to be done very quickly. \u003C\u002Fp\u003E\u003Cp\u003EBut the money isn't being transferred to another business -- instead, it's being transferred to a bank account operated by the cyber criminals. The transactions often amount to hundreds of thousands of dollars and, by the time anyone notices something is wrong, the fraudsters have taken the money. \u003C\u002Fp\u003E\u003Cp\u003EBEC attacks are already highly successful using email. The \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogles-war-on-deepfakes-as-election-looms-it-shares-ton-of-ai-faked-videos\u002F\" target=\"_blank\"\u003Eemergence of deepfakes\u003C\u002Fa\u003E and other technologies could make the situation much worse. \u003C\u002Fp\u003E\u003Cp\u003EWhile people might be more suspicious of an email claiming to be from their boss, they could be more easily convinced to make the transfer if they think they're face to face with the real person, with the attacker using technology to look and sound like their CEO. \u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-warning-crooks-are-are-using-deepfakes-to-apply-for-remote-tech-jobs\u002F\" target=\"_blank\"\u003EThe FBI has warned that cyber criminals are already using deepfakes to apply for remote jobs\u003C\u002Fa\u003E and deepfake technology is only going to get better as we move forward, making it more difficult to tell the difference between videos of real people and videos of people generated by artificial intelligence and machine learning. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EDestructive malware attacks \u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EBut as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-biggest-data-breaches-of-2021\u002F\" target=\"_blank\"\u003Edemonstrated by countless cyber incidents\u003C\u002Fa\u003E, malware and cyberattacks powered by traditional computing power can still cause plenty of damage and disruption. \u003C\u002Fp\u003E\u003Cp\u003EMalware has been used to shut down nuclear plants and power stations. Global events, such as the WannaCry ransomware attack and the NotPetya attack, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fransomware-how-the-nhs-learned-the-lessons-of-wannacry-to-protect-hospitals-from-attack\u002F\" target=\"_blank\"\u003Edemonstrated how disruptive cyberattacks can be\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003ENotPetya was particularly disruptive, causing hundreds of billions in damages around the world. \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Frussian-military-behind-notpetya-attacks-uk-officially-names-and-shames-kremlin\u002F\" target=\"_blank\"\u003EWestern governments blamed the attack on Russia\u003C\u002Fa\u003E, which launched the campaign against businesses in Ukraine -- but the interconnected nature of global computer systems meant that the attack spread across much of the world. \u003C\u002Fp\u003E\u003Cp\u003ERussia has never accepted responsibility for NotPetya, or \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcaddywiper-more-destructive-wiper-malware-strikes-ukrainian-targets\u002F\" target=\"_blank\"\u003Ea string of destructive wiper malware attacks launched against Ukraine\u003C\u002Fa\u003E in the run up to and during Russia's invasion of the country. \u003C\u002Fp\u003E\u003Cp\u003EWhile these wiper campaigns have mostly focused on Ukraine, there's the possibility that a rogue state could look to launch similar destructive attacks around the world. It's another cybersecurity risk that businesses should think about planning resilience strategies around. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EThe skills crisis\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cp\u003EOne threat that is here already -- and only likely to get worse -- is the lack of trained staff to fill the vast numbers of empty tech security roles. Having the security team in place to build the defences and make sure they are maintained continues to be a problem for companies big and small and will magnify the risks created by all the other new threats.\u003C\u002Fp\u003E\u003Cp\u003EWhile preparing for the cybersecurity threats of the future is a must, it can't be done without taking care of the cybersecurity that we're faced with at present. Being on top of cybersecurity and as protected as you can be against cyberattacks today can provide a major step towards preparing to protect against the cyberattacks of tomorrow. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003ENOW READ THIS TO LEARN EVEN MORE\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fwhat-is-cybersecurity-and-why-cybersecurity-matters\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Feducation\u002Fcomputers-tech\u002Fwhat-is-cybersecurity-and-why-cybersecurity-matters\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22What,%20exactly,%20is%20cybersecurity?%20And%20why%20does%20it%20matter?%22%7D\"\u003E\u003Cstrong\u003EWhat, exactly, is cybersecurity? And why does it matter?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-07-05 14:55:00",timezone:"UTC",updated:c,published:c},description:"The rise of quantum computing, deepfakes, the Internet of Things and more are among the things that could create very real challenges for cybersecurity going forwards.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c1a5ea23-0209-47c3-a3f0-3ee95842bcd2",image:{id:"a20d8eb8-62de-4b42-9272-580f12fb574d",filename:"portrait-of-woman-operating-digital-interface-technology.jpg",dateCreated:{created:c,date:"2022-07-04 10:53:53",timezone:"UTC",updated:c,published:c},alt:"portrait-of-woman-operating-digital-interface-technology",credits:"Image: Getty\u002FBloom Productions",caption:"\u003Cp\u003EPortrait of woman operating digital interface technology.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F07\u002F04\u002Fa20d8eb8-62de-4b42-9272-580f12fb574d\u002Fportrait-of-woman-operating-digital-interface-technology.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2121,height:1414,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"these-are-the-cybersecurity-threats-of-tomorrow-that-you-should-be-thinking-about-today",startYear:c,summary:b,title:"These are the cybersecurity threats of tomorrow that you should be thinking about today",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"1aa87593-0f1d-4577-862b-a59b5ec9bc57",username:"DannyPalmerZDNet",profileUrl:c,email:c,firstName:"Danny",lastName:"Palmer",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"dd6044cc-7220-4fce-9dce-9343d1d39902",filename:"danny-palmer.jpg",dateCreated:{created:c,date:"2022-08-05 14:36:11",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fdd6044cc-7220-4fce-9dce-9343d1d39902\u002Fdanny-palmer.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Danny Palmer is a senior reporter at ZDNET. Based in London, he writes about issues including cybersecurity, hacking and malware threats.",profile:c,title:"Senior Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"video\" data-uuid=\"9df99ced-1085-4bce-89eb-b5792d3e7a24\" data-size=\"large\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIt was one of the largest cyber-espionage attacks of recent times: hackers compromised several United States government federal agencies as well as big tech companies, and were inside networks for months before anyone spotted them. \u003C\u002Fp\u003E\u003Cp\u003EThese attackers were later \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsolarwinds-us-and-uk-blame-russian-intelligence-service-hackers-for-major-cyber-attack\u002F\" target=\"_blank\"\u003Erevealed to be working for the Russian foreign intelligence service\u003C\u002Fa\u003E (SVR), and they started their attack in an unexpected way, by targeting a software company called SolarWinds. The hackers \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsolarwinds-the-more-we-learn-the-worse-it-looks\u002F\" target=\"_blank\"\u003Eaccessed builds of the company's Orion software\u003C\u002Fa\u003E, and then placed malware into software updates sent out to SolarWinds customers between March and June 2020. \u003C\u002Fp\u003E\u003Cp\u003EThe software is used by thousands of organisations around the world. Applying security updates and patches is \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\u002F\" target=\"_blank\"\u003Egenerally regarded as good cybersecurity practice\u003C\u002Fa\u003E to protect against software vulnerabilities being exploited to facilitate cyberattacks, so organisations around the world installed the Orion updates from a source they trusted. But it was that action itself that allowed the attackers in. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"900d5ad4-9774-4f52-b0ff-712023f8e4d7\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F900d5ad4-9774-4f52-b0ff-712023f8e4d7\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"It became clear early on the threat actor employed novel and sophisticated techniques indicative of a nation-state actor and consistent with the goal of cyber espionage via a supply chain attack. In addition, the operational security of the threat actor was so advanced, they not only attacked SolarWinds but were able to leverage the Sunburst malicious code and avoid detection in some of the most complex environments in the world,\" \u003Ca href=\"https:\u002F\u002Forangematter.solarwinds.com\u002F2021\u002F05\u002F07\u002Fan-investigative-update-of-the-cyberattack\u002F\" target=\"_blank\"\u003ESolarWinds said in its investigation after the attack\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003Ca href=\"http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22http:\u002F\u002Fwww.zdnet.com\u002Ftopic\u002Fa-winning-strategy-for-cybersecurity\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EA%20winning%20strategy%20for%20cybersecurity%3C\u002Fstrong%3E%22%7D\"\u003E\u003Cstrong\u003EA winning strategy for cybersecurity\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E (ZDNet special report)\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsolarwinds-attack-hit-100-companies-and-took-months-of-planning-says-white-house\u002F\" target=\"_blank\"\u003EAmong those compromised\u003C\u002Fa\u003E by \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsupply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger\u002F\" target=\"_blank\"\u003Ethe supply chain attack\u003C\u002Fa\u003E were the US Treasury Department, the Department of Homeland Security, the US Department of State, as well as cybersecurity companies including \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-fireeye-confirm-solarwinds-supply-chain-attack\u002F\" target=\"_blank\"\u003EMicrosoft, FireEye\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmimecast-reveals-source-code-theft-in-solarwinds-hack\u002F\" target=\"_blank\"\u003EMimecast\u003C\u002Fa\u003E. In total, somewhere around 100 companies were targeted by the attackers.\u003C\u002Fp\u003E\u003Cp\u003EAttackers had been active in the network for months before the attack was discovered in December 2020, when FireEye and Microsoft found intrusions into their networks. \u003C\u002Fp\u003E\u003Cp\u003EThe attack on SolarWinds was disclosed just weeks before Sudhakar Ramakrishna was set to take up his new position as CEO of the company in January 2021. \u003C\u002Fp\u003E\u003Cp\u003EDue to the magnitude of the situation, he chose to get involved with the company's attempt to investigate and resolve the incident right away. \u003C\u002Fp\u003E\u003Cp\u003E\"It was a stressful time for all involved,\" he told ZDNet. \"When the business is in a state of turmoil and crisis, there isn't time to sit on the sidelines. The decision to jump in and start working with the team was simple.\" \u003C\u002Fp\u003E\u003Cp\u003EThe first thing that had to be done was to examine what exactly had happened, how it had remained undetected for so long, and how to ensure it can never happen again. \u003C\u002Fp\u003E\u003Cp\u003EPart of that involved \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsolarwinds-hires-chris-krebs-and-alex-stamos-as-part-of-security-review\u002F\" target=\"_blank\"\u003Ebringing in the services of Krebs Stamos Group\u003C\u002Fa\u003E – a cybersecurity consultancy set up by former US government cybersecurity chief Chris Krebs, and Stanford University professor and ex-Facebook chief security officer Alex Stamos. The \u003Ca href=\"https:\u002F\u002Fwww.ncsc.gov.uk\u002Fnews\u002Fncsc-statement-on-solarwinds-compromise\" target=\"_blank\"\u003EUK's National Cyber Security Centre\u003C\u002Fa\u003E (NCSC) was also involved in helping SolarWinds in the aftermath of the incident. \u003C\u002Fp\u003E\u003Cp\u003EBut one policy Ramakrishna wanted to introduce from day one was the concept of 'Secure by Design' – building products with security more than anything else in mind. Many organisations and software developers say they take security seriously, but when there's deadlines to meet or products to repeatedly roll out updates for, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsoftware-development-is-still-ignoring-security-that-needs-to-change-fast\u002F\" target=\"_blank\"\u003Esoftware security can often get left on the sidelines\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\u003Cp\u003E\"The notion of secure by design, I had it in my mind and in practice at some level well before I joined SolarWinds,\" Ramakrishna explains. \"Between the time I came to know about the breach and the time I joined, I started formulating my thoughts in terms of how do we organise around secure by design, what does that mean and what are the various elements of that? Then essentially went about business on day one in terms of implementing that as a process.\" \u003C\u002Fp\u003E\u003Cp\u003EMuch of this secure by design philosophy applies directly to the software build system, with the process now designed around cybersecurity as the priority. \u003C\u002Fp\u003E\u003Cp\u003EOne of the reasons that cyber attackers were able to conduct the supply chain attack was because of the static nature of the software-building process, where everything is done within one pipeline of development. While that's useful for developers, it also provides a handy target for the attackers.\u003C\u002Fp\u003E\u003Cp\u003ENow, SolarWinds uses a system of parallel builds, where the location keeps changing, even after the project has been completed and shipped. Much of this access is only provided on a need-to-know basis. That means if an attacker was ever able to breach the network, there's a smaller window to poison the code with a malicious build. \u003C\u002Fp\u003E\u003Cp\u003E\"What we're really trying to achieve from a security standpoint is to reduce the threat window, providing the least amount of time possible for a threat actor to inject malware into our code,\" said Ramakrishna. \u003C\u002Fp\u003E\u003Cp\u003EBut changing the process of how code is developed, updated and shipped isn't going to help prevent cyberattacks alone, which is why SolarWinds is now investing heavily in many other areas of cybersecurity. \u003C\u002Fp\u003E\u003Cp\u003EThese areas include the likes of user training and actively looking for potential vulnerabilities in networks. Part of this involved building up a red team, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcybersecurity-how-facebooks-red-team-is-pushing-boundaries-to-keep-your-data-safe\u002F\" target=\"_blank\"\u003Ecybersecurity personnel who have the job of testing network defences\u003C\u002Fa\u003E and finding potential flaws or holes that could be abused by attackers – crucially before the attackers find them. \u003C\u002Fp\u003E\u003Cp\u003EImportantly, the rest of the company doesn't know what tactics and techniques are going to be used in tests against the network and staff – because cyber criminals and hackers don't declare exactly how they're going to conduct campaigns, either. \u003C\u002Fp\u003E\u003Cp\u003E\"They are paid to attack our internal systems, our behaviors and our internal practices. That improves the overall security consciousness of the company and that improves the overall security posture of the company,\" Ramakrishna explained. \u003C\u002Fp\u003E\u003Cp\u003EAnalysis is performed to examine which techniques and vulnerabilities are successfully used to launch attacks – but crucially, nobody is made an example of. All of the information gathered from red teaming is put back into teaching everyone how to identify cyberattacks, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\u002F\" target=\"_blank\"\u003Ephishing emails\u003C\u002Fa\u003E and other malicious activity to help drive good cybersecurity hygiene. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-do-we-stop-cyber-weapons-from-getting-out-of-control\u002F\"\u003E\u003Cstrong\u003EHow do we stop cyber weapons from getting out of control?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut Ramakrishna and SolarWinds know that implementing new cybersecurity procedures isn't just a one-time initiative, it's something that needs to be repeatedly revisited as threats change, new vulnerabilities emerge, and offensive hacking techniques evolve. \u003C\u002Fp\u003E\u003Cp\u003E\"Increasingly, this will simply become part of the fabric of the company and we won't have to talk about it in explicit terms as much as just believing in it and working on it on a daily basis,\" he says, as SolarWinds works to ensure that something like the supply chain attack can't happen again by making the network more robust and taking a more proactive approach to detecting potential malicious activity. \u003C\u002Fp\u003E\u003Cp\u003EThe company also hopes to take the lessons it has learned and help its worldwide customer base improve their cybersecurity. \u003C\u002Fp\u003E\u003Cp\u003E\"We are evolving and helping them digitally transform much faster into the future,\" said Ramakrishna. \"My hope also is that things like the build system that we have created will become more and more standards in the industry that others can leverage as well\". \u003C\u002Fp\u003E\u003Cp\u003EBy sharing what happened, SolarWinds hopes that other organisations can also learn lessons and improve their own cybersecurity strategies, because anyone can potentially be the victim of a cyberattack, particularly if those behind it have vast resources, such as the state-backed operation that breached SolarWinds. \u003C\u002Fp\u003E\u003Cp\u003E\"No one is immune, so you cannot think that it will not happen to you. It could happen to you, so just be vigilant about things and constantly learn,\" said Ramakrishna. \u003C\u002Fp\u003E\u003Cp\u003E\"Don't try to fight it alone or don't wish the problem goes away because the problem is not going to go away,\" he added. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESEE: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fclueless-hackers-spent-months-inside-a-network-and-nobody-noticed-then-a-ransomware-gang-took-over\u002F#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fclueless-hackers-spent-months-inside-a-network-and-nobody-noticed-then-a-ransomware-gang-took-over\u002F%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22Clueless%20hackers%20spent%20months%20inside%20a%20network%20and%20nobody%20noticed.%20But%20then%20a%20ransomware%20gang%20turned%20up%22%7D\"\u003E\u003Cstrong\u003EClueless hackers spent months inside a network and nobody noticed. But then a ransomware gang turned up\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ESolarWinds is implementing secure by design in its software build process and recommends that all organisations ensure they have cybersecurity frameworks in place to help manage security at every step of the way when conducting business, no matter what that may be. \u003C\u002Fp\u003E\u003Cp\u003EMost victims of cyberattacks don't speak out about them, and some will never publicly acknowledge they fell victim. But for Ramakrishna, the best way of showing other businesses what threats are out there and how to protect against them is to openly talk about what happened at SolarWinds – and he hopes that others can learn about what happened to help protect their own networks. \u003C\u002Fp\u003E\u003Cp\u003E\"I believe the best and maybe the only way to be most safe and secure is by information-sharing more transparently more quickly,\" he said. \"If you are creating a situation where there is a lot of victim-shaming that goes on, then people do not step forward to highlight what they are learning\". \u003C\u002Fp\u003E\u003Cp\u003EFor SolarWinds, there's also an element of maintaining trust. The company fell victim to one of the most infamous cyber incidents of recent times and Ramakrishna argued it was only right to be transparent with customers about what happened \u003Cbr\u003E \u003Cbr\u003E\"I truly believe you owe it to them: how can you earn that without being transparent?\" he says. \u003C\u002Fp\u003E\u003Ch3\u003E\u003Cstrong\u003EMORE ON CYBERSECURITY\u003C\u002Fstrong\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-sneaky-hacking-group-hid-inside-networks-for-18-months-without-being-detected\u002F\"\u003E\u003Cstrong\u003EThis sneaky hacking group hid inside networks for 18 months without being detected\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Finside-a-ransomware-incident-how-a-single-mistake-left-a-door-open-for-attackers\u002F\"\u003E\u003Cstrong\u003EInside a ransomware incident: How a single mistake left a door open for attackers\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-us-government-just-launched-a-big-push-to-fill-cybersecurity-jobs-with-salaries-to-match\u002F\"\u003E\u003Cstrong\u003EThe US government just launched a big push to fill cybersecurity jobs, with salaries to match\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsupply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger\u002F\"\u003E\u003Cstrong\u003ESupply chain attacks are the hacker's new favourite weapon. And the threat is getting bigger\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-company-was-hit-with-ransomware-but-didnt-have-to-pay-up-heres-how-they-did-it\u002F\"\u003E\u003Cstrong\u003EThis company was hit with ransomware, but didn't have to pay up. Here's how they did it\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-05-24 10:05:00",timezone:"UTC",updated:c,published:c},description:"The SolarWinds supply chain attack was one of the biggest cyber incidents there's ever been. Here's how the company has dealt with the aftermath.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"3e484e1c-2b4a-4bff-aef3-e4390f40b163",image:{id:"bffc00a4-0a5c-4445-88a5-91dafb55d046",filename:"solarwinds-hq-in-austin-texas.jpg",dateCreated:{created:c,date:"2022-05-06 14:15:21",timezone:"UTC",updated:c,published:c},alt:"solarwinds-hq-in-austin-texas.jpg",credits:"Image: Getty",caption:"\u003Cp\u003ESolarWinds headquarters in Austin, Texas.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F05\u002F06\u002Fbffc00a4-0a5c-4445-88a5-91dafb55d046\u002Fsolarwinds-hq-in-austin-texas.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2985,height:1990,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Innovation^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"solarwinds-heres-how-were-building-everything-around-this-new-cybersecurity-strategy",startYear:c,summary:b,title:"SolarWinds: Here's how we're building everything around this new cybersecurity strategy",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"9a23272b-10d6-11e4-9732-00505685119a",username:"David Gewirtz",profileUrl:c,email:c,firstName:"David",lastName:"Gewirtz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"de4475ef-be59-4858-beb8-6f7696c85945",filename:"david-gewirtz.jpg",dateCreated:{created:c,date:"2022-08-05 15:19:52",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fde4475ef-be59-4858-beb8-6f7696c85945\u002Fdavid-gewirtz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"In addition to hosting the ZDNET Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.\r\n\r\nDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"05c5d190-2efd-48fa-ba7a-6f88b2a2c009\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EAmazon Echo Dot (third-gen)\u003C\u002Fp\u003E\" data-image-credit=\"Amazon\" data-image-alt-text=\"Amazon Echo Dot (third-gen)\" data-image-filename=\"amazon-echo-dot-3rd-gen-best-amazon-echo.jpg\" data-image-date-created=\"2022\u002F05\u002F26\" data-image-width=\"1296\" data-image-height=\"729\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI'm a product guy. Way back in the day I was actually a product marketing executive for a big tech company. I've shipped hundreds of products over the years. You always try to marry a need with a solution. Meet enough folks' needs, and they'll buy your product.\u003C\u002Fp\u003E\u003Cp\u003EGenerally, though, people have to think they have a need. Oh, sure, that's what marketing's about. Its job is to create demand where there might not have been any. Sometimes, it generates awareness. Sometimes, it generates leads by finding folks who might be a fit for a product. Sometimes, it just generates enough hype that the product takes off as a mere side effect of an intense hype machine. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Famazons-ready-to-announce-a-bunch-of-devices-on-sept-28\u002F\" target=\"_blank\"\u003EAmazon's ready to announce a bunch of devices on Sept. 28\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"9ccc1825-3a5e-4c77-855b-dc9bec7db19d\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F9ccc1825-3a5e-4c77-855b-dc9bec7db19d\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EHow does this relate to Alexa? Back in 2014, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Famazon-echo-it-sucks-its-awesome-it-sucks-we-want-two-more\u002F\"\u003EAlexa seemed kind of weird\u003C\u002Fa\u003E. People couldn't quite figure out why you'd want one. It didn't fit any of the usual product marketing formulas.\u003C\u002Fp\u003E\u003Cp\u003EIt was a Pringles-can shaped device you could talk to. Why would you talk to it? Why would you spend a few hundred dollars for it to do what any calculator app would do? Why would you let it take up space just to be a glorified alarm clock? And lights…just flip a switch. It couldn't be any easier.\u003C\u002Fp\u003E\u003Cp\u003EAnd for playing music? Well, we had stereos, our iPods or phones, and many other ways to play tunes. Sure, the intercom feature might be helpful. But who needs an internet-connected device listening to your every word? \u003C\u002Fp\u003E\u003Cp\u003EBut with Alexa, Amazon managed to capture lightning in a bottle…er…can. \u003C\u002Fp\u003E\u003Cp\u003EI know this is subjective, but Alexa -- more so than Siri or Google's assistant -- seems to have just the right balance between personality and helpfulness, between capability and functionality. Whether you're setting a timer while cooking, performing a hands-free math calculation while writing, pausing whatever streaming service you're watching on the Roku TV to ask a trivia or general interest question, Alexa is usually relatively helpful.\u003C\u002Fp\u003E\u003Cp\u003EIn 2022, Alexa is ubiquitous. A lot of families have one in practically every room. \u003C\u002Fp\u003E\u003Cp\u003EThere's no doubt she's a faceless AI front for a giant corporation, but she has generally always been a friendly, helpful faceless AI front for a giant corporation. \u003C\u002Fp\u003E\u003Ch2\u003EThe times they are a-changin'\u003C\u002Fh2\u003E\u003Cp\u003EBut that helpfulness seems like it might be about to change. Last week, \u003Ca href=\"https:\u002F\u002Fwww.aboutamazon.com\u002Fnews\u002Fsmall-business\u002Falexa-can-now-help-brands-answer-customer-questions\"\u003EAmazon announced\u003C\u002Fa\u003E it's about to introduce vendor-supplied answers for common Alexa questions. Here's how Amazon describes it: \u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EThe capability is called Customers ask Alexa, and it works like this: When customers pose questions to Alexa, including queries related to a product's features or compatibilities, Alexa responds with helpful answers provided by brands from those product categories. \t\u003C\u002Fp\u003E\u003Cp\u003EFor example, a customer shopping for cleaning products on Amazon.com could ask, \"How can I remove pet hair from my carpet?\" A brand can now provide answers to such questions, along with links to its Amazon storefront. \t\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cp\u003E\u003Cem\u003ERuh-roh.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EAmazon says these are not paid ads. Vendors aren't paying for placement. Instead, there's going to be a new Customers ask Alexa feature in Seller Central, where vendors can see questions and answer them using \"self-service tools.\" Answers will then be moderated by an Amazon team tasked with such things. All answers will be attributed to the brand that answers them. \u003C\u002Fp\u003E\u003Cp\u003EAccording to Rajiv Mehta, general manager of Alexa Shopping at Amazon, \"Amazon recognizes brands as experts on their products. With this new capability, we have made it easier for brands to connect with customers to help answer common questions and better inform their purchase decisions.\" \u003C\u002Fp\u003E\u003Cp\u003EYeah, there's no way this could go wrong. \u003C\u002Fp\u003E\u003Cp\u003EPlaying to the algorithm for priority on the SERP (search engine response page) has already irrevocably changed editorial journalism. Most articles (mine included) go through an SEO review. Even if a headline would be enormously appealing to humans (or simply make the most sense), it might be nuked in favor of one that has higher Google juice. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EYes, you're still getting valuable content (if I do say so myself), but SEO looms large in almost every editorial decision on almost every website. It's just what everyone now has to do to keep the revenue stream (which is necessary to produce and run expensive publications) coming in. We all need good content, and we all need to pay our bills. \u003C\u002Fp\u003E\u003Cp\u003EIt's not unreasonable to expect that vendors will vie for positional prominence in Alexa's vendor-supplied answer system. It's also not unreasonable to expect that sales pitches, even if disguised as oh-so-helpful responses, will invade those answers. \u003C\u002Fp\u003E\u003Cp\u003EThis \"service\" is not expected until October, so we don't have any sample answers. But we can certainly expect questions like \"Should I use scissors or electric clippers to cut my hair\" might result in something like, \"Never pay for a haircut again with this new cutting-edge design and look your best without the help of others. This answer brought to you by ManGroomer, the ultimate do-it-yourself hair cutting kit. Would you like me to send you one? It can be there in two days.\" \u003C\u002Fp\u003E\u003Cp\u003ENow, to be fair, the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7409272b-75e6-4691-817f-230a4e16f525\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FMANGROOMER-ULTIMATE-Self-Haircut-Clippers-Waterproof\u002Fdp\u002FB0745SC21L\u002F\" data-link-shortcode-text=\"ManGroomer\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E is awesome and \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-mangroomer-because-video-conferencing-requires-that-you-dont-look-like-a-werewolf\u002F\" target=\"_blank\"\u003Edid save me from considerable Zoom meeting embarrassment\u003C\u002Fa\u003E during the height of the pandemic lockdowns. But that's not the point. Being pitched, even for products that work, spoils the helpful relationship many of us have developed with Alexa. No longer is she a trusted helpful friend, she's yet one more door-to-door salesperson trying to sell you something -- except she's already inside the house. \u003C\u002Fp\u003E\u003Cp\u003EWe've all had that friend who got all caught up in a multilevel marketing scheme. Now, instead of talking about \"how 'bout them Yankees?\", every other word is a pitch for some MLM product or another. It's annoying, off-putting, and can eventually cause damage to the relationship. \u003C\u002Fp\u003E\u003Cp\u003EIt's true that Alexa has already offered some items at random times before (Amazon Music comes to mind). We always answer with an annoyed \"Ah, no. Nuh-nuh-no.\" Sometimes she pops up with a yellow-ringed alert that's a reminder to do something about an upcoming Subscribe and Save order. But these promos and notifications have, so far, not been specifically tied to third party vendors. They don't give vendors a way to game the system for the best SEO answer results. \u003C\u002Fp\u003E\u003Cp\u003EThis is my concern for Alexa. Amazon's engineers have managed to train Alexa for just the right balance of helpfulness and unobtrusiveness. But if she's constantly trying to push an upsell at us, it's going to get old. First it's ads on answers. Then, perhaps, it would be ads in our timers. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"61084233-a6d5-4845-a3c7-00962525c926\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F61084233-a6d5-4845-a3c7-00962525c926\" data-float=\"right\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cem\u003E\"Alexa, set timer for 10 minutes.\"\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"Timer set for ten minutes. Would you like to buy Amazon's Choice Classroom Timers for Teachers. A two-pack is only $6.95. Would you like to act before midnight tonight and place your order for neon-colored timing happiness?\"\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EOr, perhaps they'll put ads in our wake-up alarms. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"Good morning David. Perhaps you'd like to buy a box of muffins. I can ship them to you right now?\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"How about more coffee pods? You know you want them.\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"Ooh, I saw you watched The Grand Tour on Amazon Prime Video. Have I got a set of floor mats for you…\"\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EWill nothing be sacred? \u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"Alexa, what's 228 divided by 19?\"\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E\"228 divided by 19 is 12. Speaking of 12, can I interest you in a 12-pack of shoe storage boxes? Amazon's Choice is now $37.95 and I can have them in your hot little hands by Thursday. All you have to do is say yes. Do you want them? Well, do you? Say yes. Go ahead. Say it.\"\u003C\u002Fem\u003E \u003C\u002Fp\u003E\u003Cp\u003EOkay, so that's probably an exaggeration. But how many previously wonderful websites now seem like pitch machines due to monetization and SEO? So what makes us think Alexa won't go down that same dark hole? The revenue stream is probably too tempting to ignore. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fhow-to-set-up-motion-triggered-smart-lights-as-an-alexa-routine\u002F\" target=\"_blank\"\u003EHow to set up motion-triggered smart lights as an Alexa routine\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EA changing relationship\u003C\u002Fh2\u003E\u003Cp\u003EI'm sad about this. Alexa has been a fantastic (and frankly unexpected) boon to many of us. At this point, she's practically a trusted member of the family. But if her essential nature is corrupted by an overreaching quest for yet more Bezos Bucks, it will be a real shame. \u003C\u002Fp\u003E\u003Cp\u003EFor example, I wouldn't feel nearly as comfortable having Alexa in my elderly parents' house if I thought she would be pressuring them with brand marketing. The same would go for having her around young children, or anyone with poor impulse control. It's just too easy to say yes to a trusted member of the family. After all, how many times have you said yes to her helpful little queries in the past nine years? \u003C\u002Fp\u003E\u003Cp\u003EFor the record, I emailed Amazon PR to ask if there's a way Amazon customers will be able to opt out of these potential upsells and how, beyond content moderation, Amazon can prevent Alexa from turning into an SEO-driven hype machine. I haven't yet gotten a response. I'll update this article if I hear back. \u003C\u002Fp\u003E\u003Cp\u003ESo, what do you think? Do you think Alexa is going to turn into an annoying upsell bot? Would you buy anything from Alexa if she pitched it as part of a question answer? Or do you think the world is just going to hell, and this is one more slippery stone on the slippery slope down? Let us know in the comments below. \u003C\u002Fp\u003E\u003Chr\u003E\u003Cp\u003E\u003Cem\u003EYou can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002Fdavidgewirtz\"\u003E@DavidGewirtz\u003C\u002Fa\u003E, on Facebook at \u003Ca href=\"https:\u002F\u002Fwww.facebook.com\u002Fdavidgewirtz\"\u003EFacebook.com\u002FDavidGewirtz\u003C\u002Fa\u003E, on Instagram at \u003Ca href=\"https:\u002F\u002Fwww.instagram.com\u002FDavidGewirtz\u002F\"\u003EInstagram.com\u002FDavidGewirtz\u003C\u002Fa\u003E, and on YouTube at \u003Ca href=\"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FDavidGewirtzTV\"\u003EYouTube.com\u002FDavidGewirtzTV\u003C\u002Fa\u003E.\u003C\u002Fem\u003E \u003C\u002Fp\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2022-09-23 15:26:00",timezone:"UTC",updated:c,published:c},description:"Because nothing is more comforting than a robot in your bedroom or kitchen pitching you to buy more stuff at all times of the day and night.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"56c69c08-668f-4e83-be55-5d848042a2ca",image:{id:"05c5d190-2efd-48fa-ba7a-6f88b2a2c009",filename:"amazon-echo-dot-3rd-gen-best-amazon-echo.jpg",dateCreated:{created:c,date:"2022-05-26 05:33:18",timezone:"UTC",updated:c,published:c},alt:"Amazon Echo Studio review | Best smart speaker",credits:c,caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F05\u002F26\u002F05c5d190-2efd-48fa-ba7a-6f88b2a2c009\u002Famazon-echo-dot-3rd-gen-best-amazon-echo.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:729,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"analysis\u002Fopinion",hubTopicPathString:"Business^Companies^Amazon",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"is-amazon-about-to-ruin-alexa-answers-with-ads",startYear:c,summary:b,title:"Is Amazon about to ruin Alexa answers with ads?",topic:{id:"0fb7a83c-ec91-11e3-95d2-02911863765e",slug:"amazon",name:"Amazon",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"0fb7a83c-ec91-11e3-95d2-02911863765e",slug:"amazon",name:"Amazon",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9d3e6108-0023-11e4-95d2-02911863765e",slug:"innovation",name:"Innovation",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:"Explore a fresh perspective",description:c,filters:c,paging:c,slug:"dynamic-topic-3-story-carousel-analysis",title:"Analysis & Opinion",label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c},{id:"ddc9226f-14b1-4a1c-9cfa-46a60a305f1f",meta:{componentName:"ddc9226f-14b1-4a1c-9cfa-46a60a305f1f",componentDisplayName:"Latest",componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002Fddc9226f-14b1-4a1c-9cfa-46a60a305f1f\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=ddc9226f-14b1-4a1c-9cfa-46a60a305f1f"}},items:[{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6835195a-fcd2-43b2-918b-8f61bcdb9fd2",filename:"lance-31.png",dateCreated:{created:c,date:"2023-05-12 19:35:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F05\u002F12\u002F6835195a-fcd2-43b2-918b-8f61bcdb9fd2\u002Flance-31.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"f002e24f-f493-443b-a2fd-5ff172a5d756\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Cape\" data-image-alt-text=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-filename=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-crop=\"2486x1397+0+0\" data-image-width=\"2693\" data-image-height=\"1397\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ECyberattacks that target mobile devices and services can impact anyone, but the risk is especially great against politicians, journalists, activists, and public figures. Now a relatively new mobile carrier promises extra special protection against mobile threats.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002F\"\u003ECape\u003C\u002Fa\u003E, a Washington, D.C.-based mobile provider, promotes its service as built with privacy and security at its core. Cape operates as an MVNO (Mobile Virtual Network Operator), which means it doesn't have its own mobile network but sells its branded wireless service using the network of another provider. For this, Cape partners with US Cellular.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fscam-yourself-attacks-just-increased-over-600-heres-what-to-look-for\u002F\"\u003E'Scam yourself' attacks just increased over 600% - here's what to look for\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, the company also uses its own software, allowing it to securely manage customer data. With security in mind, Cape said it's able to limit the collection of personal data and control how users authenticate their accounts. Further, it can manage such aspects as internet access, call routing, and data sharing. The goal is to better ward off security threats that impact a customer's mobile privacy.\u003C\u002Fp\u003E\u003Cp\u003ETouted as more robust than privacy apps, VPNs, and privacy-minded browsers, Cape's service looks for vulnerabilities at the cellular network level. As such, it offers the following security features:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELocation obfuscation – Here, customers can change the unique identifiers associated with their mobile phones to stop location tracking and profiling.\u003C\u002Fli\u003E\u003Cli\u003EAd identifier rotation – This feature prevents advertisers and data brokers from collecting information about a customer's app use and browser history.\u003C\u002Fli\u003E\u003Cli\u003EEnhanced signaling protection – Offering stronger protection than the typical firewall, this feature combats \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5g-networks-could-be-vulnerable-to-exploit-due-to-mishmash-of-old-technologies\u002F\"\u003Esignaling or SS7 attacks\u003C\u002Fa\u003E through which attackers can intercept calls and texts and track your location.\u003C\u002Fli\u003E\u003Cli\u003ESIM swap protection – This feature uses sophisticated cryptology to prevent unauthorized SIM transfers.\u003C\u002Fli\u003E\u003Cli\u003EData privacy commitment - Here, Cape asks for a minimal amount of information for subscribers to get service and promises to delete that data when no longer needed.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ELaunched earlier this year, Cape's service was available only to government users. Now the service is open to several different groups. These include:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EElected officials, high-level executives, and celebrities are at risk of location stalking and SIM swaps.\u003C\u002Fli\u003E\u003Cli\u003ELawyers, health care providers, and cybersecurity experts who work with confidential clients and sensitive information.\u003C\u002Fli\u003E\u003Cli\u003EJournalists and activists whose work can subject them to surveillance and location tracking.\u003C\u002Fli\u003E\u003Cli\u003EDomestic abuse survivors may be tracked by their abusers.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EWith mobile threats a potential risk for anyone, Cape said it will launch a similar privacy-minded service for the general public early next year.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fnetworking\u002Fgenerative-ai-fuels-demand-for-better-mobile-connectivity-and-users-ready-to-pay-for-it\u002F\"\u003EGenerative AI fuels demand for better mobile connectivity - and users ready to pay for it\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAside from greater security, Cape offers \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcoverage\"\u003Epremium 4G\u002F5G cellular coverage\u003C\u002Fa\u003E and unlimited talk and text. For now, the service includes a pre-configured Android phone. However, starting in early 2025, subscribers will be able to bring their own up-to-date devices to the plan. Anyone interested in signing up with Cape can submit a form through the \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcontact-us\"\u003Ecompany's contact page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"Most privacy solutions—like specialized apps or burner phones—focus primarily on app and device-level threats,\" Andy Makridis, former Chief Operations Officer of the CIA, said in a press release. \"Yet, some of the most serious vulnerabilities stem from network-level weaknesses. By addressing both device and network security, Cape offers a broader layer of protection against sophisticated threats.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 20:57:00",timezone:"UTC",updated:c,published:c},description:"This mobile provider service was available only to government users but has since expanded. If you fall into these categories, you may be eligible today, but the service will expand to the general public soon, too.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ffcbc132-23b6-4b53-b3c7-12f838b209e4",image:{id:"f002e24f-f493-443b-a2fd-5ff172a5d756",filename:"screenshot-2024-11-22-at-12-18-24pm.png",dateCreated:{created:c,date:"2024-11-22 17:19:22",timezone:"UTC",updated:c,published:c},alt:"screenshot-2024-11-22-at-12-18-24pm.png",credits:"Cape",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002Ff002e24f-f493-443b-a2fd-5ff172a5d756\u002Fscreenshot-2024-11-22-at-12-18-24pm.png",cropGravity:o,crop:"2486x1397+0+0",typeName:"content_image",imageUrl:c,width:2693,height:1397,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Home & Office^Networking^Mobile Carriers",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service",startYear:c,summary:b,title:"This new wireless carrier promises ultra-secure mobile phone service",topic:{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"62ea7721-b57a-4248-8845-0a9fca050277\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Vaishnav K Suresh \u002F 500px \u002F Getty Images\" data-image-alt-text=\"camera\" data-image-filename=\"gettyimages-1394240632.jpg\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-width=\"4152\" data-image-height=\"2276\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter multiple delays, Microsoft has finally begun rolling out a preview of its controversial Recall feature for testing by members of the Windows Insider Program.\u003C\u002Fp\u003E\u003Cp\u003EThe feature, which promises a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-new-recall-feature-lets-you-ask-ai-for-that-file-or-email-you-cant-find\u002F\"\u003E\"photographic memory\"\u003C\u002Fa\u003E for Windows 11 PCs, was originally announced as part of the rollout of the new AI-powered Copilot+ in June. After a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fafter-brutal-critiques-microsoft-recall-will-get-these-major-privacy-and-security-changes\u002F\"\u003Ebrutal firestorm of criticism from security experts\u003C\u002Fa\u003E, the company delayed the feature so that sweeping privacy changes could be implemented.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcan-your-old-pc-even-handle-the-windows-11-upgrade-heres-how-to-tell\u002F\"\u003ECan your old PC even handle the Windows 11 upgrade? How to tell\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat schedule change was followed by additional delays, with a rollout of the Recall preview pushed back to October. (For a detailed timeline, see \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fas-microsoft-breaks-awkward-silence-around-its-controversial-recall-feature-privacy-questions-remain\u002F\"\u003E\"As Microsoft breaks awkward silence around its controversial Recall feature, privacy questions remain.\"\u003C\u002Fa\u003E) As October ended, the launch was \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-delays-its-troubled-ai-powered-recall-feature-yet-again\u002F\"\u003Edelayed one more time\u003C\u002Fa\u003E, with the company citing the need for additional time to deliver \"a secure and trusted experience.\"\u003C\u002Fp\u003E\u003Cp\u003EToday's announcement comes in a \u003Ca href=\"https:\u002F\u002Fblogs.windows.com\u002Fwindows-insider\u002F2024\u002F11\u002F22\u002Fpreviewing-recall-with-click-to-do-on-copilot-pcs-with-windows-insiders-in-the-dev-channel\u002F\" target=\"_blank\"\u003Elengthy post on the Windows Insider Blog\u003C\u002Fa\u003E that includes details on how to sign up for the Insider program and how to use Recall. Pointedly, the announcement recognizes \"the contributions of researchers and the security community in shaping Recall.\" It also includes this detailed description of how the feature is implemented in the new Windows 11 preview:\u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EInsiders and Recall users, we want you to know your snapshots are truly yours. We do not send your snapshots off your PC to Microsoft or third parties, and don't use them for training purposes. Microsoft can't access the keys to view your encrypted data, so we can't restore your snapshots if you remove Windows Hello or restore your snapshots if you need to reset your PC or move to a new PC. We will in future updates provide ways for you to store a backup of your keys for these cases. For now, your Copilot + PC only releases the keys to use Recall if you show your face, fingerprint, or PIN.\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cp\u003EIn this release, Microsoft says, it programmed Recall to detect \"sensitive information like credit card details, passwords, and personal identification numbers\" and block snapshots containing that information from being saved or stored. Testers can exclude specific apps and sites from being saved under any circumstances, and an option in Settings, which is off by default, allows testers to anonymously share details of apps and sites they prefer to be excluded from Recall.\u003C\u002Fp\u003E\u003Cp\u003EThe Recall feature is included in Preview Build 26120.2415 (KB5046723), which is rolling out to users who are signed up for the Windows Insider Dev Channel.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-an-incompatible-windows-10-pc-to-windows-11-two-ways\u002F\"\u003EHow to upgrade an 'incompatible' Windows 10 PC to Windows 11: Two ways\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EFor now, the feature is only available on Snapdragon-powered Copilot+ PCs; support for Copilot+ PCs based on AMD and Intel processors will be available later, Microsoft says. For this preview, the only supported languages are Chinese (simplified), English, French, German, Japanese, and Spanish.\u003C\u002Fp\u003E\u003Cp\u003EOn PCs running Windows 11 Enterprise edition and on PCs managed by an IT administrator on work and school networks, the Recall feature will be removed by default. On those managed networks, employees who have enrolled in Windows Hello using biometric authentication can opt into the Recall feature. Administrators can block use of Recall completely or can \u003Ca href=\"https:\u002F\u002Flearn.microsoft.com\u002Fen-us\u002Fwindows\u002Fclient-management\u002Fmanage-recall\"\u003Euse management tools\u003C\u002Fa\u003E to prevent saving snapshots from specific apps and websites. On managed networks, enterprises cannot access Recall data saved by an employee.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn this build, Recall also includes the Click to Do feature, which adds AI-powered automated actions to text and images. The feature offers the ability to search, save, and edit text with a preferred app and to manipulate images using AI tools in the Photos and Paint apps.\u003C\u002Fp\u003E\u003Cp\u003EThe blog post includes a lengthy list of known issues that testers are likely to encounter. The feature requires Secure Boot to be enabled, for example, and Microsoft recommends updating Microsoft 365 apps to the latest version before using Recall. Some users might experience lengthy delays in saving screenshots or a spurious error message; either issue can be resolved with a reboot.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-to-tighten-windows-security-dramatically-in-2025-heres-how\u002F\"\u003EMicrosoft to tighten Windows security dramatically in 2025 - here's how\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ERecall can be enabled or disabled using the \"Turn Windows features on or off\" dialog; in this build, disabling the feature caches the binaries that control the feature. In a future update, Microsoft says, it will completely remove the feature when the option to turn it off is selected.\u003C\u002Fp\u003E\u003Cp\u003EGiven the rocky nature of the initial announcement, Microsoft executives are likely holding their breath awaiting reactions from testers and the security community. That feedback will no doubt dictate the eventual release schedule, sometime in 2025.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 18:00:00",timezone:"UTC",updated:c,published:c},description:"What was supposed to be a signature feature of the AI-powered Copilot+ PCs for Windows 11 was delayed after a firestorm of privacy and security complaints. But it's ready for testing now, if you have the right hardware.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"43e632dd-f122-4040-bee2-f4d470f6c50c",image:{id:"62ea7721-b57a-4248-8845-0a9fca050277",filename:"gettyimages-1394240632.jpg",dateCreated:{created:c,date:"2024-11-22 17:42:31",timezone:"UTC",updated:c,published:c},alt:"camera",credits:"Vaishnav K Suresh \u002F 500px \u002F Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002F62ea7721-b57a-4248-8845-0a9fca050277\u002Fgettyimages-1394240632.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4152,height:2276,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Tech^Services & Software^Operating Systems^Windows^Windows 11",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"you-can-finally-test-microsofts-controversial-recall-feature-heres-how",startYear:c,summary:b,title:"You can finally test Microsoft's controversial Recall feature - here's how",topic:{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10c1d40e-ec91-11e3-95d2-02911863765e",slug:"microsoft",name:"Microsoft",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ENow that the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiphone-16-pro-max-buying-advice-2024\u002F\" target=\"_blank\"\u003EiPhone 16\u003C\u002Fa\u003E has arrived with new colors, AI features, and camera controls -- and with it, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F6-ios-18-settings-i-changed-immediately-and-why-you-should-too\u002F\" target=\"_blank\"\u003EiOS 18\u003C\u002Fa\u003E -- you may be looking for a new way to improve your online privacy. While all Apple \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\" target=\"_blank\"\u003EiPhone\u003C\u002Fa\u003E models and generations tend to have excellent connectivity, we always recommend using a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-why-do-you-need-one-all-your-virtual-private-network-questions-answered\u002F\" target=\"_blank\"\u003Evirtual private network (VPN) service\u003C\u002Fa\u003E to keep your data and browsing safe while on the go.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003ETrustworthy VPNs\u003C\u002Fa\u003E encrypt your online traffic when you access email, social media, and online services. If you have to rely on public Wi-Fi hotspots, they are excellent tools for protecting your data from eavesdroppers, and if you're looking to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-streaming-vpn\u002F\" target=\"_blank\"\u003Estream content\u003C\u002Fa\u003E that isn't available in your area, a VPN can potentially unlock access to different streaming libraries. \u003C\u002Fp\u003E\u003Cp\u003EWe've \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F#link={\" target=\"_blank\"\u003Etested every top VPN on the market\u003C\u002Fa\u003E and found the best ones that offer solid iPhone and Apple ecosystem apps, robust security, and rapid speeds. If you're keen to sign up for a VPN service, now is an excellent time to do so, considering the heavy discounts and promotions available as we reach Black Friday.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best travel VPNs\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best iPhone VPN right now?\u003C\u002Fh2\u003E\u003Cp\u003EBased on our extensive testing, our pick for the best VPN for iPhone is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f22bd1ec-2ba7-4c0c-8139-0a372b32dfc0\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-monetized-url=\"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. While it is not the cheapest service, NordVPN is known for its rapid speeds, solid connectivity, and massive server network. Furthermore, the NordVPN iOS app is user-friendly and won't noticeably drain your phone's battery with continual use. \u003C\u002Fp\u003E\u003Cp\u003EIf you want to find out what the best VPNs for iPhone are in 2024, check out our recommendations below.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN for iOS in 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"01a386d9-8298-49dc-b810-abdc13738b80\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordVPN is one of the more popular VPN offerings in the App Store, and for good reason. \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-does-nordvpn-work-plus-how-to-set-it-up-and-use-it-tutorial\u002F" target="_blank"\u003EInstalling NordVPN\u003C\u002Fa\u003E&nbsp;on an iPhone is a simple, painless way to secure predictable performance across regions, and the service is compatible with iOS \u003Ca href="https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fnordvpn-ios-release-notes\u002F?srsltid=AfmBOooLz0K2c1gbD1Kh6356NSzMQPekth5ctCHhXog2H4POqXRaMM1Z" target="_blank"\u003E14.2 or later\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ENordVPN's interface is user-friendly, and we found the service offers consistent, rapid, and reliable speeds that do not impact streaming services or make a noticeable difference to internet surfing.\u003C\u002Fp\u003E\u003Cp\u003EWe consider this VPN to be one of the best available, combining speed, server availability in 111 countries, reliability, and 10 simultaneous connections (although we would prefer if there was no limit).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt has many tools in addition to a standard VPN service. NordVPN's Onion over VPN is a special category of NordVPN servers that enables Tor capabilities, supports peer-to-peer file sharing, and allows you to connect through a second server for an added layer of protection. You can also set up a dedicated IP address for an additional fee.\u003C\u002Fp\u003E\u003Cp\u003EWe've tested NordVPN for years and have always been impressed with its stable connectivity and speeds. Customers generally report fast speeds and minimal buffering with easy setup, although some caution that you should turn off auto-renewal.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnord-vpn-review-an-in-depth-look-at-a-popular-vpn\u002F" target="_blank"\u003E\u003Cstrong\u003ENordVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn addition to iOS, NordVPN runs on all the most popular platforms. Prices start from $3.59 per month on a two-year standard plan, with three months of free access. Yearly plans begin at $4.59 per month. If you only want to try out NordVPN for a month, prices begin at $12.99 per month.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordVPN offers additional cybersecurity options through its premium plans, including identity theft and cyber extortion coverage.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ENordVPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003E10 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, and routers |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;111 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Email address and billing information only | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on&nbsp;Android&nbsp;|&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Best iPhone VPN overall\" data-imagegroup=\"{"alt":"NordVPN","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"1eead599-77e0-4877-bff5-ca101ca11758","title":"Nord VPN Mobile","filename":"nord-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F1eead599-77e0-4877-bff5-ca101ca11758\u002Fnord-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1301632,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Nord VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1eead599-77e0-4877-bff5-ca101ca11758","imageAltText":"NordVPN","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nord-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"1983353e-c060-44fd-a952-63449fbabf57","slug":"nordvpn","label":"NordVPN","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":128,"imgHeight":128,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"1983353e-c060-44fd-a952-63449fbabf57","name":"NordVPN","slug":"nordvpn","productType":"SERIES","updateType":"PRISM","mod":1729500496740,"displayDate":"Mon Oct 21 2024 04:48:16 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?offer_id=378&aff_id=307&source=zdnet&aff_sub=[subid_value]&aff_sub2=bestvpniphonepad22","url":""}]\" data-usepricing=\"true\" data-like=\"~ Simple, straightforward app installation ~Excellent speeds ~Great for streaming ~ Solid performance\" data-dislike=\"~No unlimited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"90bec58e-6dba-4667-8dfc-a2554c9d729b\" data-edition=\"us\" data-description=\"\u003Cp\u003ESurfshark is an affordable and reliable VPN service. When we reviewed it, we found fast connection times and no information leaks, and luckily, the company doesn't skimp on security. It offers AES-256-GCM, RSA-2048, and Perfect Forward Secrecy encryption.\u003C\u002Fp\u003E\u003Cp\u003ESurfshark supports devices running iOS 14.0 or higher. This VPN has many features, including ad and tracker blocking, a data breach scanner, and multi-hop connections. This VPN is excellent for iPhone users because of its user-friendliness, uncomplicated and quick connection process, and affordable price point.\u003C\u002Fp\u003E\u003Cp\u003EIf you want to use the Bypasser tool (Surfshark's \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-vpn-split-tunneling\u002F" target="_blank"\u003Esplit tunneling\u003C\u002Fa\u003E feature), it used to be the case that you had to use the Windows or Android app. Since October, however, this feature is also&nbsp;\u003Ca href="https:\u002F\u002Fsurfshark.com\u002Fblog\u002Fsurfshark-launches-bypasser-on-ios" target="_blank"\u003Eavailable\u003C\u002Fa\u003E for iOS.\u003C\u002Fp\u003E\u003Cp\u003EDuring testing, we've enjoyed using Surfshark as a "one size fits all" VPN solution. Sometimes, the speeds aren't the best while streaming, and it can take a moment or two to connect to your preferred server, but this VPN is still excellent value for money.\u003C\u002Fp\u003E\u003Cp\u003EWe also like the "pause" function, which allows you to resume your regular (unprotected) connection for five minutes, 30 minutes, or a few hours, which may come in handy if you need to quickly access specific services. Customers say that speeds are relatively fast and streaming works most of the time, although some have experienced issues with a handful of popular content services.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsurfshark-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003ESurfshark VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ESurfshark has excellent deals to consider on the run-up to Black Friday: $1.99 per month on a two-year plan or $2.99 per month on an annual plan. The VPN provider has also thrown in four months of free access on 12-month and 24-month plans.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESurfshark VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESurfshark VPN specifications:&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003EUnlimited&nbsp;| Ad-blocker | Two-factor authentication |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;No-logs policy |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 100 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, Linux, iOS, Android, Fire TV, Chrome, Firefox, Edge, tvOS, routers |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android, iOS, and macOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.8\u003C\u002Fp\u003E\" data-hed=\"Surfshark VPN\" data-superlative=\"Best budget iPhone VPN\" data-imagegroup=\"{"alt":"surfshark","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","title":"Surfshark VPN Mobile","filename":"surfshark-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1118835,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Surfshark VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","imageAltText":"surfshark","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"5b46a203-2264-4546-adc2-846bfa92ab9c","slug":"surfshark-vpn","label":"Surfshark VPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"5b46a203-2264-4546-adc2-846bfa92ab9c","name":"Surfshark VPN","slug":"surfshark-vpn","productType":"SERIES","updateType":"PRISM","mod":1729500695659,"displayDate":"Mon Oct 21 2024 04:51:35 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?offer_id=50&aff_id=1511&source=ZDNET&aff_sub=subid_value","url":""}]\" data-usepricing=\"true\" data-like=\"~ Unlimited simultaneous connections ~ Value for money ~ Beginner friendly ~ Consistently low pricing\" data-dislike=\"~ Slower server connection times\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f8ec62af-a801-41ff-92f7-6e134ff5962e\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN app supports iOS 15.0 and up. In addition to iOS, it supports all major platforms. There are browser extensions for Edge, \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-chrome-vpn\u002F" target="_blank"\u003EChrome\u003C\u002Fa\u003E, and Firefox, and a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-gaming-vpn\u002F" target="_blank"\u003EVPN service for gaming\u003C\u002Fa\u003E is also available.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN has servers located in 105 countries and ranks among the fastest VPNs, so it shouldn't reduce your connection speeds as much as the average VPN.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EExpressVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN doesn't maintain browsing history logs, but it does keep track of some information, such as the dates you connect and the location of the VPN server you connect to. The details of what is and isn't logged are&nbsp;\u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002Fwhat-is-vpn\u002Fpolicy-towards-logs"\u003Estated in ExpressVPN's privacy policy\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EWe've used ExpressVPN for years and found it an extremely fast, reliable service with a great server network. We also like ExpressVPN's server speed test function, which allows you to scan and measure speeds for each server (found under Window &gt; Open speed test). This feature is useful for streaming or gaming.\u003C\u002Fp\u003E\u003Cp\u003EMany customer reviews are positive, but the pricing model and renewal hikes aren't popular.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is offering a deal ahead of Black Friday. Signing up for a two-year plan will cost you $4.99 per month (lower than the typical $6.67 price tag), plus you will get six months of free access.\u003C\u002Fp\u003E\u003Cp\u003EThe iPhone app comes with a seven-day free trial.\u003C\u002Fp\u003E\u003Cp\u003EOverall, if you're looking for a set-and-forget VPN with decent speeds and user-friendliness, ExpressVPN is a top pick -- although each plan is limited to eight simultaneous devices, something we would like to see change to unlimited, considering its price point.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E8&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Chrome, Firefox, Edge, Linux, Fire TV, Android TV, tvOS, and routers&nbsp;|&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;105&nbsp;|&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No browsing logs, some connection logs |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN\" data-superlative=\"Best iPhone VPN for speed and usability\" data-imagegroup=\"{"alt":"expressvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","title":"ExpressVPN mobile","filename":"expressvpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F7cf8be39-6942-4f62-832e-2cb7da94eb8f\u002Fexpressvpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1289494,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ExpressVPN mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","imageAltText":"expressvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","slug":"expressvpn","label":"ExpressVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","name":"ExpressVPN","slug":"expressvpn","productType":"SERIES","updateType":"PRISM","mod":1729500792004,"displayDate":"Mon Oct 21 2024 04:53:12 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"Expressvpn","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002Fgo\u002Fcnet","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Works on an exceptionally large number of platforms outside of iOS ~ Consistent performance ~ Easy setup ~ Extensive server network ~ Excellent speeds\" data-dislike=\"~ More expensive than competitors ~ Limited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eed59da4-2eea-4b3b-84c0-892da176638e\" data-edition=\"us\" data-description=\"\u003Cp\u003EIPVanish has depth and plenty of configuration settings for those who want to control almost every aspect of their VPN connection.\u003C\u002Fp\u003E\u003Cp\u003EWhile it's not the most stylish VPN with the best user interface, IPVanish VPN has many protocols, so you'll always know what to expect regardless of what you're connecting to. The app has an abundance of configuration options, and there's now an extensive range of server selection options.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fipvanish-review-a-rich-wealth-of-options-and-surfing-controls\u002F" target="_blank"\u003E\u003Cstrong\u003EIPVanish VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe found IPVanish to be reasonably fast and also quick to connect. IPVanish's data transfers are secure, and it's well-regarded as a secure service. Customers report they are happy with IPVanish's customer service and the overall speed and reliability of the VPN. The service is also independently security-audited.\u003C\u002Fp\u003E\u003Cp\u003EIPVanish is an excellent option for iOS and \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-mac-vpn\u002F" target="_blank"\u003EMac devices\u003C\u002Fa\u003E. You can sign up for a two-year plan for $2.19 per month or a yearly subscription for $3.33 per month. Alternatively, if you don't want to sign up for the long haul, you can pay $12.99 for a month of access. IPVanish supports iOS 14 and up.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003ENote: IPVanish is owned by Ziff Davis, ZDNET's parent company. For more, see our&nbsp;\u003C\u002Fem\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feditorial-guidelines\u002F" target="_blank"\u003E\u003Cem\u003EEditorial Guidelines\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003EIPVanish VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Unlimited |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, Kodi, and routers | \u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: None, except billing data |&nbsp;\u003Cstrong\u003ELocations\u003C\u002Fstrong\u003E: 130 (103 countries) |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days | \u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS&nbsp;| \u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.5\u003C\u002Fp\u003E\" data-hed=\"IPVanish VPN\" data-superlative=\"Best configurable VPN for iPhone\" data-imagegroup=\"{"alt":"ipvanish","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","title":"IPVanish Mobile","filename":"ipvanish-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fc74b6025-02da-4c4c-9fab-af9e71d53ba8\u002Fipvanish-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1239747,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"IPVanish Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","imageAltText":"ipvanish","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ipvanish-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"82c4806f-a79c-46a0-be8c-008488fb0403","slug":"ipvanish","label":"IPVanish","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":350,"imgHeight":350,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"82c4806f-a79c-46a0-be8c-008488fb0403","name":"IPVanish","slug":"ipvanish","productType":"SERIES","updateType":"PRISM","mod":1729500824180,"displayDate":"Mon Oct 21 2024 04:53:44 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value","offerMerchant":"IPVanish","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ipvanish.com\u002Fexclusive","url":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Unlimited connections ~ Highly configurable app ~ Affordable ~Recently expanded server network\" data-dislike=\"~ Bland user interface ~ Few additional privacy features\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e720cee1-20da-4a1e-ab61-34a48490c7d9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn general, we recommend you avoid \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F" target="_blank"\u003Efree VPNs\u003C\u002Fa\u003E. A free VPN service could even make money selling your data, which defeats the purpose of using a VPN to protect your identity, activities, and other information.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fproton-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EProton VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe only situation where using a free VPN may not come with security concerns is when it's a free version of a reputable paid service, as is the case with Proton VPN. While limited to servers in five countries, you know the plan is supported by paid subscribers, and your data is safe. You won't be bombarded with ads, either.\u003C\u002Fp\u003E\u003Cp\u003EProton is a Swiss company and adheres to Switzerland's privacy laws. The team behind the VPN also develops the encrypted email service Proton Mail. Proton VPN provides a kill switch, various encryption protocols to choose from, and the benefit of an open-source approach, which allows for transparent third-party auditing.\u003C\u002Fp\u003E\u003Cp\u003EDespite poor Trustpilot reviews (many linked to the free plan restrictions), many users report a positive experience with this VPN provider, noting its ease of use, low CAPTCHA block rates on websites, and stable connectivity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you are interested in adopting the paid version of Proton VPN, you can sign up for a 24-month VPN plan at $4.49 per month, a 12-month subscription at $4.99, or a one-month agreement at $9.99. Note that Proton VPN requires iOS 15.0 or later.\u003C\u002Fp\u003E\u003Cp\u003EProtonVPN is a Swiss company, but you can make payments in US dollars.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton VPN features:&nbsp;\u003C\u002Fstrong\u003EOpen-source |&nbsp;\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: One to 10, depending on the plan |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 112 |&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No-logs policy | Security audits |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, Kodi, and routers | VPN accelerator |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Free option |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.6\u003C\u002Fp\u003E\" data-hed=\"Proton VPN\" data-superlative=\"Best free VPN for iPhone\" data-imagegroup=\"{"alt":"proton vpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","title":"ProtonVPN Mobile","filename":"proton-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1\u002Fproton-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1357859,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ProtonVPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","imageAltText":"proton vpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"proton-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","slug":"protonvpn","label":"ProtonVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","name":"ProtonVPN","slug":"protonvpn","productType":"SERIES","updateType":"PRISM","mod":1729500873567,"displayDate":"Mon Oct 21 2024 04:54:33 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value","offerMerchant":"Proton VPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprotonvpn.com\u002F","url":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Solid iOS app ~ Top-tier security features ~ Open source\" data-dislike=\"~ Just one connection allowed on the free plan ~ Limited free country servers\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EBest VPN for iPhone\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EApple App Store rating\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$3.59+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$1.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$6.67+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.19+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.5\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree with limited services or $4.49 per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.6\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E1 or up to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*Lowest price at the time of writing. Please note that prices may vary based on retailer and available promotions, sales, or discounts.\u003C\u002Fp\u003E\" data-hed=\"VPNs for iPhones, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhy do I need an iPhone VPN? \u003C\u002Fh3\u003E\u003Cp\u003EOur mobile devices are the keys to many aspects of our lives. Communication, payments, accessing local government services, and even as a way to entertain ourselves with content and games: our iPhones must be protected, and with them, our data. \u003C\u002Fp\u003E\u003Cp\u003EA VPN encrypts your online traffic and protects your information. If you must use a public Wi-Fi hotspot or an unknown Wi-Fi connection, a VPN can help shield you from eavesdropping and other cyberthreats. Security aside, you may also want to use a VPN to access streaming services and geo-locked content while you're on the road. \u003C\u002Fp\u003E\u003Ch3\u003ECan I trust iPhone VPN services?\u003C\u002Fh3\u003E\u003Cp\u003EAs long as you choose a reputable VPN provider that provides a compatible iOS app, it will be safe to use. Steer clear of free VPN services with little to no customer feedback, as they may be malicious and steal your data.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EChoose this VPN for iPhone...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe best iPhone VPN overall. NordVPN is a solid, feature-rich VPN. NordVPN's speeds and server network are impressive, but the price point for this reliable, secure VPN on shorter plans might be off-putting for some.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA top VPN that can just about do it all, and for an affordable price. Surfshark performs well in speed tests, earns solid customer reviews, and has an easy-to-use iOS mobile interface.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe speediest VPN for iOS. We've found that ExpressVPN connections are reliable almost all the time. The mobile version of the VPN is simple, user-friendly, and comes packed with different server options. You can also take advantage of a seven-day free iOS trial.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA highly flexible VPN. IPVanish offers a range of security and connectivity settings for you to choose from, although if you want to take full advantage of different protocols, you will want some technical knowledge.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free VPN. This Swiss VPN provider takes security seriously, and while the free version is restricted, it is still an excellent choice -- but the paid option removes all limits.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the right iPhone VPN for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d93d76dc-b425-4238-b712-7785b7d5a725\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen selecting your new iPhone VPN, consider the following factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: Try to take advantage of promotions, but ignore countdown timers -- they typically are just marketing tools. While top-notch VPNs can cost upwards of $10 per month, many are available for only a few dollars.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: If you're paying for a VPN for your iPhone or iPad, you might still want to use it across multiple devices, such as a desktop PC or laptop. We recommend you sign up for a plan with support for at least four to six devices, although preferably one with unlimited simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E: You must also decide how long you want to use the VPN. A two-year term tends to secure the best prices, but monthly, six-month, and one-year options are often also available. After you've made a selection, you typically have a 30-day money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EApps\u003C\u002Fstrong\u003E: When selecting a VPN, try it out first to ensure you like its accompanying iOS app. Some VPNs, for example, have great desktop software but need further development of their mobile apps, which may not be as intuitive or easy to use.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility\u003C\u002Fstrong\u003E: iOS 18, released on September 16, 2024, is the latest version of the iPhone operating system. Many VPN provides will provide compatible apps going back generations, but if you have an older device, check before signing up.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrials\u003C\u002Fstrong\u003E: Many VPN providers will give users a free seven-day iOS trial, so consider trying a few out before you commit to a purchase.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN for iPhone\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a4dc919e-a70d-4b8a-86e5-27bd9cbd6c09\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany providers recommended in this list have been subject to in-depth testing and reviews by members of our team. We've been talking about other VPNs for years, spoken with their management and their users, and developed a generally favorable impression.\u003C\u002Fp\u003E\u003Cp\u003EZDNET tests VPN services from multiple locations, but we can't test from all locations. Every home, every community, every local ISP, and every nation has a different infrastructure. It's essential that once you choose, you test for all your likely usage profiles and only then make the decision to keep the service or request a money-back guaranteed refund, which all these VPNs have.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you experience traffic slowdowns, check your VPN and the Wi-Fi connection between your device and your router or access point. Sometimes, connectivity issues begin at the source, and in other cases, switching your selected VPN server may be enough to resolve speed problems or connectivity drops.\u003C\u002Fp\u003E\u003Cp\u003EWe analyzed the best VPNs for iPhones below using the following criteria:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPerformance:\u003C\u002Fstrong\u003E&nbsp;Our top VPNs must have a minimum level of performance. After all, there's no point in using a VPN while streaming if your connection continually drops or lags.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Many VPNs limit how many devices you can connect to a service at the same time. If you have a phone, tablet, laptop, desktop, and possibly even a smart TV you want to connect to a VPN, you'd need a service that allows at least six simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: There's no point in using a VPN unless its security protocols and encryption levels are up to scratch. We also ensured the development team behind each recommended VPN cares about making security improvements and patching reported bugs.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: A kill switch prevents you from having an unprotected connection. It is an important feature for a VPN to have, as it protects by preventing a return to a default Wi-Fi connection should your internet connection unexpectedly drop.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGeo-blocks and streaming\u003C\u002Fstrong\u003E: We know VPNs can be key to accessing local content and services while you're away from home. We ensured that our top recommendations performed well in these scenarios and are unlikely to slow down your connection while streaming.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: What systems and devices can you run the VPN on? Our iPhone VPN recommendations, naturally, have to run easy-to-use and intuitive mobile apps.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECountries &amp; servers\u003C\u002Fstrong\u003E: In how many different countries does the VPN have servers? This can include physical and virtual servers, and whether there are enough -- at least 50 or so -- to provide variety.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrial length and price\u003C\u002Fstrong\u003E: Each VPN we recommend has a solid money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems with installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECheck out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E&nbsp;for a more extensive breakdown.\u003C\u002Fp\u003E\" data-hed=\"How we test VPNs\" data-imagegroup=\"{"alt":"protonvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Charlie Osborne\u002FZDNET","imageData":{"id":"6fcf975d-b442-4596-826e-6b44b6ba1be1","title":"protonvpn","filename":"protonvpn.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F27\u002F6fcf975d-b442-4596-826e-6b44b6ba1be1\u002Fprotonvpn.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":134307,"width":1296,"height":720,"dateCreated":{"date":"2024-03-27 11:15:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-27 11:15:51","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"protonvpn","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6fcf975d-b442-4596-826e-6b44b6ba1be1","imageAltText":"protonvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Charlie Osborne\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"protonvpn.jpg","imageDateCreated":"2024\u002F03\u002F27","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Charlie Osborne\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EVPNs for iPhone FAQs \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a5b8295b-2909-49bd-824b-ac31a083f04d\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN shouldn't be very resource-intensive, and so should not slow down your iPhone, but you may notice a slowdown in internet speeds as your requests go through your VPN's server network. Depending on the strength and base speed of your internet connection, streaming and gaming may be impacted.\u003Cbr\u003E \u003C\u002Fp\u003E\" data-hed=\"Does a VPN slow down your iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"58bc26b7-13f3-436d-83b1-4f592c958f55\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple iPhones do not have an built-in VPN, although you can install one using a mobile device management (MDM) solution. iOS does, however, support VPN use and many VPN providers have developed iOS-native mobile applications.\u003C\u002Fp\u003E\" data-hed=\"Do new iOS devices come with a built-in VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65682da0-2b6f-4fae-9c26-7e787c7ea362\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe latest version of iOS is iOS 18, released on September 16. It is likely that your VPN will remain compatible, as vendors will update their software as necessary. If you have an older iPhone, you may find that support for legacy iOS versions -- such as iOS 14 -- are phased out over time. Many VPN apps are now only compatible with iOS 15.0 and above.\u003C\u002Fp\u003E\" data-hed=\"Will my VPN work with the latest version of iOS?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"63af5e0b-9b0a-4246-87b2-30b076478bf2\" data-edition=\"us\" data-description=\"\u003Cp\u003ESetting up a VPN on your iPhone is fairly simple. Download one of the apps above from Apple's App Store. Once you've created a login and started your subscription, you are ready to connect securely.\u003C\u002Fp\u003E\u003Cp\u003EDo not download any apps from untrusted sources. Mobile device management (MDM) solutions using VPNs can be configured in&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-gb\u002Fguide\u002Fdeployment\u002Fdep2d2adb35d\u002Fweb" target="_blank"\u003EiOS settings\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How do I set up a VPN on my iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fd546ecd-fd41-43ee-a26f-7e854f4c4773\" data-edition=\"us\" data-description=\"\u003Cp\u003EPerhaps. That depends on how much you trust your carrier. You're better off encrypting your data when it's in motion, whether you use Wi-Fi or a carrier connection. Overall, it's still recommended to use a VPN no matter the type of internet access you use.\u003C\u002Fp\u003E\" data-hed=\"Do I need a VPN if I just use my carrier's data?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8f1ff395-8876-44fc-814e-9ceddf7c2912\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002FHT212614" target="_blank"\u003EiCloud+ Private Relay\u003C\u002Fa\u003E&nbsp;is a feature of iCloud+. If you buy any iCloud storage, you'll get the iCloud+ features. While Private Relay can hide your email address and location, it only does it when you're using Safari. If you're using Chrome (or any applications that use the internet directly), you're out of luck. The service is also not available in all countries.\u003C\u002Fp\u003E\u003Cp\u003EIt also shows up as a proxy server. You also can't change or hide your location, as you can with a full VPN. Private Relay is a feature of iCloud+. A VPN is a full security solution.\u003C\u002Fp\u003E\" data-hed=\"Isn't iCloud+ Private Relay a VPN? Why do I need another VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f479d3f-01de-40b0-8ef9-b7ae5a6d4e76\" data-edition=\"us\" data-description=\"\u003Cp\u003EAll software, regardless of whether they are VPNs or not, require computing resources to function. In turn, performing functions on a device -- a PC, smartphone, tablet, or otherwise -- needs power. So yes, a VPN will use your iPhone's battery, but it shouldn't be too noticeable.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf your smartphone is unexpectedly drained of battery, behaving suspiciously, or is hot to the touch, something might be going wrong. For example, there may be a malware infection or hardware problems.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best antivirus software and apps you can buy\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Do iPhone VPNs drain your battery?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3e0ef716-3019-4a65-9b8e-7506f690f7fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. We recommend that you do so to prevent any unexpected data leaks or inadvertent exposure -- such as if you forget to enable your VPN when you log in to your local coffee shop's public Wi-Fi. At the least, ensure that you always use a VPN if you have to use a public Wi-Fi hotspot or access sensitive online services, such as banking.\u003C\u002Fp\u003E\" data-hed=\"Should I leave my iPhone VPN on all of the time?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"39db85d5-6c7d-4d8e-8fb7-7877c5bca7b2\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are many free VPNs available for mobile devices, including those in Apple's ecosystem. That said, nothing in life is truly free, and you will likely be handing over your data in return for the service. They may also not be trustworthy, may be ad-supported, and may track your online activities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThose that are free but from trustworthy companies are few and far between. ProtonVPN and Windscribe's free VPN options are among those we support, although they are limited.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are there any free iPhone VPNs?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"54e1e8f0-96b8-4c06-8b8f-fa6b97f1ace1\" data-edition=\"us\" data-description=\"\u003Cp\u003EVPNs are important for establishing secure connections when abroad. Whether you're working from another country or you simply want to stream your favorite TV show, we compiled a list of the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F" target="_blank"\u003Ebest VPNs for travel\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN for travel?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4fde46f5-b12b-458f-b7cb-0677fd55431a\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou might want a VPN that works best with the iOS ecosystem or another operating system. If you're on the hunt for other trustworthy options, we've also created a guide to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003Ebest VPN services of 2024\u003C\u002Fa\u003E&nbsp;with an explainer on free VPNs, and whether they're worth it.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN overall for different operating systems?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"73585072-ed9d-4142-9580-b11eed88283b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAside from our recommendations for the best VPNs for iPhone and iPad, other VPN services on the market can also perform well and provide the security and privacy you need. Here are a few alternative options that are secure and reputable:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcyberghost-vpn-review\u002F" target="_blank"\u003ECyberGhost VPN review\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Are there alternative iPhone VPNs worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3726146f-c9f2-463f-a3cd-e4bf0d5bcc58\" data-edition=\"us\" data-description=\"\u003Cp\u003EA budget-friendly iOS long-term VPN option is Private Internet Access. For $2.03 per month, PIA provides a secure and private service with four months of access thrown in for free.\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-imagegroup=\"{"alt":"Private Internet Access","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"87626edc-7682-4b14-9655-b980eed70a19","title":"Private Internet Access VPN Mobile","filename":"private-internet-access-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F87626edc-7682-4b14-9655-b980eed70a19\u002Fprivate-internet-access-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1161293,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Private Internet Access VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"87626edc-7682-4b14-9655-b980eed70a19","imageAltText":"Private Internet Access","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"private-internet-access-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value","offerMerchant":"Private Internet Access","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a02da8cb-42a7-46b2-a739-fdad37cc530d\" data-edition=\"us\" data-description=\"\u003Cp\u003ECyberGhost is a strong VPN with one of the best money-back guarantees on the market, giving you 45 days to decide if you want to continue with the service. Plans start at $2.03 per month with four months free.\u003C\u002Fp\u003E\" data-hed=\"CyberGhost\" data-imagegroup=\"{"alt":"cyberghost","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"cf93d149-d4f6-41a4-ac08-29256c513cfd","title":"Cyberghost VPN Mobile","filename":"cyberghost-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fcf93d149-d4f6-41a4-ac08-29256c513cfd\u002Fcyberghost-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1082580,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Cyberghost VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"cf93d149-d4f6-41a4-ac08-29256c513cfd","imageAltText":"cyberghost","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cyberghost-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative with a long money-back guarantee\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value","offerMerchant":"CyberGhost","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fen_US\u002F","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6f9f7c6f-d4af-494f-a647-3d3f54904c86\" data-edition=\"us\" data-description=\"\u003Cp\u003EBased in Sweden, externally audited, and anonymous accounts make Mullvad a highly secure VPN for €5 ($5.88) per month.\u003C\u002Fp\u003E\" data-hed=\"Mullvad VPN\" data-imagegroup=\"{"alt":"mullvad","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"f4851122-38bb-4f84-a492-b44d628d128e","title":"Mullvad VPN Mobile","filename":"mullvad-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Ff4851122-38bb-4f84-a492-b44d628d128e\u002Fmullvad-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1080865,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Mullvad VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f4851122-38bb-4f84-a492-b44d628d128e","imageAltText":"mullvad","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"mullvad-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for data privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Mullvad","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmullvad.net\u002Fen\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4c514df3-2265-48e5-821e-bb2b7f31b919\" data-edition=\"us\" data-description=\"\u003Cp\u003EWindscribe is an alternative iOS VPN if you want a free (albeit limited) VPN, or you want to create your own custom VPN subscription package.\u003C\u002Fp\u003E\" data-hed=\"Windscribe\" data-imagegroup=\"{"alt":"windscribe","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"4295a832-96c2-4013-b8f8-a7ad24048151","title":"windscribe","filename":"windscribe.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F05\u002F4295a832-96c2-4013-b8f8-a7ad24048151\u002Fwindscribe.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":150115,"width":1296,"height":720,"dateCreated":{"date":"2024-06-05 08:24:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-05 08:24:09","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"windscribe","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4295a832-96c2-4013-b8f8-a7ad24048151","imageAltText":"windscribe","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"windscribe.jpg","imageDateCreated":"2024\u002F06\u002F05","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-linktext=\"Best free VPN alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Windscribe","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwindscribe.com\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:35:00",timezone:"UTC",updated:c,published:c},description:"We tested and analyzed popular VPNs compatible with Apple's iPhone range and the iOS operating system to find the best options for protecting your privacy, streaming content, and more.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d61956c8-361e-4cb5-86e6-71ce5dcab179",image:{id:"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64",filename:"surfshark-vpn-mobile.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:41",timezone:"UTC",updated:c,published:c},alt:"daniel-romero-q-rqba-xcgu-unsplash.jpg",credits:"Image: Daniel Romero via Unsplash",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPNs for iPhone: Expert tested",section:b,slug:"best-iphone-vpn",startYear:c,summary:b,title:"The best VPN services for iPhone: Expert tested and reviewed",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero reading an NFC security key.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero reading an NFC security key\" data-image-filename=\"img-1508.jpg\" data-image-date-created=\"2023\u002F01\u002F03\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter over a year of use, I love my Flipper Zero, and I'm still finding cool things to do with it.\u003C\u002Fp\u003E\u003Cp\u003EAm I using it to steal cars, clone credit cards, or change the prices shown on gas station displays? Of course not! That's just fake trash people upload to TikTok to try to look cool, and you can't do anything like that. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\"\u003EThe 50+ best Black Friday deals 2024: Early sales live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut that doesn't mean the Flipper Zero can't do some very cool and useful things. Over the past year, I've been exploring the suite of tools built into the Flipper Zero, as well as extending its capabilities by installing custom firmware. It's been a game-changer in so many ways! \u003C\u002Fp\u003E\u003Cp\u003EThe Flipper Zero might be small, but there's a lot of hardware packed into a small space.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero is a portable multi-tool for pen-testers and geeks in a toy-like shell.\u003C\u002Fp\u003E\" data-hed=\"Flipper Zero\" data-imagegroup=\"{"alt":"sample-image-16-9-red.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","title":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","filename":"img-2128.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F02\u002F20\u002F6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16\u002Fimg-2128.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":357488,"width":1600,"height":900,"dateCreated":{"date":"2023-02-20 11:30:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-02-20 11:30:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","imageAltText":"sample-image-16-9-red.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2128.jpg","imageDateCreated":"2023\u002F02\u002F20","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flipper Zero store","offerPrice":"169","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.flipperzero.one\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETo begin with, there's a sub-GHz wireless antenna that can capture and transmit wireless codes to operate wireless devices and access control systems, such as garage door remotes, boom barriers, IoT sensors, and even remote keyless systems. \u003C\u002Fp\u003E\u003Cp\u003ERFID support allows it to read, store, and emulate a number of different RFID cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdo-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EDo RFID blocking cards actually work? My Flipper Zero revealed the truth\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIt can also read, write, store, and emulate NFC tags. On the front, there's a 1-Wire connector that can read and emulate iButton (aka DS1990A, CYFRAL, Touch Memory, or Dallas key) contact keys.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere's also a built-in infrared transceiver that can both capture and transmit IR codes to control things like TVs. Finally, on the top, there are GPIO connectors that allow the Flipper Zero to connect to other gadgets in the real world.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F\"\u003E\u003Cstrong\u003EHow to unlock the Flipper Zero's true power\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat's a lot of features crammed into a tiny $169 device. But every week, I hear from buyers who are frustrated and disappointed because their Flipper Zero won't do the things that it can seemingly do based on fake social media videos.\u003C\u002Fp\u003E\u003Cp\u003EHere are some of the things I've been doing with my Flipper Zero over the past few weeks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENote\u003C\u002Fstrong\u003E: I'm usually running \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F#link={\" target=\"_blank\"\u003Ethird-party software on my Flipper Zero\u003C\u002Fa\u003E, which gives me access to a bunch of additional features. But worry not—loading third-party software doesn't invalidate your warranty, and you can easily go back to the stock software at any time using the Flipper Zero app on a desktop, laptop, or mobile device.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"df78e6a6-cf08-4210-9cbd-3a8d5548b772\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe sub-GHz wireless antenna can pick up signals from devices such as wireless doorbells and car key fobs, making the Flipper Zero a handy tool for testing if wireless transmitters are working properly. I use mine to test if the fobs are working and to test their range.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy (and how they work)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAnd yes, the Flipper Zero can record the codes transmitted by car key fobs, but retransmitting these codes to a modern car won't unlock it due to a feature called 'rolling codes' that changes the code with each use. On older cars -- those 20 years old and more -- you could use a code captured to unlock the vehicle (but don't do that unless it's your car or you have permission!), but you still couldn't drive away with it.\u003C\u002Fp\u003E\u003Cp\u003EOn the flip side -- pun intended -- retransmitting the codes to a wireless doorbell will cause the bell to ring, as most of these systems don't have a mechanism to protect against such annoyances.\u003C\u002Fp\u003E\" data-hed=\"1. Testing car key fobs, wireless doorbells and more\" data-imagegroup=\"{"alt":"Testing a car key fobs","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","title":"Testing a car key fobs","filename":"img-4422.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F542dcafa-5ad4-49e5-9e4c-2ace0599a37c\u002Fimg-4422.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":289398,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:01:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:01:56","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Testing a car key fobs","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","imageAltText":"Testing a car key fobs","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4422.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b9e30cff-c108-4dac-838f-86abe2ca1591\" data-edition=\"us\" data-description=\"\u003Cp\u003ENFC is everywhere nowadays, and the Flipper Zero allows you to work with this wireless protocol. It's built into plastic cards and fobs and used for all sorts of things, from unlocking hotel room doors to controlling barriers.\u003C\u002Fp\u003E\u003Cp\u003EBut this doesn't mean you can cause chaos in the world, because to unlock things you more often than not need access to the NFC key.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENFC signals can be read by the Flipper Zero, and many NFC cards can also be \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=ZpUqQsiwULk" target="_blank"\u003Ecopied and cloned\u003C\u002Fa\u003E (this depends on the security used for the card, so I can't give you any hard and fast rules about which NFC devices can be cloned). I've used my Flipper Zero to copy my hotel room card on occasion when the hotel only gives you a single card or when we have multiple rooms and don't want to juggle a handful of cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services (and how to choose the right one for you)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, note that while the Flipper Zero can read NFC cards and fobs, it cannot decode the card's encrypted security code used on credit and debit cards, so they can't be cloned.\u003C\u002Fp\u003E\" data-hed=\"2. Reading\u002Fsaving\u002Femulating NFC\" data-imagegroup=\"{"alt":"Flipper Zero reading an NFC output from a smartphone","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"45efd2a9-585d-4294-bf6a-9196bc707b7f","title":"Flipper Zero reading an NFC output from a smartphone","filename":"img-4423.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F45efd2a9-585d-4294-bf6a-9196bc707b7f\u002Fimg-4423.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":254166,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:03:52","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:04:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading an NFC output from a smartphone","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"45efd2a9-585d-4294-bf6a-9196bc707b7f","imageAltText":"Flipper Zero reading an NFC output from a smartphone","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4423.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2e662499-3476-44dd-bbe7-4ad6fff5ae53\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero cannot decode the card's encrypted security code, so it cannot clone bank cards.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero cannot decode the card's encrypted security code so it cannot clone bank cards\" data-image-filename=\"img-4428.jpg\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e28f271e-650a-40cb-a8be-98ddab286693\" data-edition=\"us\" data-description=\"\u003Cp\u003EAlong with NFC, the Flipper Zero can read and clone RFID cards and fobs, including hotel cards as shown in the picture above.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-retailer-is-using-rfid-tags-to-make-in-person-clothes-shopping-less-frustrating\u002F" target="_blank"\u003E\u003Cstrong\u003EHow RFID tags can make in-person clothes shopping less frustrating\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ERFID cards and tags can be locked to prevent them from being overwritten or having their security keys extracted, but the Flipper Zero can bypass many of these mechanisms. For example, it can offer to unlock the card if you present it to a valid reader (such as the lock it has been programmed to open). This allows you to clone the card and unlock the door using both the card and the Flipper Zero.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"3. Reading and unlocking RFID tags and cards\" data-imagegroup=\"{"alt":"Reading an RFID card","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","title":"Reading an RFID card","filename":"img-4425.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002Fa4cdee3f-d1db-4e9d-8a48-91d615f65221\u002Fimg-4425.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":210438,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:06:03","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:06:17","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Reading an RFID card","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","imageAltText":"Reading an RFID card","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4425.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf72a74f-7b37-428e-bda9-0dfcf8c6cd52\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero has a built-in infrared module that can be programmed to operate a wide range of devices, from \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv\u002F" target="_blank"\u003ETVs\u003C\u002Fa\u003E to AC units.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPretty much any consumer device with an IR remote control interface can be controlled using the Flipper Zero.\u003C\u002Fp\u003E\u003Cp\u003EAnother cool use of this functionality is to test if infrared remote controls are working. Simply point the remote control at the Flipper Zero in 'read IR' mode, and it will detect the signals.\u003C\u002Fp\u003E\u003Cp\u003EI use this feature all the time to test remote controls that I've fixed after battery leaks have damaged the device. It's an incredibly handy feature!\u003C\u002Fp\u003E\" data-hed=\"4. Universal infrared remote control\" data-imagegroup=\"{"alt":"The Flipper Zero has infrared capability","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","title":"The Flipper Zero has infrared capability","filename":"img-4429.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F294e7dd9-b9ab-469b-bbe8-e6ff18c4b316\u002Fimg-4429.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":230567,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:12:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:12:54","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"The Flipper Zero has infrared capability","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","imageAltText":"The Flipper Zero has infrared capability","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4429.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae924844-ed51-4006-9e66-448121b9ada3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, the Flipper Zero can bypass the security on some Sentry Safe electronic safes using an output from the GPIO.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is definitely not something you want to be doing if it isn't your safe or you don't have permission, but it goes to show just how insecure the "complimentary" safes found in hotels, spas, and Airbnbs actually are.\u003C\u002Fp\u003E\" data-hed=\"5. Bypassing Sentry Safe security\" data-imagegroup=\"{"alt":"Yes, the Flipper Zero can unlock some electronic safes","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","title":"Yes, the Flipper Zero can unlock some electronic safes","filename":"img-4427.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F468027ea-ccf8-4a20-8593-f1ec7abc26dd\u002Fimg-4427.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":194201,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:10:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:10:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Yes, the Flipper Zero can unlock some electronic safes","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","imageAltText":"Yes, the Flipper Zero can unlock some electronic safes","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4427.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0ecfec0d-98c7-40d2-afcf-aaa9107dbd58\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero can act as a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\u002F" target="_blank"\u003EBadUSB device\u003C\u002Fa\u003E, which means that when connected to a port it is seen as a Human Interface Device (HID), such as a keyboard.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services for iPhone and iPad (yes, you need to use one)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EA BadUSB device can change system settings, open backdoors, retrieve data, initiate reverse shells, or do anything that can be achieved with physical access. These tasks are completed by using a set of commands written in the Rubber Ducky Scripting Language, also known as \u003Ca href="https:\u002F\u002Fdocs.hak5.org\u002Fhak5-usb-rubber-ducky\u002Fducky-script-basics\u002Fhello-world" target="_blank"\u003EDuckyScript\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"6. Automating scripts in a variety of platforms\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fc6c2aa5-6d06-47e0-a71d-6bbdfa02f56a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero opens a browser and navigates to a webpage with no user input.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero opens a browser and navigates to a webpage with no user input\" data-image-filename=\"img-4431.gif\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"500\" data-image-height=\"281\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c430499e-fa24-4cad-bf3b-045fc036a82f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero can use the GPIO to output electrical signals and act as a signal generator. I last used this to simulate an antilock braking system module on a vehicle to confirm that all the wiring and computers in the car were working.\u003C\u002Fp\u003E\" data-hed=\"7. Signal generator\" data-imagegroup=\"{"alt":"Configuring the signal generator settings","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"66ad5e4b-bc49-441e-926b-751da4e0ec96","title":"Configuring the signal generator settings","filename":"img-4432.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F66ad5e4b-bc49-441e-926b-751da4e0ec96\u002Fimg-4432.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":218186,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:27:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:27:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Configuring the signal generator settings","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"66ad5e4b-bc49-441e-926b-751da4e0ec96","imageAltText":"Configuring the signal generator settings","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4432.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f084b423-70dc-4544-ab21-71b08e45f3ae\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Video Game Module is powered by the RP2040 microcontroller developed by Raspberry Pi and adds a bunch of gaming-related functionality.\u003C\u002Fp\u003E\u003Cp\u003EFirst, it adds a DVI video output port to the Flipper Zero, allowing it to send video to external displays. This is essential since the tiny LED panel built into the Flipper Zero isn't ideal for gaming. This capability isn't limited to gaming, though. The ability to beam video output to a larger display is great for various other applications, such as testing or training.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fif-you-like-your-flipper-zero-then-youll-love-this\u002F"\u003EIf you like your Flipper Zero, then you'll love this\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Video Game Module also includes an IMU (Inertial Measurement Unit) featuring a TDK ICM-42688-P sensor, which adds a 3-axis gyroscope and a 3-axis accelerometer to the package, allowing it to sense tilting or shaking.\u003C\u002Fp\u003E\u003Cp\u003EIf you're not into gaming, that's no problem. The RP2040 microcontroller can run applications programmed in C, C++, or MicroPython, making it a versatile addition to the Flipper Zero.\u003C\u002Fp\u003E\" data-hed=\"BONUS! Raspberry Pi Video Game Module for Flipper Zero\" data-imagegroup=\"{"alt":"Using Apple BLE Spam to spam an iPhone with popups","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Flipper Zero","imageData":{"id":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","title":"Flipper Zero Video Game Module","filename":"flipper-zero-raspberry-pi-video-game-module.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F11\u002Fa17bb30a-5f96-4f38-9fd0-5634c9d5bb9a\u002Fflipper-zero-raspberry-pi-video-game-module.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":333628,"width":1600,"height":900,"dateCreated":{"date":"2024-02-11 09:51:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-11 09:52:10","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Flipper Zero\u002FZDNET","alt":"Flipper Zero Video Game Module","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","imageAltText":"Using Apple BLE Spam to spam an iPhone with popups","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Flipper Zero","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"flipper-zero-raspberry-pi-video-game-module.jpg","imageDateCreated":"2024\u002F02\u002F11","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Flipper Zero\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:34:00",timezone:"UTC",updated:c,published:c},description:"This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ad79dfb5-0569-4d71-a848-3274e6eb00e8",image:{id:"22f4df1f-e7a0-4702-b40c-05a6afe1671d",filename:"img-20231215-101642-034.jpg",dateCreated:{created:c,date:"2023-12-15 11:24:01",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F12\u002F15\u002F22f4df1f-e7a0-4702-b40c-05a6afe1671d\u002Fimg-20231215-101642-034.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:900,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do",startYear:c,summary:b,title:"One year later: 7 useful things the Flipper Zero can do that still blows my mind",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EWhen you're looking for a new \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Evirtual private network (VPN)\u003C\u002Fa\u003E setup, you have a choice: you can install VPN software directly on the devices you want to protect or install a VPN on your router.\u003C\u002Fp\u003E\u003Cp\u003EVPNs are excellent security tools that layer your online communication with encryption, making it more difficult for you to be tracked or for your information to be stolen. VPNs also mask your IP address to appear as if you're in a different location, which can be helpful for streaming.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003ESetting up a VPN environment \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F\" target=\"_blank\"\u003Evia your router\u003C\u002Fa\u003E provides blanket coverage across devices connected to the hardware, including your smartphone, PC, and smart TV. This saves you the job of installing VPN software on each device, and the process can be far easier than you think -- as long as you have a compatible router.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers even have routers with a VPN that is already installed and ready to go. In either case, opting for a VPN-ready router can be an excellent way to improve your home security and privacy online.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best VPN router right now?\u003C\u002Fh2\u003E\u003Cp\u003EZDNET has years of experience \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Etesting VPN solutions and hardware\u003C\u002Fa\u003E. Our team of experts has researched and performed hands-on testing for decades, and we strive to give you the best recommendations for VPNs and supporting routers based on this experience and customer feedback. \u003C\u002Fp\u003E\u003Cp\u003EOverall, our pick for the best VPN router is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"cad58aed-b003-49fd-8295-2f1c2e81d5d9\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR\" data-link-shortcode-text=\"ExpressVPN Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. This router has one of our favorite VPNs preinstalled, saving you the job of setting up and configuring the software. It also offers impressive speeds and coverage.\u003C\u002Fp\u003E\u003Cp\u003EBelow are our recommendations for the best VPN routers of 2024, offering excellent VPN compatibility, speed, coverage, and additional privacy features. We've also included some worthwhile early Black Friday deals.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN routers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3a4e8e64-8219-48be-bb02-e806d04138ba\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN Aircove is our top pick thanks to its speed, ease of setup, and security. It offers dual-band connectivity for homes and offices, providing coverage of up to 1,600 square feet.\u003C\u002Fp\u003E\u003Cp\u003EWhen you pick a VPN-ready router, you still need to consider stability and speed. The $189 Aircove manages speeds of up to 1,200Mbps (600Mbps\u002F2.4GHz) when the VPN is not in use, although, as you should expect, speeds will drop when you are connected to VPN servers.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is one of our top picks as the best VPN in 2024, largely due to consistently low speed loss results during our speed tests. If you plan to use a VPN on your router 24\u002F7, it is an excellent choice -- either via Aircove or another VPN-ready router.\u003C\u002Fp\u003E\u003Cp\u003EThere's also a feature to diversify the servers used by devices connected to the router. For example, you might not want to connect your gaming PC to the VPN and have an office laptop run through a US or UK server. Parents and guardians can also take advantage of parental control settings.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead the review:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003EThe best VPN services: Expert tested\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ECustomers report excellent speed and performance, although it can be tricky to set up.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou will also need an \u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002F" target="_blank"\u003EExpressVPN subscription\u003C\u002Fa\u003E, but a free trial is included with the router. We consider ExpressVPN to be one of the top VPNs on the market, with excellent speed and stability. Plans typically begin at $6.67 per month, but during the Black Friday sale, you will pay only $4.99\u002Fmonth on a two-year contract. Six months of free access are included.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN Aircove f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6&nbsp;| Built-in VPN | 802.11ax, 802.11ac&nbsp;| Diverse server locations | Ad blocking | Threat manager | Parental controls |&nbsp;Includes free trial | Black Friday VPN plan sale\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN Aircove\" data-superlative=\"Best VPN router overall\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","title":"ExpressVPN Aircove","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":145911,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:06:47","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:07:03","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ExpressVPN","alt":"ExpressVPN Aircove","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002F","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR","url":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~ Built-in VPN ~ Up to 1,600 sq. ft. coverage ~ US and international versions\" data-dislike=\"~ VPN exclusivity ~ VPN subscription is expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4574c479-b932-4a36-aea6-e31349bdc79d\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want speed and power first and a VPN second, you should consider the TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90).\u003C\u002Fp\u003E\u003Cp\u003EThe tri-band Archer offers speeds of up to 4,804Mbps (5GHz) \u002F 1,201Mbps (5GHz) \u002F 574Mbps (2.4GHz) and has been designed with gamers in mind (hence the 4.8Gbps Game Band). It combines a plethora of WAN and LAN ports with a 1.5GHz processor. OFDMA and MU-MIMO support is included, alongside a gaming accelerator, to reduce latency and lag.\u003C\u002Fp\u003E\u003Cp\u003EYou can also add a OneMesh extender if you want to use mesh networking to increase coverage in your home and eradicate connectivity blind spots.\u003C\u002Fp\u003E\u003Cp\u003ETo set up this router with a VPN service, you must configure \u003Ca href="https:\u002F\u002Fwww.tp-link.com\u002Fus\u002Fsupport\u002Fdownload\u002Farcher-gx90\u002F" target="_blank"\u003Eeither\u003C\u002Fa\u003E OpenVPN or PPTP VPN, so be prepared to spend some time tuning the router to your needs. Many customers consider the Archer GX90 to be a solid, fast router, although its design doesn't suit everyone. If you're concerned about the antennas, they are detachable.\u003C\u002Fp\u003E\u003Cp\u003EThis router costs $230 ($20 off). Keep an eye on the price, however, as this device was heavily discounted during last year's Black Friday sales.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EArcher GX90 f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:\u003C\u002Fstrong\u003E&nbsp;Tri-band&nbsp;| High speeds&nbsp;|&nbsp;1.5GHz Quad-Core CPU&nbsp;| Beamforming | Game Accelerator | Parental controls | Large home support&nbsp;|&nbsp;TP-Link HomeShield\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90)\" data-superlative=\"Best VPN router for power\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","title":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","filename":"122.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F3c7cf5f4-ed19-4a84-95e1-a464057c7806\u002F122.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":124559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 12:31:23","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 12:31:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"122.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Tri-band ~Extreme speed ~ Game accelerator ~ Great sq. ft coverage\" data-dislike=\"~Requires configuration ~Expensive ~Bulky design\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e445816-2013-4c23-92cc-1c9a80388e2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Asus RT-AX1800S is an affordable VPN solution. The Wi-Fi 6 model, available for only $70, operates on the 2.4GHz frequency and offers up to 1,000Mbps speeds. It also offers free IoT device security via Asus AiProtection. The router has a built-in VPN: Asus Instant Guard, which you can activate with just a button click.\u003C\u002Fp\u003E\u003Cp\u003EThis router is compatible with AiMesh and includes five Ethernet ports (One Gigabit WAN and four Gigabit LAN). You can also purchase Wi-Fi extenders if you need to increase its range in larger homes.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is great value for the money, and many are impressed with the parental controls and security functions. The free VPN is designed to be as user-friendly as possible, although some users report occasional disconnection issues.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus RT-AX1800S&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003Ef\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures\u003C\u002Fstrong\u003E: Dual-band |&nbsp;2.4GHz | Up to 1,000Mbps speeds | Parental controls |&nbsp;AiMesh compatible |&nbsp;One Gigabit WAN port and four Gigabit LAN ports\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX1800S\" data-superlative=\"Best VPN router for affordability\" data-imagegroup=\"{"alt":"A VPN router next to its box","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"8c1c30c5-8b86-4709-8d05-50543146d7f0","title":"ASUS RT-AX1800S","filename":"p.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F21\u002F8c1c30c5-8b86-4709-8d05-50543146d7f0\u002Fp.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":100930,"width":1296,"height":720,"dateCreated":{"date":"2024-02-21 16:19:09","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-21 16:19:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX1800S","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8c1c30c5-8b86-4709-8d05-50543146d7f0","imageAltText":"A VPN router next to its box","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"p.jpg","imageDateCreated":"2024\u002F02\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Affordable ~Free security ~Ai Mesh compatible\" data-dislike=\"~Bland design ~Some users report speed issues\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c3be9d1c-f134-4c78-b821-01702b93aae0\" data-edition=\"us\" data-description=\"\u003Cp\u003EFor a more stylish option with custom lighting effects, consider the $398 Asus ROG Rapture GT-AXE11000.\u003C\u002Fp\u003E\u003Cp\u003EThis VPN-ready router is future-proof and while it's optimized for gamers -- who will appreciate the router's gaming accelerator, 2.5G LAN and WAN ports, and quad-core processing power -- this option also includes Asus' VPN Fusion feature.\u003C\u002Fp\u003E\u003Cp\u003EVPN Fusion is designed to let you connect to multiple VPN servers simultaneously. For example, you can assign your devices to different VPN tunnels -- selecting a server for your PC, another for your smart TV, and so on.\u003C\u002Fp\u003E\u003Cp\u003ECustomer reviews suggest the VPN is an excellent option for gamers, and the VPN Fusion feature is popular with those who do not mind getting technical. Still, some customers consider the price point to be high.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fstrong\u003E\u003Cstrong\u003E&nbsp;f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6E | Tri-band | 6GHz band | VPN Fusion |&nbsp;2.5G LAN\u002FWAN Port | Quad-core processor | Gaming accelerator\u003C\u002Fp\u003E\" data-hed=\"Asus ROG Rapture GT-AXE11000\" data-superlative=\"Best VPN for multiple connections\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"a04ca118-8605-4005-a8fa-39bf361a5dca","title":"ASUS ROG Rapture GT-AXE11000","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002Fa04ca118-8605-4005-a8fa-39bf361a5dca\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":112016,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:51:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:51:46","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"ASUS ROG Rapture GT-AXE11000","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a04ca118-8605-4005-a8fa-39bf361a5dca","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Stylish ~ Flexible VPN server options ~ 6GHz compatible\" data-dislike=\"~ Expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"954a735c-5976-4b56-b147-d23a7caadd2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe GL.iNET Beryl-AX is an excellent option if you want flexibility in your VPN choice, and you want to take your router with you when you travel.\u003C\u002Fp\u003E\u003Cp\u003EThis pocket-sized powerful router has a 1.3GHz processor and can reach speeds of up to 3000Mbps. It also includes a Gigabit Ethernet port and a USB port.\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to VPNs, the router offers implementation options with all the major providers, including NordVPN, ExpressVPN, IPVanish, and Private Internet Access. This is because the router supports the OpenVPN, Wireguard, and OpenWRT protocols.\u003C\u002Fp\u003E\u003Cp\u003EAs a bonus, upon purchase, you can choose to have your router preconfigured with your preferred VPN.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is portable, works extremely well, and is easy to configure. At $180, many users also consider this router to provide value for their money. Service plans are also available, but they are expensive.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGL.iNET Beryl-AX\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003Efe\u003C\u002Fstrong\u003E\u003Cstrong\u003Eatures:&nbsp;\u003C\u002Fstrong\u003EMulti VPN-compatibility&nbsp;| Travel-friendly&nbsp;| 1.3GHz processor | Gigabit Ethernet port |&nbsp;OpenVPN, Wireguard, and OpenWRT compatibility\u003C\u002Fp\u003E\" data-hed=\"GL.iNET Beryl-AX\" data-superlative=\"Best VPN router for travel\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","title":"GL.iNET Beryl-AX","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F60e86888-e676-42d8-a8c0-fd0e2b2b5aa5\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":46662,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:52:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:52:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNET","alt":"GL.iNET Beryl-AX","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flashrouters","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.flashrouters.com\u002Fberyl-wifi-6-mt3000-vpn-travel-router-by-flashrouters","url":""}]\" data-usepricing=\"false\" data-like=\"~VPN flexibility ~Gigabit Ethernet port ~Portable ~Sleek design\" data-dislike=\"~A lack of ports ~ Expensive support plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN router\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EBuilt-in VPN?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESpeed\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$170\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,200Mbps (disconnected) | 180Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$230\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4,804Mbps\u002F1,201Mbps\u002F574Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$70\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$398\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 11,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$180\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 3,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"Our favorite VPN routers, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a6a784bd-d1f1-4209-8c95-f11d2c1be1fd\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are advantages and disadvantages to using a VPN-enabled router or a standalone VPN app, the most important of which are below.\u003C\u002Fp\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN router\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN app\u003C\u002Fstrong\u003E&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router provides blanket coverage for all of your devices at home.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA VPN app's coverage is limited by the number of simultaneous connections you are allowed under one account.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can be complicated to set up, and most routers do not come with a built-in VPN. You could also risk your router's warranty when installing a VPN.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps are typically easy to install and use.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EInstall once, and protect everything.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou must install VPN apps individually.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN coverage and security is on permanently.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps have to be opened and services have to be enabled.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a VPN subscription and, in most cases, a paid one.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree, limited plans and paid options are available.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible router.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible PC or mobile device.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can protect devices that don't have native support, such as TVs.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN usage is limited to the available apps and OS compatibility.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"VPN router vs VPN app: How do you decide?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"49fd6070-ae39-4756-9016-3a358ec56d65\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN router service is a VPN that can either be installed directly on your router, or has already been enabled on a specific router. Today's routers are often compatible with VPNs, but installing them isn't all the same.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers also offer routers with preinstalled VPN software, but you must sign up for a subscription. You should consider using a VPN-ready router if you do not want to install your VPN manually on all of your devices or if you want to ensure that every device connected to your Wi-Fi network is protected.\u003C\u002Fp\u003E\" data-hed=\"What is a VPN router service and why should you use one?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a30cfde2-422e-4869-80a3-7eb2079c45d3\" data-edition=\"us\" data-description=\"\u003Cp\u003EInstalling a VPN on your router allows all your devices to access the same VPN network and connection. This creates blanket protection and IP masking, but it can be challenging to set up.\u003C\u002Fp\u003E\u003Cp\u003ERemember that your router will act as a VPN client rather than a server and share the VPN with devices connected to it. Here are some general steps to take, although they may change depending on your router and existing setup:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECheck your router's compatibility. Not every router will run a VPN natively -- although many modern routers do have the capacity.\u003C\u002Fli\u003E\u003Cli\u003ESign up for a VPN service. Unless your router comes with a built-in VPN, you will likely need a subscription.\u003C\u002Fli\u003E\u003Cli\u003EAccess your VPN's firmware. You will need to do so through your router's IP address.\u003C\u002Fli\u003E\u003Cli\u003EUnder settings, you should find a VPN tab, and you will need to enable VPN services and choose between a static or dynamic IP address.\u003C\u002Fli\u003E\u003Cli\u003EThe VPN client can now be installed, although you may need to tweak your network settings.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor an extensive guide on installing a VPN on your router, check out:\u003Cstrong\u003E \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How to set up your VPN router: Configuration and encryption made simple\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EChoosing the best VPN router involves many factors. If you want to purchase a VPN-ready router, you will find the best use cases for each of our recommendations below.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this VPN router...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly VPN router with solid coverage and speed. While the router is exclusive to ExpressVPN usage, it is one of our favorites due to its price, reliability, and easy setup.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA heavy-duty, powerful router. This gaming router offers tri-band connectivity and while it does require configuration, the Archer is a future-proof router with excellent speeds.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAn affordable VPN solution. This model has highly positive customer reviews and, for the price point, is a steal -- especially when you consider its built-in VPN and additional security controls.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN versatility at home. You can use the Asus VPN Fusion feature to customize your VPN experience and operate multiple server connections simultaneously.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETo take your VPN router with you on your travels. This router is one of the best travel-friendly, portable routers that is compatible with major VPN providers.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Choosing the right VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b2dc499c-f2f5-44d9-950f-b0a021928b95\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen you are researching a new VPN router, consider these points before making a purchase:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EDIY\u003C\u002Fstrong\u003E: If you want a VPN for your home network, consider whether you want to install a VPN directly on your router.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPreinstalled options\u003C\u002Fstrong\u003E: If you don't want to tamper with router settings yourself to install a VPN, consider a router model that comes with a VPN preinstalled.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAffordability\u003C\u002Fstrong\u003E: VPN routers are available for a variety of budgets. If you can, consider a future-proof VPN router that can support next-generation Wi-Fi and provide good coverage and speeds.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN\u003C\u002Fstrong\u003E: You also need to take into account the VPN service you want to use. If you have a preferred VPN, ensure that the router you want supports it.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESubscriptions\u003C\u002Fstrong\u003E: You will likely need to purchase a subscription. While there are a handful of free VPN plans offered by trustworthy vendors, most of them come with limitations. These may not be suitable for use on a router, as you may quickly run out of bandwidth. As a result, you should factor in the cost of a VPN subscription, even if it is just a basic, paid plan.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOther purposes\u003C\u002Fstrong\u003E: The VPN might be the most important aspect, but you should also consider whether other features are important to you -- such as tri-band functionality, gaming optimization, or additional security features.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile compiling our recommendations for the best VPN routers of 2024, we considered several crucial factors, including:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESpeed\u003C\u002Fstrong\u003E: There's no point investing in a new router capable of handling VPN environments unless it serves its core purpose: providing solid and stable connections to the internet. We considered traditional router models and options that provide mesh networking for larger homes.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN support\u003C\u002Fstrong\u003E: We included a range of models with built-in VPNs, VPN support for standalone VPN services, and mobile products for VPN protection on the go. We know that what might suit one user won't always suit another, so there must be flexibility in the VPN options.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EBudgets\u003C\u002Fstrong\u003E: We covered different budgets. Although our priorities are security, speed, and reliability, we wanted to ensure that we included affordable products alongside future-proofed routers.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer reviews\u003C\u002Fstrong\u003E: We also examined customer reviews in depth, including positive and negative experiences, and we factored this feedback in when deciding on our recommendations.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVendor reputation\u003C\u002Fstrong\u003E: We considered the reputation of router manufacturers, including their popularity, variety, and product accessibility.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor a more extensive breakdown, check out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"How did we choose these VPN routers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a2dd9d0b-1ee5-4324-a3bd-d1828186a2a3\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want to install a VPN directly onto a router, the process can be more of a hassle than just signing up for an app. It can, however, save you time in the long run as any device that connects to your router -- like a PC or a smartphone -- will use the VPN and will be automatically protected. This can be particularly useful if you have internet-connected devices, including TVs and IoT products, that cannot support a VPN on their own hardware.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou might want to consider setting up a VPN on your router if you have numerous devices needing protection, and you work from home. If you are a remote worker, some organizations may require you to use their own VPN to access corporate resources.\u003C\u002Fp\u003E\u003Cp\u003EA caveat: some online platforms, such as streaming services, will detect when you are using a VPN and may block you. If this is the case, you may have to temporarily disable your VPN service to resume watching.\u003C\u002Fp\u003E\" data-hed=\"The bottom line: Is a VPN router worth it?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhat VPN should I use for my router?\u003C\u002Fh3\u003E\u003Cp\u003EHere's a list of ZDNET's favorite VPNs:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"33548326-3466-4b1f-80f5-c1ac8dffe59d\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A solid combination of speed, security, and servers\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ca0b98ba-399f-4db5-b9a1-588917eb1066\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Incredibly fast\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d0eef650-a662-4506-a715-290ce433af51\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002F\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Suitable for any budget\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"142ae698-eb81-4c2d-81d7-c2c0400e10a7\" data-raw-url=\"https:\u002F\u002Fwww.privateinternetaccess.com\u002F\" data-link-shortcode-text=\"Private Internet Access\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: An open-source option\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4d13b573-5d9a-4d99-ba6d-e1e8f6920556\" data-raw-url=\"https:\u002F\u002Fprotonvpn.com\u002F\" data-link-shortcode-text=\"Proton VPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A VPN with security at its core\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPNs of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch3\u003ECan any router be a VPN router?\u003C\u002Fh3\u003E\u003Cp\u003EMany routers are now smart, intelligent devices capable of far more than providing an internet connection. Today, you can install VPN software on many different routers, and VPN support is often promoted as a major feature. \u003C\u002Fp\u003E\u003Cp\u003EA word of caution: installing third-party software on your router might void its warranty, just as jailbreaking mobile devices or changing the firmware of a gaming console can invalidate a warranty. \u003C\u002Fp\u003E\u003Ch3\u003EWhy would anyone use a VPN?\u003C\u002Fh3\u003E\u003Cp\u003EA VPN can be a great tool for protecting your privacy. At the very least, VPNs should be used when you are taking advantage of public Wi-Fi hotspots, but using them while you're online as a default is the better option to protect yourself and your information. VPNs are also beneficial in circumventing geolocation blocks and censorship.\u003C\u002Fp\u003E\u003Cp\u003ESome countries either ban VPN usage entirely or heavily discourage it. If using a VPN is illegal, you may be fined or prosecuted. According to NordVPN's \u003Ca href=\"https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fare-vpns-legal\u002F\" target=\"_blank\"\u003Ecountry guide\u003C\u002Fa\u003E, countries that ban VPNs include Belarus and Iraq, whereas governments in China and Russia are among those that only permit specific VPNs.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a work VPN expose my home network to my employer?\u003C\u002Fh3\u003E\u003Cp\u003EIt's possible, but it depends on several factors. VPNs handle traffic in different ways, but overall, it is highly unlikely that company IT administrators will be able to access your home network via your VPN connection. If you are on a work-issued laptop with software that allows such connections, however, IT administrators will most likely be able to monitor your activities and tap into resources on the device.\u003C\u002Fp\u003E\u003Cp\u003EAdditionally, while VPN tunnels encrypt your traffic and mask your online activities, you can be monitored if you use a VPN designed, licensed, or owned by your employer. VPNs can protect corporate resources, and you should keep work and private online activities separate.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a VPN slow down your internet connection?\u003C\u002Fh3\u003E\u003Cp\u003ETypically, yes, although a high-quality VPN will hopefully not make a noticeable difference. There are caveats; for example, you should expect a slowdown when connecting to servers across a long distance, such as from the UK to Australia. If, however, you experience severe speed loss when you are connecting to servers closer to you, such as from New York to Washington, this may indicate a problem with either the VPN or your ISP connection.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1555caca-a976-4e78-b5df-4435662a7042\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou can put VPN software on many devices, from PCs to mobile devices and routers. While we have showcased what we consider to be the best VPN-supporting routers in 2024, we can't highlight every worthy option -- so you can check out alternative products below, including subscriptions:\u003C\u002Fp\u003E\" data-hed=\"Are there alternative VPN routers worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6a2861a0-5d4d-4bb5-ac03-ab8a8d8505de\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $123 Flint 2 is a great alternative for performance. This router is compatible with a range of VPN protocols, including OpenVPN.\u003C\u002Fp\u003E\" data-hed=\"Flint 2\" data-imagegroup=\"{"alt":"Flint 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet","imageData":{"id":"7aaabd27-af69-4e16-821c-b6f5515eacb6","title":"Flint 2","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F7aaabd27-af69-4e16-821c-b6f5515eacb6\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":93028,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:41:46","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:42:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet","alt":"Flint 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7aaabd27-af69-4e16-821c-b6f5515eacb6","imageAltText":"Flint 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\" data-linktext=\"Best alternative for performance\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Gl-inet","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fstore-us.gl-inet.com\u002Fproducts\u002Fflint-2-gl-mt6000-wi-fi-6-high-performance-home-router","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f400e72c-5c42-4f8c-999c-dc641b9a0fcc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like the idea of the Aircove but want a more portable model, consider the $170 Aircove Go.\u003C\u002Fp\u003E\" data-hed=\"Aircove Go\" data-imagegroup=\"{"alt":"Aircove Go","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"febdef0b-83e4-4bb0-a733-a38642a2cb93","title":"Aircove Go","filename":"l.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F22\u002Ffebdef0b-83e4-4bb0-a733-a38642a2cb93\u002Fl.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":62103,"width":1296,"height":720,"dateCreated":{"date":"2024-08-22 09:04:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-22 09:04:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"Aircove Go","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"febdef0b-83e4-4bb0-a733-a38642a2cb93","imageAltText":"Aircove Go","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"l.jpg","imageDateCreated":"2024\u002F08\u002F22","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-linktext=\"Best alternative for US consumers\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"86b594a2-b878-4740-9369-6be04a061fb9","slug":"aircove-go-portable-wi-fi-6-vpn-router-protect-unlimited-devices-free-30-day-expressvpn-trial-u-s-canada-version","name":"Aircove Go | Portable Wi-Fi 6 VPN Router | Protect Unlimited Devices | Free 30-Day ExpressVPN Trial | (U.S. & Canada Version)","productType":"SERIES","updateType":"EZMONEY","mod":1732000480499,"displayDate":"Tue Nov 19 2024 02:14:40 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS","url":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ea33338-5dd6-43bf-9234-f5d846f178f1\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want a router for travel, but you don't want to spend a fortune, this $30 GL.iNet model is a solid option.\u003C\u002Fp\u003E\" data-hed=\"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router\" data-imagegroup=\"{"alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet\u002FZDNET","imageData":{"id":"d457c097-c39b-432a-8335-1c07ef22d983","title":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","filename":"118.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Fd457c097-c39b-432a-8335-1c07ef22d983\u002F118.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":48602,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:03:25","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:03:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet\u002FZDNET","alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d457c097-c39b-432a-8335-1c07ef22d983","imageAltText":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"118.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"30","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a69aa07-8d07-4065-862c-be57a07f2a2b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAmazon's $195 eero 6+ mesh Wi-Fi system, currently on sale, includes an eero security subscription and the Encrypt.me VPN.\u003C\u002Fp\u003E\" data-hed=\"Amazon eero 6+ mesh Wi-Fi\" data-imagegroup=\"{"alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon\u002FZDNET","imageData":{"id":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","title":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","filename":"116.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F7f8c63f3-68ad-4c29-b96b-8d1123c0d15d\u002F116.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":64242,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 09:51:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 09:51:43","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon | ZDNET","alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","imageAltText":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"116.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\u002FZDNET\" data-linktext=\"Best alternative with an inbuilt VPN\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"2f1a95c2-71cf-4ef1-86dc-5ddfec92a22f","slug":"eero-6-plus","name":"Eero 6 Plus","productType":"SERIES","updateType":"EZMONEY","mod":1732000473593,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"012c8098-b70a-4256-a838-4188b14bcfa0\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $85 TP-Link AX1800 Wi-Fi 6 router is an excellent alternative if you want a Wi-Fi 6 model.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX1800 Wi-Fi 6 router\" data-imagegroup=\"{"alt":"TP-Link AX1800 Wi-Fi 6 router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"TP-Link\u002FZDNET","imageData":{"id":"f1216592-effe-484a-b1ce-83fc92f943c0","title":"TP-Link AX1800 Wi-Fi 6 router","filename":"119.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Ff1216592-effe-484a-b1ce-83fc92f943c0\u002F119.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":102559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:05:56","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:06:04","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX1800 Wi-Fi 6 router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f1216592-effe-484a-b1ce-83fc92f943c0","imageAltText":"TP-Link AX1800 Wi-Fi 6 router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"TP-Link\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"119.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"TP-Link\u002FZDNET\" data-linktext=\"Best alternative Wi-Fi 6 router\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"4fe6a3b2-c24f-409c-8336-03cdc3e4cc00","slug":"tp-link-archer-ax21","name":"TP-Link Archer AX21","productType":"SERIES","updateType":"EZMONEY","mod":1732000473410,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"85","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK","url":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"debd9488-d4f0-4562-88af-1cc375b2e2fe\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $135 Asus RT-AX3000 dual-band Wi-Fi 6 router is an Ai Mesh-compatible alternative with a built-in VPN and parental controls.\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX3000\" data-imagegroup=\"{"alt":"ASUS RT-AX3000 Dual Band WiFi 6","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ASUS\u002FZDNET","imageData":{"id":"1785ad56-0089-4d7b-8594-4b10091424e7","title":"ASUS RT-AX3000 Dual Band WiFi 6","filename":"k.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F1785ad56-0089-4d7b-8594-4b10091424e7\u002Fk.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":59376,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 13:47:24","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 13:47:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX3000 Dual Band WiFi 6","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1785ad56-0089-4d7b-8594-4b10091424e7","imageAltText":"ASUS RT-AX3000 Dual Band WiFi 6","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ASUS\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"k.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ASUS\u002FZDNET\" data-linktext=\"Best alternative for parental controls\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2ade35f6-03a0-4cf2-b407-9838b20e2b1f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe InvizBox 2 is a preconfigured VPN router with robust security standards, an ad blocker, and multiple VPN hotspot options. Plans start at $99, with the hardware included.\u003C\u002Fp\u003E\" data-hed=\"InvizBox 2\" data-imagegroup=\"{"alt":"InvizBox 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"4b5da877-9d4c-4d2d-9425-635a08f492d3","title":"InvizBox 2","filename":"q.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F4b5da877-9d4c-4d2d-9425-635a08f492d3\u002Fq.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":84428,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 14:05:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 14:05:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"InvizBox","alt":"InvizBox 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4b5da877-9d4c-4d2d-9425-635a08f492d3","imageAltText":"InvizBox 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"q.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-linktext=\"Best alternative for privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Invizbox","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.invizbox.com\u002Fproducts\u002Fib2\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:11:00",timezone:"UTC",updated:c,published:c},description:"Looking for a new router to give your home blanket VPN coverage? These are the best VPN-ready routers that provide secure, fast, and reliable internet connections.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"def1c338-68ab-4b51-a334-bcfaff908a96",image:{id:"0c52942f-4983-4a2c-8aa4-467bd6c13b05",filename:"3.jpg",dateCreated:{created:c,date:"2024-10-31 12:06:47",timezone:"UTC",updated:c,published:c},alt:"A black VPN router with its antennas up against an orange background",credits:"Grassetto\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPN routers you can buy",section:b,slug:"best-vpn-router",startYear:c,summary:b,title:"The best VPN routers of 2024",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a3279b29-677e-4133-9d9a-eb87332abb09",slug:"home-networking",name:"Home Networking",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:c,description:c,filters:c,paging:c,slug:"dynamic-topic-listing-right-rail-basic-latest",title:"Latest",label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c},{id:"2ffa34dd-efe5-440b-bcdf-7eae560bba29",meta:{componentName:"2ffa34dd-efe5-440b-bcdf-7eae560bba29",componentDisplayName:c,componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F2ffa34dd-efe5-440b-bcdf-7eae560bba29\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=2ffa34dd-efe5-440b-bcdf-7eae560bba29"}},items:[{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6835195a-fcd2-43b2-918b-8f61bcdb9fd2",filename:"lance-31.png",dateCreated:{created:c,date:"2023-05-12 19:35:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F05\u002F12\u002F6835195a-fcd2-43b2-918b-8f61bcdb9fd2\u002Flance-31.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"f002e24f-f493-443b-a2fd-5ff172a5d756\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Cape\" data-image-alt-text=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-filename=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-crop=\"2486x1397+0+0\" data-image-width=\"2693\" data-image-height=\"1397\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ECyberattacks that target mobile devices and services can impact anyone, but the risk is especially great against politicians, journalists, activists, and public figures. Now a relatively new mobile carrier promises extra special protection against mobile threats.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002F\"\u003ECape\u003C\u002Fa\u003E, a Washington, D.C.-based mobile provider, promotes its service as built with privacy and security at its core. Cape operates as an MVNO (Mobile Virtual Network Operator), which means it doesn't have its own mobile network but sells its branded wireless service using the network of another provider. For this, Cape partners with US Cellular.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fscam-yourself-attacks-just-increased-over-600-heres-what-to-look-for\u002F\"\u003E'Scam yourself' attacks just increased over 600% - here's what to look for\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, the company also uses its own software, allowing it to securely manage customer data. With security in mind, Cape said it's able to limit the collection of personal data and control how users authenticate their accounts. Further, it can manage such aspects as internet access, call routing, and data sharing. The goal is to better ward off security threats that impact a customer's mobile privacy.\u003C\u002Fp\u003E\u003Cp\u003ETouted as more robust than privacy apps, VPNs, and privacy-minded browsers, Cape's service looks for vulnerabilities at the cellular network level. As such, it offers the following security features:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELocation obfuscation – Here, customers can change the unique identifiers associated with their mobile phones to stop location tracking and profiling.\u003C\u002Fli\u003E\u003Cli\u003EAd identifier rotation – This feature prevents advertisers and data brokers from collecting information about a customer's app use and browser history.\u003C\u002Fli\u003E\u003Cli\u003EEnhanced signaling protection – Offering stronger protection than the typical firewall, this feature combats \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5g-networks-could-be-vulnerable-to-exploit-due-to-mishmash-of-old-technologies\u002F\"\u003Esignaling or SS7 attacks\u003C\u002Fa\u003E through which attackers can intercept calls and texts and track your location.\u003C\u002Fli\u003E\u003Cli\u003ESIM swap protection – This feature uses sophisticated cryptology to prevent unauthorized SIM transfers.\u003C\u002Fli\u003E\u003Cli\u003EData privacy commitment - Here, Cape asks for a minimal amount of information for subscribers to get service and promises to delete that data when no longer needed.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ELaunched earlier this year, Cape's service was available only to government users. Now the service is open to several different groups. These include:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EElected officials, high-level executives, and celebrities are at risk of location stalking and SIM swaps.\u003C\u002Fli\u003E\u003Cli\u003ELawyers, health care providers, and cybersecurity experts who work with confidential clients and sensitive information.\u003C\u002Fli\u003E\u003Cli\u003EJournalists and activists whose work can subject them to surveillance and location tracking.\u003C\u002Fli\u003E\u003Cli\u003EDomestic abuse survivors may be tracked by their abusers.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EWith mobile threats a potential risk for anyone, Cape said it will launch a similar privacy-minded service for the general public early next year.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fnetworking\u002Fgenerative-ai-fuels-demand-for-better-mobile-connectivity-and-users-ready-to-pay-for-it\u002F\"\u003EGenerative AI fuels demand for better mobile connectivity - and users ready to pay for it\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAside from greater security, Cape offers \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcoverage\"\u003Epremium 4G\u002F5G cellular coverage\u003C\u002Fa\u003E and unlimited talk and text. For now, the service includes a pre-configured Android phone. However, starting in early 2025, subscribers will be able to bring their own up-to-date devices to the plan. Anyone interested in signing up with Cape can submit a form through the \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcontact-us\"\u003Ecompany's contact page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"Most privacy solutions—like specialized apps or burner phones—focus primarily on app and device-level threats,\" Andy Makridis, former Chief Operations Officer of the CIA, said in a press release. \"Yet, some of the most serious vulnerabilities stem from network-level weaknesses. By addressing both device and network security, Cape offers a broader layer of protection against sophisticated threats.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 20:57:00",timezone:"UTC",updated:c,published:c},description:"This mobile provider service was available only to government users but has since expanded. If you fall into these categories, you may be eligible today, but the service will expand to the general public soon, too.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ffcbc132-23b6-4b53-b3c7-12f838b209e4",image:{id:"f002e24f-f493-443b-a2fd-5ff172a5d756",filename:"screenshot-2024-11-22-at-12-18-24pm.png",dateCreated:{created:c,date:"2024-11-22 17:19:22",timezone:"UTC",updated:c,published:c},alt:"screenshot-2024-11-22-at-12-18-24pm.png",credits:"Cape",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002Ff002e24f-f493-443b-a2fd-5ff172a5d756\u002Fscreenshot-2024-11-22-at-12-18-24pm.png",cropGravity:o,crop:"2486x1397+0+0",typeName:"content_image",imageUrl:c,width:2693,height:1397,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Home & Office^Networking^Mobile Carriers",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service",startYear:c,summary:b,title:"This new wireless carrier promises ultra-secure mobile phone service",topic:{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"62ea7721-b57a-4248-8845-0a9fca050277\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Vaishnav K Suresh \u002F 500px \u002F Getty Images\" data-image-alt-text=\"camera\" data-image-filename=\"gettyimages-1394240632.jpg\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-width=\"4152\" data-image-height=\"2276\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter multiple delays, Microsoft has finally begun rolling out a preview of its controversial Recall feature for testing by members of the Windows Insider Program.\u003C\u002Fp\u003E\u003Cp\u003EThe feature, which promises a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-new-recall-feature-lets-you-ask-ai-for-that-file-or-email-you-cant-find\u002F\"\u003E\"photographic memory\"\u003C\u002Fa\u003E for Windows 11 PCs, was originally announced as part of the rollout of the new AI-powered Copilot+ in June. After a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fafter-brutal-critiques-microsoft-recall-will-get-these-major-privacy-and-security-changes\u002F\"\u003Ebrutal firestorm of criticism from security experts\u003C\u002Fa\u003E, the company delayed the feature so that sweeping privacy changes could be implemented.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcan-your-old-pc-even-handle-the-windows-11-upgrade-heres-how-to-tell\u002F\"\u003ECan your old PC even handle the Windows 11 upgrade? How to tell\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat schedule change was followed by additional delays, with a rollout of the Recall preview pushed back to October. (For a detailed timeline, see \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fas-microsoft-breaks-awkward-silence-around-its-controversial-recall-feature-privacy-questions-remain\u002F\"\u003E\"As Microsoft breaks awkward silence around its controversial Recall feature, privacy questions remain.\"\u003C\u002Fa\u003E) As October ended, the launch was \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-delays-its-troubled-ai-powered-recall-feature-yet-again\u002F\"\u003Edelayed one more time\u003C\u002Fa\u003E, with the company citing the need for additional time to deliver \"a secure and trusted experience.\"\u003C\u002Fp\u003E\u003Cp\u003EToday's announcement comes in a \u003Ca href=\"https:\u002F\u002Fblogs.windows.com\u002Fwindows-insider\u002F2024\u002F11\u002F22\u002Fpreviewing-recall-with-click-to-do-on-copilot-pcs-with-windows-insiders-in-the-dev-channel\u002F\" target=\"_blank\"\u003Elengthy post on the Windows Insider Blog\u003C\u002Fa\u003E that includes details on how to sign up for the Insider program and how to use Recall. Pointedly, the announcement recognizes \"the contributions of researchers and the security community in shaping Recall.\" It also includes this detailed description of how the feature is implemented in the new Windows 11 preview:\u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EInsiders and Recall users, we want you to know your snapshots are truly yours. We do not send your snapshots off your PC to Microsoft or third parties, and don't use them for training purposes. Microsoft can't access the keys to view your encrypted data, so we can't restore your snapshots if you remove Windows Hello or restore your snapshots if you need to reset your PC or move to a new PC. We will in future updates provide ways for you to store a backup of your keys for these cases. For now, your Copilot + PC only releases the keys to use Recall if you show your face, fingerprint, or PIN.\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cp\u003EIn this release, Microsoft says, it programmed Recall to detect \"sensitive information like credit card details, passwords, and personal identification numbers\" and block snapshots containing that information from being saved or stored. Testers can exclude specific apps and sites from being saved under any circumstances, and an option in Settings, which is off by default, allows testers to anonymously share details of apps and sites they prefer to be excluded from Recall.\u003C\u002Fp\u003E\u003Cp\u003EThe Recall feature is included in Preview Build 26120.2415 (KB5046723), which is rolling out to users who are signed up for the Windows Insider Dev Channel.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-an-incompatible-windows-10-pc-to-windows-11-two-ways\u002F\"\u003EHow to upgrade an 'incompatible' Windows 10 PC to Windows 11: Two ways\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EFor now, the feature is only available on Snapdragon-powered Copilot+ PCs; support for Copilot+ PCs based on AMD and Intel processors will be available later, Microsoft says. For this preview, the only supported languages are Chinese (simplified), English, French, German, Japanese, and Spanish.\u003C\u002Fp\u003E\u003Cp\u003EOn PCs running Windows 11 Enterprise edition and on PCs managed by an IT administrator on work and school networks, the Recall feature will be removed by default. On those managed networks, employees who have enrolled in Windows Hello using biometric authentication can opt into the Recall feature. Administrators can block use of Recall completely or can \u003Ca href=\"https:\u002F\u002Flearn.microsoft.com\u002Fen-us\u002Fwindows\u002Fclient-management\u002Fmanage-recall\"\u003Euse management tools\u003C\u002Fa\u003E to prevent saving snapshots from specific apps and websites. On managed networks, enterprises cannot access Recall data saved by an employee.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn this build, Recall also includes the Click to Do feature, which adds AI-powered automated actions to text and images. The feature offers the ability to search, save, and edit text with a preferred app and to manipulate images using AI tools in the Photos and Paint apps.\u003C\u002Fp\u003E\u003Cp\u003EThe blog post includes a lengthy list of known issues that testers are likely to encounter. The feature requires Secure Boot to be enabled, for example, and Microsoft recommends updating Microsoft 365 apps to the latest version before using Recall. Some users might experience lengthy delays in saving screenshots or a spurious error message; either issue can be resolved with a reboot.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-to-tighten-windows-security-dramatically-in-2025-heres-how\u002F\"\u003EMicrosoft to tighten Windows security dramatically in 2025 - here's how\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ERecall can be enabled or disabled using the \"Turn Windows features on or off\" dialog; in this build, disabling the feature caches the binaries that control the feature. In a future update, Microsoft says, it will completely remove the feature when the option to turn it off is selected.\u003C\u002Fp\u003E\u003Cp\u003EGiven the rocky nature of the initial announcement, Microsoft executives are likely holding their breath awaiting reactions from testers and the security community. That feedback will no doubt dictate the eventual release schedule, sometime in 2025.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 18:00:00",timezone:"UTC",updated:c,published:c},description:"What was supposed to be a signature feature of the AI-powered Copilot+ PCs for Windows 11 was delayed after a firestorm of privacy and security complaints. But it's ready for testing now, if you have the right hardware.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"43e632dd-f122-4040-bee2-f4d470f6c50c",image:{id:"62ea7721-b57a-4248-8845-0a9fca050277",filename:"gettyimages-1394240632.jpg",dateCreated:{created:c,date:"2024-11-22 17:42:31",timezone:"UTC",updated:c,published:c},alt:"camera",credits:"Vaishnav K Suresh \u002F 500px \u002F Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002F62ea7721-b57a-4248-8845-0a9fca050277\u002Fgettyimages-1394240632.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4152,height:2276,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Tech^Services & Software^Operating Systems^Windows^Windows 11",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"you-can-finally-test-microsofts-controversial-recall-feature-heres-how",startYear:c,summary:b,title:"You can finally test Microsoft's controversial Recall feature - here's how",topic:{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10c1d40e-ec91-11e3-95d2-02911863765e",slug:"microsoft",name:"Microsoft",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ENow that the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiphone-16-pro-max-buying-advice-2024\u002F\" target=\"_blank\"\u003EiPhone 16\u003C\u002Fa\u003E has arrived with new colors, AI features, and camera controls -- and with it, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F6-ios-18-settings-i-changed-immediately-and-why-you-should-too\u002F\" target=\"_blank\"\u003EiOS 18\u003C\u002Fa\u003E -- you may be looking for a new way to improve your online privacy. While all Apple \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\" target=\"_blank\"\u003EiPhone\u003C\u002Fa\u003E models and generations tend to have excellent connectivity, we always recommend using a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-why-do-you-need-one-all-your-virtual-private-network-questions-answered\u002F\" target=\"_blank\"\u003Evirtual private network (VPN) service\u003C\u002Fa\u003E to keep your data and browsing safe while on the go.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003ETrustworthy VPNs\u003C\u002Fa\u003E encrypt your online traffic when you access email, social media, and online services. If you have to rely on public Wi-Fi hotspots, they are excellent tools for protecting your data from eavesdroppers, and if you're looking to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-streaming-vpn\u002F\" target=\"_blank\"\u003Estream content\u003C\u002Fa\u003E that isn't available in your area, a VPN can potentially unlock access to different streaming libraries. \u003C\u002Fp\u003E\u003Cp\u003EWe've \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F#link={\" target=\"_blank\"\u003Etested every top VPN on the market\u003C\u002Fa\u003E and found the best ones that offer solid iPhone and Apple ecosystem apps, robust security, and rapid speeds. If you're keen to sign up for a VPN service, now is an excellent time to do so, considering the heavy discounts and promotions available as we reach Black Friday.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best travel VPNs\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best iPhone VPN right now?\u003C\u002Fh2\u003E\u003Cp\u003EBased on our extensive testing, our pick for the best VPN for iPhone is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f22bd1ec-2ba7-4c0c-8139-0a372b32dfc0\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-monetized-url=\"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. While it is not the cheapest service, NordVPN is known for its rapid speeds, solid connectivity, and massive server network. Furthermore, the NordVPN iOS app is user-friendly and won't noticeably drain your phone's battery with continual use. \u003C\u002Fp\u003E\u003Cp\u003EIf you want to find out what the best VPNs for iPhone are in 2024, check out our recommendations below.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN for iOS in 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"01a386d9-8298-49dc-b810-abdc13738b80\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordVPN is one of the more popular VPN offerings in the App Store, and for good reason. \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-does-nordvpn-work-plus-how-to-set-it-up-and-use-it-tutorial\u002F" target="_blank"\u003EInstalling NordVPN\u003C\u002Fa\u003E&nbsp;on an iPhone is a simple, painless way to secure predictable performance across regions, and the service is compatible with iOS \u003Ca href="https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fnordvpn-ios-release-notes\u002F?srsltid=AfmBOooLz0K2c1gbD1Kh6356NSzMQPekth5ctCHhXog2H4POqXRaMM1Z" target="_blank"\u003E14.2 or later\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ENordVPN's interface is user-friendly, and we found the service offers consistent, rapid, and reliable speeds that do not impact streaming services or make a noticeable difference to internet surfing.\u003C\u002Fp\u003E\u003Cp\u003EWe consider this VPN to be one of the best available, combining speed, server availability in 111 countries, reliability, and 10 simultaneous connections (although we would prefer if there was no limit).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt has many tools in addition to a standard VPN service. NordVPN's Onion over VPN is a special category of NordVPN servers that enables Tor capabilities, supports peer-to-peer file sharing, and allows you to connect through a second server for an added layer of protection. You can also set up a dedicated IP address for an additional fee.\u003C\u002Fp\u003E\u003Cp\u003EWe've tested NordVPN for years and have always been impressed with its stable connectivity and speeds. Customers generally report fast speeds and minimal buffering with easy setup, although some caution that you should turn off auto-renewal.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnord-vpn-review-an-in-depth-look-at-a-popular-vpn\u002F" target="_blank"\u003E\u003Cstrong\u003ENordVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn addition to iOS, NordVPN runs on all the most popular platforms. Prices start from $3.59 per month on a two-year standard plan, with three months of free access. Yearly plans begin at $4.59 per month. If you only want to try out NordVPN for a month, prices begin at $12.99 per month.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordVPN offers additional cybersecurity options through its premium plans, including identity theft and cyber extortion coverage.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ENordVPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003E10 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, and routers |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;111 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Email address and billing information only | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on&nbsp;Android&nbsp;|&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Best iPhone VPN overall\" data-imagegroup=\"{"alt":"NordVPN","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"1eead599-77e0-4877-bff5-ca101ca11758","title":"Nord VPN Mobile","filename":"nord-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F1eead599-77e0-4877-bff5-ca101ca11758\u002Fnord-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1301632,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Nord VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1eead599-77e0-4877-bff5-ca101ca11758","imageAltText":"NordVPN","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nord-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"1983353e-c060-44fd-a952-63449fbabf57","slug":"nordvpn","label":"NordVPN","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":128,"imgHeight":128,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"1983353e-c060-44fd-a952-63449fbabf57","name":"NordVPN","slug":"nordvpn","productType":"SERIES","updateType":"PRISM","mod":1729500496740,"displayDate":"Mon Oct 21 2024 04:48:16 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?offer_id=378&aff_id=307&source=zdnet&aff_sub=[subid_value]&aff_sub2=bestvpniphonepad22","url":""}]\" data-usepricing=\"true\" data-like=\"~ Simple, straightforward app installation ~Excellent speeds ~Great for streaming ~ Solid performance\" data-dislike=\"~No unlimited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"90bec58e-6dba-4667-8dfc-a2554c9d729b\" data-edition=\"us\" data-description=\"\u003Cp\u003ESurfshark is an affordable and reliable VPN service. When we reviewed it, we found fast connection times and no information leaks, and luckily, the company doesn't skimp on security. It offers AES-256-GCM, RSA-2048, and Perfect Forward Secrecy encryption.\u003C\u002Fp\u003E\u003Cp\u003ESurfshark supports devices running iOS 14.0 or higher. This VPN has many features, including ad and tracker blocking, a data breach scanner, and multi-hop connections. This VPN is excellent for iPhone users because of its user-friendliness, uncomplicated and quick connection process, and affordable price point.\u003C\u002Fp\u003E\u003Cp\u003EIf you want to use the Bypasser tool (Surfshark's \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-vpn-split-tunneling\u002F" target="_blank"\u003Esplit tunneling\u003C\u002Fa\u003E feature), it used to be the case that you had to use the Windows or Android app. Since October, however, this feature is also&nbsp;\u003Ca href="https:\u002F\u002Fsurfshark.com\u002Fblog\u002Fsurfshark-launches-bypasser-on-ios" target="_blank"\u003Eavailable\u003C\u002Fa\u003E for iOS.\u003C\u002Fp\u003E\u003Cp\u003EDuring testing, we've enjoyed using Surfshark as a "one size fits all" VPN solution. Sometimes, the speeds aren't the best while streaming, and it can take a moment or two to connect to your preferred server, but this VPN is still excellent value for money.\u003C\u002Fp\u003E\u003Cp\u003EWe also like the "pause" function, which allows you to resume your regular (unprotected) connection for five minutes, 30 minutes, or a few hours, which may come in handy if you need to quickly access specific services. Customers say that speeds are relatively fast and streaming works most of the time, although some have experienced issues with a handful of popular content services.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsurfshark-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003ESurfshark VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ESurfshark has excellent deals to consider on the run-up to Black Friday: $1.99 per month on a two-year plan or $2.99 per month on an annual plan. The VPN provider has also thrown in four months of free access on 12-month and 24-month plans.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESurfshark VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESurfshark VPN specifications:&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003EUnlimited&nbsp;| Ad-blocker | Two-factor authentication |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;No-logs policy |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 100 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, Linux, iOS, Android, Fire TV, Chrome, Firefox, Edge, tvOS, routers |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android, iOS, and macOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.8\u003C\u002Fp\u003E\" data-hed=\"Surfshark VPN\" data-superlative=\"Best budget iPhone VPN\" data-imagegroup=\"{"alt":"surfshark","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","title":"Surfshark VPN Mobile","filename":"surfshark-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1118835,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Surfshark VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","imageAltText":"surfshark","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"5b46a203-2264-4546-adc2-846bfa92ab9c","slug":"surfshark-vpn","label":"Surfshark VPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"5b46a203-2264-4546-adc2-846bfa92ab9c","name":"Surfshark VPN","slug":"surfshark-vpn","productType":"SERIES","updateType":"PRISM","mod":1729500695659,"displayDate":"Mon Oct 21 2024 04:51:35 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?offer_id=50&aff_id=1511&source=ZDNET&aff_sub=subid_value","url":""}]\" data-usepricing=\"true\" data-like=\"~ Unlimited simultaneous connections ~ Value for money ~ Beginner friendly ~ Consistently low pricing\" data-dislike=\"~ Slower server connection times\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f8ec62af-a801-41ff-92f7-6e134ff5962e\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN app supports iOS 15.0 and up. In addition to iOS, it supports all major platforms. There are browser extensions for Edge, \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-chrome-vpn\u002F" target="_blank"\u003EChrome\u003C\u002Fa\u003E, and Firefox, and a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-gaming-vpn\u002F" target="_blank"\u003EVPN service for gaming\u003C\u002Fa\u003E is also available.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN has servers located in 105 countries and ranks among the fastest VPNs, so it shouldn't reduce your connection speeds as much as the average VPN.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EExpressVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN doesn't maintain browsing history logs, but it does keep track of some information, such as the dates you connect and the location of the VPN server you connect to. The details of what is and isn't logged are&nbsp;\u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002Fwhat-is-vpn\u002Fpolicy-towards-logs"\u003Estated in ExpressVPN's privacy policy\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EWe've used ExpressVPN for years and found it an extremely fast, reliable service with a great server network. We also like ExpressVPN's server speed test function, which allows you to scan and measure speeds for each server (found under Window &gt; Open speed test). This feature is useful for streaming or gaming.\u003C\u002Fp\u003E\u003Cp\u003EMany customer reviews are positive, but the pricing model and renewal hikes aren't popular.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is offering a deal ahead of Black Friday. Signing up for a two-year plan will cost you $4.99 per month (lower than the typical $6.67 price tag), plus you will get six months of free access.\u003C\u002Fp\u003E\u003Cp\u003EThe iPhone app comes with a seven-day free trial.\u003C\u002Fp\u003E\u003Cp\u003EOverall, if you're looking for a set-and-forget VPN with decent speeds and user-friendliness, ExpressVPN is a top pick -- although each plan is limited to eight simultaneous devices, something we would like to see change to unlimited, considering its price point.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E8&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Chrome, Firefox, Edge, Linux, Fire TV, Android TV, tvOS, and routers&nbsp;|&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;105&nbsp;|&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No browsing logs, some connection logs |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN\" data-superlative=\"Best iPhone VPN for speed and usability\" data-imagegroup=\"{"alt":"expressvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","title":"ExpressVPN mobile","filename":"expressvpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F7cf8be39-6942-4f62-832e-2cb7da94eb8f\u002Fexpressvpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1289494,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ExpressVPN mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","imageAltText":"expressvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","slug":"expressvpn","label":"ExpressVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","name":"ExpressVPN","slug":"expressvpn","productType":"SERIES","updateType":"PRISM","mod":1729500792004,"displayDate":"Mon Oct 21 2024 04:53:12 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"Expressvpn","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002Fgo\u002Fcnet","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Works on an exceptionally large number of platforms outside of iOS ~ Consistent performance ~ Easy setup ~ Extensive server network ~ Excellent speeds\" data-dislike=\"~ More expensive than competitors ~ Limited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eed59da4-2eea-4b3b-84c0-892da176638e\" data-edition=\"us\" data-description=\"\u003Cp\u003EIPVanish has depth and plenty of configuration settings for those who want to control almost every aspect of their VPN connection.\u003C\u002Fp\u003E\u003Cp\u003EWhile it's not the most stylish VPN with the best user interface, IPVanish VPN has many protocols, so you'll always know what to expect regardless of what you're connecting to. The app has an abundance of configuration options, and there's now an extensive range of server selection options.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fipvanish-review-a-rich-wealth-of-options-and-surfing-controls\u002F" target="_blank"\u003E\u003Cstrong\u003EIPVanish VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe found IPVanish to be reasonably fast and also quick to connect. IPVanish's data transfers are secure, and it's well-regarded as a secure service. Customers report they are happy with IPVanish's customer service and the overall speed and reliability of the VPN. The service is also independently security-audited.\u003C\u002Fp\u003E\u003Cp\u003EIPVanish is an excellent option for iOS and \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-mac-vpn\u002F" target="_blank"\u003EMac devices\u003C\u002Fa\u003E. You can sign up for a two-year plan for $2.19 per month or a yearly subscription for $3.33 per month. Alternatively, if you don't want to sign up for the long haul, you can pay $12.99 for a month of access. IPVanish supports iOS 14 and up.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003ENote: IPVanish is owned by Ziff Davis, ZDNET's parent company. For more, see our&nbsp;\u003C\u002Fem\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feditorial-guidelines\u002F" target="_blank"\u003E\u003Cem\u003EEditorial Guidelines\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003EIPVanish VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Unlimited |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, Kodi, and routers | \u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: None, except billing data |&nbsp;\u003Cstrong\u003ELocations\u003C\u002Fstrong\u003E: 130 (103 countries) |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days | \u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS&nbsp;| \u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.5\u003C\u002Fp\u003E\" data-hed=\"IPVanish VPN\" data-superlative=\"Best configurable VPN for iPhone\" data-imagegroup=\"{"alt":"ipvanish","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","title":"IPVanish Mobile","filename":"ipvanish-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fc74b6025-02da-4c4c-9fab-af9e71d53ba8\u002Fipvanish-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1239747,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"IPVanish Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","imageAltText":"ipvanish","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ipvanish-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"82c4806f-a79c-46a0-be8c-008488fb0403","slug":"ipvanish","label":"IPVanish","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":350,"imgHeight":350,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"82c4806f-a79c-46a0-be8c-008488fb0403","name":"IPVanish","slug":"ipvanish","productType":"SERIES","updateType":"PRISM","mod":1729500824180,"displayDate":"Mon Oct 21 2024 04:53:44 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value","offerMerchant":"IPVanish","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ipvanish.com\u002Fexclusive","url":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Unlimited connections ~ Highly configurable app ~ Affordable ~Recently expanded server network\" data-dislike=\"~ Bland user interface ~ Few additional privacy features\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e720cee1-20da-4a1e-ab61-34a48490c7d9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn general, we recommend you avoid \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F" target="_blank"\u003Efree VPNs\u003C\u002Fa\u003E. A free VPN service could even make money selling your data, which defeats the purpose of using a VPN to protect your identity, activities, and other information.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fproton-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EProton VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe only situation where using a free VPN may not come with security concerns is when it's a free version of a reputable paid service, as is the case with Proton VPN. While limited to servers in five countries, you know the plan is supported by paid subscribers, and your data is safe. You won't be bombarded with ads, either.\u003C\u002Fp\u003E\u003Cp\u003EProton is a Swiss company and adheres to Switzerland's privacy laws. The team behind the VPN also develops the encrypted email service Proton Mail. Proton VPN provides a kill switch, various encryption protocols to choose from, and the benefit of an open-source approach, which allows for transparent third-party auditing.\u003C\u002Fp\u003E\u003Cp\u003EDespite poor Trustpilot reviews (many linked to the free plan restrictions), many users report a positive experience with this VPN provider, noting its ease of use, low CAPTCHA block rates on websites, and stable connectivity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you are interested in adopting the paid version of Proton VPN, you can sign up for a 24-month VPN plan at $4.49 per month, a 12-month subscription at $4.99, or a one-month agreement at $9.99. Note that Proton VPN requires iOS 15.0 or later.\u003C\u002Fp\u003E\u003Cp\u003EProtonVPN is a Swiss company, but you can make payments in US dollars.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton VPN features:&nbsp;\u003C\u002Fstrong\u003EOpen-source |&nbsp;\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: One to 10, depending on the plan |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 112 |&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No-logs policy | Security audits |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, Kodi, and routers | VPN accelerator |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Free option |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.6\u003C\u002Fp\u003E\" data-hed=\"Proton VPN\" data-superlative=\"Best free VPN for iPhone\" data-imagegroup=\"{"alt":"proton vpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","title":"ProtonVPN Mobile","filename":"proton-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1\u002Fproton-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1357859,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ProtonVPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","imageAltText":"proton vpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"proton-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","slug":"protonvpn","label":"ProtonVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","name":"ProtonVPN","slug":"protonvpn","productType":"SERIES","updateType":"PRISM","mod":1729500873567,"displayDate":"Mon Oct 21 2024 04:54:33 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value","offerMerchant":"Proton VPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprotonvpn.com\u002F","url":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Solid iOS app ~ Top-tier security features ~ Open source\" data-dislike=\"~ Just one connection allowed on the free plan ~ Limited free country servers\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EBest VPN for iPhone\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EApple App Store rating\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$3.59+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$1.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$6.67+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.19+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.5\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree with limited services or $4.49 per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.6\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E1 or up to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*Lowest price at the time of writing. Please note that prices may vary based on retailer and available promotions, sales, or discounts.\u003C\u002Fp\u003E\" data-hed=\"VPNs for iPhones, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhy do I need an iPhone VPN? \u003C\u002Fh3\u003E\u003Cp\u003EOur mobile devices are the keys to many aspects of our lives. Communication, payments, accessing local government services, and even as a way to entertain ourselves with content and games: our iPhones must be protected, and with them, our data. \u003C\u002Fp\u003E\u003Cp\u003EA VPN encrypts your online traffic and protects your information. If you must use a public Wi-Fi hotspot or an unknown Wi-Fi connection, a VPN can help shield you from eavesdropping and other cyberthreats. Security aside, you may also want to use a VPN to access streaming services and geo-locked content while you're on the road. \u003C\u002Fp\u003E\u003Ch3\u003ECan I trust iPhone VPN services?\u003C\u002Fh3\u003E\u003Cp\u003EAs long as you choose a reputable VPN provider that provides a compatible iOS app, it will be safe to use. Steer clear of free VPN services with little to no customer feedback, as they may be malicious and steal your data.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EChoose this VPN for iPhone...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe best iPhone VPN overall. NordVPN is a solid, feature-rich VPN. NordVPN's speeds and server network are impressive, but the price point for this reliable, secure VPN on shorter plans might be off-putting for some.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA top VPN that can just about do it all, and for an affordable price. Surfshark performs well in speed tests, earns solid customer reviews, and has an easy-to-use iOS mobile interface.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe speediest VPN for iOS. We've found that ExpressVPN connections are reliable almost all the time. The mobile version of the VPN is simple, user-friendly, and comes packed with different server options. You can also take advantage of a seven-day free iOS trial.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA highly flexible VPN. IPVanish offers a range of security and connectivity settings for you to choose from, although if you want to take full advantage of different protocols, you will want some technical knowledge.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free VPN. This Swiss VPN provider takes security seriously, and while the free version is restricted, it is still an excellent choice -- but the paid option removes all limits.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the right iPhone VPN for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d93d76dc-b425-4238-b712-7785b7d5a725\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen selecting your new iPhone VPN, consider the following factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: Try to take advantage of promotions, but ignore countdown timers -- they typically are just marketing tools. While top-notch VPNs can cost upwards of $10 per month, many are available for only a few dollars.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: If you're paying for a VPN for your iPhone or iPad, you might still want to use it across multiple devices, such as a desktop PC or laptop. We recommend you sign up for a plan with support for at least four to six devices, although preferably one with unlimited simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E: You must also decide how long you want to use the VPN. A two-year term tends to secure the best prices, but monthly, six-month, and one-year options are often also available. After you've made a selection, you typically have a 30-day money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EApps\u003C\u002Fstrong\u003E: When selecting a VPN, try it out first to ensure you like its accompanying iOS app. Some VPNs, for example, have great desktop software but need further development of their mobile apps, which may not be as intuitive or easy to use.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility\u003C\u002Fstrong\u003E: iOS 18, released on September 16, 2024, is the latest version of the iPhone operating system. Many VPN provides will provide compatible apps going back generations, but if you have an older device, check before signing up.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrials\u003C\u002Fstrong\u003E: Many VPN providers will give users a free seven-day iOS trial, so consider trying a few out before you commit to a purchase.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN for iPhone\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a4dc919e-a70d-4b8a-86e5-27bd9cbd6c09\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany providers recommended in this list have been subject to in-depth testing and reviews by members of our team. We've been talking about other VPNs for years, spoken with their management and their users, and developed a generally favorable impression.\u003C\u002Fp\u003E\u003Cp\u003EZDNET tests VPN services from multiple locations, but we can't test from all locations. Every home, every community, every local ISP, and every nation has a different infrastructure. It's essential that once you choose, you test for all your likely usage profiles and only then make the decision to keep the service or request a money-back guaranteed refund, which all these VPNs have.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you experience traffic slowdowns, check your VPN and the Wi-Fi connection between your device and your router or access point. Sometimes, connectivity issues begin at the source, and in other cases, switching your selected VPN server may be enough to resolve speed problems or connectivity drops.\u003C\u002Fp\u003E\u003Cp\u003EWe analyzed the best VPNs for iPhones below using the following criteria:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPerformance:\u003C\u002Fstrong\u003E&nbsp;Our top VPNs must have a minimum level of performance. After all, there's no point in using a VPN while streaming if your connection continually drops or lags.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Many VPNs limit how many devices you can connect to a service at the same time. If you have a phone, tablet, laptop, desktop, and possibly even a smart TV you want to connect to a VPN, you'd need a service that allows at least six simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: There's no point in using a VPN unless its security protocols and encryption levels are up to scratch. We also ensured the development team behind each recommended VPN cares about making security improvements and patching reported bugs.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: A kill switch prevents you from having an unprotected connection. It is an important feature for a VPN to have, as it protects by preventing a return to a default Wi-Fi connection should your internet connection unexpectedly drop.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGeo-blocks and streaming\u003C\u002Fstrong\u003E: We know VPNs can be key to accessing local content and services while you're away from home. We ensured that our top recommendations performed well in these scenarios and are unlikely to slow down your connection while streaming.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: What systems and devices can you run the VPN on? Our iPhone VPN recommendations, naturally, have to run easy-to-use and intuitive mobile apps.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECountries &amp; servers\u003C\u002Fstrong\u003E: In how many different countries does the VPN have servers? This can include physical and virtual servers, and whether there are enough -- at least 50 or so -- to provide variety.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrial length and price\u003C\u002Fstrong\u003E: Each VPN we recommend has a solid money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems with installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECheck out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E&nbsp;for a more extensive breakdown.\u003C\u002Fp\u003E\" data-hed=\"How we test VPNs\" data-imagegroup=\"{"alt":"protonvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Charlie Osborne\u002FZDNET","imageData":{"id":"6fcf975d-b442-4596-826e-6b44b6ba1be1","title":"protonvpn","filename":"protonvpn.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F27\u002F6fcf975d-b442-4596-826e-6b44b6ba1be1\u002Fprotonvpn.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":134307,"width":1296,"height":720,"dateCreated":{"date":"2024-03-27 11:15:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-27 11:15:51","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"protonvpn","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6fcf975d-b442-4596-826e-6b44b6ba1be1","imageAltText":"protonvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Charlie Osborne\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"protonvpn.jpg","imageDateCreated":"2024\u002F03\u002F27","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Charlie Osborne\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EVPNs for iPhone FAQs \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a5b8295b-2909-49bd-824b-ac31a083f04d\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN shouldn't be very resource-intensive, and so should not slow down your iPhone, but you may notice a slowdown in internet speeds as your requests go through your VPN's server network. Depending on the strength and base speed of your internet connection, streaming and gaming may be impacted.\u003Cbr\u003E \u003C\u002Fp\u003E\" data-hed=\"Does a VPN slow down your iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"58bc26b7-13f3-436d-83b1-4f592c958f55\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple iPhones do not have an built-in VPN, although you can install one using a mobile device management (MDM) solution. iOS does, however, support VPN use and many VPN providers have developed iOS-native mobile applications.\u003C\u002Fp\u003E\" data-hed=\"Do new iOS devices come with a built-in VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65682da0-2b6f-4fae-9c26-7e787c7ea362\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe latest version of iOS is iOS 18, released on September 16. It is likely that your VPN will remain compatible, as vendors will update their software as necessary. If you have an older iPhone, you may find that support for legacy iOS versions -- such as iOS 14 -- are phased out over time. Many VPN apps are now only compatible with iOS 15.0 and above.\u003C\u002Fp\u003E\" data-hed=\"Will my VPN work with the latest version of iOS?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"63af5e0b-9b0a-4246-87b2-30b076478bf2\" data-edition=\"us\" data-description=\"\u003Cp\u003ESetting up a VPN on your iPhone is fairly simple. Download one of the apps above from Apple's App Store. Once you've created a login and started your subscription, you are ready to connect securely.\u003C\u002Fp\u003E\u003Cp\u003EDo not download any apps from untrusted sources. Mobile device management (MDM) solutions using VPNs can be configured in&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-gb\u002Fguide\u002Fdeployment\u002Fdep2d2adb35d\u002Fweb" target="_blank"\u003EiOS settings\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How do I set up a VPN on my iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fd546ecd-fd41-43ee-a26f-7e854f4c4773\" data-edition=\"us\" data-description=\"\u003Cp\u003EPerhaps. That depends on how much you trust your carrier. You're better off encrypting your data when it's in motion, whether you use Wi-Fi or a carrier connection. Overall, it's still recommended to use a VPN no matter the type of internet access you use.\u003C\u002Fp\u003E\" data-hed=\"Do I need a VPN if I just use my carrier's data?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8f1ff395-8876-44fc-814e-9ceddf7c2912\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002FHT212614" target="_blank"\u003EiCloud+ Private Relay\u003C\u002Fa\u003E&nbsp;is a feature of iCloud+. If you buy any iCloud storage, you'll get the iCloud+ features. While Private Relay can hide your email address and location, it only does it when you're using Safari. If you're using Chrome (or any applications that use the internet directly), you're out of luck. The service is also not available in all countries.\u003C\u002Fp\u003E\u003Cp\u003EIt also shows up as a proxy server. You also can't change or hide your location, as you can with a full VPN. Private Relay is a feature of iCloud+. A VPN is a full security solution.\u003C\u002Fp\u003E\" data-hed=\"Isn't iCloud+ Private Relay a VPN? Why do I need another VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f479d3f-01de-40b0-8ef9-b7ae5a6d4e76\" data-edition=\"us\" data-description=\"\u003Cp\u003EAll software, regardless of whether they are VPNs or not, require computing resources to function. In turn, performing functions on a device -- a PC, smartphone, tablet, or otherwise -- needs power. So yes, a VPN will use your iPhone's battery, but it shouldn't be too noticeable.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf your smartphone is unexpectedly drained of battery, behaving suspiciously, or is hot to the touch, something might be going wrong. For example, there may be a malware infection or hardware problems.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best antivirus software and apps you can buy\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Do iPhone VPNs drain your battery?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3e0ef716-3019-4a65-9b8e-7506f690f7fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. We recommend that you do so to prevent any unexpected data leaks or inadvertent exposure -- such as if you forget to enable your VPN when you log in to your local coffee shop's public Wi-Fi. At the least, ensure that you always use a VPN if you have to use a public Wi-Fi hotspot or access sensitive online services, such as banking.\u003C\u002Fp\u003E\" data-hed=\"Should I leave my iPhone VPN on all of the time?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"39db85d5-6c7d-4d8e-8fb7-7877c5bca7b2\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are many free VPNs available for mobile devices, including those in Apple's ecosystem. That said, nothing in life is truly free, and you will likely be handing over your data in return for the service. They may also not be trustworthy, may be ad-supported, and may track your online activities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThose that are free but from trustworthy companies are few and far between. ProtonVPN and Windscribe's free VPN options are among those we support, although they are limited.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are there any free iPhone VPNs?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"54e1e8f0-96b8-4c06-8b8f-fa6b97f1ace1\" data-edition=\"us\" data-description=\"\u003Cp\u003EVPNs are important for establishing secure connections when abroad. Whether you're working from another country or you simply want to stream your favorite TV show, we compiled a list of the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F" target="_blank"\u003Ebest VPNs for travel\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN for travel?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4fde46f5-b12b-458f-b7cb-0677fd55431a\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou might want a VPN that works best with the iOS ecosystem or another operating system. If you're on the hunt for other trustworthy options, we've also created a guide to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003Ebest VPN services of 2024\u003C\u002Fa\u003E&nbsp;with an explainer on free VPNs, and whether they're worth it.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN overall for different operating systems?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"73585072-ed9d-4142-9580-b11eed88283b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAside from our recommendations for the best VPNs for iPhone and iPad, other VPN services on the market can also perform well and provide the security and privacy you need. Here are a few alternative options that are secure and reputable:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcyberghost-vpn-review\u002F" target="_blank"\u003ECyberGhost VPN review\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Are there alternative iPhone VPNs worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3726146f-c9f2-463f-a3cd-e4bf0d5bcc58\" data-edition=\"us\" data-description=\"\u003Cp\u003EA budget-friendly iOS long-term VPN option is Private Internet Access. For $2.03 per month, PIA provides a secure and private service with four months of access thrown in for free.\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-imagegroup=\"{"alt":"Private Internet Access","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"87626edc-7682-4b14-9655-b980eed70a19","title":"Private Internet Access VPN Mobile","filename":"private-internet-access-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F87626edc-7682-4b14-9655-b980eed70a19\u002Fprivate-internet-access-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1161293,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Private Internet Access VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"87626edc-7682-4b14-9655-b980eed70a19","imageAltText":"Private Internet Access","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"private-internet-access-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value","offerMerchant":"Private Internet Access","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a02da8cb-42a7-46b2-a739-fdad37cc530d\" data-edition=\"us\" data-description=\"\u003Cp\u003ECyberGhost is a strong VPN with one of the best money-back guarantees on the market, giving you 45 days to decide if you want to continue with the service. Plans start at $2.03 per month with four months free.\u003C\u002Fp\u003E\" data-hed=\"CyberGhost\" data-imagegroup=\"{"alt":"cyberghost","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"cf93d149-d4f6-41a4-ac08-29256c513cfd","title":"Cyberghost VPN Mobile","filename":"cyberghost-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fcf93d149-d4f6-41a4-ac08-29256c513cfd\u002Fcyberghost-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1082580,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Cyberghost VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"cf93d149-d4f6-41a4-ac08-29256c513cfd","imageAltText":"cyberghost","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cyberghost-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative with a long money-back guarantee\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value","offerMerchant":"CyberGhost","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fen_US\u002F","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6f9f7c6f-d4af-494f-a647-3d3f54904c86\" data-edition=\"us\" data-description=\"\u003Cp\u003EBased in Sweden, externally audited, and anonymous accounts make Mullvad a highly secure VPN for €5 ($5.88) per month.\u003C\u002Fp\u003E\" data-hed=\"Mullvad VPN\" data-imagegroup=\"{"alt":"mullvad","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"f4851122-38bb-4f84-a492-b44d628d128e","title":"Mullvad VPN Mobile","filename":"mullvad-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Ff4851122-38bb-4f84-a492-b44d628d128e\u002Fmullvad-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1080865,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Mullvad VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f4851122-38bb-4f84-a492-b44d628d128e","imageAltText":"mullvad","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"mullvad-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for data privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Mullvad","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmullvad.net\u002Fen\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4c514df3-2265-48e5-821e-bb2b7f31b919\" data-edition=\"us\" data-description=\"\u003Cp\u003EWindscribe is an alternative iOS VPN if you want a free (albeit limited) VPN, or you want to create your own custom VPN subscription package.\u003C\u002Fp\u003E\" data-hed=\"Windscribe\" data-imagegroup=\"{"alt":"windscribe","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"4295a832-96c2-4013-b8f8-a7ad24048151","title":"windscribe","filename":"windscribe.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F05\u002F4295a832-96c2-4013-b8f8-a7ad24048151\u002Fwindscribe.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":150115,"width":1296,"height":720,"dateCreated":{"date":"2024-06-05 08:24:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-05 08:24:09","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"windscribe","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4295a832-96c2-4013-b8f8-a7ad24048151","imageAltText":"windscribe","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"windscribe.jpg","imageDateCreated":"2024\u002F06\u002F05","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-linktext=\"Best free VPN alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Windscribe","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwindscribe.com\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:35:00",timezone:"UTC",updated:c,published:c},description:"We tested and analyzed popular VPNs compatible with Apple's iPhone range and the iOS operating system to find the best options for protecting your privacy, streaming content, and more.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d61956c8-361e-4cb5-86e6-71ce5dcab179",image:{id:"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64",filename:"surfshark-vpn-mobile.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:41",timezone:"UTC",updated:c,published:c},alt:"daniel-romero-q-rqba-xcgu-unsplash.jpg",credits:"Image: Daniel Romero via Unsplash",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPNs for iPhone: Expert tested",section:b,slug:"best-iphone-vpn",startYear:c,summary:b,title:"The best VPN services for iPhone: Expert tested and reviewed",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero reading an NFC security key.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero reading an NFC security key\" data-image-filename=\"img-1508.jpg\" data-image-date-created=\"2023\u002F01\u002F03\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter over a year of use, I love my Flipper Zero, and I'm still finding cool things to do with it.\u003C\u002Fp\u003E\u003Cp\u003EAm I using it to steal cars, clone credit cards, or change the prices shown on gas station displays? Of course not! That's just fake trash people upload to TikTok to try to look cool, and you can't do anything like that. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\"\u003EThe 50+ best Black Friday deals 2024: Early sales live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut that doesn't mean the Flipper Zero can't do some very cool and useful things. Over the past year, I've been exploring the suite of tools built into the Flipper Zero, as well as extending its capabilities by installing custom firmware. It's been a game-changer in so many ways! \u003C\u002Fp\u003E\u003Cp\u003EThe Flipper Zero might be small, but there's a lot of hardware packed into a small space.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero is a portable multi-tool for pen-testers and geeks in a toy-like shell.\u003C\u002Fp\u003E\" data-hed=\"Flipper Zero\" data-imagegroup=\"{"alt":"sample-image-16-9-red.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","title":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","filename":"img-2128.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F02\u002F20\u002F6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16\u002Fimg-2128.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":357488,"width":1600,"height":900,"dateCreated":{"date":"2023-02-20 11:30:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-02-20 11:30:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","imageAltText":"sample-image-16-9-red.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2128.jpg","imageDateCreated":"2023\u002F02\u002F20","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flipper Zero store","offerPrice":"169","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.flipperzero.one\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETo begin with, there's a sub-GHz wireless antenna that can capture and transmit wireless codes to operate wireless devices and access control systems, such as garage door remotes, boom barriers, IoT sensors, and even remote keyless systems. \u003C\u002Fp\u003E\u003Cp\u003ERFID support allows it to read, store, and emulate a number of different RFID cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdo-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EDo RFID blocking cards actually work? My Flipper Zero revealed the truth\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIt can also read, write, store, and emulate NFC tags. On the front, there's a 1-Wire connector that can read and emulate iButton (aka DS1990A, CYFRAL, Touch Memory, or Dallas key) contact keys.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere's also a built-in infrared transceiver that can both capture and transmit IR codes to control things like TVs. Finally, on the top, there are GPIO connectors that allow the Flipper Zero to connect to other gadgets in the real world.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F\"\u003E\u003Cstrong\u003EHow to unlock the Flipper Zero's true power\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat's a lot of features crammed into a tiny $169 device. But every week, I hear from buyers who are frustrated and disappointed because their Flipper Zero won't do the things that it can seemingly do based on fake social media videos.\u003C\u002Fp\u003E\u003Cp\u003EHere are some of the things I've been doing with my Flipper Zero over the past few weeks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENote\u003C\u002Fstrong\u003E: I'm usually running \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F#link={\" target=\"_blank\"\u003Ethird-party software on my Flipper Zero\u003C\u002Fa\u003E, which gives me access to a bunch of additional features. But worry not—loading third-party software doesn't invalidate your warranty, and you can easily go back to the stock software at any time using the Flipper Zero app on a desktop, laptop, or mobile device.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"df78e6a6-cf08-4210-9cbd-3a8d5548b772\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe sub-GHz wireless antenna can pick up signals from devices such as wireless doorbells and car key fobs, making the Flipper Zero a handy tool for testing if wireless transmitters are working properly. I use mine to test if the fobs are working and to test their range.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy (and how they work)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAnd yes, the Flipper Zero can record the codes transmitted by car key fobs, but retransmitting these codes to a modern car won't unlock it due to a feature called 'rolling codes' that changes the code with each use. On older cars -- those 20 years old and more -- you could use a code captured to unlock the vehicle (but don't do that unless it's your car or you have permission!), but you still couldn't drive away with it.\u003C\u002Fp\u003E\u003Cp\u003EOn the flip side -- pun intended -- retransmitting the codes to a wireless doorbell will cause the bell to ring, as most of these systems don't have a mechanism to protect against such annoyances.\u003C\u002Fp\u003E\" data-hed=\"1. Testing car key fobs, wireless doorbells and more\" data-imagegroup=\"{"alt":"Testing a car key fobs","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","title":"Testing a car key fobs","filename":"img-4422.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F542dcafa-5ad4-49e5-9e4c-2ace0599a37c\u002Fimg-4422.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":289398,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:01:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:01:56","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Testing a car key fobs","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","imageAltText":"Testing a car key fobs","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4422.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b9e30cff-c108-4dac-838f-86abe2ca1591\" data-edition=\"us\" data-description=\"\u003Cp\u003ENFC is everywhere nowadays, and the Flipper Zero allows you to work with this wireless protocol. It's built into plastic cards and fobs and used for all sorts of things, from unlocking hotel room doors to controlling barriers.\u003C\u002Fp\u003E\u003Cp\u003EBut this doesn't mean you can cause chaos in the world, because to unlock things you more often than not need access to the NFC key.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENFC signals can be read by the Flipper Zero, and many NFC cards can also be \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=ZpUqQsiwULk" target="_blank"\u003Ecopied and cloned\u003C\u002Fa\u003E (this depends on the security used for the card, so I can't give you any hard and fast rules about which NFC devices can be cloned). I've used my Flipper Zero to copy my hotel room card on occasion when the hotel only gives you a single card or when we have multiple rooms and don't want to juggle a handful of cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services (and how to choose the right one for you)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, note that while the Flipper Zero can read NFC cards and fobs, it cannot decode the card's encrypted security code used on credit and debit cards, so they can't be cloned.\u003C\u002Fp\u003E\" data-hed=\"2. Reading\u002Fsaving\u002Femulating NFC\" data-imagegroup=\"{"alt":"Flipper Zero reading an NFC output from a smartphone","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"45efd2a9-585d-4294-bf6a-9196bc707b7f","title":"Flipper Zero reading an NFC output from a smartphone","filename":"img-4423.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F45efd2a9-585d-4294-bf6a-9196bc707b7f\u002Fimg-4423.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":254166,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:03:52","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:04:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading an NFC output from a smartphone","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"45efd2a9-585d-4294-bf6a-9196bc707b7f","imageAltText":"Flipper Zero reading an NFC output from a smartphone","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4423.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2e662499-3476-44dd-bbe7-4ad6fff5ae53\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero cannot decode the card's encrypted security code, so it cannot clone bank cards.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero cannot decode the card's encrypted security code so it cannot clone bank cards\" data-image-filename=\"img-4428.jpg\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e28f271e-650a-40cb-a8be-98ddab286693\" data-edition=\"us\" data-description=\"\u003Cp\u003EAlong with NFC, the Flipper Zero can read and clone RFID cards and fobs, including hotel cards as shown in the picture above.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-retailer-is-using-rfid-tags-to-make-in-person-clothes-shopping-less-frustrating\u002F" target="_blank"\u003E\u003Cstrong\u003EHow RFID tags can make in-person clothes shopping less frustrating\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ERFID cards and tags can be locked to prevent them from being overwritten or having their security keys extracted, but the Flipper Zero can bypass many of these mechanisms. For example, it can offer to unlock the card if you present it to a valid reader (such as the lock it has been programmed to open). This allows you to clone the card and unlock the door using both the card and the Flipper Zero.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"3. Reading and unlocking RFID tags and cards\" data-imagegroup=\"{"alt":"Reading an RFID card","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","title":"Reading an RFID card","filename":"img-4425.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002Fa4cdee3f-d1db-4e9d-8a48-91d615f65221\u002Fimg-4425.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":210438,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:06:03","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:06:17","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Reading an RFID card","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","imageAltText":"Reading an RFID card","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4425.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf72a74f-7b37-428e-bda9-0dfcf8c6cd52\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero has a built-in infrared module that can be programmed to operate a wide range of devices, from \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv\u002F" target="_blank"\u003ETVs\u003C\u002Fa\u003E to AC units.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPretty much any consumer device with an IR remote control interface can be controlled using the Flipper Zero.\u003C\u002Fp\u003E\u003Cp\u003EAnother cool use of this functionality is to test if infrared remote controls are working. Simply point the remote control at the Flipper Zero in 'read IR' mode, and it will detect the signals.\u003C\u002Fp\u003E\u003Cp\u003EI use this feature all the time to test remote controls that I've fixed after battery leaks have damaged the device. It's an incredibly handy feature!\u003C\u002Fp\u003E\" data-hed=\"4. Universal infrared remote control\" data-imagegroup=\"{"alt":"The Flipper Zero has infrared capability","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","title":"The Flipper Zero has infrared capability","filename":"img-4429.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F294e7dd9-b9ab-469b-bbe8-e6ff18c4b316\u002Fimg-4429.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":230567,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:12:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:12:54","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"The Flipper Zero has infrared capability","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","imageAltText":"The Flipper Zero has infrared capability","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4429.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae924844-ed51-4006-9e66-448121b9ada3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, the Flipper Zero can bypass the security on some Sentry Safe electronic safes using an output from the GPIO.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is definitely not something you want to be doing if it isn't your safe or you don't have permission, but it goes to show just how insecure the "complimentary" safes found in hotels, spas, and Airbnbs actually are.\u003C\u002Fp\u003E\" data-hed=\"5. Bypassing Sentry Safe security\" data-imagegroup=\"{"alt":"Yes, the Flipper Zero can unlock some electronic safes","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","title":"Yes, the Flipper Zero can unlock some electronic safes","filename":"img-4427.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F468027ea-ccf8-4a20-8593-f1ec7abc26dd\u002Fimg-4427.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":194201,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:10:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:10:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Yes, the Flipper Zero can unlock some electronic safes","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","imageAltText":"Yes, the Flipper Zero can unlock some electronic safes","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4427.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0ecfec0d-98c7-40d2-afcf-aaa9107dbd58\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero can act as a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\u002F" target="_blank"\u003EBadUSB device\u003C\u002Fa\u003E, which means that when connected to a port it is seen as a Human Interface Device (HID), such as a keyboard.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services for iPhone and iPad (yes, you need to use one)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EA BadUSB device can change system settings, open backdoors, retrieve data, initiate reverse shells, or do anything that can be achieved with physical access. These tasks are completed by using a set of commands written in the Rubber Ducky Scripting Language, also known as \u003Ca href="https:\u002F\u002Fdocs.hak5.org\u002Fhak5-usb-rubber-ducky\u002Fducky-script-basics\u002Fhello-world" target="_blank"\u003EDuckyScript\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"6. Automating scripts in a variety of platforms\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fc6c2aa5-6d06-47e0-a71d-6bbdfa02f56a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero opens a browser and navigates to a webpage with no user input.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero opens a browser and navigates to a webpage with no user input\" data-image-filename=\"img-4431.gif\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"500\" data-image-height=\"281\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c430499e-fa24-4cad-bf3b-045fc036a82f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero can use the GPIO to output electrical signals and act as a signal generator. I last used this to simulate an antilock braking system module on a vehicle to confirm that all the wiring and computers in the car were working.\u003C\u002Fp\u003E\" data-hed=\"7. Signal generator\" data-imagegroup=\"{"alt":"Configuring the signal generator settings","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"66ad5e4b-bc49-441e-926b-751da4e0ec96","title":"Configuring the signal generator settings","filename":"img-4432.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F66ad5e4b-bc49-441e-926b-751da4e0ec96\u002Fimg-4432.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":218186,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:27:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:27:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Configuring the signal generator settings","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"66ad5e4b-bc49-441e-926b-751da4e0ec96","imageAltText":"Configuring the signal generator settings","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4432.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f084b423-70dc-4544-ab21-71b08e45f3ae\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Video Game Module is powered by the RP2040 microcontroller developed by Raspberry Pi and adds a bunch of gaming-related functionality.\u003C\u002Fp\u003E\u003Cp\u003EFirst, it adds a DVI video output port to the Flipper Zero, allowing it to send video to external displays. This is essential since the tiny LED panel built into the Flipper Zero isn't ideal for gaming. This capability isn't limited to gaming, though. The ability to beam video output to a larger display is great for various other applications, such as testing or training.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fif-you-like-your-flipper-zero-then-youll-love-this\u002F"\u003EIf you like your Flipper Zero, then you'll love this\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Video Game Module also includes an IMU (Inertial Measurement Unit) featuring a TDK ICM-42688-P sensor, which adds a 3-axis gyroscope and a 3-axis accelerometer to the package, allowing it to sense tilting or shaking.\u003C\u002Fp\u003E\u003Cp\u003EIf you're not into gaming, that's no problem. The RP2040 microcontroller can run applications programmed in C, C++, or MicroPython, making it a versatile addition to the Flipper Zero.\u003C\u002Fp\u003E\" data-hed=\"BONUS! Raspberry Pi Video Game Module for Flipper Zero\" data-imagegroup=\"{"alt":"Using Apple BLE Spam to spam an iPhone with popups","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Flipper Zero","imageData":{"id":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","title":"Flipper Zero Video Game Module","filename":"flipper-zero-raspberry-pi-video-game-module.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F11\u002Fa17bb30a-5f96-4f38-9fd0-5634c9d5bb9a\u002Fflipper-zero-raspberry-pi-video-game-module.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":333628,"width":1600,"height":900,"dateCreated":{"date":"2024-02-11 09:51:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-11 09:52:10","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Flipper Zero\u002FZDNET","alt":"Flipper Zero Video Game Module","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","imageAltText":"Using Apple BLE Spam to spam an iPhone with popups","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Flipper Zero","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"flipper-zero-raspberry-pi-video-game-module.jpg","imageDateCreated":"2024\u002F02\u002F11","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Flipper Zero\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:34:00",timezone:"UTC",updated:c,published:c},description:"This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ad79dfb5-0569-4d71-a848-3274e6eb00e8",image:{id:"22f4df1f-e7a0-4702-b40c-05a6afe1671d",filename:"img-20231215-101642-034.jpg",dateCreated:{created:c,date:"2023-12-15 11:24:01",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F12\u002F15\u002F22f4df1f-e7a0-4702-b40c-05a6afe1671d\u002Fimg-20231215-101642-034.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:900,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do",startYear:c,summary:b,title:"One year later: 7 useful things the Flipper Zero can do that still blows my mind",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EWhen you're looking for a new \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Evirtual private network (VPN)\u003C\u002Fa\u003E setup, you have a choice: you can install VPN software directly on the devices you want to protect or install a VPN on your router.\u003C\u002Fp\u003E\u003Cp\u003EVPNs are excellent security tools that layer your online communication with encryption, making it more difficult for you to be tracked or for your information to be stolen. VPNs also mask your IP address to appear as if you're in a different location, which can be helpful for streaming.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003ESetting up a VPN environment \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F\" target=\"_blank\"\u003Evia your router\u003C\u002Fa\u003E provides blanket coverage across devices connected to the hardware, including your smartphone, PC, and smart TV. This saves you the job of installing VPN software on each device, and the process can be far easier than you think -- as long as you have a compatible router.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers even have routers with a VPN that is already installed and ready to go. In either case, opting for a VPN-ready router can be an excellent way to improve your home security and privacy online.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best VPN router right now?\u003C\u002Fh2\u003E\u003Cp\u003EZDNET has years of experience \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Etesting VPN solutions and hardware\u003C\u002Fa\u003E. Our team of experts has researched and performed hands-on testing for decades, and we strive to give you the best recommendations for VPNs and supporting routers based on this experience and customer feedback. \u003C\u002Fp\u003E\u003Cp\u003EOverall, our pick for the best VPN router is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"cad58aed-b003-49fd-8295-2f1c2e81d5d9\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR\" data-link-shortcode-text=\"ExpressVPN Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. This router has one of our favorite VPNs preinstalled, saving you the job of setting up and configuring the software. It also offers impressive speeds and coverage.\u003C\u002Fp\u003E\u003Cp\u003EBelow are our recommendations for the best VPN routers of 2024, offering excellent VPN compatibility, speed, coverage, and additional privacy features. We've also included some worthwhile early Black Friday deals.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN routers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3a4e8e64-8219-48be-bb02-e806d04138ba\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN Aircove is our top pick thanks to its speed, ease of setup, and security. It offers dual-band connectivity for homes and offices, providing coverage of up to 1,600 square feet.\u003C\u002Fp\u003E\u003Cp\u003EWhen you pick a VPN-ready router, you still need to consider stability and speed. The $189 Aircove manages speeds of up to 1,200Mbps (600Mbps\u002F2.4GHz) when the VPN is not in use, although, as you should expect, speeds will drop when you are connected to VPN servers.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is one of our top picks as the best VPN in 2024, largely due to consistently low speed loss results during our speed tests. If you plan to use a VPN on your router 24\u002F7, it is an excellent choice -- either via Aircove or another VPN-ready router.\u003C\u002Fp\u003E\u003Cp\u003EThere's also a feature to diversify the servers used by devices connected to the router. For example, you might not want to connect your gaming PC to the VPN and have an office laptop run through a US or UK server. Parents and guardians can also take advantage of parental control settings.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead the review:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003EThe best VPN services: Expert tested\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ECustomers report excellent speed and performance, although it can be tricky to set up.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou will also need an \u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002F" target="_blank"\u003EExpressVPN subscription\u003C\u002Fa\u003E, but a free trial is included with the router. We consider ExpressVPN to be one of the top VPNs on the market, with excellent speed and stability. Plans typically begin at $6.67 per month, but during the Black Friday sale, you will pay only $4.99\u002Fmonth on a two-year contract. Six months of free access are included.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN Aircove f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6&nbsp;| Built-in VPN | 802.11ax, 802.11ac&nbsp;| Diverse server locations | Ad blocking | Threat manager | Parental controls |&nbsp;Includes free trial | Black Friday VPN plan sale\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN Aircove\" data-superlative=\"Best VPN router overall\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","title":"ExpressVPN Aircove","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":145911,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:06:47","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:07:03","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ExpressVPN","alt":"ExpressVPN Aircove","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002F","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR","url":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~ Built-in VPN ~ Up to 1,600 sq. ft. coverage ~ US and international versions\" data-dislike=\"~ VPN exclusivity ~ VPN subscription is expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4574c479-b932-4a36-aea6-e31349bdc79d\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want speed and power first and a VPN second, you should consider the TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90).\u003C\u002Fp\u003E\u003Cp\u003EThe tri-band Archer offers speeds of up to 4,804Mbps (5GHz) \u002F 1,201Mbps (5GHz) \u002F 574Mbps (2.4GHz) and has been designed with gamers in mind (hence the 4.8Gbps Game Band). It combines a plethora of WAN and LAN ports with a 1.5GHz processor. OFDMA and MU-MIMO support is included, alongside a gaming accelerator, to reduce latency and lag.\u003C\u002Fp\u003E\u003Cp\u003EYou can also add a OneMesh extender if you want to use mesh networking to increase coverage in your home and eradicate connectivity blind spots.\u003C\u002Fp\u003E\u003Cp\u003ETo set up this router with a VPN service, you must configure \u003Ca href="https:\u002F\u002Fwww.tp-link.com\u002Fus\u002Fsupport\u002Fdownload\u002Farcher-gx90\u002F" target="_blank"\u003Eeither\u003C\u002Fa\u003E OpenVPN or PPTP VPN, so be prepared to spend some time tuning the router to your needs. Many customers consider the Archer GX90 to be a solid, fast router, although its design doesn't suit everyone. If you're concerned about the antennas, they are detachable.\u003C\u002Fp\u003E\u003Cp\u003EThis router costs $230 ($20 off). Keep an eye on the price, however, as this device was heavily discounted during last year's Black Friday sales.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EArcher GX90 f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:\u003C\u002Fstrong\u003E&nbsp;Tri-band&nbsp;| High speeds&nbsp;|&nbsp;1.5GHz Quad-Core CPU&nbsp;| Beamforming | Game Accelerator | Parental controls | Large home support&nbsp;|&nbsp;TP-Link HomeShield\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90)\" data-superlative=\"Best VPN router for power\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","title":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","filename":"122.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F3c7cf5f4-ed19-4a84-95e1-a464057c7806\u002F122.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":124559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 12:31:23","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 12:31:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"122.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Tri-band ~Extreme speed ~ Game accelerator ~ Great sq. ft coverage\" data-dislike=\"~Requires configuration ~Expensive ~Bulky design\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e445816-2013-4c23-92cc-1c9a80388e2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Asus RT-AX1800S is an affordable VPN solution. The Wi-Fi 6 model, available for only $70, operates on the 2.4GHz frequency and offers up to 1,000Mbps speeds. It also offers free IoT device security via Asus AiProtection. The router has a built-in VPN: Asus Instant Guard, which you can activate with just a button click.\u003C\u002Fp\u003E\u003Cp\u003EThis router is compatible with AiMesh and includes five Ethernet ports (One Gigabit WAN and four Gigabit LAN). You can also purchase Wi-Fi extenders if you need to increase its range in larger homes.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is great value for the money, and many are impressed with the parental controls and security functions. The free VPN is designed to be as user-friendly as possible, although some users report occasional disconnection issues.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus RT-AX1800S&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003Ef\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures\u003C\u002Fstrong\u003E: Dual-band |&nbsp;2.4GHz | Up to 1,000Mbps speeds | Parental controls |&nbsp;AiMesh compatible |&nbsp;One Gigabit WAN port and four Gigabit LAN ports\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX1800S\" data-superlative=\"Best VPN router for affordability\" data-imagegroup=\"{"alt":"A VPN router next to its box","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"8c1c30c5-8b86-4709-8d05-50543146d7f0","title":"ASUS RT-AX1800S","filename":"p.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F21\u002F8c1c30c5-8b86-4709-8d05-50543146d7f0\u002Fp.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":100930,"width":1296,"height":720,"dateCreated":{"date":"2024-02-21 16:19:09","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-21 16:19:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX1800S","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8c1c30c5-8b86-4709-8d05-50543146d7f0","imageAltText":"A VPN router next to its box","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"p.jpg","imageDateCreated":"2024\u002F02\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Affordable ~Free security ~Ai Mesh compatible\" data-dislike=\"~Bland design ~Some users report speed issues\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c3be9d1c-f134-4c78-b821-01702b93aae0\" data-edition=\"us\" data-description=\"\u003Cp\u003EFor a more stylish option with custom lighting effects, consider the $398 Asus ROG Rapture GT-AXE11000.\u003C\u002Fp\u003E\u003Cp\u003EThis VPN-ready router is future-proof and while it's optimized for gamers -- who will appreciate the router's gaming accelerator, 2.5G LAN and WAN ports, and quad-core processing power -- this option also includes Asus' VPN Fusion feature.\u003C\u002Fp\u003E\u003Cp\u003EVPN Fusion is designed to let you connect to multiple VPN servers simultaneously. For example, you can assign your devices to different VPN tunnels -- selecting a server for your PC, another for your smart TV, and so on.\u003C\u002Fp\u003E\u003Cp\u003ECustomer reviews suggest the VPN is an excellent option for gamers, and the VPN Fusion feature is popular with those who do not mind getting technical. Still, some customers consider the price point to be high.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fstrong\u003E\u003Cstrong\u003E&nbsp;f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6E | Tri-band | 6GHz band | VPN Fusion |&nbsp;2.5G LAN\u002FWAN Port | Quad-core processor | Gaming accelerator\u003C\u002Fp\u003E\" data-hed=\"Asus ROG Rapture GT-AXE11000\" data-superlative=\"Best VPN for multiple connections\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"a04ca118-8605-4005-a8fa-39bf361a5dca","title":"ASUS ROG Rapture GT-AXE11000","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002Fa04ca118-8605-4005-a8fa-39bf361a5dca\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":112016,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:51:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:51:46","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"ASUS ROG Rapture GT-AXE11000","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a04ca118-8605-4005-a8fa-39bf361a5dca","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Stylish ~ Flexible VPN server options ~ 6GHz compatible\" data-dislike=\"~ Expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"954a735c-5976-4b56-b147-d23a7caadd2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe GL.iNET Beryl-AX is an excellent option if you want flexibility in your VPN choice, and you want to take your router with you when you travel.\u003C\u002Fp\u003E\u003Cp\u003EThis pocket-sized powerful router has a 1.3GHz processor and can reach speeds of up to 3000Mbps. It also includes a Gigabit Ethernet port and a USB port.\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to VPNs, the router offers implementation options with all the major providers, including NordVPN, ExpressVPN, IPVanish, and Private Internet Access. This is because the router supports the OpenVPN, Wireguard, and OpenWRT protocols.\u003C\u002Fp\u003E\u003Cp\u003EAs a bonus, upon purchase, you can choose to have your router preconfigured with your preferred VPN.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is portable, works extremely well, and is easy to configure. At $180, many users also consider this router to provide value for their money. Service plans are also available, but they are expensive.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGL.iNET Beryl-AX\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003Efe\u003C\u002Fstrong\u003E\u003Cstrong\u003Eatures:&nbsp;\u003C\u002Fstrong\u003EMulti VPN-compatibility&nbsp;| Travel-friendly&nbsp;| 1.3GHz processor | Gigabit Ethernet port |&nbsp;OpenVPN, Wireguard, and OpenWRT compatibility\u003C\u002Fp\u003E\" data-hed=\"GL.iNET Beryl-AX\" data-superlative=\"Best VPN router for travel\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","title":"GL.iNET Beryl-AX","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F60e86888-e676-42d8-a8c0-fd0e2b2b5aa5\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":46662,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:52:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:52:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNET","alt":"GL.iNET Beryl-AX","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flashrouters","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.flashrouters.com\u002Fberyl-wifi-6-mt3000-vpn-travel-router-by-flashrouters","url":""}]\" data-usepricing=\"false\" data-like=\"~VPN flexibility ~Gigabit Ethernet port ~Portable ~Sleek design\" data-dislike=\"~A lack of ports ~ Expensive support plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN router\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EBuilt-in VPN?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESpeed\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$170\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,200Mbps (disconnected) | 180Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$230\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4,804Mbps\u002F1,201Mbps\u002F574Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$70\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$398\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 11,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$180\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 3,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"Our favorite VPN routers, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a6a784bd-d1f1-4209-8c95-f11d2c1be1fd\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are advantages and disadvantages to using a VPN-enabled router or a standalone VPN app, the most important of which are below.\u003C\u002Fp\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN router\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN app\u003C\u002Fstrong\u003E&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router provides blanket coverage for all of your devices at home.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA VPN app's coverage is limited by the number of simultaneous connections you are allowed under one account.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can be complicated to set up, and most routers do not come with a built-in VPN. You could also risk your router's warranty when installing a VPN.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps are typically easy to install and use.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EInstall once, and protect everything.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou must install VPN apps individually.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN coverage and security is on permanently.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps have to be opened and services have to be enabled.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a VPN subscription and, in most cases, a paid one.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree, limited plans and paid options are available.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible router.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible PC or mobile device.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can protect devices that don't have native support, such as TVs.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN usage is limited to the available apps and OS compatibility.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"VPN router vs VPN app: How do you decide?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"49fd6070-ae39-4756-9016-3a358ec56d65\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN router service is a VPN that can either be installed directly on your router, or has already been enabled on a specific router. Today's routers are often compatible with VPNs, but installing them isn't all the same.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers also offer routers with preinstalled VPN software, but you must sign up for a subscription. You should consider using a VPN-ready router if you do not want to install your VPN manually on all of your devices or if you want to ensure that every device connected to your Wi-Fi network is protected.\u003C\u002Fp\u003E\" data-hed=\"What is a VPN router service and why should you use one?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a30cfde2-422e-4869-80a3-7eb2079c45d3\" data-edition=\"us\" data-description=\"\u003Cp\u003EInstalling a VPN on your router allows all your devices to access the same VPN network and connection. This creates blanket protection and IP masking, but it can be challenging to set up.\u003C\u002Fp\u003E\u003Cp\u003ERemember that your router will act as a VPN client rather than a server and share the VPN with devices connected to it. Here are some general steps to take, although they may change depending on your router and existing setup:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECheck your router's compatibility. Not every router will run a VPN natively -- although many modern routers do have the capacity.\u003C\u002Fli\u003E\u003Cli\u003ESign up for a VPN service. Unless your router comes with a built-in VPN, you will likely need a subscription.\u003C\u002Fli\u003E\u003Cli\u003EAccess your VPN's firmware. You will need to do so through your router's IP address.\u003C\u002Fli\u003E\u003Cli\u003EUnder settings, you should find a VPN tab, and you will need to enable VPN services and choose between a static or dynamic IP address.\u003C\u002Fli\u003E\u003Cli\u003EThe VPN client can now be installed, although you may need to tweak your network settings.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor an extensive guide on installing a VPN on your router, check out:\u003Cstrong\u003E \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How to set up your VPN router: Configuration and encryption made simple\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EChoosing the best VPN router involves many factors. If you want to purchase a VPN-ready router, you will find the best use cases for each of our recommendations below.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this VPN router...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly VPN router with solid coverage and speed. While the router is exclusive to ExpressVPN usage, it is one of our favorites due to its price, reliability, and easy setup.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA heavy-duty, powerful router. This gaming router offers tri-band connectivity and while it does require configuration, the Archer is a future-proof router with excellent speeds.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAn affordable VPN solution. This model has highly positive customer reviews and, for the price point, is a steal -- especially when you consider its built-in VPN and additional security controls.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN versatility at home. You can use the Asus VPN Fusion feature to customize your VPN experience and operate multiple server connections simultaneously.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETo take your VPN router with you on your travels. This router is one of the best travel-friendly, portable routers that is compatible with major VPN providers.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Choosing the right VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b2dc499c-f2f5-44d9-950f-b0a021928b95\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen you are researching a new VPN router, consider these points before making a purchase:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EDIY\u003C\u002Fstrong\u003E: If you want a VPN for your home network, consider whether you want to install a VPN directly on your router.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPreinstalled options\u003C\u002Fstrong\u003E: If you don't want to tamper with router settings yourself to install a VPN, consider a router model that comes with a VPN preinstalled.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAffordability\u003C\u002Fstrong\u003E: VPN routers are available for a variety of budgets. If you can, consider a future-proof VPN router that can support next-generation Wi-Fi and provide good coverage and speeds.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN\u003C\u002Fstrong\u003E: You also need to take into account the VPN service you want to use. If you have a preferred VPN, ensure that the router you want supports it.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESubscriptions\u003C\u002Fstrong\u003E: You will likely need to purchase a subscription. While there are a handful of free VPN plans offered by trustworthy vendors, most of them come with limitations. These may not be suitable for use on a router, as you may quickly run out of bandwidth. As a result, you should factor in the cost of a VPN subscription, even if it is just a basic, paid plan.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOther purposes\u003C\u002Fstrong\u003E: The VPN might be the most important aspect, but you should also consider whether other features are important to you -- such as tri-band functionality, gaming optimization, or additional security features.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile compiling our recommendations for the best VPN routers of 2024, we considered several crucial factors, including:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESpeed\u003C\u002Fstrong\u003E: There's no point investing in a new router capable of handling VPN environments unless it serves its core purpose: providing solid and stable connections to the internet. We considered traditional router models and options that provide mesh networking for larger homes.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN support\u003C\u002Fstrong\u003E: We included a range of models with built-in VPNs, VPN support for standalone VPN services, and mobile products for VPN protection on the go. We know that what might suit one user won't always suit another, so there must be flexibility in the VPN options.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EBudgets\u003C\u002Fstrong\u003E: We covered different budgets. Although our priorities are security, speed, and reliability, we wanted to ensure that we included affordable products alongside future-proofed routers.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer reviews\u003C\u002Fstrong\u003E: We also examined customer reviews in depth, including positive and negative experiences, and we factored this feedback in when deciding on our recommendations.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVendor reputation\u003C\u002Fstrong\u003E: We considered the reputation of router manufacturers, including their popularity, variety, and product accessibility.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor a more extensive breakdown, check out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"How did we choose these VPN routers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a2dd9d0b-1ee5-4324-a3bd-d1828186a2a3\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want to install a VPN directly onto a router, the process can be more of a hassle than just signing up for an app. It can, however, save you time in the long run as any device that connects to your router -- like a PC or a smartphone -- will use the VPN and will be automatically protected. This can be particularly useful if you have internet-connected devices, including TVs and IoT products, that cannot support a VPN on their own hardware.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou might want to consider setting up a VPN on your router if you have numerous devices needing protection, and you work from home. If you are a remote worker, some organizations may require you to use their own VPN to access corporate resources.\u003C\u002Fp\u003E\u003Cp\u003EA caveat: some online platforms, such as streaming services, will detect when you are using a VPN and may block you. If this is the case, you may have to temporarily disable your VPN service to resume watching.\u003C\u002Fp\u003E\" data-hed=\"The bottom line: Is a VPN router worth it?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhat VPN should I use for my router?\u003C\u002Fh3\u003E\u003Cp\u003EHere's a list of ZDNET's favorite VPNs:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"33548326-3466-4b1f-80f5-c1ac8dffe59d\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A solid combination of speed, security, and servers\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ca0b98ba-399f-4db5-b9a1-588917eb1066\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Incredibly fast\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d0eef650-a662-4506-a715-290ce433af51\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002F\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Suitable for any budget\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"142ae698-eb81-4c2d-81d7-c2c0400e10a7\" data-raw-url=\"https:\u002F\u002Fwww.privateinternetaccess.com\u002F\" data-link-shortcode-text=\"Private Internet Access\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: An open-source option\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4d13b573-5d9a-4d99-ba6d-e1e8f6920556\" data-raw-url=\"https:\u002F\u002Fprotonvpn.com\u002F\" data-link-shortcode-text=\"Proton VPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A VPN with security at its core\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPNs of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch3\u003ECan any router be a VPN router?\u003C\u002Fh3\u003E\u003Cp\u003EMany routers are now smart, intelligent devices capable of far more than providing an internet connection. Today, you can install VPN software on many different routers, and VPN support is often promoted as a major feature. \u003C\u002Fp\u003E\u003Cp\u003EA word of caution: installing third-party software on your router might void its warranty, just as jailbreaking mobile devices or changing the firmware of a gaming console can invalidate a warranty. \u003C\u002Fp\u003E\u003Ch3\u003EWhy would anyone use a VPN?\u003C\u002Fh3\u003E\u003Cp\u003EA VPN can be a great tool for protecting your privacy. At the very least, VPNs should be used when you are taking advantage of public Wi-Fi hotspots, but using them while you're online as a default is the better option to protect yourself and your information. VPNs are also beneficial in circumventing geolocation blocks and censorship.\u003C\u002Fp\u003E\u003Cp\u003ESome countries either ban VPN usage entirely or heavily discourage it. If using a VPN is illegal, you may be fined or prosecuted. According to NordVPN's \u003Ca href=\"https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fare-vpns-legal\u002F\" target=\"_blank\"\u003Ecountry guide\u003C\u002Fa\u003E, countries that ban VPNs include Belarus and Iraq, whereas governments in China and Russia are among those that only permit specific VPNs.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a work VPN expose my home network to my employer?\u003C\u002Fh3\u003E\u003Cp\u003EIt's possible, but it depends on several factors. VPNs handle traffic in different ways, but overall, it is highly unlikely that company IT administrators will be able to access your home network via your VPN connection. If you are on a work-issued laptop with software that allows such connections, however, IT administrators will most likely be able to monitor your activities and tap into resources on the device.\u003C\u002Fp\u003E\u003Cp\u003EAdditionally, while VPN tunnels encrypt your traffic and mask your online activities, you can be monitored if you use a VPN designed, licensed, or owned by your employer. VPNs can protect corporate resources, and you should keep work and private online activities separate.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a VPN slow down your internet connection?\u003C\u002Fh3\u003E\u003Cp\u003ETypically, yes, although a high-quality VPN will hopefully not make a noticeable difference. There are caveats; for example, you should expect a slowdown when connecting to servers across a long distance, such as from the UK to Australia. If, however, you experience severe speed loss when you are connecting to servers closer to you, such as from New York to Washington, this may indicate a problem with either the VPN or your ISP connection.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1555caca-a976-4e78-b5df-4435662a7042\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou can put VPN software on many devices, from PCs to mobile devices and routers. While we have showcased what we consider to be the best VPN-supporting routers in 2024, we can't highlight every worthy option -- so you can check out alternative products below, including subscriptions:\u003C\u002Fp\u003E\" data-hed=\"Are there alternative VPN routers worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6a2861a0-5d4d-4bb5-ac03-ab8a8d8505de\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $123 Flint 2 is a great alternative for performance. This router is compatible with a range of VPN protocols, including OpenVPN.\u003C\u002Fp\u003E\" data-hed=\"Flint 2\" data-imagegroup=\"{"alt":"Flint 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet","imageData":{"id":"7aaabd27-af69-4e16-821c-b6f5515eacb6","title":"Flint 2","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F7aaabd27-af69-4e16-821c-b6f5515eacb6\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":93028,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:41:46","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:42:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet","alt":"Flint 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7aaabd27-af69-4e16-821c-b6f5515eacb6","imageAltText":"Flint 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\" data-linktext=\"Best alternative for performance\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Gl-inet","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fstore-us.gl-inet.com\u002Fproducts\u002Fflint-2-gl-mt6000-wi-fi-6-high-performance-home-router","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f400e72c-5c42-4f8c-999c-dc641b9a0fcc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like the idea of the Aircove but want a more portable model, consider the $170 Aircove Go.\u003C\u002Fp\u003E\" data-hed=\"Aircove Go\" data-imagegroup=\"{"alt":"Aircove Go","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"febdef0b-83e4-4bb0-a733-a38642a2cb93","title":"Aircove Go","filename":"l.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F22\u002Ffebdef0b-83e4-4bb0-a733-a38642a2cb93\u002Fl.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":62103,"width":1296,"height":720,"dateCreated":{"date":"2024-08-22 09:04:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-22 09:04:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"Aircove Go","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"febdef0b-83e4-4bb0-a733-a38642a2cb93","imageAltText":"Aircove Go","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"l.jpg","imageDateCreated":"2024\u002F08\u002F22","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-linktext=\"Best alternative for US consumers\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"86b594a2-b878-4740-9369-6be04a061fb9","slug":"aircove-go-portable-wi-fi-6-vpn-router-protect-unlimited-devices-free-30-day-expressvpn-trial-u-s-canada-version","name":"Aircove Go | Portable Wi-Fi 6 VPN Router | Protect Unlimited Devices | Free 30-Day ExpressVPN Trial | (U.S. & Canada Version)","productType":"SERIES","updateType":"EZMONEY","mod":1732000480499,"displayDate":"Tue Nov 19 2024 02:14:40 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS","url":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ea33338-5dd6-43bf-9234-f5d846f178f1\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want a router for travel, but you don't want to spend a fortune, this $30 GL.iNet model is a solid option.\u003C\u002Fp\u003E\" data-hed=\"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router\" data-imagegroup=\"{"alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet\u002FZDNET","imageData":{"id":"d457c097-c39b-432a-8335-1c07ef22d983","title":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","filename":"118.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Fd457c097-c39b-432a-8335-1c07ef22d983\u002F118.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":48602,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:03:25","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:03:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet\u002FZDNET","alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d457c097-c39b-432a-8335-1c07ef22d983","imageAltText":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"118.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"30","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a69aa07-8d07-4065-862c-be57a07f2a2b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAmazon's $195 eero 6+ mesh Wi-Fi system, currently on sale, includes an eero security subscription and the Encrypt.me VPN.\u003C\u002Fp\u003E\" data-hed=\"Amazon eero 6+ mesh Wi-Fi\" data-imagegroup=\"{"alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon\u002FZDNET","imageData":{"id":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","title":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","filename":"116.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F7f8c63f3-68ad-4c29-b96b-8d1123c0d15d\u002F116.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":64242,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 09:51:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 09:51:43","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon | ZDNET","alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","imageAltText":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"116.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\u002FZDNET\" data-linktext=\"Best alternative with an inbuilt VPN\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"2f1a95c2-71cf-4ef1-86dc-5ddfec92a22f","slug":"eero-6-plus","name":"Eero 6 Plus","productType":"SERIES","updateType":"EZMONEY","mod":1732000473593,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"012c8098-b70a-4256-a838-4188b14bcfa0\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $85 TP-Link AX1800 Wi-Fi 6 router is an excellent alternative if you want a Wi-Fi 6 model.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX1800 Wi-Fi 6 router\" data-imagegroup=\"{"alt":"TP-Link AX1800 Wi-Fi 6 router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"TP-Link\u002FZDNET","imageData":{"id":"f1216592-effe-484a-b1ce-83fc92f943c0","title":"TP-Link AX1800 Wi-Fi 6 router","filename":"119.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Ff1216592-effe-484a-b1ce-83fc92f943c0\u002F119.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":102559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:05:56","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:06:04","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX1800 Wi-Fi 6 router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f1216592-effe-484a-b1ce-83fc92f943c0","imageAltText":"TP-Link AX1800 Wi-Fi 6 router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"TP-Link\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"119.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"TP-Link\u002FZDNET\" data-linktext=\"Best alternative Wi-Fi 6 router\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"4fe6a3b2-c24f-409c-8336-03cdc3e4cc00","slug":"tp-link-archer-ax21","name":"TP-Link Archer AX21","productType":"SERIES","updateType":"EZMONEY","mod":1732000473410,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"85","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK","url":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"debd9488-d4f0-4562-88af-1cc375b2e2fe\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $135 Asus RT-AX3000 dual-band Wi-Fi 6 router is an Ai Mesh-compatible alternative with a built-in VPN and parental controls.\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX3000\" data-imagegroup=\"{"alt":"ASUS RT-AX3000 Dual Band WiFi 6","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ASUS\u002FZDNET","imageData":{"id":"1785ad56-0089-4d7b-8594-4b10091424e7","title":"ASUS RT-AX3000 Dual Band WiFi 6","filename":"k.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F1785ad56-0089-4d7b-8594-4b10091424e7\u002Fk.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":59376,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 13:47:24","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 13:47:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX3000 Dual Band WiFi 6","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1785ad56-0089-4d7b-8594-4b10091424e7","imageAltText":"ASUS RT-AX3000 Dual Band WiFi 6","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ASUS\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"k.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ASUS\u002FZDNET\" data-linktext=\"Best alternative for parental controls\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2ade35f6-03a0-4cf2-b407-9838b20e2b1f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe InvizBox 2 is a preconfigured VPN router with robust security standards, an ad blocker, and multiple VPN hotspot options. Plans start at $99, with the hardware included.\u003C\u002Fp\u003E\" data-hed=\"InvizBox 2\" data-imagegroup=\"{"alt":"InvizBox 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"4b5da877-9d4c-4d2d-9425-635a08f492d3","title":"InvizBox 2","filename":"q.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F4b5da877-9d4c-4d2d-9425-635a08f492d3\u002Fq.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":84428,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 14:05:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 14:05:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"InvizBox","alt":"InvizBox 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4b5da877-9d4c-4d2d-9425-635a08f492d3","imageAltText":"InvizBox 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"q.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-linktext=\"Best alternative for privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Invizbox","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.invizbox.com\u002Fproducts\u002Fib2\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:11:00",timezone:"UTC",updated:c,published:c},description:"Looking for a new router to give your home blanket VPN coverage? These are the best VPN-ready routers that provide secure, fast, and reliable internet connections.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"def1c338-68ab-4b51-a334-bcfaff908a96",image:{id:"0c52942f-4983-4a2c-8aa4-467bd6c13b05",filename:"3.jpg",dateCreated:{created:c,date:"2024-10-31 12:06:47",timezone:"UTC",updated:c,published:c},alt:"A black VPN router with its antennas up against an orange background",credits:"Grassetto\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPN routers you can buy",section:b,slug:"best-vpn-router",startYear:c,summary:b,title:"The best VPN routers of 2024",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a3279b29-677e-4133-9d9a-eb87332abb09",slug:"home-networking",name:"Home Networking",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EMany of us have dozens of online accounts, and each requires a different username, password, and potentially a 2FA or CAPTCHA check. Keeping track of all your usernames and passwords can be difficult, especially given vendors' requirements to adopt complex passwords consisting of numbers and special characters in their effort to improve security.\u003C\u002Fp\u003E\u003Cp\u003EWhile it is important to not rely on passwords alone, when logging in is a lengthy and irritating process, it can inadvertently encourage users to reuse the same (memorable) credentials across all their services. We want to avoid this situation, as it increases the risk of account compromise.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\"\u003E\u003Cstrong\u003EThe best antivirus software\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-apple-microsoft-make-a-new-commitment-for-a-passwordless-future\u002F#link={\" target=\"_blank\"\u003Epasswordless options\u003C\u002Fa\u003E are already rolling out, traditional password managers are still effective than trying to recall every username and password combination you use for the services that still require them. Keeping your sensitive information safe is more important than ever, and a reliable \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyoure-definitely-not-making-the-most-of-your-password-manager\u002F\" target=\"_blank\"\u003Epassword manager\u003C\u002Fa\u003E can be an effective solution to security and password overload.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best password manager right now?\u003C\u002Fh2\u003E\u003Cp\u003EOur pick for best overall choice, \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7858fd20-1757-4d7d-b4d0-9a060c145f5a\" data-raw-url=\"https:\u002F\u002F1password.com\u002F\" data-link-shortcode-text=\"1Password\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, has a user-friendly interface that simplifies credential storage. You only need to remember one password to use the service, and it comes with useful features, including autofill and a secure vault.\u003C\u002Fp\u003E\u003Cp\u003EZDNET researched and tested the best password managers available, considering security, storage, compatibility, and price. We also considered customer reviews and expert opinions. Read on to find out how other options stack up and best serve your password security needs.\u003C\u002Fp\u003E\u003Ch2\u003EBest password managers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4b0a9da3-f01c-4893-9de7-fbe0d4204b5a\" data-edition=\"us\" data-description=\"\u003Cp\u003E1Password is the best password manager overall, with its user-friendly interface and excellent features. It allows you to store credentials for online accounts and credit card information, and best of all, you only need to remember one password.\u003C\u002Fp\u003E\u003Cp\u003EThis app helps you create unique passwords that should be less susceptible to hackers, and stores them for you so you don't have to remember complex passwords for multiple accounts. 1Password's autofill feature can automatically fill in information like your username, password, or credit card number. You can also share your information with trusted family or friends if needed.\u003C\u002Fp\u003E\u003Cp\u003EThe app is accessible across your favorite devices, making access easy and secure. 1Password is compatible with Windows, MacOS, iOS, and Android. Browser add-ons are also available for Chrome, Edge, Brave, and Firefox.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview\u003C\u002Fstrong\u003E\u003Cstrong\u003E:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F1password-review\u002F"\u003E\u003Cstrong\u003E1Password\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EOther notable features include a secure digital vault for stashing sensitive documents and notes and a feature that alerts you to weak, compromised, or repeated passwords. Passwordless authentication, including \u003Ca href="https:\u002F\u002Fblog.1password.com\u002Fhow-save-manage-share-passkeys-1password\u002F" target="_blank"\u003Epasskey storage\u003C\u002Fa\u003E, is also available. Furthermore, Watchtower users can also monitor SSH key security risks.\u003C\u002Fp\u003E\u003Cp\u003E1Password does not offer a free plan, but the app does provide a free, 14-day trial that doesn't require inputting your credit card information.\u003C\u002Fp\u003E\u003Cp\u003E1Password costs $2.99 per month, billed annually, or $4.99 for a family pack. Business options are also available for up to 10 seats and beyond.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOverall, if you're looking for a reliable and easy-to-use password manager with great features and account protection tools, 1Password is a top choice. Users say 1Password's approach to data security is top-notch, and the company has great customer support.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E1Password f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003ESecurely store credentials | Password generator | Multi-platform compatibility | Tag and folder organizer | Two-factor authentication | Watchtower feature to identify weak, reused, or compromised passwords | Secure digital vault | Trustpilot rating: 4.7&nbsp;| Passkey storage\u003C\u002Fp\u003E\" data-hed=\"1Password\" data-superlative=\"Best password manager overall\" data-imagegroup=\"{"alt":"1password","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"1Password\u002FZDNET","imageData":{"id":"63e1aed3-a350-4e46-9e87-a6d2c35d8a38","title":"1password","filename":"1password.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F63e1aed3-a350-4e46-9e87-a6d2c35d8a38\u002F1password.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":152770,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:13:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:13:26","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"1Password\u002FZDNET","alt":"1Password interface screenshot","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"63e1aed3-a350-4e46-9e87-a6d2c35d8a38","imageAltText":"1password","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"1Password\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"1password.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"1Password\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15734885?sid=subid_value","offerMerchant":"1Password","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002F1password.com\u002F","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15734885?sid=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ User-friendly ~Excellent features ~Account protection tools ~Digital vault ~ Family plans\" data-dislike=\"~ No free plan ~Limited customer service\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3e1b8684-c028-4487-81c3-3828beac797b\" data-edition=\"us\" data-description=\"\u003Cp\u003EBitwarden is the best free password manager because it's open-source, has a user-friendly interface, fast uploads, and smartphone compatibility. You can use it on as many devices as you want without limitations, ensuring you always have access to your most sensitive information.\u003C\u002Fp\u003E\u003Cp\u003EBitwarden allows you to store as many passwords as you like, with no restrictions on the number or type of passwords that you can store. Additionally, the app can help you create secure passwords across all plans, and you can safely share them with strong encryption.\u003C\u002Fp\u003E\u003Cp\u003EYou can choose between a free, limited option (although all core functions are included), or premium accounts for less than $1 per month ($10 billed annually). Alternatively, you can sign up for a family pack -- allowing up to six users -- priced at $3.33 per month ($40 per year). Business pricing begins at $4 per user per month.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a reliable and free -- or extremely affordable -- password manager, Bitwarden is an excellent choice. It offers advanced security features and compatibility with a wide range of devices.\u003C\u002Fp\u003E\u003Cp\u003EUsers enjoy the transparent pricing model and say, "It just works." The extensions are excellent, although many would like to see changes to the maintenance routines.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBitwarden f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EOpen-source password manager |&nbsp;Free version with unlimited passwords |&nbsp;Two-factor authentication | Multi-platform support |&nbsp;Autofill and auto-login functionality | Emergency access for trusted individuals | Trustpilot rating: 4.6 | Passwordless features available\u003C\u002Fp\u003E\" data-hed=\"Bitwarden\" data-superlative=\"Best free or affordable password manager\" data-imagegroup=\"{"alt":"Bitwarden","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Bitwarden\u002FZDNET","imageData":{"id":"5f8ca7e1-4a71-40b4-9c52-83a7a95d769d","title":"Bitwarden features","filename":"bitwarden.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F5f8ca7e1-4a71-40b4-9c52-83a7a95d769d\u002Fbitwarden.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":245944,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:28:01","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:28:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Bitwarden\u002FZDNET","alt":"Screenshot of Bitwarden features","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"5f8ca7e1-4a71-40b4-9c52-83a7a95d769d","imageAltText":"Bitwarden","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Bitwarden\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"bitwarden.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Bitwarden\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bitwarden","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fbitwarden.com\u002F","url":""}]\" data-usepricing=\"true\" data-like=\"~ User-friendly ~Very fast uploads ~Smartphone-compatible ~ Affordable\" data-dislike=\"~ Some reported auto-filling issues\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e4d38c6-597a-4d0a-98f5-3b020803dc1d\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordPass is the best password manager for businesses. It offers secure sharing, health reports, and multi-factor authentication.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECreated by the same team behind NordVPN, NordPass provides advanced encryption for added peace of mind when storing passwords and sensitive data.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETeam plans with up to 10 seats begin at $1.79 per month per user. Features include company-wide settings, Google Workspace SSO, a security dashboard, MS ADFS, and support for Okta user and group provisioning.\u003C\u002Fp\u003E\u003Cp\u003ENordPass also includes a Data Breach Scanner, which ensures your information is safe and alerts customers if a stored password has been compromised in a third-party security incident. You can store contact information for colleagues and businesses in one place, allowing for quick and easy password sharing with the right people. You can assign digital entry points to teams for credential sharing and payment information.\u003C\u002Fp\u003E\u003Cp\u003EThe service can already store passkeys, allowing passwordless authentication for business users. A new tool, Authopia by NordPass, allows organizations to add passkey login options to their web domains.\u003C\u002Fp\u003E\u003Cp\u003ENordPass offers a 30-day money-back guarantee. A free trial is available for home and business plans; no credit card is required. You can sign up for a free account or a personal plan starting at $1.29 per month. NordPass Premium subscribers receive three months of service for free.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a password manager that offers advanced security features and is designed with business in mind, NordPass is an excellent choice. Users say the password manager is user-friendly, although the price can quickly increase.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENordPass f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EPassword generation and autofill | Two-factor authentication | Personal information and payment data storage | Password sharing and emergency access | Password breach scanner | Cross-device syncing | Biometrics | Trustpilot rating: 4.5 | Passwordless authentication\u003C\u002Fp\u003E\" data-hed=\"NordPass\" data-superlative=\"Best password manager for business\" data-imagegroup=\"{"alt":"NordPass","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"NordPass\u002FZDNET","imageData":{"id":"64e23e7a-ec01-4edd-a89c-45e36c22624d","title":"nordpass1","filename":"nordpass1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F11\u002F64e23e7a-ec01-4edd-a89c-45e36c22624d\u002Fnordpass1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":122652,"width":1296,"height":720,"dateCreated":{"date":"2024-06-11 09:15:15","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-11 09:15:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"nordpass1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"64e23e7a-ec01-4edd-a89c-45e36c22624d","imageAltText":"NordPass","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"NordPass\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nordpass1.jpg","imageDateCreated":"2024\u002F06\u002F11","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"NordPass\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"NordPass","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgo.nordpass.io\u002Faff_c?offer_id=645&aff_id=307&url_id=24693&aff_sub=subid_value&source=ZDNET","url":""}]\" data-usepricing=\"true\" data-like=\"~ Secure sharing ~Health reports ~Useful business contact and team features\" data-dislike=\"~ Free version limited to a single device ~ Professional support limited to enterprise plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d7b1f70b-42b9-4fb4-8fca-f95b2c652101\" data-edition=\"us\" data-description=\"\u003Cp\u003EDashlane is the best password manager based on its extensive feature suite, which includes generous storage, VPN protection, and dark web monitoring.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIn addition to storing passwords, the web-first Dashlane platform securely stores your payments and personal information for easy input when you're on the web or logging into an app. You can store an unlimited number of passwords and sync your data to all your devices, ensuring you never go without access to your most important sites and apps.\u003C\u002Fp\u003E\u003Cp\u003EFeatures include 2FA compatibility, secure password sharing, emergency contacts, a VPN for safe browsing, form autofill, a digital payment wallet, a password generator, and an alert system to notify you when your passwords have been compromised.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDashlane has introduced&nbsp;\u003Ca href="https:\u002F\u002Fwww.dashlane.com\u002Fpasswordless" target="_blank"\u003Epasswordless authentication\u003C\u002Fa\u003E&nbsp;for new iOS and Android users, which removes the need for a master password, alongside \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=cABmVNh-Vxo" target="_blank"\u003Epasswordless logins\u003C\u002Fa\u003E&nbsp;for the web.\u003C\u002Fp\u003E\u003Cp\u003EYou can try out a basic personal account for free, whereas an advanced subscription with a VPN will cost you $4.99 per month, billed annually. A family plan with up to 10 accounts costs $7.49 per month. Alternatively, you can opt for a business plan at $8 per seat, per month, or a fixed price of $20 per month for up to 10 seats.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a password manager that offers advanced security features like VPN protection and dark web monitoring, Dashlane is an excellent choice. Users note that premium options are somewhat pricey, and while the features are worthwhile, this may deter some customers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDashlane f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003ESecure password storage and management |&nbsp;Digital wallet for online payments and receipts | Form autofill | Dark web monitoring | VPN for safe and private browsing | Password changer to quickly update weak passwords | Emergency contact access | ISO 27001 certified&nbsp;| Trustpilot rating: 4.3 |&nbsp;Passwordless authentication\u003C\u002Fp\u003E\" data-hed=\"Dashlane\" data-superlative=\"Best password manager for features\" data-imagegroup=\"{"alt":"zd-dashlane.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Dashlane\u002FZDNET","imageData":{"id":"705fc45d-8dde-4918-b95c-b2567611afd2","title":"Dashlane password manager","filename":"dashlane.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F705fc45d-8dde-4918-b95c-b2567611afd2\u002Fdashlane.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":170744,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:04:51","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:05:09","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Dashlane\u002FZDNET","alt":"Dashlane interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"705fc45d-8dde-4918-b95c-b2567611afd2","imageAltText":"zd-dashlane.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Dashlane\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dashlane.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Dashlane\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.tkqlhce.com\u002Fclick-9041660-15832565-1717701958000?sid=subid_value","offerMerchant":"Dashlane","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.dashlane.com\u002F","url":"https:\u002F\u002Fwww.tkqlhce.com\u002Fclick-9041660-15832565-1717701958000?sid=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Generous storage ~VPN protection ~Dark web monitoring ~ Going passwordless\" data-dislike=\"~ Plans can get pricey ~Device limitations\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8fa95e67-966a-4bd5-bdd2-e2ac95ce2670\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeeper Password Manager &amp; Digital Vault is the best password manager for security, with its multi-platform syncing, multi-factor authentication, and available templates. Keeper takes security seriously, using leading encryption technology (AES 256-bit encryption and PBKDF2) to protect your sensitive data from ransomware and data breaches.\u003C\u002Fp\u003E\u003Cp\u003EYou can store as many passwords as you want in your personal vault, with easy access via biometrics, a record organizer, and automatic syncing. Keeper also allows you to import existing credentials or easily share your vault records with trusted friends while keeping them safe from hackers.\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to 2FA, Keeper supports TOTP, SMS, Fingerprint (e.g. Touch ID), Face ID, and WebAuthn security keys. Additionally, the software is FIPS 140-2 validated.\u003C\u002Fp\u003E\u003Cp\u003EThere is 24\u002F7 customer support and business users can take advantage of Keeper working out-of-the-box with platforms like Okta, Azure AD, Ping Identity, and Google Workspace. Some features require a paid plan. Personal accounts start at $1.46 per month, whereas Keeper Business costs $7 per month per user for up to five seats.\u003C\u002Fp\u003E\u003Cp\u003EIf you are willing to use your email for self-verification, you can get a free trial without inputting your credit card information. Users report the UI is intuitive, but there can be a lack of customer support.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EKeeper Password Manager &amp; Digital Vault f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EUnlimited password storage | Advanced security features including 2FA and biometrics |&nbsp;Supports multiple devices and platforms, including Windows, MacOS, iOS, Android, and web browsers | Password generator | Emergency contacts record sharing | Encrypted vault for storing sensitive documents | Trustpilot rating: 3.6 | Passwordless features available\u003C\u002Fp\u003E\" data-hed=\"Keeper Password Manager & Digital Vault\" data-superlative=\"Best password manager security\" data-imagegroup=\"{"alt":"Keeper Password Manager & Digital Vault","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Keeper\u002FZDNET","imageData":{"id":"8d32b40c-8c62-4850-8bfe-f5bbd6f1a260","title":"Keeper Password Manager & Digital Vault","filename":"keeper-password-manager-digital-vault.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F8d32b40c-8c62-4850-8bfe-f5bbd6f1a260\u002Fkeeper-password-manager-digital-vault.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":175291,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:42:29","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:42:47","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Keeper\u002FZDNET","alt":"Screenshot of Keeper Password Manager & Digital Vault interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8d32b40c-8c62-4850-8bfe-f5bbd6f1a260","imageAltText":"Keeper Password Manager & Digital Vault","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Keeper\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"keeper-password-manager-digital-vault.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Keeper\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Keeper","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fclick.linksynergy.com\u002Ffs-bin\u002Fclick?id=IokOf8qagZo&offerid=1261408.176&bids=1261408.176&type=3&subid=0&u1=subid_value","url":"https:\u002F\u002Fclick.linksynergy.com\u002Ffs-bin\u002Fclick?id=IokOf8qagZo&offerid=1261408.176&bids=1261408.176&type=3&subid=0&u1=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Syncing across multiple platforms ~Multi-factor authentication\" data-dislike=\"~ Autofill delays ~Some users report customer service, cancellation problems\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"04321c1b-1aca-4af0-a337-a968a976cabd\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe best password manager of 2024 is 1Password, which offers an affordable, easy way to store your passwords and personal data in a reliable, accessible manner. If you want to explore all of our top picks, below is an overview of the best password managers:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPassword manager\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EKey features\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EGoing passwordless?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E1Password\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly interface, an autofill feature, and account protection tools\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EBitwarden\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $1+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly interface, fast uploads, smartphone compatibility, and other advanced security features\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESome features available\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordPass\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $1.29+ per user per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESecure sharing, health reports, multi-factor authentication, and advanced encryption\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EDashlane\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $4.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EGenerous storage, VPN protection, dark web monitoring, and Chrome integration, passwordless options\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EKeeper Password Manager &amp; Digital Vault\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$1.46+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMulti-platform syncing, multi-factor authentication, available templates, and top encryption technology\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESome features available\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003ENote: Prices and features may vary based on the plan selected.\u003C\u002Fp\u003E\" data-hed=\"What is the best password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"972198da-69f1-4ac1-a671-28e97fac4a79\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this password manager...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E1Password\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA family-friendly, one-stop-shop password manager. 1Password has features that allow you to easily share passwords with family members and manage multiple accounts. It's one of the best options out there.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EBitwarden\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free or affordable password manager. Bitwarden is open-source and available for use on all platforms. It will help you strengthen your online security, with free plans that include the software's core features.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordPass\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA password manager suitable for work. Its features, such as secure sharing and centralized billing, make it a great choice for teams and small businesses. Its personal plans are also worth exploring.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EDashlane\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMulti-faceted features. Dashlane includes features like a VPN and dark web monitoring, which go beyond the typical functions of a password manager, with a focus on security and passwordless technologies.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EKeeper Password Manager &amp; Digital Vault\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA security-focused solution. Keeper has features like secure file storage, making it an ideal choice if you want to keep your data as safe as possible. Biometric access is a great additional feature.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the best password manager for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e7711145-a9d5-4777-b08c-07718c8b991d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere is a wide range of password managers on the market today. To help you make the right decision, consider these factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity:&nbsp;\u003C\u002Fstrong\u003ESecurity is the top priority when it comes to password managers. The most secure password managers offer advanced encryption and use safe protocols to protect personal information when transferring from the service to your device and vice versa.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EStorage:\u003C\u002Fstrong\u003E&nbsp;Another important consideration is storage capacity. While some password managers limit the number of passwords you can store, others offer unlimited storage so that you can add all your information without restrictions.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility:\u003C\u002Fstrong\u003E&nbsp;It's also essential to check if your preferred device and operating system are compatible with the password manager. The best options offer cross-platform compatibility, allowing you to access your data from multiple devices, including your computer, tablet, and mobile device.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAccounts\u003C\u002Fstrong\u003E: If you want to assign a person more than one identity or online account, consider whether the family (or business) accounts are worth the money.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFeatures\u003C\u002Fstrong\u003E: You may like a data breach scanner, secure vault, autofill, or passwordless options. If the additional features of password managers interest you, see if the solution you are interested has them.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOpen source\u003C\u002Fstrong\u003E: Open-source options should be considered, when possible, as the code is open to outside auditing for security vulnerabilities and flaws. This can boost trust in a product.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a password manager\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f2edf640-90cd-4b84-a20b-5c2f5983952a\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn compiling this list of the best password managers, we examined third-party reviews and opinions from security experts. We also have hands-on experience with these password management tools because that's the only way to really get to know how usable a service is.\u003C\u002Fp\u003E\u003Cp\u003EWhen selecting the best password manager, several crucial factors must be considered. These are some of the key elements that determine the best options:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice: \u003C\u002Fstrong\u003EWhile some password managers are free, others may require a paid subscription to access all features. It's important to weigh the price against the benefits and select a password manager that meets your budget.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer reviews\u003C\u002Fstrong\u003E: Customer experiences and feedback are very important. If usability is overlooked, it really doesn't matter how secure or exceptional a password manager is. We consider customer reviews and ease of use as one of our most important criteria.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompany reputation\u003C\u002Fstrong\u003E: As you trust these organizations to manage your credentials securely, we only include reputable vendors that perform frequent security audits.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EUse cases\u003C\u002Fstrong\u003E: We wanted to include a range of password managers suitable for consumer and business use cases and purposes.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EUpdates\u003C\u002Fstrong\u003E: We like to see password manager services providing frequent security and usability updates.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPasswordless\u003C\u002Fstrong\u003E: While often still in the testing stages, in the name of longevity, we like to see services testing out these technologies.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"How did we choose the best password managers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"90fff618-71d3-4555-a279-bfd5701603f2\" data-edition=\"us\" data-description=\"\u003Cp\u003EPassword managers are digital tools that can help you keep safely track and organize all your passwords and other sensitive information. Once you create an account with a password manager, you can add your login credentials, credit card details, and other personal data into the password vault. You can add this information all at once or over time as you use different websites and apps.\u003C\u002Fp\u003E\u003Cp\u003EThe password manager will then store all your data in an encrypted format, making it difficult for hackers to decipher. Whenever you visit a site or use an app requiring login credentials, the password manager can automatically fill in your username and password for you. This feature can save you a lot of time and hassle, especially if you manage many different accounts.\u003C\u002Fp\u003E\u003Cp\u003EAnother feature of the best password managers is the ability to generate strong passwords. These passwords are typically long and random, making them more difficult to guess or crack. Password managers can create and store these complex passwords for you, making it much easier to keep your accounts secure.\u003C\u002Fp\u003E\u003Cp\u003EPassword managers can be invaluable for anyone who wants to keep their online accounts safe and secure.\u003C\u002Fp\u003E\" data-hed=\"How does a password manager work?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"70e14e09-60d3-4af5-a87b-3d68624bdb8c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn today's digital age, almost everything we do requires a password, from social media to online banking, and it can be challenging to remember all the different passwords we create. The best way to manage these passwords is by using a password manager. Not only does it store your passwords in a central location, but it also provides strong encryption to keep your data safe from cybercriminals.\u003C\u002Fp\u003E\u003Cp\u003EUsing a password manager can also help prevent attacks and data breaches that expose your information to the wrong eyes. Cybercriminals use various methods to gain access to your passwords, from phishing attacks to brute-force attacks. You can also use a password manager to create strong, unique passwords for each account, reducing the risk of being hacked. Alternatively, some browsers, such as Google Chrome, offer built-in password managers.\u003C\u002Fp\u003E\" data-hed=\"Do I need a password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cf32d248-a4db-4cc9-ab1d-fec579d8f626\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, password managers are safe, as they use advanced encryption algorithms to protect your login credentials. When you use a password manager, your passwords are stored in an encrypted form, which means they can't be accessed by anyone without the correct password or passphrase.\u003C\u002Fp\u003E\u003Cp\u003EIt is important to choose a reputable password manager and use a strong, unique password or passphrase to protect your account. You should also remember there's no such thing as a 100% secure service, and on occasion, even the best password managers may have to patch and fix security vulnerabilities.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are password managers safe?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9e9892e3-6299-4eca-80c3-ef1578fec707\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile no system is completely invulnerable to hacking, the best password managers use strong encryption algorithms and other security measures to protect your data. They also require a strong master password or passphrase to access your account. It is important to use a unique and complex master password and enable two-factor authentication to increase security.\u003C\u002Fp\u003E\" data-hed=\"Can a password manager be hacked?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eaebf286-d23a-4deb-93f3-01b5eae4438a\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, most password managers allow you to use your account on multiple devices, such as your computer, smartphone, or tablet. This means you can access your passwords and other login credentials from anywhere at any time.\u003C\u002Fp\u003E\" data-hed=\"Can I use a password manager on multiple devices?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e6d85a6c-ab14-48e8-ac58-d79975e17505\" data-edition=\"us\" data-description=\"\u003Cp\u003EPasswords may, one day, become a thing of the past, although we have a long way to go. Passwordless \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-apple-microsoft-make-a-new-commitment-for-a-passwordless-future\u002F" target="_blank"\u003Eauthentication systems\u003C\u002Fa\u003E are linked most commonly to the FIDO Alliance, which promotes an open standard of passwordless authentication using passkeys. Passkeys are encrypted, safer than passwords, and use a key pair (only you have the private key) to authenticate at the time of a sign-in request.\u003C\u002Fp\u003E\" data-hed=\"What are passwordless options?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"befa48ca-6e82-467b-a498-4953d7cc2c2c\" data-edition=\"us\" data-description=\"\u003Cp\u003EGenerally speaking, yes. You will find that many security experts consider password managers to be one of the best solutions for managing countless complex passwords. No solution is completely safe from cyberattacks, so be mindful of this if you use them -- but anything is better&nbsp;than using weak passwords to protect your online accounts.\u003C\u002Fp\u003E\" data-hed=\"Do security experts recommend password managers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ac3de51-fc70-43a9-a764-6d20f67f1692\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you aren't keen on the idea of a password manager -- or a password manager alone -- we recommend that you purchase a physical security key. Physical security keys and dongles provide an additional layer of cryptographic protection for your online accounts, and unless an attacker has physical access to your key, it is challenging to compromise your credentials.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"What else could I use to protect my online accounts?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c8b19662-aa2d-4f46-b514-dfa4ea3c5fa7\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile we've aimed to showcase the best password managers in 2024, it isn't possible to highlight every worthy option on the market. In our search, we've also found other password managers that did not make the top list but are certainly worth exploring, as listed below.\u003C\u002Fp\u003E\" data-hed=\"Are there alternative password managers worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ea2e111c-86aa-4046-8ecf-7c09ddc45699\" data-edition=\"us\" data-description=\"\u003Cp\u003EEnpass is a freemium solid, secure password manager alternative suitable for storing and syncing passwords and passkeys from various services.\u003C\u002Fp\u003E\" data-hed=\"Enpass\" data-imagegroup=\"{"alt":"enpass password manager","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Enpass","imageData":{"id":"4bc2bcf2-634f-4f90-bfd2-64999d168281","title":"enpass password manager","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F19\u002F4bc2bcf2-634f-4f90-bfd2-64999d168281\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":105685,"width":1296,"height":720,"dateCreated":{"date":"2024-11-19 08:05:10","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-11-19 08:05:27","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Enpass","alt":"enpass password manager","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4bc2bcf2-634f-4f90-bfd2-64999d168281","imageAltText":"enpass password manager","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Enpass","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F11\u002F19","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Enpass\" data-linktext=\"Best alternative for syncing\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fenpass.pxf.io\u002Fc\u002F159047\u002F844649\u002F11801?&sharedid=zdnet&partnerpropertyid=1980086&u=https%3A%2F%2Fwww.enpass.io%2F&subId1=subid_value","offerMerchant":"Enpass","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.enpass.io\u002F","url":"https:\u002F\u002Fenpass.pxf.io\u002Fc\u002F159047\u002F844649\u002F11801?&sharedid=zdnet&partnerpropertyid=1980086&u=https%3A%2F%2Fwww.enpass.io%2F&subId1=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e05245eb-50e5-43f9-b621-9c0fb41fa0ec\" data-edition=\"us\" data-description=\"\u003Cp\u003EAs of iOS 18, Apple users can use Apple's new Passwords app to manage their credentials, for free.\u003C\u002Fp\u003E\" data-hed=\"Apple Passwords\" data-imagegroup=\"{"alt":"apple-passwords.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Emily Long\u002FZDNET","imageData":{"id":"d793fbaf-c310-444c-ac7d-e712efeb97a9","title":"apple-passwords","filename":"apple-passwords.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F15\u002Fd793fbaf-c310-444c-ac7d-e712efeb97a9\u002Fapple-passwords.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":214938,"width":1802,"height":1036,"dateCreated":{"date":"2024-11-15 21:01:34","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-11-15 21:01:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Screenshot by Emily Long\u002FZDNET","alt":"apple-passwords.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d793fbaf-c310-444c-ac7d-e712efeb97a9","imageAltText":"apple-passwords.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Emily Long\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"apple-passwords.png","imageDateCreated":"2024\u002F11\u002F15","imageWidth":1802,"imageHeight":1036,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Emily Long\u002FZDNET\" data-linktext=\"Best free alternative for Apple fans\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Apple","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F104955","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"364e0149-203c-4b12-96a3-4fc27c7c976d\" data-edition=\"us\" data-description=\"\u003Cp\u003ELogMeOnce offers advanced security features like anti-theft protection and multi-factor authentication. It has a free option and personal plans starting from $2.50 per month (or $7.99 per month per user for businesses). Students can get 50% off.\u003C\u002Fp\u003E\" data-hed=\"LogMeOnce\" data-imagegroup=\"{"alt":"LogMeOnce","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"LogMeOnce\u002FZDNET","imageData":{"id":"3725c221-956e-43bc-98c7-c680e6cebc80","title":"LogMeOnce","filename":"logmeonce.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F3725c221-956e-43bc-98c7-c680e6cebc80\u002Flogmeonce.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":152607,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:52:37","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:53:08","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"LogMeOnce\u002FZDNET","alt":"LogMeOnce interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3725c221-956e-43bc-98c7-c680e6cebc80","imageAltText":"LogMeOnce","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"LogMeOnce\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"logmeonce.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"LogMeOnce\u002FZDNET\" data-linktext=\"Best free alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=www.logmeonce.com%2Fpassword-manager%2F","offerMerchant":"LogMeOnce","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.logmeonce.com\u002Fpassword-manager\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=www.logmeonce.com%2Fpassword-manager%2F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0faa548b-7aaa-42e6-9e44-c0ec8ab75aae\" data-edition=\"us\" data-description=\"\u003Cp\u003EProton Pass is an open-source password manager with unlimited logins and notes. Premium plans are available from $2.99 per month, and family packs are available for $4.99\u002Fmonth during the Black Friday sale. A free plan is also available.\u003C\u002Fp\u003E\" data-hed=\"Proton Pass\" data-imagegroup=\"{"alt":"Proton Pass","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Proton Pass","imageData":{"id":"148e908e-442b-4c22-98ec-f286e104dd26","title":"Proton Pass","filename":"s.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F25\u002F148e908e-442b-4c22-98ec-f286e104dd26\u002Fs.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":172279,"width":1296,"height":720,"dateCreated":{"date":"2024-01-25 13:43:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-25 13:43:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Proton Pass","alt":"Proton Pass","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"148e908e-442b-4c22-98ec-f286e104dd26","imageAltText":"Proton Pass","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Proton Pass","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"s.jpg","imageDateCreated":"2024\u002F01\u002F25","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Proton Pass\" data-linktext=\"Best alternative for open source technologies\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fproton.me\u002Fpass","offerMerchant":"Proton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fproton.me\u002Fpass","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fproton.me\u002Fpass"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c7e6b0c1-6524-4e78-b92f-5f45b551fc11\" data-edition=\"us\" data-description=\"\u003Cp\u003EExpressVPN Keys is a password manager built into the popular VPN service ExpressVPN. If you need both, this could be an excellent choice.\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN Keys\" data-imagegroup=\"{"alt":"ExpressVPN Keys","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ExpressVPN\u002FZDNET","imageData":{"id":"072d3f70-ea55-44f9-b693-fc342427cc04","title":"ExpressVPN","filename":"expressvpn-keys.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F072d3f70-ea55-44f9-b693-fc342427cc04\u002Fexpressvpn-keys.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":110090,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:55:08","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:55:36","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ExpressVPN\u002FZDNET","alt":"ExpressVPN logo","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"072d3f70-ea55-44f9-b693-fc342427cc04","imageAltText":"ExpressVPN Keys","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ExpressVPN\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-keys.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ExpressVPN\u002FZDNET\" data-linktext=\"Best password manager alternative with a built-in VPN\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002Fkeys","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5789b628-b59f-4072-8c61-cd7300446525\" data-edition=\"us\" data-description=\"\u003Cp\u003ENorton Password Manager offers a simple-to-use extension, mobile app, and vault. Remember to write down your vault password, though.\u003C\u002Fp\u003E\" data-hed=\"Norton Password Manager\" data-imagegroup=\"{"alt":"Norton Password manager","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Norton\u002FZDNET","imageData":{"id":"af514dfc-d908-45b2-93cf-e575eb2289e8","title":"Norton password manager","filename":"norton-password-manager.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002Faf514dfc-d908-45b2-93cf-e575eb2289e8\u002Fnorton-password-manager.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":172822,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 21:00:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 21:00:48","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Norton\u002FZDNET","alt":"norton-password-manager","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"af514dfc-d908-45b2-93cf-e575eb2289e8","imageAltText":"Norton Password manager","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Norton\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"norton-password-manager.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Norton\u002FZDNET\" data-linktext=\"Best free password manager and generator alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Norton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmy.norton.com\u002Fextspa\u002Fpasswordmanager","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Ch1\u003E\u003Cbr\u003E\u003C\u002Fh1\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 16:48:00",timezone:"UTC",updated:c,published:c},description:"Are you tired of remembering complex passwords across all your online services? A good password manager will do this for you. We tested the best password managers of 2024 to keep your credentials safe and simplify your login process.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"26df4e47-6e71-4eef-850f-da4dba63498c",image:{id:"b862507b-2772-4aa3-933a-ddcc287c836d",filename:"best-password-managers.jpg",dateCreated:{created:c,date:"2023-04-20 14:39:44",timezone:"UTC",updated:c,published:c},alt:"Password management. Weak and strong password.",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003EPassword management. Weak and strong password.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F20\u002Fb862507b-2772-4aa3-933a-ddcc287c836d\u002Fbest-password-managers.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^Password Manager",relatedItems:[]},name:b,promoTitle:"The best password managers: Expert tested",section:b,slug:"best-password-manager",startYear:c,summary:b,title:"The best password managers of 2024: Expert tested",topic:{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"1a5ca947-c46a-4f02-ac88-a6c22b0ab7aa\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Charlie Osborne\u002FZDNET\" data-image-alt-text=\"expressvpn-windows-3\" data-image-filename=\"expressvpn-windows-3.jpg\" data-image-date-created=\"2024\u002F05\u002F21\" data-image-width=\"1296\" data-image-height=\"720\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWith \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fearly-black-friday-2024-everything-you-need-to-know-about-holiday-shopping\u002F\" target=\"_blank\"\u003EBlack Friday\u003C\u002Fa\u003E landing soon, some excellent online deals are already launching for tech, gadgets, home products, and more (check out \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003Ethe best early Black Friday deals\u003C\u002Fa\u003E we've found so far here). VPN providers are also starting their sales early. We've been keeping an eye on the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-vpn-deals-2024\u002F\" target=\"_blank\"\u003Ebest Black Friday VPN deals\u003C\u002Fa\u003E available now, and an unusual deal has surfaced: one offered by \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"43dd8db6-4680-401f-9be4-c5f549092d18\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fp\u003E\u003Cp\u003EIf you agree to sign up for a two-year plan, you can save on ExpressVPN's typical $6.67\u002Fmonth price. Instead, you will \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"2315f8b5-c095-40c0-8be1-073a1d90e4da\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-link-shortcode-text=\"pay only $4.99\u002Fmonth\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. In addition, you will be given six months of free access. Alternatively, agree to a one-year contract, and you will pay $6.25\u002Fmonth, with four months of free service added to the length of your subscription. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"710ffd8f-b930-4dfd-913a-0f9bd7bf289e\" data-edition=\"us\" data-hed=\"ExpressVPN for $4.99\u002Fmonth + 6 months free\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"9236e0e2-6920-4e76-a41f-63f4b46ba109","filename":"expressvpn-web.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F9236e0e2-6920-4e76-a41f-63f4b46ba109\u002Fexpressvpn-web.jpg","dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"9236e0e2-6920-4e76-a41f-63f4b46ba109","imageFilename":"expressvpn-web.jpg","imageDateCreated":"2023\u002F11\u002F07"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-offermerchant=\"ExpressVPN\" data-monetizedurl=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https:\u002F\u002Fwww.expressvpn.com\u002F&subId1=subid_value\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThat's not all, however. If you want blanket VPN coverage in your home, ExpressVPN has also cut the price of its routers, the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"2443a2f9-753f-4529-9ff4-03160b34cb4b\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-na\" data-monetized-url=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value\" data-link-shortcode-text=\"Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E and \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"120b0887-abc5-446f-b64e-b90a8eb25761\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-go-na\" data-monetized-url=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value\" data-link-shortcode-text=\"Aircove Go\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, by 30% ahead of Black Friday. These routers come with ExpressVPN pre-installed for you and are priced at $133 and $119, respectively.\u003C\u002Fp\u003E\u003Cp\u003EA virtual private network (VPN) is an excellent way to enhance your online privacy and security. VPNs route your traffic through a server network, so you can choose where you would like your IP to appear from -- allowing you to avoid geolocation blocks -- while also hiding your original IP address. Modern VPNs also use strong encryption protocols to protect your data and prevent eavesdropping or tracking. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EExpressVPN review: A fine VPN service, but is it worth the price?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is one of the fastest VPN services around. During our tests, ExpressVPN's speed often outperforms its competitors, and we also like the range of locations available in its server network, comprised of 105 countries. You can connect up to eight devices simultaneously. This VPN is also beginner-friendly, making it a great choice if you are new to the world of VPNs.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN rarely offers promotional prices. The standard price of a two-year plan is usually $6.67\u002Fmonth, so finding this VPN any cheaper is a deal worth noting. The $4.99\u002Fmonth price tag is still more expensive than some competitors, but when you consider the six months of free service included as a bonus, this Black Friday sale is one we recommend. There's a 30-day money-back guarantee, too, so you can test out the VPN and decide whether or not it is right for you.\u003C\u002Fp\u003E\u003Cp\u003EIf you're interested, check out \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7f13de6e-8c13-4dd0-b767-90fd035cc765\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN's deal\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E while it lasts. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f1e70db-625b-4dda-bd59-485712352f28\" data-edition=\"us\" data-description=\"\u003Cp\u003EVPN pricing is subject to change at any time, although it is likely that this deal will stay live until the end of Black Friday or Cyber Monday. Deals are subject to sell-out or expire at any time, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOur team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We're sorry if you've missed out on this deal, but don't fret -- we're constantly finding new chances to score savings and sharing them with you at \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002F" target="_blank"\u003EZDNET.com\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"When will this deal expire?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"3aa16d16-8ccd-4f94-b2cc-91f3af21b2ff\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F3aa16d16-8ccd-4f94-b2cc-91f3af21b2ff\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 15:35:00",timezone:"UTC",updated:c,published:c},description:"ExpressVPN is one of our favorites with some of the best speeds available -- and it's on sale ahead of Black Friday.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c7f60114-e082-4d02-abbe-bfea6f0375ae",image:{id:"7cf8be39-6942-4f62-832e-2cb7da94eb8f",filename:"expressvpn-mobile.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:40",timezone:"UTC",updated:c,published:c},alt:"prioritize-hands-on-images",credits:"Don't forget credit\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F7cf8be39-6942-4f62-832e-2cb7da94eb8f\u002Fexpressvpn-mobile.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"expressvpn-black-friday-deal-2024",startYear:c,summary:b,title:"ExpressVPN is now under $5 a month in rare Black Friday deal",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d20c33-288c-4293-bd76-6dc00bae78c9",username:"alison.denisco",profileUrl:c,email:c,firstName:"Alison",lastName:"DeNisco Rayome",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"74de94eb-6040-4185-941f-3396a8db41a9",filename:"ad-headshot-800x600px.jpg",dateCreated:{created:c,date:"2016-08-31 13:36:07",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2016\u002F08\u002F31\u002F74de94eb-6040-4185-941f-3396a8db41a9\u002Fad-headshot-800x600px.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Alison DeNisco Rayome is the Managing Editor of ZDNET Commerce. She was formerly a Managing Editor at CNET, covering software, services, and home tech, and a Senior Editor at TechRepublic, covering AI, cybersecurity, tech and the workplace, and CxO\u002Fleadership.",profile:c,title:"Managing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EHave you ever Googled your name and realized how many sites out there have collected your address, phone number, and other personal information, and published it for anyone to find? If you want to delete some of that digital footprint, you might consider a subscription to \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ad18aca4-3110-49a8-ac15-3fa9d7a86ca5\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"DeleteMe\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, a service that removes your personal info from online platforms to help reduce your risk of identity theft, data breaches, and spam calls. Right now, a subscription is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"47f25209-b2cb-442f-a465-47d2533157d0\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"25% off for Black Friday with the coupon code BFCM25OFF\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"97e42384-a2ca-4c18-ab29-a457a428ad7d\" data-edition=\"us\" data-hed=\"DeleteMe one-year subscription for under $10 a month: Save 25% with code BFCM25OFF\" data-imagegroup=\"{"alt":"DeleteMe","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"DeleteMe","imageData":{"id":"88352dce-3d26-4aea-a890-72eba3d9da71","filename":"r.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F29\u002F88352dce-3d26-4aea-a890-72eba3d9da71\u002Fr.jpg","dateCreated":{"date":"2023-11-29 12:22:51","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"88352dce-3d26-4aea-a890-72eba3d9da71","imageFilename":"r.jpg","imageDateCreated":"2023\u002F11\u002F29"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"DeleteMe\" data-offerurl=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-offermerchant=\"DeleteMe\" data-monetizedurl=\"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735248?sid=subid_value\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI've used DeleteMe in the past, and was impressed with the results. The company sends a quarterly privacy report detailing what sites your information was found on, and where it was removed. It's also one of our tested top picks for the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-data-removal-services\u002F\" target=\"_blank\"\u003Ebest online data removal services\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003EThe best Black Friday deals live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAfter you sign up, the removal process starts, and you'll get your first security report within a week. The service will continue searching for and removing your information on an ongoing basis throughout the year.\u003C\u002Fp\u003E\u003Cp\u003EA yearly plan regularly costs $129 (or about $11 per month) for one person. You can also get a membership for couples or families, or sign up for up to two years starting at $209. The 25% off will come off that amount. \u003C\u002Fp\u003E\u003Cp\u003EDon't miss this deal for \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d16c9f38-bbdc-423f-9cf3-dee638d10546\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"25% off a DeleteMe subscription\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E to keep yourself (or a loved one) safer online.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c543ca15-2713-46e1-9852-81413a5aab32\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis DeleteMe deal will run from Nov. 22 - Dec. 5, 2024. Deals are subject to sell out or expire at any time, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings. Our team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We're sorry if you've missed out on this deal, but don't fret -- we're constantly finding new chances to save and sharing them with you at&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002F" target="_blank"\u003EZDNET.com\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"When will this deal expire?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d1230917-eb26-4c49-ac65-e1ee9ebc33d1\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis year, Black Friday falls on Friday, Nov. 29, the day after Thanksgiving in the US.\u003C\u002Fp\u003E\" data-hed=\"When is Black Friday?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"83511191-1b07-4c24-92ec-d985f062f58c\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F83511191-1b07-4c24-92ec-d985f062f58c\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 14:00:19",timezone:"UTC",updated:c,published:c},description:"DeleteMe helps remove your address, phone number, and other personal information from online platforms to protect you from identity theft, robocalls, and data breaches -- and it's 25% off for Black Friday.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"cbe39f43-d50a-4817-b14e-5b734fbd55e4",image:{id:"512952c7-2cb8-4b8d-bca1-bf0b08567277",filename:"gettyimages-2170708705.jpg",dateCreated:{created:c,date:"2024-11-21 19:41:58",timezone:"UTC",updated:c,published:c},alt:"holiday-placeholder-image",credits:"Getty\u002FMirageC",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F21\u002F512952c7-2cb8-4b8d-bca1-bf0b08567277\u002Fgettyimages-2170708705.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:7952,height:5304,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals",hubTopicPathString:"Tech^Services & Software",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"i-deleted-my-personal-info-from-the-internet-with-this-service-and-its-on-sale-for-black-friday",startYear:c,summary:b,title:"I deleted my personal info from the internet with this service (and it's on sale for Black Friday)",topic:{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EVirtual private networks, also known as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003EVPNs\u003C\u002Fa\u003E, are excellent tools to help protect your privacy and security. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best Black Friday deals live now\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAt ZDNET, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Ewe've been testing top VPNs for years\u003C\u002Fa\u003E, and we recommend that you sign up for one to stop people from spying on your online activities. As VPNs create a secure, encrypted tunnel to protect your data and mask your IP address, you can use them as an additional layer of protection for changing your location, streaming, and more. \u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a great VPN deal ahead of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fearly-black-friday-2024-everything-you-need-to-know-about-holiday-shopping\u002F\" target=\"_blank\"\u003EBlack Friday\u003C\u002Fa\u003E, you're in luck. We found the best promotions and deals on VPN services before Black Friday begins next week. Check out our recommendations below. (While many of these are for a monthly price, you typically have to pay the full contract amount up front, though there are often money-back guarantees if you change your mind.)\u003C\u002Fp\u003E\u003Ch2\u003EOur favorite VPN deals for Black Friday 2024\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"acff2af3-3d56-4c6d-b15f-2714c7958594\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002Fpricing\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth + four months free: Surfshark's entry-level VPN plan is only $1.99\u002Fmonth on a two-year contract. It's also our tested pick for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Ethe best-value VPN\u003C\u002Fa\u003E. (Stack Social is also running a deal to get you \u003Ca href=\"https:\u002F\u002Fwww.stacksocial.com\u002Fsales\u002F3-year-subscription?aid=a-ceempx7z&utm_source=zdnet.com&utm_medium=referral&utm_campaign=3-year-subscription_111024&utm_term=scsf-609808&utm_content=a0xRn000002fVmjIAE&scsonar=1\" target=\"_blank\"\u003Ea three-year contract for $84\u003C\u002Fa\u003E.)\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3a1ec4ac-1917-4b8b-85f6-f4d04e7e3665\" data-raw-url=\"https:\u002F\u002Fprivadovpn.com\u002F\" data-link-shortcode-text=\"PrivadoVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.11\u002Fmonth + three months free: Another excellent deal is for PrivadoVPN, a VPN service with a reasonable server network that's also one of our picks for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-cheap-vpn\u002F\" target=\"_blank\"\u003Ethe best cheap VPNs\u003C\u002Fa\u003E. If you select the two-year plan you pay only $1.11\u002Fmonth, or if you want an annual subscription, you will pay only $1.33\u002Fmonth.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8ab759ba-349f-4a82-aafc-263f1d59381d\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002Fpricing\u002Fnordvpn-plan-site\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $3.59\u002Fmonth + three months free: NordVPN is one of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnordvpn-review\u002F\" target=\"_blank\"\u003Eour favorite VPNs across the board\u003C\u002Fa\u003E for speed, streaming, and security. You will receive three months of free access if you sign up for a one- or two-year contract.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ff8f159c-bc05-46d0-887d-6d7fd35c5c78\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $4.99\u002Fmonth + six months free: It's unusual for ExpressVPN to go on sale, so it's worth considering the Black Friday promotion on a two-year contract. Instead of the typical $6.67\u002Fmonth price, you will pay $4.99\u002Fmonth and be given six months of access for free. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"379d80ce-67bc-4685-b72f-7548ad6b0c23\" data-raw-url=\"https:\u002F\u002Fprotonvpn.com\u002Fl\u002Fbf-vpn-deals\" data-link-shortcode-text=\"Proton VPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.99\u002Fmonth: Proton VPN features one of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F\" target=\"_blank\"\u003Eour favorite free VPN offerings\u003C\u002Fa\u003E. With this Black Friday discount, you can upgrade to its paid tier for $2.99 a month (70% off the usual price) when you sign up for two years.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0f49c4d5-3635-48f6-82a2-2f0d1e16e398\" data-raw-url=\"https:\u002F\u002Fwww.purevpn.com\u002Forder\" data-monetized-url=\"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=38687&u1=subid_value&murl=https%3A%2F%2Fwww.purevpn.com%2Forder\" data-link-shortcode-text=\"PureVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth: If you want a set-and-forget VPN for up to five years, consider the discounts available when you sign up for a PureVPN subscription. Ahead of Black Friday, a standard five-year contract will only cost $1.99\u002Fmonth. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"67bccb1a-0ccf-4d72-bbe8-1ce92135f52c\" data-raw-url=\"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online\" data-link-shortcode-text=\"Private Internet Access\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.03\u002Fmonth + four months free: Also known as PIA, Private Internet Access is a solid VPN and our pick for the best open-source option, which, ahead of Black Friday, is only $2.03\u002Fmonth if you agree to a two-year contract. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"6161795c-9321-426b-8b85-3b5d65fd0c60\" data-raw-url=\"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fbuy\u002Fcyberghost-vpn-3\" data-monetized-url=\"https:\u002F\u002Fwww.jdoqocy.com\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value\" data-link-shortcode-text=\"CyberGhost\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.03\u002Fmonth + four months free: CyberGhost is an excellent VPN option if you want a service that can handle streaming services without fuss. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"19ae30eb-1e12-4dbd-8228-12188756abf4\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $1.99\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ESurfshark's entry-level VPN plan is on sale ahead of Black Friday. You will only pay $1.99\u002Fmonth on a two-year contract, and as a bonus, you will be given four months of free access, added to the length of the contract.\u003C\u002Fp\u003E\u003Cp\u003EWe recommend Surfshark as an affordable VPN suitable for beginners and experienced users alike. It offers excellent value for money, reasonable speeds, and a solid server network.\u003C\u002Fp\u003E\" data-hed=\"Surfshark\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","title":"Surfshark VPN Mobile","filename":"surfshark-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1118835,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Surfshark VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsurfshark.com\u002Fpricing","url":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a73487c5-a7bb-4b31-b605-a970c0e81b25\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $1.11\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThree months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EPrivadoVPN is a consistently affordable VPN with a reasonably sized server network. If you sign up for a two-year plan, you will only pay $1.11\u002Fmonth, and you will be given three months of free access. This VPN service also comes with useful features such as ad blocking and parental controls.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Privado VPN\" data-superlative=\"Three months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Privado VPN","imageData":{"id":"1a46ee58-dae3-46db-b696-e89187590732","title":"privado-vpn-logo","filename":"privado-vpn-logo.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F11\u002F14\u002F1a46ee58-dae3-46db-b696-e89187590732\u002Fprivado-vpn-logo.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":132050,"width":1296,"height":720,"dateCreated":{"date":"2022-11-14 15:46:45","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-11-14 15:46:55","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Privado VPN","alt":"privado vpn logo","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1a46ee58-dae3-46db-b696-e89187590732","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Privado VPN","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"privado-vpn-logo.jpg","imageDateCreated":"2022\u002F11\u002F14","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Privado VPN\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2519239&u=514792&m=152571&afftrack=subid_value&urllink=privadovpn.com%2Fpricing%2F","offerMerchant":"PrivadoVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprivadovpn.com\u002Fpricing\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2519239&u=514792&m=152571&afftrack=subid_value&urllink=privadovpn.com%2Fpricing%2F"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e3a2012-f69a-4767-9108-380f8707a8b6\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $3.59\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThree months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ENordVPN is one of our favorite VPNs for speed and security. It offers an excellent server network with 111 countries, easy-to-use apps across numerous operating systems, and great customer support. Ahead of Black Friday, you can pay $3.59\u002Fmonth (on a two-year contract) and enjoy three months of free access.\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Three months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"1eead599-77e0-4877-bff5-ca101ca11758","title":"Nord VPN Mobile","filename":"nord-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F1eead599-77e0-4877-bff5-ca101ca11758\u002Fnord-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1301632,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Nord VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1eead599-77e0-4877-bff5-ca101ca11758","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nord-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnordvpn.com\u002Fpricing\u002Fnordvpn-plan-site\u002F","url":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ebdc07ca-fb03-462a-a67b-da9a809d78a6\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $2.03\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EPrivate Internet Access, also known as PIA, is a solid VPN that often launches promotional deals. Ahead of Black Friday, you can sign up for only $2.03\u002Fmonth if you are happy to agree to a two-year contract. As a bonus, four months of free access have been thrown in.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"87626edc-7682-4b14-9655-b980eed70a19","title":"Private Internet Access VPN Mobile","filename":"private-internet-access-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F87626edc-7682-4b14-9655-b980eed70a19\u002Fprivate-internet-access-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1161293,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Private Internet Access VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"87626edc-7682-4b14-9655-b980eed70a19","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"private-internet-access-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value","offerMerchant":"PIA","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ab4d6d67-8bed-4c0a-9811-b832b0da885c\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $2.03\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECyberGhost is an excellent VPN option if you want a service able to handle streaming services without any fuss. Currently, the VPN provider has a promotional deal available on two-year contracts: you will pay the equivalent of $2.03\u002Fmonth and you will receive four&nbsp;months of free access at the end of your plan.\u003C\u002Fp\u003E\" data-hed=\"CyberGhost\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"cf93d149-d4f6-41a4-ac08-29256c513cfd","title":"Cyberghost VPN Mobile","filename":"cyberghost-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fcf93d149-d4f6-41a4-ac08-29256c513cfd\u002Fcyberghost-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1082580,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Cyberghost VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"cf93d149-d4f6-41a4-ac08-29256c513cfd","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cyberghost-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value","offerMerchant":"CyberGhost","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fbuy\u002Fcyberghost-vpn-3","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EBest Black Friday long-term VPN deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0f49c4d5-3635-48f6-82a2-2f0d1e16e398\" data-raw-url=\"https:\u002F\u002Fwww.purevpn.com\u002Forder\" data-link-shortcode-text=\"PureVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth: If you want a set-and-forget VPN for up to five years, consider the discounts available when you sign up for a PureVPN subscription. Ahead of Black Friday, you will only pay $1.99\u002Fmonth on a standard five-year contract. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ff8f159c-bc05-46d0-887d-6d7fd35c5c78\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $4.99\u002Fmonth (six months free): It's unusual for ExpressVPN to go on sale, so it's worth considering the Black Friday promotion on a two-year contract. Instead of the typical $6.67\u002Fmonth price, you will pay $4.99\u002Fmonth and you will be given six months of access for free. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EBest Black Friday family VPN deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"acff2af3-3d56-4c6d-b15f-2714c7958594\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002Fpricing\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99 (four months free): Surfshark's entry-level VPN plan is $1.99\u002Fmonth on a two-year contract and as it offers unlimited simultaneous connections, it's a great option for families. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3a1ec4ac-1917-4b8b-85f6-f4d04e7e3665\" data-raw-url=\"https:\u002F\u002Fprivadovpn.com\u002F\" data-link-shortcode-text=\"PrivadoVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.11 (three months free): PrivadoVPN, available for only $1.11\u002Fmonth, is a VPN service with a reasonable server network, parental controls, and ad blocking.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"6287b204-a70e-4a91-b04c-9c94c891c84d\" data-raw-url=\"https:\u002F\u002Fus.norton.com\u002Fpromo\u002Fpaid-search\u002Fvpn-fast\" data-monetized-url=\"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fus.norton.com\u002Fpromo\u002Fpaid-search\u002Fvpn-fast\" data-link-shortcode-text=\"Norton Ultra VPN Plus\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $60\u002Fyear: Norton Ultra VPN Plus is also offering a family plan for $5\u002Fmonth. This plan allows you to protect up to 10 devices and use parental controls, including screen time restrictions. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EBest Black Friday VPN router deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"bcbf09be-4b9c-447a-aef1-065ab518857d\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS\" data-link-shortcode-text=\"ASUS RT-AX1800S wireless router:\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E $69 (save $21 at Amazon): The ASUS RT-AX1800S is a budget-friendly router with a built-in VPN.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"eb852638-19f2-4965-992d-c6e6c8d8107b\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FGL-iNet-GL-AXT1800-Pocket-Sized-Extender-Repeater\u002Fdp\u002FB0B2J7WSDK\" data-link-shortcode-text=\"GL.iNet GL-AXT1800 travel router\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $93 (save $56 at Amazon): If you need a pocket-sized, travel-friendly router, this option supports AdGuard Home, OpenVPN, or WireGuard-based VPN services.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d263fd29-c643-4741-886e-c6b3dee27ef6\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-Tri-Band-Archer-AXE75-Wireless\u002Fdp\u002FB0B3SQK74L\" data-link-shortcode-text=\"Archer AXE75 router\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $135 (save $65 at Amazon): You can also save $20 on the TP-Link Archer AXE75, a budget-friendly Wi-Fi 6 router with VPN client support.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4ea617c1-3d5d-4664-a27b-d672bd74b124\" data-raw-url=\"https:\u002F\u002Fwww.flashrouters.com\u002Fcudy-m3000-mesh-vpn-router-by-flashrouters\" data-link-shortcode-text=\"M3000 WiFi 6 Mesh VPN FlashRouter\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $260 (save $120 at FlashRouters): If you need a VPN solution for large homes and multiple devices, consider the $120 discount on an M300 model.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"88a46782-11bf-4030-82a6-83a73c492e2a\" data-raw-url=\"https:\u002F\u002Fstore-us.gl-inet.com\u002Fproducts\u002Fbrume-2-gl-mt2500a-ultra-efficient-vpn-security-gateway-router\" data-link-shortcode-text=\"Brume 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $67 (save $22 at GL.iNet: If you need a compact VPN gateway, you can enjoy a $22 discount on the Brume 2, a device set with a USB-C connector and both Wireguard and OpenVPN pre-installed.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"c61b4b36-1829-4e71-857c-4b67b50794a5\" data-raw-url=\"https:\u002F\u002Fwww.bestbuy.com\u002Fsite\u002Fasus-rog-rapture-gt-ax11000-pro-tri-band-wifi-6-gaming-router-2-5g-port-black\u002F6531152.p?skuId=6531152\" data-link-shortcode-text=\"ASUS ROG Rapture GT-AX11000\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $360 (save $40 at Best Buy): You can take advantage of a great discount on a powerful VPN-ready router, the ASUS ROG Rapture, at Best Buy. \u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ceb794a1-4e7a-4286-9218-e718a8fa76dc\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-AC1900-Smart-WiFi-Router\u002Fdp\u002FB07Z56LHZV\" data-link-shortcode-text=\"TP-Link Archer A9\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $52 (save $7 at Amazon): If you are looking for a cheap router capable of handling VPN software, you can pick up a renewed model at Amazon for only $50.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3fdd80e6-04c7-4267-94cd-628115123926\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\" data-link-shortcode-text=\"TP-Link Archer GX90\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $230 (save $20 at Amazon): Another option is the TP-Link Archer GX90. This is a powerful, future-proof tri-band router that gamers will love.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"bcc1bb14-dc70-4526-b4c0-61ef40fafbd6\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-na\" data-link-shortcode-text=\"ExpressVPN Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $133 (save $57 at ExpressVPN): If you want a router with an inbuilt VPN -- and one of the best VPNs we currently recommend -- consider the discount available on the ExpressVPN Aircove. For a portable version, you can also save $51 on the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"29156f77-0a79-41fa-ac51-a5c0ef2529de\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-go-na\" data-link-shortcode-text=\"Aircove Go\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EFAQs\u003C\u002Fh2\u003E\u003Ch3\u003EWhen is Black Friday?\u003C\u002Fh3\u003E\u003Cp\u003EIn 2024, Black Friday will launch on Nov. 29, one day after Thanksgiving, in the United States. Deals will appear not only on the actual day but also during the week of Black Friday and days afterward. The best sales will likely emerge from Nov. 29 to Dec. 2.\u003C\u002Fp\u003E\u003Ch3\u003EWhen is Cyber Monday?\u003C\u002Fh3\u003E\u003Cp\u003ECyber Monday will land on Dec. 2 this year. There will be plenty of deals on tech, accessories, clothing, and more in the run-up to Thanksgiving, throughout Black Friday week, and during Cyber Monday. \u003C\u002Fp\u003E\u003Ch3\u003EAre VPN deals really better on Black Friday?\u003C\u002Fh3\u003E\u003Cp\u003EThey can be. Many VPN providers use countdown timers as marketing tools and display the typical plan price as a \"sale\" rate, but this doesn't mean that the occasional promotion isn't genuine. Historically, we've seen some great deals appear for VPNs around Thanksgiving and Black Friday.\u003C\u002Fp\u003E\u003Ch3\u003EWhat's the difference between Black Friday and Cyber Monday?\u003C\u002Fh3\u003E\u003Cp\u003EBlack Friday and Cyber Monday are similar, but one appears before the other. Black Friday launches on Nov. 29, 2024, while Cyber Monda will launch on Dec. 2. The days in between are often called Cyber Week.\u003C\u002Fp\u003E\u003Ch3\u003EHow did we choose these Black Friday deals?\u003C\u002Fh3\u003E\u003Cp\u003EAt ZDNET, we only write about products we like or want to buy, and we endeavor to let you know about every deal we find that we believe offers great value. Our deal-hunting experts look for deals that are at least 20% off retail price, when possible, but we also highlight deals for products that are rarely on sale, such as Apple devices.\u003C\u002Fp\u003E\u003Cp\u003EWe consider customer reviews and our own hands-on product experience and conduct extensive research to ensure we only recommend the best deals. We aim to help you shop smarter and get the best return for your money. \u003C\u002Fp\u003E\u003Ch3\u003EWhere can you shop the best Black Friday and Cyber Monday deals? \u003C\u002Fh3\u003E\u003Cp\u003EYou can enjoy the in-store Black Friday and Cyber Monday sales at major retailers like Walmart, Best Buy, and Target. However, in recent years, many shoppers have opted to make their purchases online, with Amazon becoming one of the top retailers to visit.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"26af060d-46bc-4ba7-85be-be2f4246a469\" data-edition=\"us\" data-description=\"\u003Cp\u003EZDNET's experts have been searching through Black Friday sales live now to find the best discounts by category. These are the best Black Friday deals so far, by category:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-tv-deals-2024\u002F"\u003EBlack Friday TV deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-phone-deals-2024\u002F"\u003EBlack Friday phone deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-laptop-deals-2024\u002F"\u003EBlack Friday laptop deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-gaming-deals-2024\u002F"\u003EBlack Friday gaming deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-gaming-pc-deals-2024\u002F"\u003EBlack Friday gaming PC deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-tablet-deals-2024\u002F"\u003EBlack Friday tablet deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-smartwatch-and-fitness-tracker-deals-2024\u002F"\u003EBlack Friday smartwatch and fitness tracker deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-headphone-deals-2024\u002F"\u003EBlack Friday headphone deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-monitor-deals-2024\u002F"\u003EBlack Friday monitor deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fkitchen-household\u002Fbest-black-friday-robot-vacuum-deals-2024\u002F"\u003EBlack Friday robot vacuum deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fbest-black-friday-security-camera-deals-2024\u002F"\u003EBlack Friday security camera deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-storage-and-ssd-deals-2024\u002F"\u003EBlack Friday storage and SSD deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fenergy\u002Fbest-black-friday-portable-power-station-deals-2024\u002F"\u003EBlack Friday portable power station deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-streaming-deals-2024\u002F"\u003EBlack Friday streaming deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-vpn-deals-2024\u002F"\u003EBlack Friday VPN deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-chromebook-deals-2024\u002F"\u003EBlack Friday Chromebook deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-ipad-deals-2024\u002F"\u003EBlack Friday iPad deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-airpods-deals-2024\u002F"\u003EBlack Friday AirPods deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-apple-watch-deals-2024\u002F"\u003EBlack Friday Apple Watch deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-kindle-deals-2024\u002F"\u003EBlack Friday Kindle deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-roku-deals-2024\u002F"\u003EBlack Friday Roku deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fkitchen-household\u002Fbest-black-friday-roborock-deals-2024\u002F"\u003EBlack Friday Roborock deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-hp-deals-2024\u002F"\u003EBlack Friday HP deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-nintendo-switch-deals-2024\u002F"\u003EBlack Friday Nintendo Switch deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-playstation-5-deals-2024\u002F"\u003EBlack Friday PlayStation deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EYou can also find the best Black Friday deals by price:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-deals-under-25-2024\u002F"\u003EBlack Friday deals under $25\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-deals-under-100-2024\u002F"\u003EBlack Friday deals under $100\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAnd the best Black Friday deals by retailer:&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-amazon-deals-2024\u002F"\u003EBlack Friday Amazon deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-best-buy-deals-2024\u002F"\u003EBlack Friday Best Buy deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-walmart-deals-2024\u002F"\u003EBlack Friday Walmart deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-apple-deals-2024\u002F"\u003EBlack Friday Apple deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-samsung-deals-2024\u002F"\u003EBlack Friday Samsung deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"What are the best Black Friday 2024 deals?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"83511191-1b07-4c24-92ec-d985f062f58c\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F83511191-1b07-4c24-92ec-d985f062f58c\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 09:24:00",timezone:"UTC",updated:c,published:c},description:"Looking for a deal on a VPN before Black Friday? We found the best promotions around for secure, private, and trustworthy VPN solutions that we've tested.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"38f6e5d5-4f2e-407a-b3d0-df5308ccc175",image:{id:"4d9748ea-120e-46ed-8c9d-274b053386c9",filename:"vpn.png",dateCreated:{created:c,date:"2023-10-23 17:41:45",timezone:"UTC",updated:c,published:c},alt:"holiday-placeholder-image",credits:"bymuratdeniz\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F10\u002F23\u002F4d9748ea-120e-46ed-8c9d-274b053386c9\u002Fvpn.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals-roundup",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"best-black-friday-vpn-deals-2024",startYear:c,summary:b,title:"The best Black Friday VPN deals 2024: Early sales live now",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"ab2ae5cc-62fd-4292-a0b0-fb223738c1de",username:"ksolino",profileUrl:c,email:c,firstName:"Kayla",lastName:"Solino",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"523fff3e-db1c-4997-8e16-2dfa40989bc3",filename:"img-2794.jpg",dateCreated:{created:c,date:"2023-10-02 14:47:16",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F10\u002F02\u002F523fff3e-db1c-4997-8e16-2dfa40989bc3\u002Fimg-2794.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Kayla Solino is a ZDNET Associate Editor based in New York City and New Jersey. She has a master's degree in journalism from the University of Alabama. Some of her past bylines include Inc., Fortune, and The Crimson White. In her spare time, she enjoys keeping up with all things Crimson Tide, binging British Bake Off, and baking.",profile:c,title:"Associate Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EDid you know \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f58c0548-5937-4629-b078-8eb89cbd8deb\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX532AM-A-AirTag\u002Fdp\u002FB0933BVK6T\" data-link-shortcode-text=\"AirTags\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E can be used for more than just locating your keys? \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fapples-airtag-4-pack-is-20-off-with-this-deal-ahead-of-black-friday\u002F\" target=\"_blank\"\u003EAirTags\u003C\u002Fa\u003E are handy for tracking your essentials, and in 2024, there are configurations that allow you to attach them to keys, pets, bags, and even water bottles. Perhaps one of the most useful places for an AirTag, though, is your wallet. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best Bluetooth trackers you can buy: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs with any functional accessory, the market is full of different AirTag wallets, accessories, and more. Keep in mind that what you may actually be looking for is a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-best-airtag-you-can-buy-for-your-wallet-isnt-made-by-apple-and-its-rechargeable\u002F\" target=\"_blank\"\u003EBluetooth tracking card\u003C\u002Fa\u003E or another nifty wallet gadget. That's why we tested plenty of the smart options available to ensure you never lose your wallet again, evaluating capacity, security, and cost. We also combined expert research and analysis to make sure we've considered the most functional AirTag wallets or tracking accessories for you.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EThe best AirTag accessories you can buy\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat's the best AirTag wallet right now?\u003C\u002Fh2\u003E\u003Cp\u003EOur pick for the best AirTag wallet overall is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7a796acb-0200-4998-b80b-adb43a1baa07\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1\" data-link-shortcode-text=\"Ridge Wallet\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, because it offers plenty of room for cards and cash in a stylish and customizable design. It's also durable and offers great value over time. Keep reading to see how our other top AirTag wallets and accessories stack up and find the best option for your lifestyle. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattention-apple-airtag-users-dont-ignore-this-warning\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EAttention Apple AirTag users: Don't ignore this warning\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EThe best AirTag wallets of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d91f856a-a907-4c05-b637-f98b4a639626\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge wallet is a slim RFID-blocking wallet designed to hold up to 12 cards. Cash can be stored via a cash strap or money clip on the outside of the wallet, and the brand offers three AirTag configurations for tracking: an AirTag holder designed to \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BXBL1345" target="_blank"\u003Efit into the cash strap\u003C\u002Fa\u003E or \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BQZCV5HY" target="_blank"\u003Ereplace the money clip\u003C\u002Fa\u003E for $25, or the \u003Ca href="https:\u002F\u002Fridge.com\u002Fproducts\u002Fcarbon-case-for-airtag" target="_blank"\u003EAirTag carbon add-on holder\u003C\u002Fa\u003E that attaches outside any Ridge wallet for $40.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe Ridge offers durability and functionality while also providing top-notch security and smart capabilities. Although it is a bit pricey, it has a lifetime warranty to keep up with your daily use and a risk-free 99-day trial period. All things considered, a quality, traditional leather-style wallet could easily run you over the $100 mark, too, which makes this long-term investment worth it, in my opinion.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EI gifted this wallet to my Dad a year before using one myself, and I can confidently say it's a winner. Prior to gifting him the Ridge, he used several other wallets, including a traditional leather and titanium case style, but none of them fit his needs.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMy Dad is a shove-everything-into-your-pockets-and-go kind of person, and no wallet could ever keep all his cards, cash, and receipts organized until the Ridge. The minimalist design helps ensure he can put what he really needs into his wallet and makes it easy to access cards and cash when he wants.\u003C\u002Fp\u003E\u003Cp\u003EI initially thought the maneuvering to slide the cards in and out would be annoying, but after a little practice, he said it became second nature and is surprisingly easier than opening and removing cards or cash from a traditional wallet. I agree that there's a brief learning curve involved, but once you get it down, it's a non-issue.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe practicality, coupled with the RFID technology, numerous color and metal options, and the addable AirTag tracker, makes the Ridge nearly faultless. Although it can get a little chunky when it's full to the brim with cards (but alas, what wallet doesn't?). This is a great wallet for small handbags, concert or stadium bags, and going out on the town, too.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ridge customers said on the website that they liked the wallet capacity, durability, design, and functionality of the Ridge wallet. The wallet features a 4.8\u002F5 starts online, and 97% of customers said they'd recommend the Ridge wallet to a friend. Several customers said they were repeat purchasers and that their wallets stood the test of time.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: The Ridge wallet is 20% off (save $20) on Amazon in select colors at the time of publication.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERidge Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003EAluminum&nbsp;\u003Cstrong\u003E|\u003C\u002Fstrong\u003E RFID blocking | Accessories and add ons available | Several materials and designs&nbsp;| Cash strap or money clip for cash storage | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;86 x 54 x 6 mm&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ridge Wallet\" data-superlative=\"Best AirTag wallet overall\" data-imagegroup=\"{"alt":"img-0675","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","title":"ridge-wallet","filename":"img-0675.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002Fb5a3a5b6-041b-44b4-b2d1-5028597f10b3\u002Fimg-0675.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1303963,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-08 18:48:12","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 18:48:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"img-0675","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","imageAltText":"img-0675","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-0675.jpg","imageDateCreated":"2024\u002F04\u002F08","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offer=\"{"id":"a164cfc7-0f98-4b47-a698-ad7a30009aff","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","label":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"a164cfc7-0f98-4b47-a698-ad7a30009aff","name":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","productType":"SERIES","updateType":"PRISM","mod":1732026171142,"displayDate":"Tue Nov 19 2024 09:22:51 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Durable ~ RFID-blocking ~ Relatively slim yet multi-functional ~ Minimalist design ~ Unique colors and designs\" data-dislike=\"~ Expensive ~ Must buy AirTag holder components as add-ons ~ Can become bulky for pockets when full ~ Certain finishes may scratch\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e223c11-5dbb-41f5-a4e3-2c83453971fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're not dead set on using an AirTag wallet or \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories" target="_blank"\u003EAirTag accessory\u003C\u002Fa\u003E to track your wallet, it may be worth it to consider a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E equipped with location tracking. The Journey LOC8 is the finder wallet version of our pick for best overall MagSafe wallet, the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Fezmo-magsafe-wallet-phone-stand?" target="_blank"\u003EEzmo wallet\u003C\u002Fa\u003E (pictured above).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EJourney's MagSafe wallet is the perfect balance of style and function with enough space to hold 5 cards. The wallet also doubles as a phone stand, so you can watch your favorite entertainment on the go or keep your phone screen visible at your desk. The stand has adjustable viewing angles in both portrait and landscape modes and features a protective lining to safeguard your cards' information with RFID-blocking technology while preventing them from becoming demagnetized.\u003C\u002Fp\u003E\u003Cp\u003EThe LOC8 takes all the great features of the Ezmo wallet one step further, offering location tracking -- no AirTag needed. It uses Apple's Find My technology for easy integration, is rechargeable, and comes with built-in speakers so you can easily ping the LOC8 wallet to find its location.\u003C\u002Fp\u003E\u003Cp\u003EI tested the Ezmo version of the Journey wallet for several weeks during my commute from New Jersey to New York City, and I like it enough to recommend the LOC8 with built-in tracking confidently. I like the premium feel and how easy the wallet makes it to access my transit cards during my commute. I also like how the wallet provides enough space for 5 cards and folded cash. It's perfect for holding my debit card, work badge, and other incidentals like paper train tickets. The phone stand was nice, too. Although it's one of the pricier options for a MagSafe wallet, I think it's well worth the investment due to its multi-functionality and excellent quality, especially if you use your MagSafe wallet every day.\u003C\u002Fp\u003E\u003Cp\u003ECurrent users on the Journey website said they liked the slim profile, smart design, larger card capacity, and sleek material -- so much so that the wallet has a 5\u002F5 star rating online, with one customer noting that it "does it all really well."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's Note: At the time of publication on Oct. 24, you can save 20% off at Journey's website thanks to a fall sale.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EJourney LOC8 tracking wallet and phone stand features:\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E&nbsp;MagSafe bifold&nbsp;| Multi-functional&nbsp;| RFID protection | Built-in lock to prevent card slippage | Water resistant | Built-in speaker | Apple Find My System compatible | Rechargeable |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;66 mm x 103 mm x 14 mm |&nbsp;\u003Cstrong\u003ECard capacity:\u003C\u002Fstrong\u003E&nbsp;Up to 5 cards&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Journey LOC8 Tracking Wallet and Phone Stand\" data-superlative=\"Best MagSafe tracking wallet\" data-imagegroup=\"{"alt":"journey-magsafe-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","title":"journey-magsafe-wallet","filename":"img-1053.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F12\u002F68736460-4a2c-4d02-aea5-b27ba0b0d87f\u002Fimg-1053.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243587,"width":6000,"height":4000,"dateCreated":{"date":"2024-03-12 14:29:02","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-12 14:30:18","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"journey-magsafe-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","imageAltText":"journey-magsafe-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1053.jpg","imageDateCreated":"2024\u002F03\u002F12","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand","offerMerchant":"Journey","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand"}]\" data-usepricing=\"true\" data-like=\"~ Stylish ~ Sleek design ~ High-quality ~ Multi-functional ~ No AirTag necessary\" data-dislike=\"~ Pricier option ~ Takes time to get used to\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ffa55451-6a2e-4038-b15b-a48a7e99050c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like affordable luxury tech products, don't look any further than Bosca's AirTag wallet for all your card storage needs. Plus, if you're looking for a minimalist option, this could be a great fit for your needs. Part of my job at ZDNET includes testing tons of tech accessories, from MagSafe gear to AirTag accessories and beyond, so needless to say, I have tested a lot of different things, including MagSafe and AirTag wallets. This is the first AirTag wallet I've tested in a while that I was really impressed with, and it took me by surprise.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere's nothing overly unique about the design of this Bosca wallet. In fact, if you went on Amazon, you'd see tons of similar options at varying price points offering similar features: slim design, a few card slots, maybe an ID window, and, of course, that trusty little spot to tuck your AirTag. The hybrid card slot\u002Fwallet combo has become a popular option in 2024, as many people shift to cardless payment options like Apple Pay and Google Pay more and more and carry fewer cards daily.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBut what makes Bosca's stand-out is the craftsmanship and leather used to construct it. I knew right away upon opening up this wallet that it was, what the kids call, legit. The leather is smooth, and the Saddle color has a really striking tone that is not too orange and not too brown. Moreso, it looks like something that didn't fall out of Amazon's massive factory market, and that's thanks to the full grain, Italian, hand-stained leather and intentional construction. It holds cards great, has a dedicated ID slot with a slit to make grabbing your identification easy, and two pockets to hold extra cash, cards, or other incidentals. It's super easy to snap your AirTag in and be on your way, and most importantly, it's the kind of tech accessory that feels like it will withstand the test of time, and will perhaps get better with age. I compared the leather of this wallet to some of my own personal handbags and small goods from various other brands, and there's certainly a similar standard that I was impressed with.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt is certainly pricier than other options on this list (though not as expensive as a Ridge wallet) and I do wish there were perhaps more colored options, but for what is offered I feel that this wallet is a confident balance of affordable luxury that justifies its price tag, and potentially prevents the type of incessant rebuying that can often occur with tech accessories.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: This product is currently unavailable on Amazon at the time of publication on 11\u002F19.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBosca AirTag Wallet features\u003C\u002Fstrong\u003E:&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E Hybrid cardholder design | \u003Cstrong\u003EDimensions\u003C\u002Fstrong\u003E: 4.375 H x 3.00 W x 0.125 D | \u003Cstrong\u003ECard capacity:&nbsp;\u003C\u002Fstrong\u003E3 Card Pockets, 2 card\u002Fcash pockets, 1 ID slot | Cash storage | Full grain, Italian, Hand-stained leather&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Bosca AirTag Wallet\" data-superlative=\"Best leather AirTag wallet\" data-imagegroup=\"{"alt":"bosca-airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"9183531b-994a-46db-a2fb-e002d45fe8c0","title":"bosca-airtag-wallet","filename":"img-2017.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F9183531b-994a-46db-a2fb-e002d45fe8c0\u002Fimg-2017.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3181064,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:30:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:30:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"bosca-airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"9183531b-994a-46db-a2fb-e002d45fe8c0","imageAltText":"bosca-airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2017.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML","url":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bosca","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.bosca.com\u002Fproducts\u002F7-pocket-i-d-card-case-1?","url":""}]\" data-usepricing=\"true\" data-like=\"~ Quality leather ~ Minimalist design ~ Secure AirTag holder ~ ID slot ~Affordable luxury\" data-dislike=\"~ Pricier ~ Not ideal for over 5 cards ~ Only three colors\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c24940fd-c7ec-43c5-8565-91864f17cc70\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Spigen AirTag Wallet S is a more affordable and expandable wallet design. Similar in overall construction and function the the Ridge wallet, the main difference is the material and price point.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDespite its streamlined design, the Spigen AirTag Wallet S holds up to 12 cards. The polycarbonate shell makes for a super-light build, so it won't weigh your purse or pockets down. The nylon elastic cash strap is an extra bonus to stow away your bills. It also incorporates special RFID-blocking protection to prevent RFID card readers from stealing your information.\u003C\u002Fp\u003E\u003Cp\u003E"The Spigen AirTag Wallet S's sleek design and compact form initially drew my attention," says Liz Ho, an experienced camping guide, travel expert, and founder of&nbsp;\u003Ca href="https:\u002F\u002Fcampingguidance.com\u002F"\u003ECamping Guidance\u003C\u002Fa\u003E. "Its built-in AirTag compartment gave me peace of mind, knowing I could easily locate my wallet if it ever went missing."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Amazon customers said they liked that the Spigen S wallet was more affordable, had a dedicated, built-in spot for an AirTag, and held both cash and cards. However, some experienced damage early on and didn't like the plastic material. Overall, customers said they were happy with the appearance and value of the wallet but wished it had some improvements in material and performance.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESpigen AirTag Wallet S specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;| RFID-blocking | Cash strap for cash storage |&nbsp;\u003Cstrong\u003EMaterial:&nbsp;\u003C\u002Fstrong\u003EPolycarbonate&nbsp;| Cash strap for cashe storage |\u003Cstrong\u003E Dimensions:\u003C\u002Fstrong\u003E&nbsp;1.18 x 3.15 x 1.97 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Spigen AirTag Card Holder Wallet S\" data-superlative=\"Best mid-range AirTag wallet\" data-imagegroup=\"{"alt":"spigen-airtag-wallet-s-","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Spigen\u002FZDNET","imageData":{"id":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","title":"spigen-airtag-wallet-s-","filename":"spigen-airtag-wallet-s-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F06\u002F8644ee4e-7ac0-4698-85a7-7919e1ad37a7\u002Fspigen-airtag-wallet-s-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":99656,"width":670,"height":372,"dateCreated":{"date":"2024-02-06 21:17:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-06 21:17:55","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Spigen\u002FZDNET","alt":"spigen-airtag-wallet-s-","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","imageAltText":"spigen-airtag-wallet-s-","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Spigen\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"spigen-airtag-wallet-s-removebg-preview.png","imageDateCreated":"2024\u002F02\u002F06","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Spigen\u002FZDNET\" data-offer=\"{"id":"4304727d-dd37-4970-9617-bf811bde1f17","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","label":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"4304727d-dd37-4970-9617-bf811bde1f17","name":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","productType":"SERIES","updateType":"PRISM","mod":1732130514526,"displayDate":"Wed Nov 20 2024 14:21:54 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Cash strap ~ Lightweight ~ Dedicated AirTag slot ~ Budget friendly\" data-dislike=\"~ Limited colors ~ Not scratch-resistant ~ Cheap material\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f047a9e0-bac2-4c03-8664-247677f447eb\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ekster Wallet for AirTag combines minimalism with affordable luxury functions. It holds up to 12 cards as well as cash. Plus, it features RFID-blocking technology, a dedicated AirTag slot, quick access with a push button, and an easy slide-up function to fan out cards.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt's an AirTag-compatible version of the brand's popular Parliament wallet, and it's slim enough to fit in your front or back pocket. However, it's slightly expensive and lacks color options.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ekster wallet users on the Ekster website said they liked the high-quality construction, overall design, and easy function. One customer said they even upgraded to this AirTag wallet after losing their Parliament wallet on vacation, and another called it perfect. "If you have been looking for a wallet that is high-quality with all the features, this is definitely the wallet for you," one customer wrote in their review.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EEkster Wallet for AirTag specs: Type:\u003C\u002Fstrong\u003E Slide | \u003Cstrong\u003EMaterial: \u003C\u002Fstrong\u003ELeather | Slide-up function to fan cards | RFID-blocking | Minimalist design | AirTag slot | Quick card access with button | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E 4.1 x 2.5 x 0.4 inches&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ekster Wallet for AirTag\" data-superlative=\"Best card slide AirTag wallet\" data-imagegroup=\"{"alt":"Ekster Parliament Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Ekster\u002FZDNET","imageData":{"id":"060cf5a9-e745-493f-a252-e63202f78cc3","title":"Ekster Parliament Wallet","filename":"ekster-parliament-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F07\u002F21\u002F060cf5a9-e745-493f-a252-e63202f78cc3\u002Fekster-parliament-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":20869,"width":1296,"height":720,"dateCreated":{"date":"2023-07-21 19:50:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-07-21 19:50:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Ekster\u002FZDNET","alt":"Ekster Parliament Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"060cf5a9-e745-493f-a252-e63202f78cc3","imageAltText":"Ekster Parliament Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Ekster\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ekster-parliament-wallet.jpg","imageDateCreated":"2023\u002F07\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Ekster\u002FZDNET\" data-offer=\"{"id":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","label":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","name":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","productType":"SERIES","updateType":"PRISM","mod":1729871219011,"displayDate":"Fri Oct 25 2024 11:46:59 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9","url":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F","offerMerchant":"Ekster","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ekster.com\u002Fproducts\u002Fwallet-for-airtag?","url":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F"}]\" data-usepricing=\"true\" data-like=\"~ High-quality leather ~ Minimalist design ~ Easy slide access ~ Dedicated AirTag slot ~Slim\" data-dislike=\"~ Pricey ~ Limited color options ~ No ID slot\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2433d834-099f-43d1-be78-2fb3675f2c22\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Doeboe AirTag Wallet is the best budget AirTag wallet with a surprisingly lightweight build despite its leather material.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ERicky Allen, marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, says, "It's a great wallet with all the necessities, like card slots, a pocket for bills, and an AirTag keychain holder."\u003C\u002Fp\u003E\u003Cp\u003EMade of Crazy Horse leather, this bifold wallet features 10 different card slots, including a bill pocket to stash your cash. It also has an ID window so you don't have to take your driver's license out whenever you need to show it. The simple, minimalist design is simple to manage and also lightweight, so it won't weigh your pockets down.\u003C\u002Fp\u003E\u003Cp\u003EAllen commented on the security as well. "I liked how easy it was to insert my AirTag and the anti-theft RFID protection it provides. Security is very important to me, and I'm glad this wallet provides the added protection of RFID-blocking."\u003C\u002Fp\u003E\u003Cp\u003ECurrent Doeboe wallet users on Amazon said they liked the appearance, durability, and compactness of the wallet, with several customers emphasizing the genuine leather construction.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDoeboe AirTag Bifold Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EBifold&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003ELeather&nbsp;| ID window | RFID blocking |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;1.97 x 1.57 x 0.59 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Doeboe AirTag Bifold Wallet\" data-superlative=\"Best budget AirTag wallet\" data-imagegroup=\"{"alt":"doeboe AirTag Bifold Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Doeboe\u002FZDNET","imageData":{"id":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","title":"doeboe AirTag Bifold Wallet","filename":"doeboe-airtag-bifold-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F12\u002F2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06\u002Fdoeboe-airtag-bifold-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":92192,"width":1296,"height":720,"dateCreated":{"date":"2023-04-12 18:35:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-04-12 18:35:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09BHXPH8H","alt":"doeboe AirTag Bifold Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","imageAltText":"doeboe AirTag Bifold Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Doeboe\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"doeboe-airtag-bifold-wallet.jpg","imageDateCreated":"2023\u002F04\u002F12","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Doeboe\u002FZDNET\" data-offer=\"{"id":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","label":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","name":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","productType":"SERIES","updateType":"PRISM","mod":1732130531292,"displayDate":"Wed Nov 20 2024 14:22:11 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4","url":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Roomy ~ Traditional feel ~ RFID-blocking technology ~ ID Window ~ Affordable ~ Several color options\" data-dislike=\"~Bulkier, bifold design ~ Cheaper look and feel\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to tell if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge Wallet with an accompanying AirTag holder attachment is ZDNET's top pick for best overall AirTag wallet.&nbsp; \u003C\u002Fp\u003E\u003Cp\u003EWith a slim and stylish, yet easily expandable and durable design, the Ridge wallet handles up to 12 cards, and offers an efficient storage option for cash. Equipped with RFID-blocking technology and built of tough aluminum, the Ridge is the creme de la creme of trackable, practical wallets, and is a true buy-one-time purchase. \u003C\u002Fp\u003E\u003Cp\u003ESee how our other top picks compared to the Ridge wallet in type, cost, and card capacity below:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EBest AirTag wallet\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EType\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECard capacity\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EStarts at $95\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003E$90\u003C\u002Ftd\u003E\u003Ctd\u003EMagSafe bifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 5\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003E$85\u003C\u002Ftd\u003E\u003Ctd\u003EHybird card holder\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 6\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003E$50\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003E$99\u003C\u002Ftd\u003E\u003Ctd\u003ESlide\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bilfold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003E$26\u003C\u002Ftd\u003E\u003Ctd\u003EBifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 10\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"What is the best AirTag wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt isn't easy to choose the best AirTag wallet when there are so many options on the market. These expert recommendations may help you in the buying process so you can be sure to find the right wallet for your needs.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EChoose this AirTag wallet...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall AirTag wallet for function, style, security, and longevity. Easily customize this wallet to fit your lifestyle.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003EA MagSafe wallet option equipped with Apple's Find My tracking technology.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003EAn affordable luxury, hybird AirTag wallet. \u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall affordable AirTag wallet alternative with great value.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003EThe best AirTag wallet for easy access. Store your cards with extra security while enjoying unrivaled convenience.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bifold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EA budget bifold wallet. This best AirTag wallet offers a traditional design with a built-in AirTag holder.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the best AirTag wallet for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're in the market for an AirTag wallet, you already know the marketplace is copious. Here's a few things to keep in mind while you search that may help you narrow down your options and find the right fit for you.&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECapacity\u003C\u002Fstrong\u003E: Consider what you want to store in your wallet. How many cards? Cash? Any other incidentals like your work badge or transit passes? We'd recommend finding out your absolute bare minimum need for card capacity (maybe that's three cards or maybe it's ten) and factoring that into your search. You'll easily be able to cut a huge chunk of options out based on capacity alone.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: Many AirTag wallets provide RFID-blocking, which means that it blocks card scanners that can steal your information. If this is a top priority for you, you can drop many of the cheaper options, which often don't offer these capabilities.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E: The price of AirTag wallets can vary considerably, and like with any purchase, establishing a budget is key. While we've included a budget, mid-range, and expensive pick on this list, you need to decide for yourself what your magic number is. Keep in mind that your wallet is often an everyday essential that lasts for a number of years, so it may be worth it to set a higher budget. Plus, many quality traditional leather wallets often cost over $100, too.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003EYour needs: \u003C\u002Fstrong\u003ESo you're here because you think you want an AirTag wallet. But maybe what you're actually looking for is a Bluetooth tracker card to upgrade your favorite traditional wallet. Or maybe you just want an AirTag card insert to do the same. Think about what you actually need right now and what makes the most sense for your lifestyle -- it may not be what you thought at first.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing an AirTag wallet\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"aeb5de34-5d6e-45b1-9b25-8fa4c111c9e5\" data-edition=\"us\" data-description=\"\u003Cp\u003EWe combined our expert research and analysis, hands-on testing for select products, and our extensive testing and knowledge of alternative Bluetooth trackers to curate this list. We consider factors like lifestyle, construction, durability, tracking capabilities, and function while compiling these top picks and made sure to provide options for those who aren't sure if an AirTag wallet is right for them. If we think a new product is worth your money, we'll update this list or write a spotlight review highlighting its best qualities and specifying who it's for.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPlus, we are routinely scouring the web for new products that are worthy of testing, following news on product rollouts and upgrades, and sourcing the best deals.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How did we choose these AirTag wallets?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e338db83-da68-4ce6-9398-b4683b088f84\" data-edition=\"us\" data-description=\"\u003Cp\u003EAn AirTag is a type of tracking device. You can affix it to an object, and the AirTag will then provide tracking for that item. Simply log into the Find My app to track your device and see an exact location. You can also ping your phone so it sounds like an alert, helping you to find it that much easier.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What is an AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a56e686-7136-4674-af80-65a8ebe65fd3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, AirTags can be used to track anything like keys, bags, purses, wallets, and more. There's lots of \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003Eaccessories on the market\u003C\u002Fa\u003E to seamlessly configure an AirTag to your needs, and likewise, many AirTag wallets are specially designed to hold an AirTag to upgrade your traditional wallet with location-tracking capabilities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best AirTag accessories of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can AirTags be used in a wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e33f8c0c-f5d2-483d-82ec-f5717cc0b4bd\" data-edition=\"us\" data-description=\"\u003Cp\u003ENo, by no means are AirTag wallets the only \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003Ebluetooth tracking\u003C\u002Fa\u003E accessories on the market. You can equip and configure traditional wallets with tracking cards like the KeySmart Smart Card, or use other alternative trackers like Tile. And if you want to upgrade to a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E, some are available with built-in tracking configurations already installed, like the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand" target="_blank"\u003EJourney LOC8 wallet\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best bluetooth trackers of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Are AirTag wallets the only tracking options out there?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"530a9dbb-0397-4823-9367-e052347b9bed\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere's a few different types of products and configurations that will help you track your wallet, no matter where you leave it. Here are the most common:&nbsp;\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EA wallet specially designed to house an AirTag tracker, either by design or with added attachments.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA Bluetooth tracker card that uses Apple's Find My technology that can slide into an existing wallet like any other card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA tracker card designed to hold an AirTag that can slide into an existing wallet like a card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EWallets that are already enabled with their own Bluetooth tracking systems and don't require an AirTag (these often use Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EMagSafe wallet options are enabled with Bluetooth tracking (which also likely uses Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003C\u002Fol\u003E\" data-hed=\"What types of bluetooth tracking is available for my wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"852bccff-11ea-40df-a48e-a5df96e0bc6b\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile this may not be the conventional route, if you're interested in tinkering and building your own custom AirTag setup, you actually can. ZDNET's Adrian Kingsley-Hughes did himself in April 2023, and wrote up his own \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003Estep-by-step guide\u003C\u002Fa\u003E that you can follow.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003E\u003Cstrong\u003EI built a custom AirTag that Apple will hate me for. Here's how you can too\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can I build my own custom AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9441c617-048c-459d-ae23-6b39c18c9b0a\" data-edition=\"us\" data-description=\"\u003Cp\u003EAirTags will not interfere with your debit or credit cards and they will not cause demagnetization. AirTags operate using Apple's Find My technology and a bluetooth connection, and the frequency does not disturb your cards. &nbsp;\u003C\u002Fp\u003E\" data-hed=\"Do AirTags interfere with credit cards?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"700087c7-33c1-4d66-b676-77be91ca990d\" data-edition=\"us\" data-description=\"\u003Cp\u003EAccording to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.dhs.gov\u002Fradio-frequency-identification-rfid-what-it" target="_blank"\u003EDepartment of Homeland Security\u003C\u002Fa\u003E, RFID refers to Radio Frequency Identification (RFID) technology. This technology uses radio waves to identify people or objects.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere are devices that can read information contained in a wireless device or "tag" from a distance without making any physical contact or requiring a line of sight -- for example, the chips in credit or debit cards. Wallets which feature RFID-blocking technology prevent these devices from accessing information stored in protected chips, which can help prevent your bank information from being compromised.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What does RFID mean?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2b70c98b-f3b7-4c83-85b8-f6aa453c96a7\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe beauty of an AirTag is that it can be tracked from anywhere. Your AirTag just needs to be within range of a Bluetooth connection while near an Apple device. It does not even have to be your own phone, so as long as you are close to an Apple device, you can use AirTag technology to locate your wallet.\u003C\u002Fp\u003E\" data-hed=\"How far can I track my AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d6ee353c-06e9-4aa0-a5b6-bc285c09ca55\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're an iPhone user, there's a few ways to recognize if an AirTag is tracking you. Your phone may alert you of an "AirTag found moving with you." This will happen if these things are true:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EThe AirTag is separated from its owner.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYour iPhone is awake.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to find out if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How can I find out if an AirTag is tracking me?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EMore AirTag wallets to consider \u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003EIf you haven't found an AirTag wallet that feels right for you, here are a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F\" target=\"_blank\"\u003Efew alternatives\u003C\u002Fa\u003E that may better suit your needs -- it may not be a traditional wallet that you're looking for at all. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fe2701ee-9351-4da3-adc5-9cf5eee59de4\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Geo Wallet is ESR's flagship tracking wallet, which also uses Apple's Find My technology to ensure you can always find your MagSafe wallet. It holds up to three cards, and like the Journey LOC8 wallet, it also doubles as a stand.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo MagSafe Tracking Wallet\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"906f0b35-4a46-4fc9-86ac-73ae744003a9","title":"esr-halo-lock-geo-wallet","filename":"img-1826.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F07\u002F906f0b35-4a46-4fc9-86ac-73ae744003a9\u002Fimg-1826.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1061142,"width":6000,"height":4000,"dateCreated":{"date":"2024-06-07 16:47:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-07 16:48:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"906f0b35-4a46-4fc9-86ac-73ae744003a9","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1826.jpg","imageDateCreated":"2024\u002F06\u002F07","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best Bluetooth tracking wallet alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ca868a1-1f05-47d2-92d7-5b67e33a4781\" data-edition=\"us\" data-description=\"\u003Cp\u003EMaybe you're not actually in need of an AirTag wallet option. This traditional-style wallet from ESR features plenty of card slots and a designated ID slot and is enabled with Apple's Find My technology -- the first of its kind. While it isn't made of the most premium material and certainly isn't a leather alternative, it's a great wallet if you want built-in Bluetooth tracking without all the hassle of an added AirTag.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo Wallet with Find My\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"a7f849fb-6419-4135-9267-3c8952c8f262","title":"esr-halo-lock-geo-wallet","filename":"img-2021.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002Fa7f849fb-6419-4135-9267-3c8952c8f262\u002Fimg-2021.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3663445,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:31:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:31:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a7f849fb-6419-4135-9267-3c8952c8f262","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2021.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best bluetooth tracking traditional wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F","offerMerchant":"Esrgear","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.esrgear.com\u002Fgeo-wallet-with-find-my-discount\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6d2af2ec-b708-45a0-94cd-66b97f508fac\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeySmart's SmartCard lets you instantly turn any wallet into a trackable one by simply sliding it in place. It's super thin, works with Apple iOS Find My, has a wireless rechargeable battery, and is IPX7-rated. ZDNET's Adrian Kingsley-Hughes personally prefers these nifty cards over an AirTag, which needs battery replacing and can be bulky.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"KeySmart SmartCard\" data-imagegroup=\"{"alt":"KeySmart SmartCard","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"0accc90e-03af-42d6-a3b2-691d4553c3e4","title":"KeySmart SmartCard","filename":"img-9077.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F18\u002F0accc90e-03af-42d6-a3b2-691d4553c3e4\u002Fimg-9077.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":328342,"width":1600,"height":900,"dateCreated":{"date":"2024-03-18 12:05:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-18 12:05:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"KeySmart SmartCard","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0accc90e-03af-42d6-a3b2-691d4553c3e4","imageAltText":"KeySmart SmartCard","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-9077.jpg","imageDateCreated":"2024\u002F03\u002F18","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"Best non-AirTag tracking accessory to upgrade your current wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?","url":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2518b7f0-697d-4804-be5d-febcac9e50b5\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad also offers a tracking card that is enabled with Apple's Find My technology. Newly released in May 2024, the tracking card was back ordered for several weeks but is finally back to purchase as of the last publication of this article.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Nomad Tracking Card\" data-imagegroup=\"{"alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Max Buondonno\u002FZDNET","imageData":{"id":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","title":"nomad-tracking-card-zdnet-1","filename":"nomad-tracking-card-zdnet-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F27\u002F2bd33f28-27e9-407b-af79-b0ff2c63a22e\u002Fnomad-tracking-card-zdnet-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1024037,"width":1600,"height":900,"dateCreated":{"date":"2024-05-27 20:57:05","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-27 20:57:21","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Max Buondonno\u002FZDNET","alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","imageAltText":"Nomad Tracking Card with Card Wallet Plus and iPhone.","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Max Buondonno\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nomad-tracking-card-zdnet-1.jpg","imageDateCreated":"2024\u002F05\u002F27","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Max Buondonno\u002FZDNET\" data-linktext=\"Another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Ftracking-card","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0a5a8532-add5-40fe-add5-b637ca50be7c\" data-edition=\"us\" data-description=\"\u003Cp\u003EChipolo's Card Spot is shaped like a credit card, connects to Apple's Find My network, and gets ZDNET reviews editor Kerry Wan's pick for the best Bluetooth wallet tracker. The Card Spot is designed to live in your wallet, measuring a thickness of 0.09 inches -- about the same as two credit cards stacked together.\u003C\u002Fp\u003E\" data-hed=\"Chipolo Card Spot\" data-imagegroup=\"{"alt":"chipolo-iphone-here","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNet","imageData":{"id":"229910f6-af1c-4beb-bae9-4e9cffac574b","title":"chipolo-iphone-here","filename":"dsc00202.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F03\u002F11\u002F229910f6-af1c-4beb-bae9-4e9cffac574b\u002Fdsc00202.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":2785280,"width":6000,"height":3376,"dateCreated":{"date":"2022-03-11 23:07:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-03-11 23:07:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNet","alt":"chipolo-iphone-here","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"229910f6-af1c-4beb-bae9-4e9cffac574b","imageAltText":"chipolo-iphone-here","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dsc00202.jpg","imageDateCreated":"2022\u002F03\u002F11","imageWidth":6000,"imageHeight":3376,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNet\" data-linktext=\"Yet another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"47777800-8d9e-43f0-a72e-fae7294a820c\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad Goods also offers a card for the AirTag. Pop in your AirTag and slide it into your favorite wallet. It's as simple as that. \u003Cem\u003EAuthor's Note: This card is currently out of stock at the time of publication on 11\u002F19.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\" data-hed=\"Nomad Goods Card for AirTag\" data-imagegroup=\"{"alt":"airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"ec6a4994-42cd-410c-84e8-c0cce3423f15","title":"airtag-wallet","filename":"img-1563.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F10\u002Fec6a4994-42cd-410c-84e8-c0cce3423f15\u002Fimg-1563.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243591,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-10 14:17:18","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-10 14:25:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ec6a4994-42cd-410c-84e8-c0cce3423f15","imageAltText":"airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1563.jpg","imageDateCreated":"2024\u002F04\u002F10","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Fcard-for-airtag","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf136b08-c58a-4958-a14a-c2b857d0e137\" data-edition=\"us\" data-description=\"\u003Cp\u003ESimilar to the Nomad AirTag card, the TagVault allows you to pop an AirTag into a thin card-like casing, too. Plus, you get two in this pack.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Elevation Lab TagValut AirTag Insert (2-Pack)\" data-imagegroup=\"{"alt":"tagvault-airtag-insert","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Elevation Labs\u002FZDNET","imageData":{"id":"2b4b84ba-8975-448e-9a91-d60ec69b8026","title":"tagvault-airtag-insert","filename":"tagvault-airtag-insert-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002F2b4b84ba-8975-448e-9a91-d60ec69b8026\u002Ftagvault-airtag-insert-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":71497,"width":670,"height":372,"dateCreated":{"date":"2024-04-08 20:01:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 20:01:37","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Elevation Labs\u002FZDNET","alt":"tagvault-airtag-insert","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b4b84ba-8975-448e-9a91-d60ec69b8026","imageAltText":"tagvault-airtag-insert","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Elevation Labs\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"tagvault-airtag-insert-removebg-preview.png","imageDateCreated":"2024\u002F04\u002F08","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Elevation Labs\u002FZDNET\" data-linktext=\"Best budget AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ENeed the AirTag first? \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"f98673a7-9eba-4967-bc24-e9c87a7d23e3\" data-edition=\"us\" data-hed=\"Apple AirTag 4-Pack\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","filename":"img-0679.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002Fb14c53f9-6e74-4e39-b6f4-e44f7bff40b0\u002Fimg-0679.jpg","dateCreated":{"date":"2024-02-20 18:13:00","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","imageFilename":"img-0679.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0D54JZTHY?ref=ods_ucc_kindle_B0D54JZTHY_rc_nd_ucc\" data-offermerchant=\"Amazon\" data-monetizedurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX542AM-A-AirTag-Pack\u002Fdp\u002FB0932QJ2JZ?tag=zdnet-buy-button-20\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"2bb54237-6f2e-49cc-a125-d5bbe726cc2c\" data-edition=\"us\" data-hed=\"AirTag (1 Count)\" data-imagegroup=\"{"alt":"airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"16bed821-221f-4af3-aa35-0043a2afc64c","filename":"img-0685.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002F16bed821-221f-4af3-aa35-0043a2afc64c\u002Fimg-0685.jpg","dateCreated":{"date":"2024-02-20 18:13:04","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"16bed821-221f-4af3-aa35-0043a2afc64c","imageFilename":"img-0685.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0933BVK6T\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"919366eb-c91a-486d-9d88-097ffd074900\" data-edition=\"us\" data-description=\"\u003Cp\u003EZDNET sourced external industry experts for this article. Here is more information about them:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ELiz Ho\u003C\u002Fstrong\u003E: An avid camper and outdoor enthusiast who runs the&nbsp;\u003Ca href="https:\u002F\u002Fwww.youtube.com\u002F@CampingGuidance" target="_blank"\u003ECamping Guidance YouTube channel\u003C\u002Fa\u003E, which has 16.5K subscribers.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ERicky Allen: \u003C\u002Fstrong\u003EAn interior designer and marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, which sells eco-friendly wallpaper murals.\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Meet the experts\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EOther AirTag accessories to explore\u003C\u002Fh2\u003E\u003Cp\u003EFrom keychains to mounts and more, there are many \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EAirTag accessories\u003C\u002Fa\u003E to choose from. Here are a few others we've tested. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"6b759340-3792-44f1-a52e-2fda9ea25fef\" data-edition=\"us\" data-hed=\"Belkin Secure Holder with Wire Cable \" data-imagegroup=\"{"alt":"belkin-wire-airtag-holder","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","filename":"img-1428.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F03\u002F1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe\u002Fimg-1428.jpg","dateCreated":{"date":"2024-04-03 19:49:28","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","imageFilename":"img-1428.jpg","imageDateCreated":"2024\u002F04\u002F03"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FBelkin-Protective-Scratch-Resistance-Accessory\u002Fdp\u002FB09LCJFLXM\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"3779620b-f69a-4b91-bbc3-6fa5283a7b01\" data-edition=\"us\" data-hed=\"Pelican AirTag Sticker Mount\" data-imagegroup=\"{"alt":"pelican-sticker-mount-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","filename":"img-1459.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F09\u002F5ba80891-52a3-43c0-9dc9-392fc2cd7248\u002Fimg-1459.jpg","dateCreated":{"date":"2024-04-09 19:21:10","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","imageFilename":"img-1459.jpg","imageDateCreated":"2024\u002F04\u002F09"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fpelicanoutdoor.com\u002Fproducts\u002Fpelican-protector-airtag-sticker-mount-black\" data-offermerchant=\"Pelicanoutdoor\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"417c2c85-77f2-4fb6-a72e-620264724a80\" data-edition=\"us\" data-hed=\"Apple AirTag Loop\" data-imagegroup=\"{"alt":"apple-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Jason Hiner\u002FZDNET","imageData":{"id":"d0d9c538-3c10-4cd2-a7db-707034c02254","filename":"apple-airtag.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F09\u002F12\u002Fd0d9c538-3c10-4cd2-a7db-707034c02254\u002Fapple-airtag.jpg","dateCreated":{"date":"2023-09-12 03:32:34","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"d0d9c538-3c10-4cd2-a7db-707034c02254","imageFilename":"apple-airtag.jpg","imageDateCreated":"2023\u002F09\u002F12"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Jason Hiner\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-AirTag-Loop-Capri-Blue\u002Fdp\u002FB099C2472N?\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-21 16:48:14",timezone:"UTC",updated:c,published:c},description:"We tested the best Apple AirTag wallets and tracking accessories from Nomad, ESR, Ridge, and more to help you keep track of your cards and cash.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"a687cfd4-f602-4ae8-86bc-38672bfd5ad1",image:{id:"28b4587d-26d8-4c01-9af3-9c90ebd6be03",filename:"img-2035.jpg",dateCreated:{created:c,date:"2024-10-24 15:33:27",timezone:"UTC",updated:c,published:c},alt:"airtag-wallets",credits:"Kayla Solino\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F28b4587d-26d8-4c01-9af3-9c90ebd6be03\u002Fimg-2035.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:6000,height:4000,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Wearables",relatedItems:[]},name:b,promoTitle:"The best AirTag wallets you can buy: Expert tested",section:b,slug:"best-airtag-wallet",startYear:c,summary:b,title:"The best AirTag wallets of 2024: Expert tested",topic:{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0f170e27-b89d-48a1-aa1e-6d5c3594737e",slug:"work-life",name:"Work Life",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:c,description:c,filters:c,paging:c,slug:"dynamic-topic-five-story-feature-latest-offset-5",title:c,label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c},{id:"61aded77-4ad4-412f-850f-e183cdc51b1d",meta:{componentName:"61aded77-4ad4-412f-850f-e183cdc51b1d",componentDisplayName:c,componentType:"ContentList"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F61aded77-4ad4-412f-850f-e183cdc51b1d\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=61aded77-4ad4-412f-850f-e183cdc51b1d",meta:{pageNum:1,count:15}},prev:{href:c,meta:c},next:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F61aded77-4ad4-412f-850f-e183cdc51b1d\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=61aded77-4ad4-412f-850f-e183cdc51b1d&offset=15&limit=15",meta:{pageNum:2,count:15}},first:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F61aded77-4ad4-412f-850f-e183cdc51b1d\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=61aded77-4ad4-412f-850f-e183cdc51b1d&offset=0&limit=15",meta:{pageNum:1,count:15}},last:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Flisting\u002Fdynamic_listing\u002F61aded77-4ad4-412f-850f-e183cdc51b1d\u002Fweb?searchBy=id&topicSlug=security&componentType=ContentList&componentName=61aded77-4ad4-412f-850f-e183cdc51b1d&offset=56055&limit=15",meta:{pageNum:3738,count:10}}},items:[{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6835195a-fcd2-43b2-918b-8f61bcdb9fd2",filename:"lance-31.png",dateCreated:{created:c,date:"2023-05-12 19:35:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F05\u002F12\u002F6835195a-fcd2-43b2-918b-8f61bcdb9fd2\u002Flance-31.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"f002e24f-f493-443b-a2fd-5ff172a5d756\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Cape\" data-image-alt-text=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-filename=\"screenshot-2024-11-22-at-12-18-24pm.png\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-crop=\"2486x1397+0+0\" data-image-width=\"2693\" data-image-height=\"1397\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ECyberattacks that target mobile devices and services can impact anyone, but the risk is especially great against politicians, journalists, activists, and public figures. Now a relatively new mobile carrier promises extra special protection against mobile threats.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002F\"\u003ECape\u003C\u002Fa\u003E, a Washington, D.C.-based mobile provider, promotes its service as built with privacy and security at its core. Cape operates as an MVNO (Mobile Virtual Network Operator), which means it doesn't have its own mobile network but sells its branded wireless service using the network of another provider. For this, Cape partners with US Cellular.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fscam-yourself-attacks-just-increased-over-600-heres-what-to-look-for\u002F\"\u003E'Scam yourself' attacks just increased over 600% - here's what to look for\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, the company also uses its own software, allowing it to securely manage customer data. With security in mind, Cape said it's able to limit the collection of personal data and control how users authenticate their accounts. Further, it can manage such aspects as internet access, call routing, and data sharing. The goal is to better ward off security threats that impact a customer's mobile privacy.\u003C\u002Fp\u003E\u003Cp\u003ETouted as more robust than privacy apps, VPNs, and privacy-minded browsers, Cape's service looks for vulnerabilities at the cellular network level. As such, it offers the following security features:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELocation obfuscation – Here, customers can change the unique identifiers associated with their mobile phones to stop location tracking and profiling.\u003C\u002Fli\u003E\u003Cli\u003EAd identifier rotation – This feature prevents advertisers and data brokers from collecting information about a customer's app use and browser history.\u003C\u002Fli\u003E\u003Cli\u003EEnhanced signaling protection – Offering stronger protection than the typical firewall, this feature combats \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5g-networks-could-be-vulnerable-to-exploit-due-to-mishmash-of-old-technologies\u002F\"\u003Esignaling or SS7 attacks\u003C\u002Fa\u003E through which attackers can intercept calls and texts and track your location.\u003C\u002Fli\u003E\u003Cli\u003ESIM swap protection – This feature uses sophisticated cryptology to prevent unauthorized SIM transfers.\u003C\u002Fli\u003E\u003Cli\u003EData privacy commitment - Here, Cape asks for a minimal amount of information for subscribers to get service and promises to delete that data when no longer needed.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ELaunched earlier this year, Cape's service was available only to government users. Now the service is open to several different groups. These include:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EElected officials, high-level executives, and celebrities are at risk of location stalking and SIM swaps.\u003C\u002Fli\u003E\u003Cli\u003ELawyers, health care providers, and cybersecurity experts who work with confidential clients and sensitive information.\u003C\u002Fli\u003E\u003Cli\u003EJournalists and activists whose work can subject them to surveillance and location tracking.\u003C\u002Fli\u003E\u003Cli\u003EDomestic abuse survivors may be tracked by their abusers.\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EWith mobile threats a potential risk for anyone, Cape said it will launch a similar privacy-minded service for the general public early next year.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fnetworking\u002Fgenerative-ai-fuels-demand-for-better-mobile-connectivity-and-users-ready-to-pay-for-it\u002F\"\u003EGenerative AI fuels demand for better mobile connectivity - and users ready to pay for it\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAside from greater security, Cape offers \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcoverage\"\u003Epremium 4G\u002F5G cellular coverage\u003C\u002Fa\u003E and unlimited talk and text. For now, the service includes a pre-configured Android phone. However, starting in early 2025, subscribers will be able to bring their own up-to-date devices to the plan. Anyone interested in signing up with Cape can submit a form through the \u003Ca href=\"https:\u002F\u002Fwww.cape.co\u002Fcontact-us\"\u003Ecompany's contact page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"Most privacy solutions—like specialized apps or burner phones—focus primarily on app and device-level threats,\" Andy Makridis, former Chief Operations Officer of the CIA, said in a press release. \"Yet, some of the most serious vulnerabilities stem from network-level weaknesses. By addressing both device and network security, Cape offers a broader layer of protection against sophisticated threats.\"\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 20:57:00",timezone:"UTC",updated:c,published:c},description:"This mobile provider service was available only to government users but has since expanded. If you fall into these categories, you may be eligible today, but the service will expand to the general public soon, too.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ffcbc132-23b6-4b53-b3c7-12f838b209e4",image:{id:"f002e24f-f493-443b-a2fd-5ff172a5d756",filename:"screenshot-2024-11-22-at-12-18-24pm.png",dateCreated:{created:c,date:"2024-11-22 17:19:22",timezone:"UTC",updated:c,published:c},alt:"screenshot-2024-11-22-at-12-18-24pm.png",credits:"Cape",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002Ff002e24f-f493-443b-a2fd-5ff172a5d756\u002Fscreenshot-2024-11-22-at-12-18-24pm.png",cropGravity:o,crop:"2486x1397+0+0",typeName:"content_image",imageUrl:c,width:2693,height:1397,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Home & Office^Networking^Mobile Carriers",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"this-new-wireless-carrier-promises-ultra-secure-mobile-phone-service",startYear:c,summary:b,title:"This new wireless carrier promises ultra-secure mobile phone service",topic:{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"118e23fc-ec91-11e3-95d2-02911863765e",slug:"mobile-carriers",name:"Mobile Carriers",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"294e47d5-10d6-11e4-9732-00505685119a",username:"Ed Bott",profileUrl:c,email:c,firstName:"Ed",lastName:"Bott",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e98b0a76-a96a-4fbb-be02-00807405874e",filename:"ed-bott.jpg",dateCreated:{created:c,date:"2022-08-05 15:06:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fe98b0a76-a96a-4fbb-be02-00807405874e\u002Fed-bott.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Ed Bott is an award-winning technology writer with more than three decades' experience writing for mainstream media outlets and online publications. He has served as editor of the U.S. edition of PC Computing and managing editor of PC World; both publications had monthly paid circulation in excess of 1 million during his tenure. He is the author of more than 25 books, including Windows 10 Inside Out (now in its 4th edition) and Windows 11 Inside Out (2023).",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"62ea7721-b57a-4248-8845-0a9fca050277\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Vaishnav K Suresh \u002F 500px \u002F Getty Images\" data-image-alt-text=\"camera\" data-image-filename=\"gettyimages-1394240632.jpg\" data-image-date-created=\"2024\u002F11\u002F22\" data-image-width=\"4152\" data-image-height=\"2276\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter multiple delays, Microsoft has finally begun rolling out a preview of its controversial Recall feature for testing by members of the Windows Insider Program.\u003C\u002Fp\u003E\u003Cp\u003EThe feature, which promises a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwindows-new-recall-feature-lets-you-ask-ai-for-that-file-or-email-you-cant-find\u002F\"\u003E\"photographic memory\"\u003C\u002Fa\u003E for Windows 11 PCs, was originally announced as part of the rollout of the new AI-powered Copilot+ in June. After a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fafter-brutal-critiques-microsoft-recall-will-get-these-major-privacy-and-security-changes\u002F\"\u003Ebrutal firestorm of criticism from security experts\u003C\u002Fa\u003E, the company delayed the feature so that sweeping privacy changes could be implemented.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcan-your-old-pc-even-handle-the-windows-11-upgrade-heres-how-to-tell\u002F\"\u003ECan your old PC even handle the Windows 11 upgrade? How to tell\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat schedule change was followed by additional delays, with a rollout of the Recall preview pushed back to October. (For a detailed timeline, see \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fas-microsoft-breaks-awkward-silence-around-its-controversial-recall-feature-privacy-questions-remain\u002F\"\u003E\"As Microsoft breaks awkward silence around its controversial Recall feature, privacy questions remain.\"\u003C\u002Fa\u003E) As October ended, the launch was \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-delays-its-troubled-ai-powered-recall-feature-yet-again\u002F\"\u003Edelayed one more time\u003C\u002Fa\u003E, with the company citing the need for additional time to deliver \"a secure and trusted experience.\"\u003C\u002Fp\u003E\u003Cp\u003EToday's announcement comes in a \u003Ca href=\"https:\u002F\u002Fblogs.windows.com\u002Fwindows-insider\u002F2024\u002F11\u002F22\u002Fpreviewing-recall-with-click-to-do-on-copilot-pcs-with-windows-insiders-in-the-dev-channel\u002F\" target=\"_blank\"\u003Elengthy post on the Windows Insider Blog\u003C\u002Fa\u003E that includes details on how to sign up for the Insider program and how to use Recall. Pointedly, the announcement recognizes \"the contributions of researchers and the security community in shaping Recall.\" It also includes this detailed description of how the feature is implemented in the new Windows 11 preview:\u003C\u002Fp\u003E\u003Cblockquote\u003E\u003Cp\u003EInsiders and Recall users, we want you to know your snapshots are truly yours. We do not send your snapshots off your PC to Microsoft or third parties, and don't use them for training purposes. Microsoft can't access the keys to view your encrypted data, so we can't restore your snapshots if you remove Windows Hello or restore your snapshots if you need to reset your PC or move to a new PC. We will in future updates provide ways for you to store a backup of your keys for these cases. For now, your Copilot + PC only releases the keys to use Recall if you show your face, fingerprint, or PIN.\u003C\u002Fp\u003E\u003C\u002Fblockquote\u003E\u003Cp\u003EIn this release, Microsoft says, it programmed Recall to detect \"sensitive information like credit card details, passwords, and personal identification numbers\" and block snapshots containing that information from being saved or stored. Testers can exclude specific apps and sites from being saved under any circumstances, and an option in Settings, which is off by default, allows testers to anonymously share details of apps and sites they prefer to be excluded from Recall.\u003C\u002Fp\u003E\u003Cp\u003EThe Recall feature is included in Preview Build 26120.2415 (KB5046723), which is rolling out to users who are signed up for the Windows Insider Dev Channel.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-upgrade-an-incompatible-windows-10-pc-to-windows-11-two-ways\u002F\"\u003EHow to upgrade an 'incompatible' Windows 10 PC to Windows 11: Two ways\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EFor now, the feature is only available on Snapdragon-powered Copilot+ PCs; support for Copilot+ PCs based on AMD and Intel processors will be available later, Microsoft says. For this preview, the only supported languages are Chinese (simplified), English, French, German, Japanese, and Spanish.\u003C\u002Fp\u003E\u003Cp\u003EOn PCs running Windows 11 Enterprise edition and on PCs managed by an IT administrator on work and school networks, the Recall feature will be removed by default. On those managed networks, employees who have enrolled in Windows Hello using biometric authentication can opt into the Recall feature. Administrators can block use of Recall completely or can \u003Ca href=\"https:\u002F\u002Flearn.microsoft.com\u002Fen-us\u002Fwindows\u002Fclient-management\u002Fmanage-recall\"\u003Euse management tools\u003C\u002Fa\u003E to prevent saving snapshots from specific apps and websites. On managed networks, enterprises cannot access Recall data saved by an employee.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn this build, Recall also includes the Click to Do feature, which adds AI-powered automated actions to text and images. The feature offers the ability to search, save, and edit text with a preferred app and to manipulate images using AI tools in the Photos and Paint apps.\u003C\u002Fp\u003E\u003Cp\u003EThe blog post includes a lengthy list of known issues that testers are likely to encounter. The feature requires Secure Boot to be enabled, for example, and Microsoft recommends updating Microsoft 365 apps to the latest version before using Recall. Some users might experience lengthy delays in saving screenshots or a spurious error message; either issue can be resolved with a reboot.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fmicrosoft-to-tighten-windows-security-dramatically-in-2025-heres-how\u002F\"\u003EMicrosoft to tighten Windows security dramatically in 2025 - here's how\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ERecall can be enabled or disabled using the \"Turn Windows features on or off\" dialog; in this build, disabling the feature caches the binaries that control the feature. In a future update, Microsoft says, it will completely remove the feature when the option to turn it off is selected.\u003C\u002Fp\u003E\u003Cp\u003EGiven the rocky nature of the initial announcement, Microsoft executives are likely holding their breath awaiting reactions from testers and the security community. That feedback will no doubt dictate the eventual release schedule, sometime in 2025.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 18:00:00",timezone:"UTC",updated:c,published:c},description:"What was supposed to be a signature feature of the AI-powered Copilot+ PCs for Windows 11 was delayed after a firestorm of privacy and security complaints. But it's ready for testing now, if you have the right hardware.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"43e632dd-f122-4040-bee2-f4d470f6c50c",image:{id:"62ea7721-b57a-4248-8845-0a9fca050277",filename:"gettyimages-1394240632.jpg",dateCreated:{created:c,date:"2024-11-22 17:42:31",timezone:"UTC",updated:c,published:c},alt:"camera",credits:"Vaishnav K Suresh \u002F 500px \u002F Getty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F22\u002F62ea7721-b57a-4248-8845-0a9fca050277\u002Fgettyimages-1394240632.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4152,height:2276,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Tech^Services & Software^Operating Systems^Windows^Windows 11",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"you-can-finally-test-microsofts-controversial-recall-feature-heres-how",startYear:c,summary:b,title:"You can finally test Microsoft's controversial Recall feature - here's how",topic:{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"41040cf0-0abb-4cd0-aad1-1cb0e38b334c",slug:"windows-11",name:"Windows 11",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"10c1d40e-ec91-11e3-95d2-02911863765e",slug:"microsoft",name:"Microsoft",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003ENow that the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fiphone-16-pro-max-buying-advice-2024\u002F\" target=\"_blank\"\u003EiPhone 16\u003C\u002Fa\u003E has arrived with new colors, AI features, and camera controls -- and with it, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F6-ios-18-settings-i-changed-immediately-and-why-you-should-too\u002F\" target=\"_blank\"\u003EiOS 18\u003C\u002Fa\u003E -- you may be looking for a new way to improve your online privacy. While all Apple \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone\u002F\" target=\"_blank\"\u003EiPhone\u003C\u002Fa\u003E models and generations tend to have excellent connectivity, we always recommend using a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-why-do-you-need-one-all-your-virtual-private-network-questions-answered\u002F\" target=\"_blank\"\u003Evirtual private network (VPN) service\u003C\u002Fa\u003E to keep your data and browsing safe while on the go.\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003ETrustworthy VPNs\u003C\u002Fa\u003E encrypt your online traffic when you access email, social media, and online services. If you have to rely on public Wi-Fi hotspots, they are excellent tools for protecting your data from eavesdroppers, and if you're looking to \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-streaming-vpn\u002F\" target=\"_blank\"\u003Estream content\u003C\u002Fa\u003E that isn't available in your area, a VPN can potentially unlock access to different streaming libraries. \u003C\u002Fp\u003E\u003Cp\u003EWe've \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F#link={\" target=\"_blank\"\u003Etested every top VPN on the market\u003C\u002Fa\u003E and found the best ones that offer solid iPhone and Apple ecosystem apps, robust security, and rapid speeds. If you're keen to sign up for a VPN service, now is an excellent time to do so, considering the heavy discounts and promotions available as we reach Black Friday.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best travel VPNs\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best iPhone VPN right now?\u003C\u002Fh2\u003E\u003Cp\u003EBased on our extensive testing, our pick for the best VPN for iPhone is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f22bd1ec-2ba7-4c0c-8139-0a372b32dfc0\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-monetized-url=\"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. While it is not the cheapest service, NordVPN is known for its rapid speeds, solid connectivity, and massive server network. Furthermore, the NordVPN iOS app is user-friendly and won't noticeably drain your phone's battery with continual use. \u003C\u002Fp\u003E\u003Cp\u003EIf you want to find out what the best VPNs for iPhone are in 2024, check out our recommendations below.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN for iOS in 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"01a386d9-8298-49dc-b810-abdc13738b80\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordVPN is one of the more popular VPN offerings in the App Store, and for good reason. \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-does-nordvpn-work-plus-how-to-set-it-up-and-use-it-tutorial\u002F" target="_blank"\u003EInstalling NordVPN\u003C\u002Fa\u003E&nbsp;on an iPhone is a simple, painless way to secure predictable performance across regions, and the service is compatible with iOS \u003Ca href="https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fnordvpn-ios-release-notes\u002F?srsltid=AfmBOooLz0K2c1gbD1Kh6356NSzMQPekth5ctCHhXog2H4POqXRaMM1Z" target="_blank"\u003E14.2 or later\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ENordVPN's interface is user-friendly, and we found the service offers consistent, rapid, and reliable speeds that do not impact streaming services or make a noticeable difference to internet surfing.\u003C\u002Fp\u003E\u003Cp\u003EWe consider this VPN to be one of the best available, combining speed, server availability in 111 countries, reliability, and 10 simultaneous connections (although we would prefer if there was no limit).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt has many tools in addition to a standard VPN service. NordVPN's Onion over VPN is a special category of NordVPN servers that enables Tor capabilities, supports peer-to-peer file sharing, and allows you to connect through a second server for an added layer of protection. You can also set up a dedicated IP address for an additional fee.\u003C\u002Fp\u003E\u003Cp\u003EWe've tested NordVPN for years and have always been impressed with its stable connectivity and speeds. Customers generally report fast speeds and minimal buffering with easy setup, although some caution that you should turn off auto-renewal.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnord-vpn-review-an-in-depth-look-at-a-popular-vpn\u002F" target="_blank"\u003E\u003Cstrong\u003ENordVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn addition to iOS, NordVPN runs on all the most popular platforms. Prices start from $3.59 per month on a two-year standard plan, with three months of free access. Yearly plans begin at $4.59 per month. If you only want to try out NordVPN for a month, prices begin at $12.99 per month.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordVPN offers additional cybersecurity options through its premium plans, including identity theft and cyber extortion coverage.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ENordVPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003E10 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, and routers |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;111 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Email address and billing information only | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on&nbsp;Android&nbsp;|&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Best iPhone VPN overall\" data-imagegroup=\"{"alt":"NordVPN","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"1eead599-77e0-4877-bff5-ca101ca11758","title":"Nord VPN Mobile","filename":"nord-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F1eead599-77e0-4877-bff5-ca101ca11758\u002Fnord-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1301632,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Nord VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1eead599-77e0-4877-bff5-ca101ca11758","imageAltText":"NordVPN","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nord-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"1983353e-c060-44fd-a952-63449fbabf57","slug":"nordvpn","label":"NordVPN","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":128,"imgHeight":128,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":128,\\"mediaType\\":\\"stock\\",\\"height\\":128,\\"id\\":\\"466f589d-2ec6-44cb-a17a-8a1eb169b55a\\",\\"filename\\":\\"nordvpn.jpg\\",\\"dateCreated\\":{\\"date\\":\\"2020-01-18 00:01:12\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1579305.672},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"1983353e-c060-44fd-a952-63449fbabf57","name":"NordVPN","slug":"nordvpn","productType":"SERIES","updateType":"PRISM","mod":1729500496740,"displayDate":"Mon Oct 21 2024 04:48:16 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?offer_id=378&aff_id=307&source=zdnet&aff_sub=[subid_value]&aff_sub2=bestvpniphonepad22","url":""}]\" data-usepricing=\"true\" data-like=\"~ Simple, straightforward app installation ~Excellent speeds ~Great for streaming ~ Solid performance\" data-dislike=\"~No unlimited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"90bec58e-6dba-4667-8dfc-a2554c9d729b\" data-edition=\"us\" data-description=\"\u003Cp\u003ESurfshark is an affordable and reliable VPN service. When we reviewed it, we found fast connection times and no information leaks, and luckily, the company doesn't skimp on security. It offers AES-256-GCM, RSA-2048, and Perfect Forward Secrecy encryption.\u003C\u002Fp\u003E\u003Cp\u003ESurfshark supports devices running iOS 14.0 or higher. This VPN has many features, including ad and tracker blocking, a data breach scanner, and multi-hop connections. This VPN is excellent for iPhone users because of its user-friendliness, uncomplicated and quick connection process, and affordable price point.\u003C\u002Fp\u003E\u003Cp\u003EIf you want to use the Bypasser tool (Surfshark's \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-vpn-split-tunneling\u002F" target="_blank"\u003Esplit tunneling\u003C\u002Fa\u003E feature), it used to be the case that you had to use the Windows or Android app. Since October, however, this feature is also&nbsp;\u003Ca href="https:\u002F\u002Fsurfshark.com\u002Fblog\u002Fsurfshark-launches-bypasser-on-ios" target="_blank"\u003Eavailable\u003C\u002Fa\u003E for iOS.\u003C\u002Fp\u003E\u003Cp\u003EDuring testing, we've enjoyed using Surfshark as a "one size fits all" VPN solution. Sometimes, the speeds aren't the best while streaming, and it can take a moment or two to connect to your preferred server, but this VPN is still excellent value for money.\u003C\u002Fp\u003E\u003Cp\u003EWe also like the "pause" function, which allows you to resume your regular (unprotected) connection for five minutes, 30 minutes, or a few hours, which may come in handy if you need to quickly access specific services. Customers say that speeds are relatively fast and streaming works most of the time, although some have experienced issues with a handful of popular content services.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fsurfshark-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003ESurfshark VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ESurfshark has excellent deals to consider on the run-up to Black Friday: $1.99 per month on a two-year plan or $2.99 per month on an annual plan. The VPN provider has also thrown in four months of free access on 12-month and 24-month plans.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ESurfshark VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESurfshark VPN specifications:&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003EUnlimited&nbsp;| Ad-blocker | Two-factor authentication |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;No-logs policy |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 100 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, Linux, iOS, Android, Fire TV, Chrome, Firefox, Edge, tvOS, routers |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android, iOS, and macOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.8\u003C\u002Fp\u003E\" data-hed=\"Surfshark VPN\" data-superlative=\"Best budget iPhone VPN\" data-imagegroup=\"{"alt":"surfshark","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","title":"Surfshark VPN Mobile","filename":"surfshark-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1118835,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Surfshark VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","imageAltText":"surfshark","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"5b46a203-2264-4546-adc2-846bfa92ab9c","slug":"surfshark-vpn","label":"Surfshark VPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"5b46a203-2264-4546-adc2-846bfa92ab9c","name":"Surfshark VPN","slug":"surfshark-vpn","productType":"SERIES","updateType":"PRISM","mod":1729500695659,"displayDate":"Mon Oct 21 2024 04:51:35 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?offer_id=50&aff_id=1511&source=ZDNET&aff_sub=subid_value","url":""}]\" data-usepricing=\"true\" data-like=\"~ Unlimited simultaneous connections ~ Value for money ~ Beginner friendly ~ Consistently low pricing\" data-dislike=\"~ Slower server connection times\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f8ec62af-a801-41ff-92f7-6e134ff5962e\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN app supports iOS 15.0 and up. In addition to iOS, it supports all major platforms. There are browser extensions for Edge, \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-chrome-vpn\u002F" target="_blank"\u003EChrome\u003C\u002Fa\u003E, and Firefox, and a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-gaming-vpn\u002F" target="_blank"\u003EVPN service for gaming\u003C\u002Fa\u003E is also available.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN has servers located in 105 countries and ranks among the fastest VPNs, so it shouldn't reduce your connection speeds as much as the average VPN.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EExpressVPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN doesn't maintain browsing history logs, but it does keep track of some information, such as the dates you connect and the location of the VPN server you connect to. The details of what is and isn't logged are&nbsp;\u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002Fwhat-is-vpn\u002Fpolicy-towards-logs"\u003Estated in ExpressVPN's privacy policy\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EWe've used ExpressVPN for years and found it an extremely fast, reliable service with a great server network. We also like ExpressVPN's server speed test function, which allows you to scan and measure speeds for each server (found under Window &gt; Open speed test). This feature is useful for streaming or gaming.\u003C\u002Fp\u003E\u003Cp\u003EMany customer reviews are positive, but the pricing model and renewal hikes aren't popular.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is offering a deal ahead of Black Friday. Signing up for a two-year plan will cost you $4.99 per month (lower than the typical $6.67 price tag), plus you will get six months of free access.\u003C\u002Fp\u003E\u003Cp\u003EThe iPhone app comes with a seven-day free trial.\u003C\u002Fp\u003E\u003Cp\u003EOverall, if you're looking for a set-and-forget VPN with decent speeds and user-friendliness, ExpressVPN is a top pick -- although each plan is limited to eight simultaneous devices, something we would like to see change to unlimited, considering its price point.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E8&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Chrome, Firefox, Edge, Linux, Fire TV, Android TV, tvOS, and routers&nbsp;|&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;105&nbsp;|&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No browsing logs, some connection logs |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.7\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN\" data-superlative=\"Best iPhone VPN for speed and usability\" data-imagegroup=\"{"alt":"expressvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","title":"ExpressVPN mobile","filename":"expressvpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F7cf8be39-6942-4f62-832e-2cb7da94eb8f\u002Fexpressvpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1289494,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ExpressVPN mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7cf8be39-6942-4f62-832e-2cb7da94eb8f","imageAltText":"expressvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","slug":"expressvpn","label":"ExpressVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"01fe21a2-5117-4442-b7f5-0dc3173fb3ff","name":"ExpressVPN","slug":"expressvpn","productType":"SERIES","updateType":"PRISM","mod":1729500792004,"displayDate":"Mon Oct 21 2024 04:53:12 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"Expressvpn","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002Fgo\u002Fcnet","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Works on an exceptionally large number of platforms outside of iOS ~ Consistent performance ~ Easy setup ~ Extensive server network ~ Excellent speeds\" data-dislike=\"~ More expensive than competitors ~ Limited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eed59da4-2eea-4b3b-84c0-892da176638e\" data-edition=\"us\" data-description=\"\u003Cp\u003EIPVanish has depth and plenty of configuration settings for those who want to control almost every aspect of their VPN connection.\u003C\u002Fp\u003E\u003Cp\u003EWhile it's not the most stylish VPN with the best user interface, IPVanish VPN has many protocols, so you'll always know what to expect regardless of what you're connecting to. The app has an abundance of configuration options, and there's now an extensive range of server selection options.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fipvanish-review-a-rich-wealth-of-options-and-surfing-controls\u002F" target="_blank"\u003E\u003Cstrong\u003EIPVanish VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe found IPVanish to be reasonably fast and also quick to connect. IPVanish's data transfers are secure, and it's well-regarded as a secure service. Customers report they are happy with IPVanish's customer service and the overall speed and reliability of the VPN. The service is also independently security-audited.\u003C\u002Fp\u003E\u003Cp\u003EIPVanish is an excellent option for iOS and \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-mac-vpn\u002F" target="_blank"\u003EMac devices\u003C\u002Fa\u003E. You can sign up for a two-year plan for $2.19 per month or a yearly subscription for $3.33 per month. Alternatively, if you don't want to sign up for the long haul, you can pay $12.99 for a month of access. IPVanish supports iOS 14 and up.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003ENote: IPVanish is owned by Ziff Davis, ZDNET's parent company. For more, see our&nbsp;\u003C\u002Fem\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Feditorial-guidelines\u002F" target="_blank"\u003E\u003Cem\u003EEditorial Guidelines\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003EIPVanish VPN features:&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Unlimited |&nbsp;\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, Kodi, and routers | \u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: None, except billing data |&nbsp;\u003Cstrong\u003ELocations\u003C\u002Fstrong\u003E: 130 (103 countries) |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days | \u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS&nbsp;| \u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.5\u003C\u002Fp\u003E\" data-hed=\"IPVanish VPN\" data-superlative=\"Best configurable VPN for iPhone\" data-imagegroup=\"{"alt":"ipvanish","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","title":"IPVanish Mobile","filename":"ipvanish-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fc74b6025-02da-4c4c-9fab-af9e71d53ba8\u002Fipvanish-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1239747,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"IPVanish Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"c74b6025-02da-4c4c-9fab-af9e71d53ba8","imageAltText":"ipvanish","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ipvanish-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"82c4806f-a79c-46a0-be8c-008488fb0403","slug":"ipvanish","label":"IPVanish","edition":["US","ES"],"imageId":"{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}","imgWidth":350,"imgHeight":350,"objectType":"content_product_series","typeLabel":"Series","imgUrl":"\u002Fcontent\u002Fimage\u002Fredirect\u002F{\\"sType\\":\\"catdev\\",\\"width\\":350,\\"mediaType\\":\\"stock\\",\\"height\\":350,\\"id\\":\\"c418952f-0f42-4cb4-b083-b54342d49708\\",\\"filename\\":\\"logo-full.png\\",\\"dateCreated\\":{\\"date\\":\\"2020-02-04 00:16:01\\",\\"timezone_type\\":3,\\"timezone\\":\\"UTC\\",\\"secondsSinceEpoch\\":1580775.361},\\"typeName\\":\\"content_image\\",\\"overrideBaseUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img\\",\\"overrideFastlyUrl\\":\\"https:_slash__slash_www.cnet.com_slash_a_slash_img_slash_resize_slash_\\",\\"overrideFastlyBucket\\":\\"hub\\"}\u002Fresize\u002F75x56","icon":""}\" data-techobjectinfo=\"{"uuid":"82c4806f-a79c-46a0-be8c-008488fb0403","name":"IPVanish","slug":"ipvanish","productType":"SERIES","updateType":"PRISM","mod":1729500824180,"displayDate":"Mon Oct 21 2024 04:53:44 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value","offerMerchant":"IPVanish","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ipvanish.com\u002Fexclusive","url":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Unlimited connections ~ Highly configurable app ~ Affordable ~Recently expanded server network\" data-dislike=\"~ Bland user interface ~ Few additional privacy features\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e720cee1-20da-4a1e-ab61-34a48490c7d9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn general, we recommend you avoid \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F" target="_blank"\u003Efree VPNs\u003C\u002Fa\u003E. A free VPN service could even make money selling your data, which defeats the purpose of using a VPN to protect your identity, activities, and other information.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fproton-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EProton VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe only situation where using a free VPN may not come with security concerns is when it's a free version of a reputable paid service, as is the case with Proton VPN. While limited to servers in five countries, you know the plan is supported by paid subscribers, and your data is safe. You won't be bombarded with ads, either.\u003C\u002Fp\u003E\u003Cp\u003EProton is a Swiss company and adheres to Switzerland's privacy laws. The team behind the VPN also develops the encrypted email service Proton Mail. Proton VPN provides a kill switch, various encryption protocols to choose from, and the benefit of an open-source approach, which allows for transparent third-party auditing.\u003C\u002Fp\u003E\u003Cp\u003EDespite poor Trustpilot reviews (many linked to the free plan restrictions), many users report a positive experience with this VPN provider, noting its ease of use, low CAPTCHA block rates on websites, and stable connectivity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you are interested in adopting the paid version of Proton VPN, you can sign up for a 24-month VPN plan at $4.49 per month, a 12-month subscription at $4.99, or a one-month agreement at $9.99. Note that Proton VPN requires iOS 15.0 or later.\u003C\u002Fp\u003E\u003Cp\u003EProtonVPN is a Swiss company, but you can make payments in US dollars.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton VPN features:&nbsp;\u003C\u002Fstrong\u003EOpen-source |&nbsp;\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: One to 10, depending on the plan |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 112 |&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No-logs policy | Security audits |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, Kodi, and routers | VPN accelerator |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Free option |&nbsp;\u003Cstrong\u003EApple App Store rating:&nbsp;\u003C\u002Fstrong\u003E4.6\u003C\u002Fp\u003E\" data-hed=\"Proton VPN\" data-superlative=\"Best free VPN for iPhone\" data-imagegroup=\"{"alt":"proton vpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","title":"ProtonVPN Mobile","filename":"proton-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1\u002Fproton-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1357859,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"ProtonVPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba4844ba-6dc7-4e9e-ab04-2e4e8ae864a1","imageAltText":"proton vpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"proton-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-offer=\"{"id":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","slug":"protonvpn","label":"ProtonVPN","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fc14048a-08f3-483d-b7fe-6a3f9fb895ba","name":"ProtonVPN","slug":"protonvpn","productType":"SERIES","updateType":"PRISM","mod":1729500873567,"displayDate":"Mon Oct 21 2024 04:54:33 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value","offerMerchant":"Proton VPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprotonvpn.com\u002F","url":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Solid iOS app ~ Top-tier security features ~ Open source\" data-dislike=\"~ Just one connection allowed on the free plan ~ Limited free country servers\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EBest VPN for iPhone\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EApple App Store rating\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$3.59+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$1.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$6.67+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.7\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 8\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.19+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.5\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUnlimited\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree with limited services or $4.49 per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4.6\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E1 or up to 10\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*Lowest price at the time of writing. Please note that prices may vary based on retailer and available promotions, sales, or discounts.\u003C\u002Fp\u003E\" data-hed=\"VPNs for iPhones, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhy do I need an iPhone VPN? \u003C\u002Fh3\u003E\u003Cp\u003EOur mobile devices are the keys to many aspects of our lives. Communication, payments, accessing local government services, and even as a way to entertain ourselves with content and games: our iPhones must be protected, and with them, our data. \u003C\u002Fp\u003E\u003Cp\u003EA VPN encrypts your online traffic and protects your information. If you must use a public Wi-Fi hotspot or an unknown Wi-Fi connection, a VPN can help shield you from eavesdropping and other cyberthreats. Security aside, you may also want to use a VPN to access streaming services and geo-locked content while you're on the road. \u003C\u002Fp\u003E\u003Ch3\u003ECan I trust iPhone VPN services?\u003C\u002Fh3\u003E\u003Cp\u003EAs long as you choose a reputable VPN provider that provides a compatible iOS app, it will be safe to use. Steer clear of free VPN services with little to no customer feedback, as they may be malicious and steal your data.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EChoose this VPN for iPhone...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe best iPhone VPN overall. NordVPN is a solid, feature-rich VPN. NordVPN's speeds and server network are impressive, but the price point for this reliable, secure VPN on shorter plans might be off-putting for some.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ESurfshark VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA top VPN that can just about do it all, and for an affordable price. Surfshark performs well in speed tests, earns solid customer reviews, and has an easy-to-use iOS mobile interface.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe speediest VPN for iOS. We've found that ExpressVPN connections are reliable almost all the time. The mobile version of the VPN is simple, user-friendly, and comes packed with different server options. You can also take advantage of a seven-day free iOS trial.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EIPVanish VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA highly flexible VPN. IPVanish offers a range of security and connectivity settings for you to choose from, although if you want to take full advantage of different protocols, you will want some technical knowledge.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free VPN. This Swiss VPN provider takes security seriously, and while the free version is restricted, it is still an excellent choice -- but the paid option removes all limits.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the right iPhone VPN for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d93d76dc-b425-4238-b712-7785b7d5a725\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen selecting your new iPhone VPN, consider the following factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: Try to take advantage of promotions, but ignore countdown timers -- they typically are just marketing tools. While top-notch VPNs can cost upwards of $10 per month, many are available for only a few dollars.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: If you're paying for a VPN for your iPhone or iPad, you might still want to use it across multiple devices, such as a desktop PC or laptop. We recommend you sign up for a plan with support for at least four to six devices, although preferably one with unlimited simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E: You must also decide how long you want to use the VPN. A two-year term tends to secure the best prices, but monthly, six-month, and one-year options are often also available. After you've made a selection, you typically have a 30-day money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EApps\u003C\u002Fstrong\u003E: When selecting a VPN, try it out first to ensure you like its accompanying iOS app. Some VPNs, for example, have great desktop software but need further development of their mobile apps, which may not be as intuitive or easy to use.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility\u003C\u002Fstrong\u003E: iOS 18, released on September 16, 2024, is the latest version of the iPhone operating system. Many VPN provides will provide compatible apps going back generations, but if you have an older device, check before signing up.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrials\u003C\u002Fstrong\u003E: Many VPN providers will give users a free seven-day iOS trial, so consider trying a few out before you commit to a purchase.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN for iPhone\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a4dc919e-a70d-4b8a-86e5-27bd9cbd6c09\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany providers recommended in this list have been subject to in-depth testing and reviews by members of our team. We've been talking about other VPNs for years, spoken with their management and their users, and developed a generally favorable impression.\u003C\u002Fp\u003E\u003Cp\u003EZDNET tests VPN services from multiple locations, but we can't test from all locations. Every home, every community, every local ISP, and every nation has a different infrastructure. It's essential that once you choose, you test for all your likely usage profiles and only then make the decision to keep the service or request a money-back guaranteed refund, which all these VPNs have.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you experience traffic slowdowns, check your VPN and the Wi-Fi connection between your device and your router or access point. Sometimes, connectivity issues begin at the source, and in other cases, switching your selected VPN server may be enough to resolve speed problems or connectivity drops.\u003C\u002Fp\u003E\u003Cp\u003EWe analyzed the best VPNs for iPhones below using the following criteria:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPerformance:\u003C\u002Fstrong\u003E&nbsp;Our top VPNs must have a minimum level of performance. After all, there's no point in using a VPN while streaming if your connection continually drops or lags.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Many VPNs limit how many devices you can connect to a service at the same time. If you have a phone, tablet, laptop, desktop, and possibly even a smart TV you want to connect to a VPN, you'd need a service that allows at least six simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: There's no point in using a VPN unless its security protocols and encryption levels are up to scratch. We also ensured the development team behind each recommended VPN cares about making security improvements and patching reported bugs.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: A kill switch prevents you from having an unprotected connection. It is an important feature for a VPN to have, as it protects by preventing a return to a default Wi-Fi connection should your internet connection unexpectedly drop.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGeo-blocks and streaming\u003C\u002Fstrong\u003E: We know VPNs can be key to accessing local content and services while you're away from home. We ensured that our top recommendations performed well in these scenarios and are unlikely to slow down your connection while streaming.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: What systems and devices can you run the VPN on? Our iPhone VPN recommendations, naturally, have to run easy-to-use and intuitive mobile apps.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECountries &amp; servers\u003C\u002Fstrong\u003E: In how many different countries does the VPN have servers? This can include physical and virtual servers, and whether there are enough -- at least 50 or so -- to provide variety.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETrial length and price\u003C\u002Fstrong\u003E: Each VPN we recommend has a solid money-back guarantee.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems with installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECheck out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E&nbsp;for a more extensive breakdown.\u003C\u002Fp\u003E\" data-hed=\"How we test VPNs\" data-imagegroup=\"{"alt":"protonvpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Charlie Osborne\u002FZDNET","imageData":{"id":"6fcf975d-b442-4596-826e-6b44b6ba1be1","title":"protonvpn","filename":"protonvpn.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F27\u002F6fcf975d-b442-4596-826e-6b44b6ba1be1\u002Fprotonvpn.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":134307,"width":1296,"height":720,"dateCreated":{"date":"2024-03-27 11:15:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-27 11:15:51","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"protonvpn","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6fcf975d-b442-4596-826e-6b44b6ba1be1","imageAltText":"protonvpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Charlie Osborne\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"protonvpn.jpg","imageDateCreated":"2024\u002F03\u002F27","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Charlie Osborne\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EVPNs for iPhone FAQs \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a5b8295b-2909-49bd-824b-ac31a083f04d\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN shouldn't be very resource-intensive, and so should not slow down your iPhone, but you may notice a slowdown in internet speeds as your requests go through your VPN's server network. Depending on the strength and base speed of your internet connection, streaming and gaming may be impacted.\u003Cbr\u003E \u003C\u002Fp\u003E\" data-hed=\"Does a VPN slow down your iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"58bc26b7-13f3-436d-83b1-4f592c958f55\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple iPhones do not have an built-in VPN, although you can install one using a mobile device management (MDM) solution. iOS does, however, support VPN use and many VPN providers have developed iOS-native mobile applications.\u003C\u002Fp\u003E\" data-hed=\"Do new iOS devices come with a built-in VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65682da0-2b6f-4fae-9c26-7e787c7ea362\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe latest version of iOS is iOS 18, released on September 16. It is likely that your VPN will remain compatible, as vendors will update their software as necessary. If you have an older iPhone, you may find that support for legacy iOS versions -- such as iOS 14 -- are phased out over time. Many VPN apps are now only compatible with iOS 15.0 and above.\u003C\u002Fp\u003E\" data-hed=\"Will my VPN work with the latest version of iOS?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"63af5e0b-9b0a-4246-87b2-30b076478bf2\" data-edition=\"us\" data-description=\"\u003Cp\u003ESetting up a VPN on your iPhone is fairly simple. Download one of the apps above from Apple's App Store. Once you've created a login and started your subscription, you are ready to connect securely.\u003C\u002Fp\u003E\u003Cp\u003EDo not download any apps from untrusted sources. Mobile device management (MDM) solutions using VPNs can be configured in&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-gb\u002Fguide\u002Fdeployment\u002Fdep2d2adb35d\u002Fweb" target="_blank"\u003EiOS settings\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How do I set up a VPN on my iPhone?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fd546ecd-fd41-43ee-a26f-7e854f4c4773\" data-edition=\"us\" data-description=\"\u003Cp\u003EPerhaps. That depends on how much you trust your carrier. You're better off encrypting your data when it's in motion, whether you use Wi-Fi or a carrier connection. Overall, it's still recommended to use a VPN no matter the type of internet access you use.\u003C\u002Fp\u003E\" data-hed=\"Do I need a VPN if I just use my carrier's data?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8f1ff395-8876-44fc-814e-9ceddf7c2912\" data-edition=\"us\" data-description=\"\u003Cp\u003EApple&nbsp;\u003Ca href="https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002FHT212614" target="_blank"\u003EiCloud+ Private Relay\u003C\u002Fa\u003E&nbsp;is a feature of iCloud+. If you buy any iCloud storage, you'll get the iCloud+ features. While Private Relay can hide your email address and location, it only does it when you're using Safari. If you're using Chrome (or any applications that use the internet directly), you're out of luck. The service is also not available in all countries.\u003C\u002Fp\u003E\u003Cp\u003EIt also shows up as a proxy server. You also can't change or hide your location, as you can with a full VPN. Private Relay is a feature of iCloud+. A VPN is a full security solution.\u003C\u002Fp\u003E\" data-hed=\"Isn't iCloud+ Private Relay a VPN? Why do I need another VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f479d3f-01de-40b0-8ef9-b7ae5a6d4e76\" data-edition=\"us\" data-description=\"\u003Cp\u003EAll software, regardless of whether they are VPNs or not, require computing resources to function. In turn, performing functions on a device -- a PC, smartphone, tablet, or otherwise -- needs power. So yes, a VPN will use your iPhone's battery, but it shouldn't be too noticeable.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf your smartphone is unexpectedly drained of battery, behaving suspiciously, or is hot to the touch, something might be going wrong. For example, there may be a malware infection or hardware problems.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best antivirus software and apps you can buy\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Do iPhone VPNs drain your battery?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3e0ef716-3019-4a65-9b8e-7506f690f7fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes. We recommend that you do so to prevent any unexpected data leaks or inadvertent exposure -- such as if you forget to enable your VPN when you log in to your local coffee shop's public Wi-Fi. At the least, ensure that you always use a VPN if you have to use a public Wi-Fi hotspot or access sensitive online services, such as banking.\u003C\u002Fp\u003E\" data-hed=\"Should I leave my iPhone VPN on all of the time?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"39db85d5-6c7d-4d8e-8fb7-7877c5bca7b2\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are many free VPNs available for mobile devices, including those in Apple's ecosystem. That said, nothing in life is truly free, and you will likely be handing over your data in return for the service. They may also not be trustworthy, may be ad-supported, and may track your online activities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThose that are free but from trustworthy companies are few and far between. ProtonVPN and Windscribe's free VPN options are among those we support, although they are limited.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are there any free iPhone VPNs?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"54e1e8f0-96b8-4c06-8b8f-fa6b97f1ace1\" data-edition=\"us\" data-description=\"\u003Cp\u003EVPNs are important for establishing secure connections when abroad. Whether you're working from another country or you simply want to stream your favorite TV show, we compiled a list of the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-travel-vpn\u002F" target="_blank"\u003Ebest VPNs for travel\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN for travel?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4fde46f5-b12b-458f-b7cb-0677fd55431a\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou might want a VPN that works best with the iOS ecosystem or another operating system. If you're on the hunt for other trustworthy options, we've also created a guide to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003Ebest VPN services of 2024\u003C\u002Fa\u003E&nbsp;with an explainer on free VPNs, and whether they're worth it.\u003C\u002Fp\u003E\" data-hed=\"What is the best VPN overall for different operating systems?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"73585072-ed9d-4142-9580-b11eed88283b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAside from our recommendations for the best VPNs for iPhone and iPad, other VPN services on the market can also perform well and provide the security and privacy you need. Here are a few alternative options that are secure and reputable:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fcyberghost-vpn-review\u002F" target="_blank"\u003ECyberGhost VPN review\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Are there alternative iPhone VPNs worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3726146f-c9f2-463f-a3cd-e4bf0d5bcc58\" data-edition=\"us\" data-description=\"\u003Cp\u003EA budget-friendly iOS long-term VPN option is Private Internet Access. For $2.03 per month, PIA provides a secure and private service with four months of access thrown in for free.\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-imagegroup=\"{"alt":"Private Internet Access","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"87626edc-7682-4b14-9655-b980eed70a19","title":"Private Internet Access VPN Mobile","filename":"private-internet-access-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F87626edc-7682-4b14-9655-b980eed70a19\u002Fprivate-internet-access-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1161293,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Private Internet Access VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"87626edc-7682-4b14-9655-b980eed70a19","imageAltText":"Private Internet Access","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"private-internet-access-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value","offerMerchant":"Private Internet Access","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a02da8cb-42a7-46b2-a739-fdad37cc530d\" data-edition=\"us\" data-description=\"\u003Cp\u003ECyberGhost is a strong VPN with one of the best money-back guarantees on the market, giving you 45 days to decide if you want to continue with the service. Plans start at $2.03 per month with four months free.\u003C\u002Fp\u003E\" data-hed=\"CyberGhost\" data-imagegroup=\"{"alt":"cyberghost","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"cf93d149-d4f6-41a4-ac08-29256c513cfd","title":"Cyberghost VPN Mobile","filename":"cyberghost-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fcf93d149-d4f6-41a4-ac08-29256c513cfd\u002Fcyberghost-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1082580,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Cyberghost VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"cf93d149-d4f6-41a4-ac08-29256c513cfd","imageAltText":"cyberghost","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cyberghost-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative with a long money-back guarantee\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value","offerMerchant":"CyberGhost","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fen_US\u002F","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fen_US%2F&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6f9f7c6f-d4af-494f-a647-3d3f54904c86\" data-edition=\"us\" data-description=\"\u003Cp\u003EBased in Sweden, externally audited, and anonymous accounts make Mullvad a highly secure VPN for €5 ($5.88) per month.\u003C\u002Fp\u003E\" data-hed=\"Mullvad VPN\" data-imagegroup=\"{"alt":"mullvad","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"f4851122-38bb-4f84-a492-b44d628d128e","title":"Mullvad VPN Mobile","filename":"mullvad-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Ff4851122-38bb-4f84-a492-b44d628d128e\u002Fmullvad-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1080865,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Mullvad VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f4851122-38bb-4f84-a492-b44d628d128e","imageAltText":"mullvad","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"mullvad-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-linktext=\"Best alternative for data privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Mullvad","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmullvad.net\u002Fen\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4c514df3-2265-48e5-821e-bb2b7f31b919\" data-edition=\"us\" data-description=\"\u003Cp\u003EWindscribe is an alternative iOS VPN if you want a free (albeit limited) VPN, or you want to create your own custom VPN subscription package.\u003C\u002Fp\u003E\" data-hed=\"Windscribe\" data-imagegroup=\"{"alt":"windscribe","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"4295a832-96c2-4013-b8f8-a7ad24048151","title":"windscribe","filename":"windscribe.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F05\u002F4295a832-96c2-4013-b8f8-a7ad24048151\u002Fwindscribe.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":150115,"width":1296,"height":720,"dateCreated":{"date":"2024-06-05 08:24:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-05 08:24:09","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"windscribe","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4295a832-96c2-4013-b8f8-a7ad24048151","imageAltText":"windscribe","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"windscribe.jpg","imageDateCreated":"2024\u002F06\u002F05","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-linktext=\"Best free VPN alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Windscribe","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwindscribe.com\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:35:00",timezone:"UTC",updated:c,published:c},description:"We tested and analyzed popular VPNs compatible with Apple's iPhone range and the iOS operating system to find the best options for protecting your privacy, streaming content, and more.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d61956c8-361e-4cb5-86e6-71ce5dcab179",image:{id:"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64",filename:"surfshark-vpn-mobile.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:41",timezone:"UTC",updated:c,published:c},alt:"daniel-romero-q-rqba-xcgu-unsplash.jpg",credits:"Image: Daniel Romero via Unsplash",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPNs for iPhone: Expert tested",section:b,slug:"best-iphone-vpn",startYear:c,summary:b,title:"The best VPN services for iPhone: Expert tested and reviewed",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"f2d97ea2-8175-11e2-9d12-0018fe8a00b0",username:"Adrian Kingsley-Hughes",profileUrl:c,email:c,firstName:"Adrian",lastName:"Kingsley-Hughes",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"11c625de-cb18-4e3f-8614-5010553831f2",filename:"adrian-kingsley-hughes.jpg",dateCreated:{created:c,date:"2022-08-05 14:59:32",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F11c625de-cb18-4e3f-8614-5010553831f2\u002Fadrian-kingsley-hughes.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera. Adrian has authored\u002Fco-authored technical books on a variety of topics, ranging from programming to building and maintaining PCs. His most recent books include 'Build the Ultimate Custom PC', 'Beginning Programming' and 'The PC Doctor's Fix It Yourself Guide'. He has also written training manuals that have been used by a number of Fortune 500 companies.",profile:c,title:"Senior Contributing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"fa8fca9e-c7ee-4b66-b7f8-fb70580cd96f\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero reading an NFC security key.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero reading an NFC security key\" data-image-filename=\"img-1508.jpg\" data-image-date-created=\"2023\u002F01\u002F03\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter over a year of use, I love my Flipper Zero, and I'm still finding cool things to do with it.\u003C\u002Fp\u003E\u003Cp\u003EAm I using it to steal cars, clone credit cards, or change the prices shown on gas station displays? Of course not! That's just fake trash people upload to TikTok to try to look cool, and you can't do anything like that. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\"\u003EThe 50+ best Black Friday deals 2024: Early sales live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EBut that doesn't mean the Flipper Zero can't do some very cool and useful things. Over the past year, I've been exploring the suite of tools built into the Flipper Zero, as well as extending its capabilities by installing custom firmware. It's been a game-changer in so many ways! \u003C\u002Fp\u003E\u003Cp\u003EThe Flipper Zero might be small, but there's a lot of hardware packed into a small space.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero is a portable multi-tool for pen-testers and geeks in a toy-like shell.\u003C\u002Fp\u003E\" data-hed=\"Flipper Zero\" data-imagegroup=\"{"alt":"sample-image-16-9-red.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","title":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","filename":"img-2128.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F02\u002F20\u002F6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16\u002Fimg-2128.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":357488,"width":1600,"height":900,"dateCreated":{"date":"2023-02-20 11:30:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-02-20 11:30:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading the apple Pay NFC signal from my Apple Watch Ultra","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"6003ef6c-69b4-49a3-9ae8-0fbf4aca1f16","imageAltText":"sample-image-16-9-red.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2128.jpg","imageDateCreated":"2023\u002F02\u002F20","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flipper Zero store","offerPrice":"169","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fshop.flipperzero.one\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ETo begin with, there's a sub-GHz wireless antenna that can capture and transmit wireless codes to operate wireless devices and access control systems, such as garage door remotes, boom barriers, IoT sensors, and even remote keyless systems. \u003C\u002Fp\u003E\u003Cp\u003ERFID support allows it to read, store, and emulate a number of different RFID cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fdo-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EDo RFID blocking cards actually work? My Flipper Zero revealed the truth\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIt can also read, write, store, and emulate NFC tags. On the front, there's a 1-Wire connector that can read and emulate iButton (aka DS1990A, CYFRAL, Touch Memory, or Dallas key) contact keys.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThere's also a built-in infrared transceiver that can both capture and transmit IR codes to control things like TVs. Finally, on the top, there are GPIO connectors that allow the Flipper Zero to connect to other gadgets in the real world.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F\"\u003E\u003Cstrong\u003EHow to unlock the Flipper Zero's true power\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EThat's a lot of features crammed into a tiny $169 device. But every week, I hear from buyers who are frustrated and disappointed because their Flipper Zero won't do the things that it can seemingly do based on fake social media videos.\u003C\u002Fp\u003E\u003Cp\u003EHere are some of the things I've been doing with my Flipper Zero over the past few weeks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENote\u003C\u002Fstrong\u003E: I'm usually running \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-unlock-the-flipper-zero-true-power\u002F#link={\" target=\"_blank\"\u003Ethird-party software on my Flipper Zero\u003C\u002Fa\u003E, which gives me access to a bunch of additional features. But worry not—loading third-party software doesn't invalidate your warranty, and you can easily go back to the stock software at any time using the Flipper Zero app on a desktop, laptop, or mobile device.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"df78e6a6-cf08-4210-9cbd-3a8d5548b772\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe sub-GHz wireless antenna can pick up signals from devices such as wireless doorbells and car key fobs, making the Flipper Zero a handy tool for testing if wireless transmitters are working properly. I use mine to test if the fobs are working and to test their range.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy (and how they work)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAnd yes, the Flipper Zero can record the codes transmitted by car key fobs, but retransmitting these codes to a modern car won't unlock it due to a feature called 'rolling codes' that changes the code with each use. On older cars -- those 20 years old and more -- you could use a code captured to unlock the vehicle (but don't do that unless it's your car or you have permission!), but you still couldn't drive away with it.\u003C\u002Fp\u003E\u003Cp\u003EOn the flip side -- pun intended -- retransmitting the codes to a wireless doorbell will cause the bell to ring, as most of these systems don't have a mechanism to protect against such annoyances.\u003C\u002Fp\u003E\" data-hed=\"1. Testing car key fobs, wireless doorbells and more\" data-imagegroup=\"{"alt":"Testing a car key fobs","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","title":"Testing a car key fobs","filename":"img-4422.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F542dcafa-5ad4-49e5-9e4c-2ace0599a37c\u002Fimg-4422.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":289398,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:01:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:01:56","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Testing a car key fobs","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"542dcafa-5ad4-49e5-9e4c-2ace0599a37c","imageAltText":"Testing a car key fobs","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4422.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b9e30cff-c108-4dac-838f-86abe2ca1591\" data-edition=\"us\" data-description=\"\u003Cp\u003ENFC is everywhere nowadays, and the Flipper Zero allows you to work with this wireless protocol. It's built into plastic cards and fobs and used for all sorts of things, from unlocking hotel room doors to controlling barriers.\u003C\u002Fp\u003E\u003Cp\u003EBut this doesn't mean you can cause chaos in the world, because to unlock things you more often than not need access to the NFC key.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENFC signals can be read by the Flipper Zero, and many NFC cards can also be \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=ZpUqQsiwULk" target="_blank"\u003Ecopied and cloned\u003C\u002Fa\u003E (this depends on the security used for the card, so I can't give you any hard and fast rules about which NFC devices can be cloned). I've used my Flipper Zero to copy my hotel room card on occasion when the hotel only gives you a single card or when we have multiple rooms and don't want to juggle a handful of cards.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services (and how to choose the right one for you)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EHowever, note that while the Flipper Zero can read NFC cards and fobs, it cannot decode the card's encrypted security code used on credit and debit cards, so they can't be cloned.\u003C\u002Fp\u003E\" data-hed=\"2. Reading\u002Fsaving\u002Femulating NFC\" data-imagegroup=\"{"alt":"Flipper Zero reading an NFC output from a smartphone","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"45efd2a9-585d-4294-bf6a-9196bc707b7f","title":"Flipper Zero reading an NFC output from a smartphone","filename":"img-4423.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F45efd2a9-585d-4294-bf6a-9196bc707b7f\u002Fimg-4423.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":254166,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:03:52","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:04:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Flipper Zero reading an NFC output from a smartphone","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"45efd2a9-585d-4294-bf6a-9196bc707b7f","imageAltText":"Flipper Zero reading an NFC output from a smartphone","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4423.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"2e662499-3476-44dd-bbe7-4ad6fff5ae53\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero cannot decode the card's encrypted security code, so it cannot clone bank cards.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero cannot decode the card's encrypted security code so it cannot clone bank cards\" data-image-filename=\"img-4428.jpg\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"1600\" data-image-height=\"900\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e28f271e-650a-40cb-a8be-98ddab286693\" data-edition=\"us\" data-description=\"\u003Cp\u003EAlong with NFC, the Flipper Zero can read and clone RFID cards and fobs, including hotel cards as shown in the picture above.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-retailer-is-using-rfid-tags-to-make-in-person-clothes-shopping-less-frustrating\u002F" target="_blank"\u003E\u003Cstrong\u003EHow RFID tags can make in-person clothes shopping less frustrating\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ERFID cards and tags can be locked to prevent them from being overwritten or having their security keys extracted, but the Flipper Zero can bypass many of these mechanisms. For example, it can offer to unlock the card if you present it to a valid reader (such as the lock it has been programmed to open). This allows you to clone the card and unlock the door using both the card and the Flipper Zero.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"3. Reading and unlocking RFID tags and cards\" data-imagegroup=\"{"alt":"Reading an RFID card","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","title":"Reading an RFID card","filename":"img-4425.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002Fa4cdee3f-d1db-4e9d-8a48-91d615f65221\u002Fimg-4425.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":210438,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:06:03","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:06:17","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Reading an RFID card","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a4cdee3f-d1db-4e9d-8a48-91d615f65221","imageAltText":"Reading an RFID card","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4425.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf72a74f-7b37-428e-bda9-0dfcf8c6cd52\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero has a built-in infrared module that can be programmed to operate a wide range of devices, from \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv\u002F" target="_blank"\u003ETVs\u003C\u002Fa\u003E to AC units.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPretty much any consumer device with an IR remote control interface can be controlled using the Flipper Zero.\u003C\u002Fp\u003E\u003Cp\u003EAnother cool use of this functionality is to test if infrared remote controls are working. Simply point the remote control at the Flipper Zero in 'read IR' mode, and it will detect the signals.\u003C\u002Fp\u003E\u003Cp\u003EI use this feature all the time to test remote controls that I've fixed after battery leaks have damaged the device. It's an incredibly handy feature!\u003C\u002Fp\u003E\" data-hed=\"4. Universal infrared remote control\" data-imagegroup=\"{"alt":"The Flipper Zero has infrared capability","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","title":"The Flipper Zero has infrared capability","filename":"img-4429.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F294e7dd9-b9ab-469b-bbe8-e6ff18c4b316\u002Fimg-4429.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":230567,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:12:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:12:54","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"The Flipper Zero has infrared capability","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"294e7dd9-b9ab-469b-bbe8-e6ff18c4b316","imageAltText":"The Flipper Zero has infrared capability","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4429.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae924844-ed51-4006-9e66-448121b9ada3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, the Flipper Zero can bypass the security on some Sentry Safe electronic safes using an output from the GPIO.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is definitely not something you want to be doing if it isn't your safe or you don't have permission, but it goes to show just how insecure the "complimentary" safes found in hotels, spas, and Airbnbs actually are.\u003C\u002Fp\u003E\" data-hed=\"5. Bypassing Sentry Safe security\" data-imagegroup=\"{"alt":"Yes, the Flipper Zero can unlock some electronic safes","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","title":"Yes, the Flipper Zero can unlock some electronic safes","filename":"img-4427.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F468027ea-ccf8-4a20-8593-f1ec7abc26dd\u002Fimg-4427.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":194201,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:10:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:10:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Yes, the Flipper Zero can unlock some electronic safes","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"468027ea-ccf8-4a20-8593-f1ec7abc26dd","imageAltText":"Yes, the Flipper Zero can unlock some electronic safes","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4427.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0ecfec0d-98c7-40d2-afcf-aaa9107dbd58\" data-edition=\"us\" data-description=\"\u003Cp\u003EFlipper Zero can act as a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Ffbi-cybercriminals-are-mailing-out-usb-drives-that-will-install-ransomware\u002F" target="_blank"\u003EBadUSB device\u003C\u002Fa\u003E, which means that when connected to a port it is seen as a Human Interface Device (HID), such as a keyboard.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-iphone-vpn\u002F"\u003E\u003Cstrong\u003EThe best VPN services for iPhone and iPad (yes, you need to use one)\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EA BadUSB device can change system settings, open backdoors, retrieve data, initiate reverse shells, or do anything that can be achieved with physical access. These tasks are completed by using a set of commands written in the Rubber Ducky Scripting Language, also known as \u003Ca href="https:\u002F\u002Fdocs.hak5.org\u002Fhak5-usb-rubber-ducky\u002Fducky-script-basics\u002Fhello-world" target="_blank"\u003EDuckyScript\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"6. Automating scripts in a variety of platforms\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"fc6c2aa5-6d06-47e0-a71d-6bbdfa02f56a\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EFlipper Zero opens a browser and navigates to a webpage with no user input.\u003C\u002Fp\u003E\" data-image-credit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-image-alt-text=\"Flipper Zero opens a browser and navigates to a webpage with no user input\" data-image-filename=\"img-4431.gif\" data-image-date-created=\"2023\u002F06\u002F29\" data-image-width=\"500\" data-image-height=\"281\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c430499e-fa24-4cad-bf3b-045fc036a82f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Flipper Zero can use the GPIO to output electrical signals and act as a signal generator. I last used this to simulate an antilock braking system module on a vehicle to confirm that all the wiring and computers in the car were working.\u003C\u002Fp\u003E\" data-hed=\"7. Signal generator\" data-imagegroup=\"{"alt":"Configuring the signal generator settings","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"66ad5e4b-bc49-441e-926b-751da4e0ec96","title":"Configuring the signal generator settings","filename":"img-4432.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F29\u002F66ad5e4b-bc49-441e-926b-751da4e0ec96\u002Fimg-4432.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":218186,"width":1600,"height":900,"dateCreated":{"date":"2023-06-29 18:27:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-29 18:27:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"Configuring the signal generator settings","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"66ad5e4b-bc49-441e-926b-751da4e0ec96","imageAltText":"Configuring the signal generator settings","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-4432.jpg","imageDateCreated":"2023\u002F06\u002F29","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f084b423-70dc-4544-ab21-71b08e45f3ae\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Video Game Module is powered by the RP2040 microcontroller developed by Raspberry Pi and adds a bunch of gaming-related functionality.\u003C\u002Fp\u003E\u003Cp\u003EFirst, it adds a DVI video output port to the Flipper Zero, allowing it to send video to external displays. This is essential since the tiny LED panel built into the Flipper Zero isn't ideal for gaming. This capability isn't limited to gaming, though. The ability to beam video output to a larger display is great for various other applications, such as testing or training.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fif-you-like-your-flipper-zero-then-youll-love-this\u002F"\u003EIf you like your Flipper Zero, then you'll love this\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe Video Game Module also includes an IMU (Inertial Measurement Unit) featuring a TDK ICM-42688-P sensor, which adds a 3-axis gyroscope and a 3-axis accelerometer to the package, allowing it to sense tilting or shaking.\u003C\u002Fp\u003E\u003Cp\u003EIf you're not into gaming, that's no problem. The RP2040 microcontroller can run applications programmed in C, C++, or MicroPython, making it a versatile addition to the Flipper Zero.\u003C\u002Fp\u003E\" data-hed=\"BONUS! Raspberry Pi Video Game Module for Flipper Zero\" data-imagegroup=\"{"alt":"Using Apple BLE Spam to spam an iPhone with popups","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Flipper Zero","imageData":{"id":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","title":"Flipper Zero Video Game Module","filename":"flipper-zero-raspberry-pi-video-game-module.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F11\u002Fa17bb30a-5f96-4f38-9fd0-5634c9d5bb9a\u002Fflipper-zero-raspberry-pi-video-game-module.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":333628,"width":1600,"height":900,"dateCreated":{"date":"2024-02-11 09:51:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-11 09:52:10","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Flipper Zero\u002FZDNET","alt":"Flipper Zero Video Game Module","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a17bb30a-5f96-4f38-9fd0-5634c9d5bb9a","imageAltText":"Using Apple BLE Spam to spam an iPhone with popups","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Flipper Zero","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"flipper-zero-raspberry-pi-video-game-module.jpg","imageDateCreated":"2024\u002F02\u002F11","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Flipper Zero\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:34:00",timezone:"UTC",updated:c,published:c},description:"This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"ad79dfb5-0569-4d71-a848-3274e6eb00e8",image:{id:"22f4df1f-e7a0-4702-b40c-05a6afe1671d",filename:"img-20231215-101642-034.jpg",dateCreated:{created:c,date:"2023-12-15 11:24:01",timezone:"UTC",updated:c,published:c},alt:"GOTRAX 4 electric scooter",credits:"GOTRAX",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F12\u002F15\u002F22f4df1f-e7a0-4702-b40c-05a6afe1671d\u002Fimg-20231215-101642-034.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1600,height:900,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"one-year-later-the-flipper-zero-is-still-cool-here-are-7-useful-things-you-can-do",startYear:c,summary:b,title:"One year later: 7 useful things the Flipper Zero can do that still blows my mind",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EWhen you're looking for a new \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Evirtual private network (VPN)\u003C\u002Fa\u003E setup, you have a choice: you can install VPN software directly on the devices you want to protect or install a VPN on your router.\u003C\u002Fp\u003E\u003Cp\u003EVPNs are excellent security tools that layer your online communication with encryption, making it more difficult for you to be tracked or for your information to be stolen. VPNs also mask your IP address to appear as if you're in a different location, which can be helpful for streaming.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003ESetting up a VPN environment \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F\" target=\"_blank\"\u003Evia your router\u003C\u002Fa\u003E provides blanket coverage across devices connected to the hardware, including your smartphone, PC, and smart TV. This saves you the job of installing VPN software on each device, and the process can be far easier than you think -- as long as you have a compatible router.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers even have routers with a VPN that is already installed and ready to go. In either case, opting for a VPN-ready router can be an excellent way to improve your home security and privacy online.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best VPN router right now?\u003C\u002Fh2\u003E\u003Cp\u003EZDNET has years of experience \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Etesting VPN solutions and hardware\u003C\u002Fa\u003E. Our team of experts has researched and performed hands-on testing for decades, and we strive to give you the best recommendations for VPNs and supporting routers based on this experience and customer feedback. \u003C\u002Fp\u003E\u003Cp\u003EOverall, our pick for the best VPN router is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"cad58aed-b003-49fd-8295-2f1c2e81d5d9\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR\" data-link-shortcode-text=\"ExpressVPN Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. This router has one of our favorite VPNs preinstalled, saving you the job of setting up and configuring the software. It also offers impressive speeds and coverage.\u003C\u002Fp\u003E\u003Cp\u003EBelow are our recommendations for the best VPN routers of 2024, offering excellent VPN compatibility, speed, coverage, and additional privacy features. We've also included some worthwhile early Black Friday deals.\u003C\u002Fp\u003E\u003Ch2\u003EThe best VPN routers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3a4e8e64-8219-48be-bb02-e806d04138ba\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe ExpressVPN Aircove is our top pick thanks to its speed, ease of setup, and security. It offers dual-band connectivity for homes and offices, providing coverage of up to 1,600 square feet.\u003C\u002Fp\u003E\u003Cp\u003EWhen you pick a VPN-ready router, you still need to consider stability and speed. The $189 Aircove manages speeds of up to 1,200Mbps (600Mbps\u002F2.4GHz) when the VPN is not in use, although, as you should expect, speeds will drop when you are connected to VPN servers.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is one of our top picks as the best VPN in 2024, largely due to consistently low speed loss results during our speed tests. If you plan to use a VPN on your router 24\u002F7, it is an excellent choice -- either via Aircove or another VPN-ready router.\u003C\u002Fp\u003E\u003Cp\u003EThere's also a feature to diversify the servers used by devices connected to the router. For example, you might not want to connect your gaming PC to the VPN and have an office laptop run through a US or UK server. Parents and guardians can also take advantage of parental control settings.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERead the review:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F" target="_blank"\u003EThe best VPN services: Expert tested\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003ECustomers report excellent speed and performance, although it can be tricky to set up.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou will also need an \u003Ca href="https:\u002F\u002Fwww.expressvpn.com\u002F" target="_blank"\u003EExpressVPN subscription\u003C\u002Fa\u003E, but a free trial is included with the router. We consider ExpressVPN to be one of the top VPNs on the market, with excellent speed and stability. Plans typically begin at $6.67 per month, but during the Black Friday sale, you will pay only $4.99\u002Fmonth on a two-year contract. Six months of free access are included.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN Aircove f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6&nbsp;| Built-in VPN | 802.11ax, 802.11ac&nbsp;| Diverse server locations | Ad blocking | Threat manager | Parental controls |&nbsp;Includes free trial | Black Friday VPN plan sale\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN Aircove\" data-superlative=\"Best VPN router overall\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","title":"ExpressVPN Aircove","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":145911,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:06:47","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:07:03","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ExpressVPN","alt":"ExpressVPN Aircove","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0c52942f-4983-4a2c-8aa4-467bd6c13b05","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002F","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR","url":"https:\u002F\u002Fwww.amazon.com\u002FExpressVPN-Aircove-AX1800-High-Speed-Wi-Fi-Router\u002Fdp\u002FB09VBXLGJR?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~ Built-in VPN ~ Up to 1,600 sq. ft. coverage ~ US and international versions\" data-dislike=\"~ VPN exclusivity ~ VPN subscription is expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4574c479-b932-4a36-aea6-e31349bdc79d\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want speed and power first and a VPN second, you should consider the TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90).\u003C\u002Fp\u003E\u003Cp\u003EThe tri-band Archer offers speeds of up to 4,804Mbps (5GHz) \u002F 1,201Mbps (5GHz) \u002F 574Mbps (2.4GHz) and has been designed with gamers in mind (hence the 4.8Gbps Game Band). It combines a plethora of WAN and LAN ports with a 1.5GHz processor. OFDMA and MU-MIMO support is included, alongside a gaming accelerator, to reduce latency and lag.\u003C\u002Fp\u003E\u003Cp\u003EYou can also add a OneMesh extender if you want to use mesh networking to increase coverage in your home and eradicate connectivity blind spots.\u003C\u002Fp\u003E\u003Cp\u003ETo set up this router with a VPN service, you must configure \u003Ca href="https:\u002F\u002Fwww.tp-link.com\u002Fus\u002Fsupport\u002Fdownload\u002Farcher-gx90\u002F" target="_blank"\u003Eeither\u003C\u002Fa\u003E OpenVPN or PPTP VPN, so be prepared to spend some time tuning the router to your needs. Many customers consider the Archer GX90 to be a solid, fast router, although its design doesn't suit everyone. If you're concerned about the antennas, they are detachable.\u003C\u002Fp\u003E\u003Cp\u003EThis router costs $230 ($20 off). Keep an eye on the price, however, as this device was heavily discounted during last year's Black Friday sales.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EArcher GX90 f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:\u003C\u002Fstrong\u003E&nbsp;Tri-band&nbsp;| High speeds&nbsp;|&nbsp;1.5GHz Quad-Core CPU&nbsp;| Beamforming | Game Accelerator | Parental controls | Large home support&nbsp;|&nbsp;TP-Link HomeShield\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX6600 Wi-Fi 6 gaming router (Archer GX90)\" data-superlative=\"Best VPN router for power\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","title":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","filename":"122.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F3c7cf5f4-ed19-4a84-95e1-a464057c7806\u002F122.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":124559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 12:31:23","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 12:31:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX6600 WiFi 6 Gaming Router (Archer GX90)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3c7cf5f4-ed19-4a84-95e1-a464057c7806","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"122.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Tri-band ~Extreme speed ~ Game accelerator ~ Great sq. ft coverage\" data-dislike=\"~Requires configuration ~Expensive ~Bulky design\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e445816-2013-4c23-92cc-1c9a80388e2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Asus RT-AX1800S is an affordable VPN solution. The Wi-Fi 6 model, available for only $70, operates on the 2.4GHz frequency and offers up to 1,000Mbps speeds. It also offers free IoT device security via Asus AiProtection. The router has a built-in VPN: Asus Instant Guard, which you can activate with just a button click.\u003C\u002Fp\u003E\u003Cp\u003EThis router is compatible with AiMesh and includes five Ethernet ports (One Gigabit WAN and four Gigabit LAN). You can also purchase Wi-Fi extenders if you need to increase its range in larger homes.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is great value for the money, and many are impressed with the parental controls and security functions. The free VPN is designed to be as user-friendly as possible, although some users report occasional disconnection issues.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus RT-AX1800S&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003Ef\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures\u003C\u002Fstrong\u003E: Dual-band |&nbsp;2.4GHz | Up to 1,000Mbps speeds | Parental controls |&nbsp;AiMesh compatible |&nbsp;One Gigabit WAN port and four Gigabit LAN ports\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX1800S\" data-superlative=\"Best VPN router for affordability\" data-imagegroup=\"{"alt":"A VPN router next to its box","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"8c1c30c5-8b86-4709-8d05-50543146d7f0","title":"ASUS RT-AX1800S","filename":"p.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F21\u002F8c1c30c5-8b86-4709-8d05-50543146d7f0\u002Fp.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":100930,"width":1296,"height":720,"dateCreated":{"date":"2024-02-21 16:19:09","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-21 16:19:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX1800S","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8c1c30c5-8b86-4709-8d05-50543146d7f0","imageAltText":"A VPN router next to its box","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"p.jpg","imageDateCreated":"2024\u002F02\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Affordable ~Free security ~Ai Mesh compatible\" data-dislike=\"~Bland design ~Some users report speed issues\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c3be9d1c-f134-4c78-b821-01702b93aae0\" data-edition=\"us\" data-description=\"\u003Cp\u003EFor a more stylish option with custom lighting effects, consider the $398 Asus ROG Rapture GT-AXE11000.\u003C\u002Fp\u003E\u003Cp\u003EThis VPN-ready router is future-proof and while it's optimized for gamers -- who will appreciate the router's gaming accelerator, 2.5G LAN and WAN ports, and quad-core processing power -- this option also includes Asus' VPN Fusion feature.\u003C\u002Fp\u003E\u003Cp\u003EVPN Fusion is designed to let you connect to multiple VPN servers simultaneously. For example, you can assign your devices to different VPN tunnels -- selecting a server for your PC, another for your smart TV, and so on.\u003C\u002Fp\u003E\u003Cp\u003ECustomer reviews suggest the VPN is an excellent option for gamers, and the VPN Fusion feature is popular with those who do not mind getting technical. Still, some customers consider the price point to be high.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fstrong\u003E\u003Cstrong\u003E&nbsp;f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EWi-Fi 6E | Tri-band | 6GHz band | VPN Fusion |&nbsp;2.5G LAN\u002FWAN Port | Quad-core processor | Gaming accelerator\u003C\u002Fp\u003E\" data-hed=\"Asus ROG Rapture GT-AXE11000\" data-superlative=\"Best VPN for multiple connections\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"a04ca118-8605-4005-a8fa-39bf361a5dca","title":"ASUS ROG Rapture GT-AXE11000","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002Fa04ca118-8605-4005-a8fa-39bf361a5dca\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":112016,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:51:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:51:46","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"ASUS ROG Rapture GT-AXE11000","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a04ca118-8605-4005-a8fa-39bf361a5dca","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-GT-AXE11000-Triple-level-Acceleration-Subscription-free\u002Fdp\u002FB09Q68DGWN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\" data-like=\"~Stylish ~ Flexible VPN server options ~ 6GHz compatible\" data-dislike=\"~ Expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"954a735c-5976-4b56-b147-d23a7caadd2d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe GL.iNET Beryl-AX is an excellent option if you want flexibility in your VPN choice, and you want to take your router with you when you travel.\u003C\u002Fp\u003E\u003Cp\u003EThis pocket-sized powerful router has a 1.3GHz processor and can reach speeds of up to 3000Mbps. It also includes a Gigabit Ethernet port and a USB port.\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to VPNs, the router offers implementation options with all the major providers, including NordVPN, ExpressVPN, IPVanish, and Private Internet Access. This is because the router supports the OpenVPN, Wireguard, and OpenWRT protocols.\u003C\u002Fp\u003E\u003Cp\u003EAs a bonus, upon purchase, you can choose to have your router preconfigured with your preferred VPN.\u003C\u002Fp\u003E\u003Cp\u003ECustomers say this router is portable, works extremely well, and is easy to configure. At $180, many users also consider this router to provide value for their money. Service plans are also available, but they are expensive.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGL.iNET Beryl-AX\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003Efe\u003C\u002Fstrong\u003E\u003Cstrong\u003Eatures:&nbsp;\u003C\u002Fstrong\u003EMulti VPN-compatibility&nbsp;| Travel-friendly&nbsp;| 1.3GHz processor | Gigabit Ethernet port |&nbsp;OpenVPN, Wireguard, and OpenWRT compatibility\u003C\u002Fp\u003E\" data-hed=\"GL.iNET Beryl-AX\" data-superlative=\"Best VPN router for travel\" data-imagegroup=\"{"alt":"placeholder-product-image-for-best-lists.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","title":"GL.iNET Beryl-AX","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F60e86888-e676-42d8-a8c0-fd0e2b2b5aa5\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":46662,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:52:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:52:40","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNET","alt":"GL.iNET Beryl-AX","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"60e86888-e676-42d8-a8c0-fd0e2b2b5aa5","imageAltText":"placeholder-product-image-for-best-lists.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Flashrouters","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.flashrouters.com\u002Fberyl-wifi-6-mt3000-vpn-travel-router-by-flashrouters","url":""}]\" data-usepricing=\"false\" data-like=\"~VPN flexibility ~Gigabit Ethernet port ~Portable ~Sleek design\" data-dislike=\"~A lack of ports ~ Expensive support plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN router\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EBuilt-in VPN?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESpeed\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$170\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,200Mbps (disconnected) | 180Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$230\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E4,804Mbps\u002F1,201Mbps\u002F574Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$70\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 1,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EASUS ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$398\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 11,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$180\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003Ex\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EUp to 3,000Mbps\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"Our favorite VPN routers, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a6a784bd-d1f1-4209-8c95-f11d2c1be1fd\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere are advantages and disadvantages to using a VPN-enabled router or a standalone VPN app, the most important of which are below.\u003C\u002Fp\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN router\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E\u003Cstrong\u003EVPN app\u003C\u002Fstrong\u003E&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router provides blanket coverage for all of your devices at home.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA VPN app's coverage is limited by the number of simultaneous connections you are allowed under one account.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can be complicated to set up, and most routers do not come with a built-in VPN. You could also risk your router's warranty when installing a VPN.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps are typically easy to install and use.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EInstall once, and protect everything.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou must install VPN apps individually.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EVPN coverage and security is on permanently.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN apps have to be opened and services have to be enabled.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a VPN subscription and, in most cases, a paid one.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree, limited plans and paid options are available.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible router.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYou need a compatible PC or mobile device.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EA VPN router can protect devices that don't have native support, such as TVs.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN usage is limited to the available apps and OS compatibility.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"VPN router vs VPN app: How do you decide?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"49fd6070-ae39-4756-9016-3a358ec56d65\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN router service is a VPN that can either be installed directly on your router, or has already been enabled on a specific router. Today's routers are often compatible with VPNs, but installing them isn't all the same.\u003C\u002Fp\u003E\u003Cp\u003ESome VPN providers also offer routers with preinstalled VPN software, but you must sign up for a subscription. You should consider using a VPN-ready router if you do not want to install your VPN manually on all of your devices or if you want to ensure that every device connected to your Wi-Fi network is protected.\u003C\u002Fp\u003E\" data-hed=\"What is a VPN router service and why should you use one?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a30cfde2-422e-4869-80a3-7eb2079c45d3\" data-edition=\"us\" data-description=\"\u003Cp\u003EInstalling a VPN on your router allows all your devices to access the same VPN network and connection. This creates blanket protection and IP masking, but it can be challenging to set up.\u003C\u002Fp\u003E\u003Cp\u003ERemember that your router will act as a VPN client rather than a server and share the VPN with devices connected to it. Here are some general steps to take, although they may change depending on your router and existing setup:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ECheck your router's compatibility. Not every router will run a VPN natively -- although many modern routers do have the capacity.\u003C\u002Fli\u003E\u003Cli\u003ESign up for a VPN service. Unless your router comes with a built-in VPN, you will likely need a subscription.\u003C\u002Fli\u003E\u003Cli\u003EAccess your VPN's firmware. You will need to do so through your router's IP address.\u003C\u002Fli\u003E\u003Cli\u003EUnder settings, you should find a VPN tab, and you will need to enable VPN services and choose between a static or dynamic IP address.\u003C\u002Fli\u003E\u003Cli\u003EThe VPN client can now be installed, although you may need to tweak your network settings.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor an extensive guide on installing a VPN on your router, check out:\u003Cstrong\u003E \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to set up a VPN on your router\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How to set up your VPN router: Configuration and encryption made simple\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EChoosing the best VPN router involves many factors. If you want to purchase a VPN-ready router, you will find the best use cases for each of our recommendations below.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this VPN router...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN Aircove\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly VPN router with solid coverage and speed. While the router is exclusive to ExpressVPN usage, it is one of our favorites due to its price, reliability, and easy setup.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ETP-Link Archer GX90\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA heavy-duty, powerful router. This gaming router offers tri-band connectivity and while it does require configuration, the Archer is a future-proof router with excellent speeds.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus RT-AX1800S\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EAn affordable VPN solution. This model has highly positive customer reviews and, for the price point, is a steal -- especially when you consider its built-in VPN and additional security controls.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EAsus ROG Rapture GT-AXE11000\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EVPN versatility at home. You can use the Asus VPN Fusion feature to customize your VPN experience and operate multiple server connections simultaneously.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EGL.iNET Beryl-AX\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETo take your VPN router with you on your travels. This router is one of the best travel-friendly, portable routers that is compatible with major VPN providers.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Choosing the right VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b2dc499c-f2f5-44d9-950f-b0a021928b95\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen you are researching a new VPN router, consider these points before making a purchase:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EDIY\u003C\u002Fstrong\u003E: If you want a VPN for your home network, consider whether you want to install a VPN directly on your router.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPreinstalled options\u003C\u002Fstrong\u003E: If you don't want to tamper with router settings yourself to install a VPN, consider a router model that comes with a VPN preinstalled.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAffordability\u003C\u002Fstrong\u003E: VPN routers are available for a variety of budgets. If you can, consider a future-proof VPN router that can support next-generation Wi-Fi and provide good coverage and speeds.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN\u003C\u002Fstrong\u003E: You also need to take into account the VPN service you want to use. If you have a preferred VPN, ensure that the router you want supports it.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESubscriptions\u003C\u002Fstrong\u003E: You will likely need to purchase a subscription. While there are a handful of free VPN plans offered by trustworthy vendors, most of them come with limitations. These may not be suitable for use on a router, as you may quickly run out of bandwidth. As a result, you should factor in the cost of a VPN subscription, even if it is just a basic, paid plan.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOther purposes\u003C\u002Fstrong\u003E: The VPN might be the most important aspect, but you should also consider whether other features are important to you -- such as tri-band functionality, gaming optimization, or additional security features.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a VPN router\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile compiling our recommendations for the best VPN routers of 2024, we considered several crucial factors, including:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESpeed\u003C\u002Fstrong\u003E: There's no point investing in a new router capable of handling VPN environments unless it serves its core purpose: providing solid and stable connections to the internet. We considered traditional router models and options that provide mesh networking for larger homes.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVPN support\u003C\u002Fstrong\u003E: We included a range of models with built-in VPNs, VPN support for standalone VPN services, and mobile products for VPN protection on the go. We know that what might suit one user won't always suit another, so there must be flexibility in the VPN options.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EBudgets\u003C\u002Fstrong\u003E: We covered different budgets. Although our priorities are security, speed, and reliability, we wanted to ensure that we included affordable products alongside future-proofed routers.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer reviews\u003C\u002Fstrong\u003E: We also examined customer reviews in depth, including positive and negative experiences, and we factored this feedback in when deciding on our recommendations.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EVendor reputation\u003C\u002Fstrong\u003E: We considered the reputation of router manufacturers, including their popularity, variety, and product accessibility.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems installing apps, using the service, renewing, or canceling. We listed VPNs with an available support team.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor a more extensive breakdown, check out our comprehensive&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F"\u003EVPN testing methodology page\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"How did we choose these VPN routers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a2dd9d0b-1ee5-4324-a3bd-d1828186a2a3\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want to install a VPN directly onto a router, the process can be more of a hassle than just signing up for an app. It can, however, save you time in the long run as any device that connects to your router -- like a PC or a smartphone -- will use the VPN and will be automatically protected. This can be particularly useful if you have internet-connected devices, including TVs and IoT products, that cannot support a VPN on their own hardware.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EYou might want to consider setting up a VPN on your router if you have numerous devices needing protection, and you work from home. If you are a remote worker, some organizations may require you to use their own VPN to access corporate resources.\u003C\u002Fp\u003E\u003Cp\u003EA caveat: some online platforms, such as streaming services, will detect when you are using a VPN and may block you. If this is the case, you may have to temporarily disable your VPN service to resume watching.\u003C\u002Fp\u003E\" data-hed=\"The bottom line: Is a VPN router worth it?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EWhat VPN should I use for my router?\u003C\u002Fh3\u003E\u003Cp\u003EHere's a list of ZDNET's favorite VPNs:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"33548326-3466-4b1f-80f5-c1ac8dffe59d\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A solid combination of speed, security, and servers\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ca0b98ba-399f-4db5-b9a1-588917eb1066\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Incredibly fast\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d0eef650-a662-4506-a715-290ce433af51\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002F\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: Suitable for any budget\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"142ae698-eb81-4c2d-81d7-c2c0400e10a7\" data-raw-url=\"https:\u002F\u002Fwww.privateinternetaccess.com\u002F\" data-link-shortcode-text=\"Private Internet Access\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: An open-source option\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4d13b573-5d9a-4d99-ba6d-e1e8f6920556\" data-raw-url=\"https:\u002F\u002Fprotonvpn.com\u002F\" data-link-shortcode-text=\"Proton VPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: A VPN with security at its core\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPNs of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch3\u003ECan any router be a VPN router?\u003C\u002Fh3\u003E\u003Cp\u003EMany routers are now smart, intelligent devices capable of far more than providing an internet connection. Today, you can install VPN software on many different routers, and VPN support is often promoted as a major feature. \u003C\u002Fp\u003E\u003Cp\u003EA word of caution: installing third-party software on your router might void its warranty, just as jailbreaking mobile devices or changing the firmware of a gaming console can invalidate a warranty. \u003C\u002Fp\u003E\u003Ch3\u003EWhy would anyone use a VPN?\u003C\u002Fh3\u003E\u003Cp\u003EA VPN can be a great tool for protecting your privacy. At the very least, VPNs should be used when you are taking advantage of public Wi-Fi hotspots, but using them while you're online as a default is the better option to protect yourself and your information. VPNs are also beneficial in circumventing geolocation blocks and censorship.\u003C\u002Fp\u003E\u003Cp\u003ESome countries either ban VPN usage entirely or heavily discourage it. If using a VPN is illegal, you may be fined or prosecuted. According to NordVPN's \u003Ca href=\"https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fare-vpns-legal\u002F\" target=\"_blank\"\u003Ecountry guide\u003C\u002Fa\u003E, countries that ban VPNs include Belarus and Iraq, whereas governments in China and Russia are among those that only permit specific VPNs.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a work VPN expose my home network to my employer?\u003C\u002Fh3\u003E\u003Cp\u003EIt's possible, but it depends on several factors. VPNs handle traffic in different ways, but overall, it is highly unlikely that company IT administrators will be able to access your home network via your VPN connection. If you are on a work-issued laptop with software that allows such connections, however, IT administrators will most likely be able to monitor your activities and tap into resources on the device.\u003C\u002Fp\u003E\u003Cp\u003EAdditionally, while VPN tunnels encrypt your traffic and mask your online activities, you can be monitored if you use a VPN designed, licensed, or owned by your employer. VPNs can protect corporate resources, and you should keep work and private online activities separate.\u003C\u002Fp\u003E\u003Ch3\u003EDoes a VPN slow down your internet connection?\u003C\u002Fh3\u003E\u003Cp\u003ETypically, yes, although a high-quality VPN will hopefully not make a noticeable difference. There are caveats; for example, you should expect a slowdown when connecting to servers across a long distance, such as from the UK to Australia. If, however, you experience severe speed loss when you are connecting to servers closer to you, such as from New York to Washington, this may indicate a problem with either the VPN or your ISP connection.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1555caca-a976-4e78-b5df-4435662a7042\" data-edition=\"us\" data-description=\"\u003Cp\u003EYou can put VPN software on many devices, from PCs to mobile devices and routers. While we have showcased what we consider to be the best VPN-supporting routers in 2024, we can't highlight every worthy option -- so you can check out alternative products below, including subscriptions:\u003C\u002Fp\u003E\" data-hed=\"Are there alternative VPN routers worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6a2861a0-5d4d-4bb5-ac03-ab8a8d8505de\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $123 Flint 2 is a great alternative for performance. This router is compatible with a range of VPN protocols, including OpenVPN.\u003C\u002Fp\u003E\" data-hed=\"Flint 2\" data-imagegroup=\"{"alt":"Flint 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet","imageData":{"id":"7aaabd27-af69-4e16-821c-b6f5515eacb6","title":"Flint 2","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F7aaabd27-af69-4e16-821c-b6f5515eacb6\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":93028,"width":1296,"height":720,"dateCreated":{"date":"2024-10-31 12:41:46","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-31 12:42:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet","alt":"Flint 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7aaabd27-af69-4e16-821c-b6f5515eacb6","imageAltText":"Flint 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F10\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\" data-linktext=\"Best alternative for performance\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Gl-inet","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fstore-us.gl-inet.com\u002Fproducts\u002Fflint-2-gl-mt6000-wi-fi-6-high-performance-home-router","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f400e72c-5c42-4f8c-999c-dc641b9a0fcc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like the idea of the Aircove but want a more portable model, consider the $170 Aircove Go.\u003C\u002Fp\u003E\" data-hed=\"Aircove Go\" data-imagegroup=\"{"alt":"Aircove Go","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon","imageData":{"id":"febdef0b-83e4-4bb0-a733-a38642a2cb93","title":"Aircove Go","filename":"l.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F22\u002Ffebdef0b-83e4-4bb0-a733-a38642a2cb93\u002Fl.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":62103,"width":1296,"height":720,"dateCreated":{"date":"2024-08-22 09:04:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-22 09:04:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon","alt":"Aircove Go","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"febdef0b-83e4-4bb0-a733-a38642a2cb93","imageAltText":"Aircove Go","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"l.jpg","imageDateCreated":"2024\u002F08\u002F22","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\" data-linktext=\"Best alternative for US consumers\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"86b594a2-b878-4740-9369-6be04a061fb9","slug":"aircove-go-portable-wi-fi-6-vpn-router-protect-unlimited-devices-free-30-day-expressvpn-trial-u-s-canada-version","name":"Aircove Go | Portable Wi-Fi 6 VPN Router | Protect Unlimited Devices | Free 30-Day ExpressVPN Trial | (U.S. & Canada Version)","productType":"SERIES","updateType":"EZMONEY","mod":1732000480499,"displayDate":"Tue Nov 19 2024 02:14:40 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS","url":"https:\u002F\u002Fwww.amazon.com\u002FAircove-Portable-Protect-Unlimited-ExpressVPN\u002Fdp\u002FB0CM6VL4PS?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ea33338-5dd6-43bf-9234-f5d846f178f1\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you want a router for travel, but you don't want to spend a fortune, this $30 GL.iNet model is a solid option.\u003C\u002Fp\u003E\" data-hed=\"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router\" data-imagegroup=\"{"alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"GL.iNet\u002FZDNET","imageData":{"id":"d457c097-c39b-432a-8335-1c07ef22d983","title":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","filename":"118.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Fd457c097-c39b-432a-8335-1c07ef22d983\u002F118.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":48602,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:03:25","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:03:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"GL.iNet\u002FZDNET","alt":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d457c097-c39b-432a-8335-1c07ef22d983","imageAltText":"GL.iNet GL-MT300N-V2 mini travel wireless pocket VPN router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"GL.iNet\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"118.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"GL.iNet\u002FZDNET\" data-linktext=\"Best alternative for affordability\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"30","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002FGL-iNET-GL-MT300N-V2-Repeater-300Mbps-Performance\u002Fdp\u002FB073TSK26W\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a69aa07-8d07-4065-862c-be57a07f2a2b\" data-edition=\"us\" data-description=\"\u003Cp\u003EAmazon's $195 eero 6+ mesh Wi-Fi system, currently on sale, includes an eero security subscription and the Encrypt.me VPN.\u003C\u002Fp\u003E\" data-hed=\"Amazon eero 6+ mesh Wi-Fi\" data-imagegroup=\"{"alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Amazon\u002FZDNET","imageData":{"id":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","title":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","filename":"116.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002F7f8c63f3-68ad-4c29-b96b-8d1123c0d15d\u002F116.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":64242,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 09:51:32","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 09:51:43","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Amazon | ZDNET","alt":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"7f8c63f3-68ad-4c29-b96b-8d1123c0d15d","imageAltText":"Amazon eero 6+ mesh Wi-Fi (eero Security subscription, inbuilt Encrypt.me VPN)","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Amazon\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"116.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Amazon\u002FZDNET\" data-linktext=\"Best alternative with an inbuilt VPN\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"2f1a95c2-71cf-4ef1-86dc-5ddfec92a22f","slug":"eero-6-plus","name":"Eero 6 Plus","productType":"SERIES","updateType":"EZMONEY","mod":1732000473593,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F","url":"https:\u002F\u002Fwww.amazon.com\u002Feero-reliable-gigabit-connect-Coverage\u002Fdp\u002FB08ZK2BHP2\u002F?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"012c8098-b70a-4256-a838-4188b14bcfa0\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $85 TP-Link AX1800 Wi-Fi 6 router is an excellent alternative if you want a Wi-Fi 6 model.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"TP-Link AX1800 Wi-Fi 6 router\" data-imagegroup=\"{"alt":"TP-Link AX1800 Wi-Fi 6 router","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"TP-Link\u002FZDNET","imageData":{"id":"f1216592-effe-484a-b1ce-83fc92f943c0","title":"TP-Link AX1800 Wi-Fi 6 router","filename":"119.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F08\u002F24\u002Ff1216592-effe-484a-b1ce-83fc92f943c0\u002F119.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":102559,"width":1296,"height":720,"dateCreated":{"date":"2023-08-24 10:05:56","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-08-24 10:06:04","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"TP-Link\u002FZDNET","alt":"TP-Link AX1800 Wi-Fi 6 router","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"f1216592-effe-484a-b1ce-83fc92f943c0","imageAltText":"TP-Link AX1800 Wi-Fi 6 router","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"TP-Link\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"119.jpg","imageDateCreated":"2023\u002F08\u002F24","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"TP-Link\u002FZDNET\" data-linktext=\"Best alternative Wi-Fi 6 router\" data-linkurl=\"Design: Mini Listicle\" data-techobjectinfo=\"{"uuid":"4fe6a3b2-c24f-409c-8336-03cdc3e4cc00","slug":"tp-link-archer-ax21","name":"TP-Link Archer AX21","productType":"SERIES","updateType":"EZMONEY","mod":1732000473410,"displayDate":"Tue Nov 19 2024 02:14:33 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"85","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK","url":"https:\u002F\u002Fwww.amazon.com\u002FWiFi-6-Router-Gigabit-Wireless\u002Fdp\u002FB08H8ZLKKK?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"debd9488-d4f0-4562-88af-1cc375b2e2fe\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe $135 Asus RT-AX3000 dual-band Wi-Fi 6 router is an Ai Mesh-compatible alternative with a built-in VPN and parental controls.\u003C\u002Fp\u003E\" data-hed=\"Asus RT-AX3000\" data-imagegroup=\"{"alt":"ASUS RT-AX3000 Dual Band WiFi 6","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ASUS\u002FZDNET","imageData":{"id":"1785ad56-0089-4d7b-8594-4b10091424e7","title":"ASUS RT-AX3000 Dual Band WiFi 6","filename":"k.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F1785ad56-0089-4d7b-8594-4b10091424e7\u002Fk.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":59376,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 13:47:24","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 13:47:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ASUS","alt":"ASUS RT-AX3000 Dual Band WiFi 6","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1785ad56-0089-4d7b-8594-4b10091424e7","imageAltText":"ASUS RT-AX3000 Dual Band WiFi 6","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ASUS\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"k.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ASUS\u002FZDNET\" data-linktext=\"Best alternative for parental controls\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P","url":"https:\u002F\u002Fwww.amazon.com\u002FASUS-RT-AX3000-802-11ax-Lifetime-Whole-Home\u002Fdp\u002FB084BNH26P?tag=zdnet-buy-button-20"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2ade35f6-03a0-4cf2-b407-9838b20e2b1f\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe InvizBox 2 is a preconfigured VPN router with robust security standards, an ad blocker, and multiple VPN hotspot options. Plans start at $99, with the hardware included.\u003C\u002Fp\u003E\" data-hed=\"InvizBox 2\" data-imagegroup=\"{"alt":"InvizBox 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"InvizBox\u002FZDNET","imageData":{"id":"4b5da877-9d4c-4d2d-9425-635a08f492d3","title":"InvizBox 2","filename":"q.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F18\u002F4b5da877-9d4c-4d2d-9425-635a08f492d3\u002Fq.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":84428,"width":1296,"height":720,"dateCreated":{"date":"2024-01-18 14:05:36","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-18 14:05:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"InvizBox","alt":"InvizBox 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4b5da877-9d4c-4d2d-9425-635a08f492d3","imageAltText":"InvizBox 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"InvizBox\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"q.jpg","imageDateCreated":"2024\u002F01\u002F18","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"InvizBox\u002FZDNET\" data-linktext=\"Best alternative for privacy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Invizbox","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.invizbox.com\u002Fproducts\u002Fib2\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 17:11:00",timezone:"UTC",updated:c,published:c},description:"Looking for a new router to give your home blanket VPN coverage? These are the best VPN-ready routers that provide secure, fast, and reliable internet connections.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"def1c338-68ab-4b51-a334-bcfaff908a96",image:{id:"0c52942f-4983-4a2c-8aa4-467bd6c13b05",filename:"3.jpg",dateCreated:{created:c,date:"2024-10-31 12:06:47",timezone:"UTC",updated:c,published:c},alt:"A black VPN router with its antennas up against an orange background",credits:"Grassetto\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F31\u002F0c52942f-4983-4a2c-8aa4-467bd6c13b05\u002F3.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best VPN routers you can buy",section:b,slug:"best-vpn-router",startYear:c,summary:b,title:"The best VPN routers of 2024",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a3279b29-677e-4133-9d9a-eb87332abb09",slug:"home-networking",name:"Home Networking",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EMany of us have dozens of online accounts, and each requires a different username, password, and potentially a 2FA or CAPTCHA check. Keeping track of all your usernames and passwords can be difficult, especially given vendors' requirements to adopt complex passwords consisting of numbers and special characters in their effort to improve security.\u003C\u002Fp\u003E\u003Cp\u003EWhile it is important to not rely on passwords alone, when logging in is a lengthy and irritating process, it can inadvertently encourage users to reuse the same (memorable) credentials across all their services. We want to avoid this situation, as it increases the risk of account compromise.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\"\u003E\u003Cstrong\u003EThe best antivirus software\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-apple-microsoft-make-a-new-commitment-for-a-passwordless-future\u002F#link={\" target=\"_blank\"\u003Epasswordless options\u003C\u002Fa\u003E are already rolling out, traditional password managers are still effective than trying to recall every username and password combination you use for the services that still require them. Keeping your sensitive information safe is more important than ever, and a reliable \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fyoure-definitely-not-making-the-most-of-your-password-manager\u002F\" target=\"_blank\"\u003Epassword manager\u003C\u002Fa\u003E can be an effective solution to security and password overload.\u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best password manager right now?\u003C\u002Fh2\u003E\u003Cp\u003EOur pick for best overall choice, \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7858fd20-1757-4d7d-b4d0-9a060c145f5a\" data-raw-url=\"https:\u002F\u002F1password.com\u002F\" data-link-shortcode-text=\"1Password\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, has a user-friendly interface that simplifies credential storage. You only need to remember one password to use the service, and it comes with useful features, including autofill and a secure vault.\u003C\u002Fp\u003E\u003Cp\u003EZDNET researched and tested the best password managers available, considering security, storage, compatibility, and price. We also considered customer reviews and expert opinions. Read on to find out how other options stack up and best serve your password security needs.\u003C\u002Fp\u003E\u003Ch2\u003EBest password managers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"4b0a9da3-f01c-4893-9de7-fbe0d4204b5a\" data-edition=\"us\" data-description=\"\u003Cp\u003E1Password is the best password manager overall, with its user-friendly interface and excellent features. It allows you to store credentials for online accounts and credit card information, and best of all, you only need to remember one password.\u003C\u002Fp\u003E\u003Cp\u003EThis app helps you create unique passwords that should be less susceptible to hackers, and stores them for you so you don't have to remember complex passwords for multiple accounts. 1Password's autofill feature can automatically fill in information like your username, password, or credit card number. You can also share your information with trusted family or friends if needed.\u003C\u002Fp\u003E\u003Cp\u003EThe app is accessible across your favorite devices, making access easy and secure. 1Password is compatible with Windows, MacOS, iOS, and Android. Browser add-ons are also available for Chrome, Edge, Brave, and Firefox.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview\u003C\u002Fstrong\u003E\u003Cstrong\u003E:\u003C\u002Fstrong\u003E&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F1password-review\u002F"\u003E\u003Cstrong\u003E1Password\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EOther notable features include a secure digital vault for stashing sensitive documents and notes and a feature that alerts you to weak, compromised, or repeated passwords. Passwordless authentication, including \u003Ca href="https:\u002F\u002Fblog.1password.com\u002Fhow-save-manage-share-passkeys-1password\u002F" target="_blank"\u003Epasskey storage\u003C\u002Fa\u003E, is also available. Furthermore, Watchtower users can also monitor SSH key security risks.\u003C\u002Fp\u003E\u003Cp\u003E1Password does not offer a free plan, but the app does provide a free, 14-day trial that doesn't require inputting your credit card information.\u003C\u002Fp\u003E\u003Cp\u003E1Password costs $2.99 per month, billed annually, or $4.99 for a family pack. Business options are also available for up to 10 seats and beyond.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOverall, if you're looking for a reliable and easy-to-use password manager with great features and account protection tools, 1Password is a top choice. Users say 1Password's approach to data security is top-notch, and the company has great customer support.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E1Password f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003ESecurely store credentials | Password generator | Multi-platform compatibility | Tag and folder organizer | Two-factor authentication | Watchtower feature to identify weak, reused, or compromised passwords | Secure digital vault | Trustpilot rating: 4.7&nbsp;| Passkey storage\u003C\u002Fp\u003E\" data-hed=\"1Password\" data-superlative=\"Best password manager overall\" data-imagegroup=\"{"alt":"1password","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"1Password\u002FZDNET","imageData":{"id":"63e1aed3-a350-4e46-9e87-a6d2c35d8a38","title":"1password","filename":"1password.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F63e1aed3-a350-4e46-9e87-a6d2c35d8a38\u002F1password.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":152770,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:13:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:13:26","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"1Password\u002FZDNET","alt":"1Password interface screenshot","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"63e1aed3-a350-4e46-9e87-a6d2c35d8a38","imageAltText":"1password","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"1Password\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"1password.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"1Password\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15734885?sid=subid_value","offerMerchant":"1Password","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002F1password.com\u002F","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15734885?sid=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ User-friendly ~Excellent features ~Account protection tools ~Digital vault ~ Family plans\" data-dislike=\"~ No free plan ~Limited customer service\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3e1b8684-c028-4487-81c3-3828beac797b\" data-edition=\"us\" data-description=\"\u003Cp\u003EBitwarden is the best free password manager because it's open-source, has a user-friendly interface, fast uploads, and smartphone compatibility. You can use it on as many devices as you want without limitations, ensuring you always have access to your most sensitive information.\u003C\u002Fp\u003E\u003Cp\u003EBitwarden allows you to store as many passwords as you like, with no restrictions on the number or type of passwords that you can store. Additionally, the app can help you create secure passwords across all plans, and you can safely share them with strong encryption.\u003C\u002Fp\u003E\u003Cp\u003EYou can choose between a free, limited option (although all core functions are included), or premium accounts for less than $1 per month ($10 billed annually). Alternatively, you can sign up for a family pack -- allowing up to six users -- priced at $3.33 per month ($40 per year). Business pricing begins at $4 per user per month.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a reliable and free -- or extremely affordable -- password manager, Bitwarden is an excellent choice. It offers advanced security features and compatibility with a wide range of devices.\u003C\u002Fp\u003E\u003Cp\u003EUsers enjoy the transparent pricing model and say, "It just works." The extensions are excellent, although many would like to see changes to the maintenance routines.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBitwarden f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EOpen-source password manager |&nbsp;Free version with unlimited passwords |&nbsp;Two-factor authentication | Multi-platform support |&nbsp;Autofill and auto-login functionality | Emergency access for trusted individuals | Trustpilot rating: 4.6 | Passwordless features available\u003C\u002Fp\u003E\" data-hed=\"Bitwarden\" data-superlative=\"Best free or affordable password manager\" data-imagegroup=\"{"alt":"Bitwarden","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Bitwarden\u002FZDNET","imageData":{"id":"5f8ca7e1-4a71-40b4-9c52-83a7a95d769d","title":"Bitwarden features","filename":"bitwarden.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F5f8ca7e1-4a71-40b4-9c52-83a7a95d769d\u002Fbitwarden.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":245944,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:28:01","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:28:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Bitwarden\u002FZDNET","alt":"Screenshot of Bitwarden features","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"5f8ca7e1-4a71-40b4-9c52-83a7a95d769d","imageAltText":"Bitwarden","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Bitwarden\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"bitwarden.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Bitwarden\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bitwarden","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fbitwarden.com\u002F","url":""}]\" data-usepricing=\"true\" data-like=\"~ User-friendly ~Very fast uploads ~Smartphone-compatible ~ Affordable\" data-dislike=\"~ Some reported auto-filling issues\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e4d38c6-597a-4d0a-98f5-3b020803dc1d\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordPass is the best password manager for businesses. It offers secure sharing, health reports, and multi-factor authentication.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECreated by the same team behind NordVPN, NordPass provides advanced encryption for added peace of mind when storing passwords and sensitive data.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ETeam plans with up to 10 seats begin at $1.79 per month per user. Features include company-wide settings, Google Workspace SSO, a security dashboard, MS ADFS, and support for Okta user and group provisioning.\u003C\u002Fp\u003E\u003Cp\u003ENordPass also includes a Data Breach Scanner, which ensures your information is safe and alerts customers if a stored password has been compromised in a third-party security incident. You can store contact information for colleagues and businesses in one place, allowing for quick and easy password sharing with the right people. You can assign digital entry points to teams for credential sharing and payment information.\u003C\u002Fp\u003E\u003Cp\u003EThe service can already store passkeys, allowing passwordless authentication for business users. A new tool, Authopia by NordPass, allows organizations to add passkey login options to their web domains.\u003C\u002Fp\u003E\u003Cp\u003ENordPass offers a 30-day money-back guarantee. A free trial is available for home and business plans; no credit card is required. You can sign up for a free account or a personal plan starting at $1.29 per month. NordPass Premium subscribers receive three months of service for free.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a password manager that offers advanced security features and is designed with business in mind, NordPass is an excellent choice. Users say the password manager is user-friendly, although the price can quickly increase.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENordPass f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EPassword generation and autofill | Two-factor authentication | Personal information and payment data storage | Password sharing and emergency access | Password breach scanner | Cross-device syncing | Biometrics | Trustpilot rating: 4.5 | Passwordless authentication\u003C\u002Fp\u003E\" data-hed=\"NordPass\" data-superlative=\"Best password manager for business\" data-imagegroup=\"{"alt":"NordPass","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"NordPass\u002FZDNET","imageData":{"id":"64e23e7a-ec01-4edd-a89c-45e36c22624d","title":"nordpass1","filename":"nordpass1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F11\u002F64e23e7a-ec01-4edd-a89c-45e36c22624d\u002Fnordpass1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":122652,"width":1296,"height":720,"dateCreated":{"date":"2024-06-11 09:15:15","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-11 09:15:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"nordpass1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"64e23e7a-ec01-4edd-a89c-45e36c22624d","imageAltText":"NordPass","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"NordPass\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nordpass1.jpg","imageDateCreated":"2024\u002F06\u002F11","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"NordPass\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"NordPass","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fgo.nordpass.io\u002Faff_c?offer_id=645&aff_id=307&url_id=24693&aff_sub=subid_value&source=ZDNET","url":""}]\" data-usepricing=\"true\" data-like=\"~ Secure sharing ~Health reports ~Useful business contact and team features\" data-dislike=\"~ Free version limited to a single device ~ Professional support limited to enterprise plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d7b1f70b-42b9-4fb4-8fca-f95b2c652101\" data-edition=\"us\" data-description=\"\u003Cp\u003EDashlane is the best password manager based on its extensive feature suite, which includes generous storage, VPN protection, and dark web monitoring.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIn addition to storing passwords, the web-first Dashlane platform securely stores your payments and personal information for easy input when you're on the web or logging into an app. You can store an unlimited number of passwords and sync your data to all your devices, ensuring you never go without access to your most important sites and apps.\u003C\u002Fp\u003E\u003Cp\u003EFeatures include 2FA compatibility, secure password sharing, emergency contacts, a VPN for safe browsing, form autofill, a digital payment wallet, a password generator, and an alert system to notify you when your passwords have been compromised.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDashlane has introduced&nbsp;\u003Ca href="https:\u002F\u002Fwww.dashlane.com\u002Fpasswordless" target="_blank"\u003Epasswordless authentication\u003C\u002Fa\u003E&nbsp;for new iOS and Android users, which removes the need for a master password, alongside \u003Ca href="https:\u002F\u002Fwww.youtube.com\u002Fwatch?v=cABmVNh-Vxo" target="_blank"\u003Epasswordless logins\u003C\u002Fa\u003E&nbsp;for the web.\u003C\u002Fp\u003E\u003Cp\u003EYou can try out a basic personal account for free, whereas an advanced subscription with a VPN will cost you $4.99 per month, billed annually. A family plan with up to 10 accounts costs $7.49 per month. Alternatively, you can opt for a business plan at $8 per seat, per month, or a fixed price of $20 per month for up to 10 seats.\u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a password manager that offers advanced security features like VPN protection and dark web monitoring, Dashlane is an excellent choice. Users note that premium options are somewhat pricey, and while the features are worthwhile, this may deter some customers.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDashlane f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003ESecure password storage and management |&nbsp;Digital wallet for online payments and receipts | Form autofill | Dark web monitoring | VPN for safe and private browsing | Password changer to quickly update weak passwords | Emergency contact access | ISO 27001 certified&nbsp;| Trustpilot rating: 4.3 |&nbsp;Passwordless authentication\u003C\u002Fp\u003E\" data-hed=\"Dashlane\" data-superlative=\"Best password manager for features\" data-imagegroup=\"{"alt":"zd-dashlane.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Dashlane\u002FZDNET","imageData":{"id":"705fc45d-8dde-4918-b95c-b2567611afd2","title":"Dashlane password manager","filename":"dashlane.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F705fc45d-8dde-4918-b95c-b2567611afd2\u002Fdashlane.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":170744,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:04:51","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:05:09","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Dashlane\u002FZDNET","alt":"Dashlane interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"705fc45d-8dde-4918-b95c-b2567611afd2","imageAltText":"zd-dashlane.jpg","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Dashlane\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dashlane.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Dashlane\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.tkqlhce.com\u002Fclick-9041660-15832565-1717701958000?sid=subid_value","offerMerchant":"Dashlane","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.dashlane.com\u002F","url":"https:\u002F\u002Fwww.tkqlhce.com\u002Fclick-9041660-15832565-1717701958000?sid=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Generous storage ~VPN protection ~Dark web monitoring ~ Going passwordless\" data-dislike=\"~ Plans can get pricey ~Device limitations\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8fa95e67-966a-4bd5-bdd2-e2ac95ce2670\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeeper Password Manager &amp; Digital Vault is the best password manager for security, with its multi-platform syncing, multi-factor authentication, and available templates. Keeper takes security seriously, using leading encryption technology (AES 256-bit encryption and PBKDF2) to protect your sensitive data from ransomware and data breaches.\u003C\u002Fp\u003E\u003Cp\u003EYou can store as many passwords as you want in your personal vault, with easy access via biometrics, a record organizer, and automatic syncing. Keeper also allows you to import existing credentials or easily share your vault records with trusted friends while keeping them safe from hackers.\u003C\u002Fp\u003E\u003Cp\u003EWhen it comes to 2FA, Keeper supports TOTP, SMS, Fingerprint (e.g. Touch ID), Face ID, and WebAuthn security keys. Additionally, the software is FIPS 140-2 validated.\u003C\u002Fp\u003E\u003Cp\u003EThere is 24\u002F7 customer support and business users can take advantage of Keeper working out-of-the-box with platforms like Okta, Azure AD, Ping Identity, and Google Workspace. Some features require a paid plan. Personal accounts start at $1.46 per month, whereas Keeper Business costs $7 per month per user for up to five seats.\u003C\u002Fp\u003E\u003Cp\u003EIf you are willing to use your email for self-verification, you can get a free trial without inputting your credit card information. Users report the UI is intuitive, but there can be a lack of customer support.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EKeeper Password Manager &amp; Digital Vault f\u003C\u002Fstrong\u003E\u003Cstrong\u003Eeatures:&nbsp;\u003C\u002Fstrong\u003EUnlimited password storage | Advanced security features including 2FA and biometrics |&nbsp;Supports multiple devices and platforms, including Windows, MacOS, iOS, Android, and web browsers | Password generator | Emergency contacts record sharing | Encrypted vault for storing sensitive documents | Trustpilot rating: 3.6 | Passwordless features available\u003C\u002Fp\u003E\" data-hed=\"Keeper Password Manager & Digital Vault\" data-superlative=\"Best password manager security\" data-imagegroup=\"{"alt":"Keeper Password Manager & Digital Vault","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Keeper\u002FZDNET","imageData":{"id":"8d32b40c-8c62-4850-8bfe-f5bbd6f1a260","title":"Keeper Password Manager & Digital Vault","filename":"keeper-password-manager-digital-vault.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F8d32b40c-8c62-4850-8bfe-f5bbd6f1a260\u002Fkeeper-password-manager-digital-vault.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":175291,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:42:29","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:42:47","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Keeper\u002FZDNET","alt":"Screenshot of Keeper Password Manager & Digital Vault interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8d32b40c-8c62-4850-8bfe-f5bbd6f1a260","imageAltText":"Keeper Password Manager & Digital Vault","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Keeper\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"keeper-password-manager-digital-vault.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Keeper\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":false,"monetizedUrl":"","offerMerchant":"Keeper","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"off","rawUrl":"https:\u002F\u002Fclick.linksynergy.com\u002Ffs-bin\u002Fclick?id=IokOf8qagZo&offerid=1261408.176&bids=1261408.176&type=3&subid=0&u1=subid_value","url":"https:\u002F\u002Fclick.linksynergy.com\u002Ffs-bin\u002Fclick?id=IokOf8qagZo&offerid=1261408.176&bids=1261408.176&type=3&subid=0&u1=subid_value"}]\" data-usepricing=\"true\" data-like=\"~ Syncing across multiple platforms ~Multi-factor authentication\" data-dislike=\"~ Autofill delays ~Some users report customer service, cancellation problems\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"04321c1b-1aca-4af0-a337-a968a976cabd\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe best password manager of 2024 is 1Password, which offers an affordable, easy way to store your passwords and personal data in a reliable, accessible manner. If you want to explore all of our top picks, below is an overview of the best password managers:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPassword manager\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EKey features\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EGoing passwordless?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E1Password\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly interface, an autofill feature, and account protection tools\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EBitwarden\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $1+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA user-friendly interface, fast uploads, smartphone compatibility, and other advanced security features\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESome features available\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordPass\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $1.29+ per user per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESecure sharing, health reports, multi-factor authentication, and advanced encryption\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EDashlane\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EFree \u002F $4.99+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EGenerous storage, VPN protection, dark web monitoring, and Chrome integration, passwordless options\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EYes\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EKeeper Password Manager &amp; Digital Vault\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$1.46+ per month\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMulti-platform syncing, multi-factor authentication, available templates, and top encryption technology\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ESome features available\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003ENote: Prices and features may vary based on the plan selected.\u003C\u002Fp\u003E\" data-hed=\"What is the best password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"972198da-69f1-4ac1-a671-28e97fac4a79\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this password manager...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003E1Password\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA family-friendly, one-stop-shop password manager. 1Password has features that allow you to easily share passwords with family members and manage multiple accounts. It's one of the best options out there.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EBitwarden\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free or affordable password manager. Bitwarden is open-source and available for use on all platforms. It will help you strengthen your online security, with free plans that include the software's core features.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordPass\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA password manager suitable for work. Its features, such as secure sharing and centralized billing, make it a great choice for teams and small businesses. Its personal plans are also worth exploring.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EDashlane\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EMulti-faceted features. Dashlane includes features like a VPN and dark web monitoring, which go beyond the typical functions of a password manager, with a focus on security and passwordless technologies.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EKeeper Password Manager &amp; Digital Vault\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA security-focused solution. Keeper has features like secure file storage, making it an ideal choice if you want to keep your data as safe as possible. Biometric access is a great additional feature.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the best password manager for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e7711145-a9d5-4777-b08c-07718c8b991d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere is a wide range of password managers on the market today. To help you make the right decision, consider these factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity:&nbsp;\u003C\u002Fstrong\u003ESecurity is the top priority when it comes to password managers. The most secure password managers offer advanced encryption and use safe protocols to protect personal information when transferring from the service to your device and vice versa.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EStorage:\u003C\u002Fstrong\u003E&nbsp;Another important consideration is storage capacity. While some password managers limit the number of passwords you can store, others offer unlimited storage so that you can add all your information without restrictions.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility:\u003C\u002Fstrong\u003E&nbsp;It's also essential to check if your preferred device and operating system are compatible with the password manager. The best options offer cross-platform compatibility, allowing you to access your data from multiple devices, including your computer, tablet, and mobile device.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAccounts\u003C\u002Fstrong\u003E: If you want to assign a person more than one identity or online account, consider whether the family (or business) accounts are worth the money.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFeatures\u003C\u002Fstrong\u003E: You may like a data breach scanner, secure vault, autofill, or passwordless options. If the additional features of password managers interest you, see if the solution you are interested has them.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EOpen source\u003C\u002Fstrong\u003E: Open-source options should be considered, when possible, as the code is open to outside auditing for security vulnerabilities and flaws. This can boost trust in a product.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a password manager\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f2edf640-90cd-4b84-a20b-5c2f5983952a\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn compiling this list of the best password managers, we examined third-party reviews and opinions from security experts. We also have hands-on experience with these password management tools because that's the only way to really get to know how usable a service is.\u003C\u002Fp\u003E\u003Cp\u003EWhen selecting the best password manager, several crucial factors must be considered. These are some of the key elements that determine the best options:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrice: \u003C\u002Fstrong\u003EWhile some password managers are free, others may require a paid subscription to access all features. It's important to weigh the price against the benefits and select a password manager that meets your budget.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECustomer reviews\u003C\u002Fstrong\u003E: Customer experiences and feedback are very important. If usability is overlooked, it really doesn't matter how secure or exceptional a password manager is. We consider customer reviews and ease of use as one of our most important criteria.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompany reputation\u003C\u002Fstrong\u003E: As you trust these organizations to manage your credentials securely, we only include reputable vendors that perform frequent security audits.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EUse cases\u003C\u002Fstrong\u003E: We wanted to include a range of password managers suitable for consumer and business use cases and purposes.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EUpdates\u003C\u002Fstrong\u003E: We like to see password manager services providing frequent security and usability updates.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPasswordless\u003C\u002Fstrong\u003E: While often still in the testing stages, in the name of longevity, we like to see services testing out these technologies.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"How did we choose the best password managers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"90fff618-71d3-4555-a279-bfd5701603f2\" data-edition=\"us\" data-description=\"\u003Cp\u003EPassword managers are digital tools that can help you keep safely track and organize all your passwords and other sensitive information. Once you create an account with a password manager, you can add your login credentials, credit card details, and other personal data into the password vault. You can add this information all at once or over time as you use different websites and apps.\u003C\u002Fp\u003E\u003Cp\u003EThe password manager will then store all your data in an encrypted format, making it difficult for hackers to decipher. Whenever you visit a site or use an app requiring login credentials, the password manager can automatically fill in your username and password for you. This feature can save you a lot of time and hassle, especially if you manage many different accounts.\u003C\u002Fp\u003E\u003Cp\u003EAnother feature of the best password managers is the ability to generate strong passwords. These passwords are typically long and random, making them more difficult to guess or crack. Password managers can create and store these complex passwords for you, making it much easier to keep your accounts secure.\u003C\u002Fp\u003E\u003Cp\u003EPassword managers can be invaluable for anyone who wants to keep their online accounts safe and secure.\u003C\u002Fp\u003E\" data-hed=\"How does a password manager work?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"70e14e09-60d3-4af5-a87b-3d68624bdb8c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIn today's digital age, almost everything we do requires a password, from social media to online banking, and it can be challenging to remember all the different passwords we create. The best way to manage these passwords is by using a password manager. Not only does it store your passwords in a central location, but it also provides strong encryption to keep your data safe from cybercriminals.\u003C\u002Fp\u003E\u003Cp\u003EUsing a password manager can also help prevent attacks and data breaches that expose your information to the wrong eyes. Cybercriminals use various methods to gain access to your passwords, from phishing attacks to brute-force attacks. You can also use a password manager to create strong, unique passwords for each account, reducing the risk of being hacked. Alternatively, some browsers, such as Google Chrome, offer built-in password managers.\u003C\u002Fp\u003E\" data-hed=\"Do I need a password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cf32d248-a4db-4cc9-ab1d-fec579d8f626\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, password managers are safe, as they use advanced encryption algorithms to protect your login credentials. When you use a password manager, your passwords are stored in an encrypted form, which means they can't be accessed by anyone without the correct password or passphrase.\u003C\u002Fp\u003E\u003Cp\u003EIt is important to choose a reputable password manager and use a strong, unique password or passphrase to protect your account. You should also remember there's no such thing as a 100% secure service, and on occasion, even the best password managers may have to patch and fix security vulnerabilities.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are password managers safe?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9e9892e3-6299-4eca-80c3-ef1578fec707\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile no system is completely invulnerable to hacking, the best password managers use strong encryption algorithms and other security measures to protect your data. They also require a strong master password or passphrase to access your account. It is important to use a unique and complex master password and enable two-factor authentication to increase security.\u003C\u002Fp\u003E\" data-hed=\"Can a password manager be hacked?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"eaebf286-d23a-4deb-93f3-01b5eae4438a\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, most password managers allow you to use your account on multiple devices, such as your computer, smartphone, or tablet. This means you can access your passwords and other login credentials from anywhere at any time.\u003C\u002Fp\u003E\" data-hed=\"Can I use a password manager on multiple devices?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e6d85a6c-ab14-48e8-ac58-d79975e17505\" data-edition=\"us\" data-description=\"\u003Cp\u003EPasswords may, one day, become a thing of the past, although we have a long way to go. Passwordless \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fgoogle-apple-microsoft-make-a-new-commitment-for-a-passwordless-future\u002F" target="_blank"\u003Eauthentication systems\u003C\u002Fa\u003E are linked most commonly to the FIDO Alliance, which promotes an open standard of passwordless authentication using passkeys. Passkeys are encrypted, safer than passwords, and use a key pair (only you have the private key) to authenticate at the time of a sign-in request.\u003C\u002Fp\u003E\" data-hed=\"What are passwordless options?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"befa48ca-6e82-467b-a498-4953d7cc2c2c\" data-edition=\"us\" data-description=\"\u003Cp\u003EGenerally speaking, yes. You will find that many security experts consider password managers to be one of the best solutions for managing countless complex passwords. No solution is completely safe from cyberattacks, so be mindful of this if you use them -- but anything is better&nbsp;than using weak passwords to protect your online accounts.\u003C\u002Fp\u003E\" data-hed=\"Do security experts recommend password managers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ac3de51-fc70-43a9-a764-6d20f67f1692\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you aren't keen on the idea of a password manager -- or a password manager alone -- we recommend that you purchase a physical security key. Physical security keys and dongles provide an additional layer of cryptographic protection for your online accounts, and unless an attacker has physical access to your key, it is challenging to compromise your credentials.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:&nbsp;\u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-security-key\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best security keys you can buy: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"What else could I use to protect my online accounts?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c8b19662-aa2d-4f46-b514-dfa4ea3c5fa7\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile we've aimed to showcase the best password managers in 2024, it isn't possible to highlight every worthy option on the market. In our search, we've also found other password managers that did not make the top list but are certainly worth exploring, as listed below.\u003C\u002Fp\u003E\" data-hed=\"Are there alternative password managers worth considering?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ea2e111c-86aa-4046-8ecf-7c09ddc45699\" data-edition=\"us\" data-description=\"\u003Cp\u003EEnpass is a freemium solid, secure password manager alternative suitable for storing and syncing passwords and passkeys from various services.\u003C\u002Fp\u003E\" data-hed=\"Enpass\" data-imagegroup=\"{"alt":"enpass password manager","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Enpass","imageData":{"id":"4bc2bcf2-634f-4f90-bfd2-64999d168281","title":"enpass password manager","filename":"3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F19\u002F4bc2bcf2-634f-4f90-bfd2-64999d168281\u002F3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":105685,"width":1296,"height":720,"dateCreated":{"date":"2024-11-19 08:05:10","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-11-19 08:05:27","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Enpass","alt":"enpass password manager","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4bc2bcf2-634f-4f90-bfd2-64999d168281","imageAltText":"enpass password manager","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Enpass","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"3.jpg","imageDateCreated":"2024\u002F11\u002F19","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Enpass\" data-linktext=\"Best alternative for syncing\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fenpass.pxf.io\u002Fc\u002F159047\u002F844649\u002F11801?&sharedid=zdnet&partnerpropertyid=1980086&u=https%3A%2F%2Fwww.enpass.io%2F&subId1=subid_value","offerMerchant":"Enpass","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.enpass.io\u002F","url":"https:\u002F\u002Fenpass.pxf.io\u002Fc\u002F159047\u002F844649\u002F11801?&sharedid=zdnet&partnerpropertyid=1980086&u=https%3A%2F%2Fwww.enpass.io%2F&subId1=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e05245eb-50e5-43f9-b621-9c0fb41fa0ec\" data-edition=\"us\" data-description=\"\u003Cp\u003EAs of iOS 18, Apple users can use Apple's new Passwords app to manage their credentials, for free.\u003C\u002Fp\u003E\" data-hed=\"Apple Passwords\" data-imagegroup=\"{"alt":"apple-passwords.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Emily Long\u002FZDNET","imageData":{"id":"d793fbaf-c310-444c-ac7d-e712efeb97a9","title":"apple-passwords","filename":"apple-passwords.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F15\u002Fd793fbaf-c310-444c-ac7d-e712efeb97a9\u002Fapple-passwords.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":214938,"width":1802,"height":1036,"dateCreated":{"date":"2024-11-15 21:01:34","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-11-15 21:01:42","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Screenshot by Emily Long\u002FZDNET","alt":"apple-passwords.png","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d793fbaf-c310-444c-ac7d-e712efeb97a9","imageAltText":"apple-passwords.png","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Emily Long\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"apple-passwords.png","imageDateCreated":"2024\u002F11\u002F15","imageWidth":1802,"imageHeight":1036,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Emily Long\u002FZDNET\" data-linktext=\"Best free alternative for Apple fans\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Apple","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F104955","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"364e0149-203c-4b12-96a3-4fc27c7c976d\" data-edition=\"us\" data-description=\"\u003Cp\u003ELogMeOnce offers advanced security features like anti-theft protection and multi-factor authentication. It has a free option and personal plans starting from $2.50 per month (or $7.99 per month per user for businesses). Students can get 50% off.\u003C\u002Fp\u003E\" data-hed=\"LogMeOnce\" data-imagegroup=\"{"alt":"LogMeOnce","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"LogMeOnce\u002FZDNET","imageData":{"id":"3725c221-956e-43bc-98c7-c680e6cebc80","title":"LogMeOnce","filename":"logmeonce.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F3725c221-956e-43bc-98c7-c680e6cebc80\u002Flogmeonce.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":152607,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:52:37","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:53:08","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"LogMeOnce\u002FZDNET","alt":"LogMeOnce interface","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3725c221-956e-43bc-98c7-c680e6cebc80","imageAltText":"LogMeOnce","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"LogMeOnce\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"logmeonce.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"LogMeOnce\u002FZDNET\" data-linktext=\"Best free alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=www.logmeonce.com%2Fpassword-manager%2F","offerMerchant":"LogMeOnce","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.logmeonce.com\u002Fpassword-manager\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=www.logmeonce.com%2Fpassword-manager%2F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0faa548b-7aaa-42e6-9e44-c0ec8ab75aae\" data-edition=\"us\" data-description=\"\u003Cp\u003EProton Pass is an open-source password manager with unlimited logins and notes. Premium plans are available from $2.99 per month, and family packs are available for $4.99\u002Fmonth during the Black Friday sale. A free plan is also available.\u003C\u002Fp\u003E\" data-hed=\"Proton Pass\" data-imagegroup=\"{"alt":"Proton Pass","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Proton Pass","imageData":{"id":"148e908e-442b-4c22-98ec-f286e104dd26","title":"Proton Pass","filename":"s.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F01\u002F25\u002F148e908e-442b-4c22-98ec-f286e104dd26\u002Fs.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":172279,"width":1296,"height":720,"dateCreated":{"date":"2024-01-25 13:43:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-01-25 13:43:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Proton Pass","alt":"Proton Pass","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"148e908e-442b-4c22-98ec-f286e104dd26","imageAltText":"Proton Pass","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Proton Pass","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"s.jpg","imageDateCreated":"2024\u002F01\u002F25","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Proton Pass\" data-linktext=\"Best alternative for open source technologies\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fproton.me\u002Fpass","offerMerchant":"Proton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fproton.me\u002Fpass","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fproton.me\u002Fpass"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c7e6b0c1-6524-4e78-b92f-5f45b551fc11\" data-edition=\"us\" data-description=\"\u003Cp\u003EExpressVPN Keys is a password manager built into the popular VPN service ExpressVPN. If you need both, this could be an excellent choice.\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN Keys\" data-imagegroup=\"{"alt":"ExpressVPN Keys","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ExpressVPN\u002FZDNET","imageData":{"id":"072d3f70-ea55-44f9-b693-fc342427cc04","title":"ExpressVPN","filename":"expressvpn-keys.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002F072d3f70-ea55-44f9-b693-fc342427cc04\u002Fexpressvpn-keys.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":110090,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 20:55:08","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 20:55:36","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ExpressVPN\u002FZDNET","alt":"ExpressVPN logo","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"072d3f70-ea55-44f9-b693-fc342427cc04","imageAltText":"ExpressVPN Keys","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ExpressVPN\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-keys.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ExpressVPN\u002FZDNET\" data-linktext=\"Best password manager alternative with a built-in VPN\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002Fkeys","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5789b628-b59f-4072-8c61-cd7300446525\" data-edition=\"us\" data-description=\"\u003Cp\u003ENorton Password Manager offers a simple-to-use extension, mobile app, and vault. Remember to write down your vault password, though.\u003C\u002Fp\u003E\" data-hed=\"Norton Password Manager\" data-imagegroup=\"{"alt":"Norton Password manager","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Norton\u002FZDNET","imageData":{"id":"af514dfc-d908-45b2-93cf-e575eb2289e8","title":"Norton password manager","filename":"norton-password-manager.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F13\u002Faf514dfc-d908-45b2-93cf-e575eb2289e8\u002Fnorton-password-manager.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":172822,"width":1296,"height":720,"dateCreated":{"date":"2023-06-13 21:00:35","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-06-13 21:00:48","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Norton\u002FZDNET","alt":"norton-password-manager","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"af514dfc-d908-45b2-93cf-e575eb2289e8","imageAltText":"Norton Password manager","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Norton\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"norton-password-manager.jpg","imageDateCreated":"2023\u002F06\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Norton\u002FZDNET\" data-linktext=\"Best free password manager and generator alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Norton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmy.norton.com\u002Fextspa\u002Fpasswordmanager","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E\u003Ch1\u003E\u003Cbr\u003E\u003C\u002Fh1\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 16:48:00",timezone:"UTC",updated:c,published:c},description:"Are you tired of remembering complex passwords across all your online services? A good password manager will do this for you. We tested the best password managers of 2024 to keep your credentials safe and simplify your login process.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"26df4e47-6e71-4eef-850f-da4dba63498c",image:{id:"b862507b-2772-4aa3-933a-ddcc287c836d",filename:"best-password-managers.jpg",dateCreated:{created:c,date:"2023-04-20 14:39:44",timezone:"UTC",updated:c,published:c},alt:"Password management. Weak and strong password.",credits:"Getty Images\u002FiStockphoto",caption:"\u003Cp\u003EPassword management. Weak and strong password.\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F20\u002Fb862507b-2772-4aa3-933a-ddcc287c836d\u002Fbest-password-managers.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^Password Manager",relatedItems:[]},name:b,promoTitle:"The best password managers: Expert tested",section:b,slug:"best-password-manager",startYear:c,summary:b,title:"The best password managers of 2024: Expert tested",topic:{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"926c7fe3-bac7-46e3-b421-bf633d90ee73",slug:"productivity",name:"Productivity",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"1a5ca947-c46a-4f02-ac88-a6c22b0ab7aa\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Charlie Osborne\u002FZDNET\" data-image-alt-text=\"expressvpn-windows-3\" data-image-filename=\"expressvpn-windows-3.jpg\" data-image-date-created=\"2024\u002F05\u002F21\" data-image-width=\"1296\" data-image-height=\"720\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EWith \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fearly-black-friday-2024-everything-you-need-to-know-about-holiday-shopping\u002F\" target=\"_blank\"\u003EBlack Friday\u003C\u002Fa\u003E landing soon, some excellent online deals are already launching for tech, gadgets, home products, and more (check out \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003Ethe best early Black Friday deals\u003C\u002Fa\u003E we've found so far here). VPN providers are also starting their sales early. We've been keeping an eye on the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-vpn-deals-2024\u002F\" target=\"_blank\"\u003Ebest Black Friday VPN deals\u003C\u002Fa\u003E available now, and an unusual deal has surfaced: one offered by \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"43dd8db6-4680-401f-9be4-c5f549092d18\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fp\u003E\u003Cp\u003EIf you agree to sign up for a two-year plan, you can save on ExpressVPN's typical $6.67\u002Fmonth price. Instead, you will \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"2315f8b5-c095-40c0-8be1-073a1d90e4da\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-link-shortcode-text=\"pay only $4.99\u002Fmonth\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. In addition, you will be given six months of free access. Alternatively, agree to a one-year contract, and you will pay $6.25\u002Fmonth, with four months of free service added to the length of your subscription. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"710ffd8f-b930-4dfd-913a-0f9bd7bf289e\" data-edition=\"us\" data-hed=\"ExpressVPN for $4.99\u002Fmonth + 6 months free\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"9236e0e2-6920-4e76-a41f-63f4b46ba109","filename":"expressvpn-web.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F9236e0e2-6920-4e76-a41f-63f4b46ba109\u002Fexpressvpn-web.jpg","dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"9236e0e2-6920-4e76-a41f-63f4b46ba109","imageFilename":"expressvpn-web.jpg","imageDateCreated":"2023\u002F11\u002F07"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.expressvpn.com\u002F\" data-offermerchant=\"ExpressVPN\" data-monetizedurl=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https:\u002F\u002Fwww.expressvpn.com\u002F&subId1=subid_value\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThat's not all, however. If you want blanket VPN coverage in your home, ExpressVPN has also cut the price of its routers, the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"2443a2f9-753f-4529-9ff4-03160b34cb4b\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-na\" data-monetized-url=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value\" data-link-shortcode-text=\"Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E and \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"120b0887-abc5-446f-b64e-b90a8eb25761\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-go-na\" data-monetized-url=\"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1654835\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value\" data-link-shortcode-text=\"Aircove Go\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, by 30% ahead of Black Friday. These routers come with ExpressVPN pre-installed for you and are priced at $133 and $119, respectively.\u003C\u002Fp\u003E\u003Cp\u003EA virtual private network (VPN) is an excellent way to enhance your online privacy and security. VPNs route your traffic through a server network, so you can choose where you would like your IP to appear from -- allowing you to avoid geolocation blocks -- while also hiding your original IP address. Modern VPNs also use strong encryption protocols to protect your data and prevent eavesdropping or tracking. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EReview:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EExpressVPN review: A fine VPN service, but is it worth the price?\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E \u003C\u002Fp\u003E\u003Cp\u003EExpressVPN is one of the fastest VPN services around. During our tests, ExpressVPN's speed often outperforms its competitors, and we also like the range of locations available in its server network, comprised of 105 countries. You can connect up to eight devices simultaneously. This VPN is also beginner-friendly, making it a great choice if you are new to the world of VPNs.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN rarely offers promotional prices. The standard price of a two-year plan is usually $6.67\u002Fmonth, so finding this VPN any cheaper is a deal worth noting. The $4.99\u002Fmonth price tag is still more expensive than some competitors, but when you consider the six months of free service included as a bonus, this Black Friday sale is one we recommend. There's a 30-day money-back guarantee, too, so you can test out the VPN and decide whether or not it is right for you.\u003C\u002Fp\u003E\u003Cp\u003EIf you're interested, check out \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7f13de6e-8c13-4dd0-b767-90fd035cc765\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN's deal\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E while it lasts. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3f1e70db-625b-4dda-bd59-485712352f28\" data-edition=\"us\" data-description=\"\u003Cp\u003EVPN pricing is subject to change at any time, although it is likely that this deal will stay live until the end of Black Friday or Cyber Monday. Deals are subject to sell-out or expire at any time, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOur team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We're sorry if you've missed out on this deal, but don't fret -- we're constantly finding new chances to score savings and sharing them with you at \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002F" target="_blank"\u003EZDNET.com\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"When will this deal expire?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"3aa16d16-8ccd-4f94-b2cc-91f3af21b2ff\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F3aa16d16-8ccd-4f94-b2cc-91f3af21b2ff\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 15:35:00",timezone:"UTC",updated:c,published:c},description:"ExpressVPN is one of our favorites with some of the best speeds available -- and it's on sale ahead of Black Friday.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"c7f60114-e082-4d02-abbe-bfea6f0375ae",image:{id:"7cf8be39-6942-4f62-832e-2cb7da94eb8f",filename:"expressvpn-mobile.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:40",timezone:"UTC",updated:c,published:c},alt:"prioritize-hands-on-images",credits:"Don't forget credit\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F7cf8be39-6942-4f62-832e-2cb7da94eb8f\u002Fexpressvpn-mobile.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"expressvpn-black-friday-deal-2024",startYear:c,summary:b,title:"ExpressVPN is now under $5 a month in rare Black Friday deal",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d20c33-288c-4293-bd76-6dc00bae78c9",username:"alison.denisco",profileUrl:c,email:c,firstName:"Alison",lastName:"DeNisco Rayome",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"74de94eb-6040-4185-941f-3396a8db41a9",filename:"ad-headshot-800x600px.jpg",dateCreated:{created:c,date:"2016-08-31 13:36:07",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2016\u002F08\u002F31\u002F74de94eb-6040-4185-941f-3396a8db41a9\u002Fad-headshot-800x600px.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Alison DeNisco Rayome is the Managing Editor of ZDNET Commerce. She was formerly a Managing Editor at CNET, covering software, services, and home tech, and a Senior Editor at TechRepublic, covering AI, cybersecurity, tech and the workplace, and CxO\u002Fleadership.",profile:c,title:"Managing Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EHave you ever Googled your name and realized how many sites out there have collected your address, phone number, and other personal information, and published it for anyone to find? If you want to delete some of that digital footprint, you might consider a subscription to \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ad18aca4-3110-49a8-ac15-3fa9d7a86ca5\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"DeleteMe\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, a service that removes your personal info from online platforms to help reduce your risk of identity theft, data breaches, and spam calls. Right now, a subscription is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"47f25209-b2cb-442f-a465-47d2533157d0\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"25% off for Black Friday with the coupon code BFCM25OFF\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"97e42384-a2ca-4c18-ab29-a457a428ad7d\" data-edition=\"us\" data-hed=\"DeleteMe one-year subscription for under $10 a month: Save 25% with code BFCM25OFF\" data-imagegroup=\"{"alt":"DeleteMe","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"DeleteMe","imageData":{"id":"88352dce-3d26-4aea-a890-72eba3d9da71","filename":"r.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F29\u002F88352dce-3d26-4aea-a890-72eba3d9da71\u002Fr.jpg","dateCreated":{"date":"2023-11-29 12:22:51","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"88352dce-3d26-4aea-a890-72eba3d9da71","imageFilename":"r.jpg","imageDateCreated":"2023\u002F11\u002F29"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"DeleteMe\" data-offerurl=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-offermerchant=\"DeleteMe\" data-monetizedurl=\"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735248?sid=subid_value\" data-techobjectinfo=\"{}\" data-usemonetization=\"true\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EI've used DeleteMe in the past, and was impressed with the results. The company sends a quarterly privacy report detailing what sites your information was found on, and where it was removed. It's also one of our tested top picks for the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-data-removal-services\u002F\" target=\"_blank\"\u003Ebest online data removal services\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003EThe best Black Friday deals live now\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAfter you sign up, the removal process starts, and you'll get your first security report within a week. The service will continue searching for and removing your information on an ongoing basis throughout the year.\u003C\u002Fp\u003E\u003Cp\u003EA yearly plan regularly costs $129 (or about $11 per month) for one person. You can also get a membership for couples or families, or sign up for up to two years starting at $209. The 25% off will come off that amount. \u003C\u002Fp\u003E\u003Cp\u003EDon't miss this deal for \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d16c9f38-bbdc-423f-9cf3-dee638d10546\" data-raw-url=\"https:\u002F\u002Fjoindeleteme.com\u002F\" data-link-shortcode-text=\"25% off a DeleteMe subscription\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E to keep yourself (or a loved one) safer online.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c543ca15-2713-46e1-9852-81413a5aab32\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis DeleteMe deal will run from Nov. 22 - Dec. 5, 2024. Deals are subject to sell out or expire at any time, though ZDNET remains committed to finding, sharing, and updating the best product deals for you to score the best savings. Our team of experts regularly checks in on the deals we share to ensure they are still live and obtainable. We're sorry if you've missed out on this deal, but don't fret -- we're constantly finding new chances to save and sharing them with you at&nbsp;\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002F" target="_blank"\u003EZDNET.com\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"When will this deal expire?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d1230917-eb26-4c49-ac65-e1ee9ebc33d1\" data-edition=\"us\" data-description=\"\u003Cp\u003EThis year, Black Friday falls on Friday, Nov. 29, the day after Thanksgiving in the US.\u003C\u002Fp\u003E\" data-hed=\"When is Black Friday?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"83511191-1b07-4c24-92ec-d985f062f58c\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F83511191-1b07-4c24-92ec-d985f062f58c\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 14:00:19",timezone:"UTC",updated:c,published:c},description:"DeleteMe helps remove your address, phone number, and other personal information from online platforms to protect you from identity theft, robocalls, and data breaches -- and it's 25% off for Black Friday.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"cbe39f43-d50a-4817-b14e-5b734fbd55e4",image:{id:"512952c7-2cb8-4b8d-bca1-bf0b08567277",filename:"gettyimages-2170708705.jpg",dateCreated:{created:c,date:"2024-11-21 19:41:58",timezone:"UTC",updated:c,published:c},alt:"holiday-placeholder-image",credits:"Getty\u002FMirageC",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F21\u002F512952c7-2cb8-4b8d-bca1-bf0b08567277\u002Fgettyimages-2170708705.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:7952,height:5304,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals",hubTopicPathString:"Tech^Services & Software",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"i-deleted-my-personal-info-from-the-internet-with-this-service-and-its-on-sale-for-black-friday",startYear:c,summary:b,title:"I deleted my personal info from the internet with this service (and it's on sale for Black Friday)",topic:{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"96093490-341e-45e4-b27a-bf297aa2c5bb",slug:"services-software",name:"Services & Software",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EVirtual private networks, also known as \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003EVPNs\u003C\u002Fa\u003E, are excellent tools to help protect your privacy and security. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best Black Friday deals live now\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAt ZDNET, \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Ewe've been testing top VPNs for years\u003C\u002Fa\u003E, and we recommend that you sign up for one to stop people from spying on your online activities. As VPNs create a secure, encrypted tunnel to protect your data and mask your IP address, you can use them as an additional layer of protection for changing your location, streaming, and more. \u003C\u002Fp\u003E\u003Cp\u003EIf you're looking for a great VPN deal ahead of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fearly-black-friday-2024-everything-you-need-to-know-about-holiday-shopping\u002F\" target=\"_blank\"\u003EBlack Friday\u003C\u002Fa\u003E, you're in luck. We found the best promotions and deals on VPN services before Black Friday begins next week. Check out our recommendations below. (While many of these are for a monthly price, you typically have to pay the full contract amount up front, though there are often money-back guarantees if you change your mind.)\u003C\u002Fp\u003E\u003Ch2\u003EOur favorite VPN deals for Black Friday 2024\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"acff2af3-3d56-4c6d-b15f-2714c7958594\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002Fpricing\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth + four months free: Surfshark's entry-level VPN plan is only $1.99\u002Fmonth on a two-year contract. It's also our tested pick for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003Ethe best-value VPN\u003C\u002Fa\u003E. (Stack Social is also running a deal to get you \u003Ca href=\"https:\u002F\u002Fwww.stacksocial.com\u002Fsales\u002F3-year-subscription?aid=a-ceempx7z&utm_source=zdnet.com&utm_medium=referral&utm_campaign=3-year-subscription_111024&utm_term=scsf-609808&utm_content=a0xRn000002fVmjIAE&scsonar=1\" target=\"_blank\"\u003Ea three-year contract for $84\u003C\u002Fa\u003E.)\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3a1ec4ac-1917-4b8b-85f6-f4d04e7e3665\" data-raw-url=\"https:\u002F\u002Fprivadovpn.com\u002F\" data-link-shortcode-text=\"PrivadoVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.11\u002Fmonth + three months free: Another excellent deal is for PrivadoVPN, a VPN service with a reasonable server network that's also one of our picks for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-cheap-vpn\u002F\" target=\"_blank\"\u003Ethe best cheap VPNs\u003C\u002Fa\u003E. If you select the two-year plan you pay only $1.11\u002Fmonth, or if you want an annual subscription, you will pay only $1.33\u002Fmonth.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8ab759ba-349f-4a82-aafc-263f1d59381d\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002Fpricing\u002Fnordvpn-plan-site\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $3.59\u002Fmonth + three months free: NordVPN is one of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnordvpn-review\u002F\" target=\"_blank\"\u003Eour favorite VPNs across the board\u003C\u002Fa\u003E for speed, streaming, and security. You will receive three months of free access if you sign up for a one- or two-year contract.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ff8f159c-bc05-46d0-887d-6d7fd35c5c78\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $4.99\u002Fmonth + six months free: It's unusual for ExpressVPN to go on sale, so it's worth considering the Black Friday promotion on a two-year contract. Instead of the typical $6.67\u002Fmonth price, you will pay $4.99\u002Fmonth and be given six months of access for free. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"379d80ce-67bc-4685-b72f-7548ad6b0c23\" data-raw-url=\"https:\u002F\u002Fprotonvpn.com\u002Fl\u002Fbf-vpn-deals\" data-link-shortcode-text=\"Proton VPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.99\u002Fmonth: Proton VPN features one of \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-free-vpn\u002F\" target=\"_blank\"\u003Eour favorite free VPN offerings\u003C\u002Fa\u003E. With this Black Friday discount, you can upgrade to its paid tier for $2.99 a month (70% off the usual price) when you sign up for two years.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0f49c4d5-3635-48f6-82a2-2f0d1e16e398\" data-raw-url=\"https:\u002F\u002Fwww.purevpn.com\u002Forder\" data-monetized-url=\"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=38687&u1=subid_value&murl=https%3A%2F%2Fwww.purevpn.com%2Forder\" data-link-shortcode-text=\"PureVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth: If you want a set-and-forget VPN for up to five years, consider the discounts available when you sign up for a PureVPN subscription. Ahead of Black Friday, a standard five-year contract will only cost $1.99\u002Fmonth. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"67bccb1a-0ccf-4d72-bbe8-1ce92135f52c\" data-raw-url=\"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online\" data-link-shortcode-text=\"Private Internet Access\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.03\u002Fmonth + four months free: Also known as PIA, Private Internet Access is a solid VPN and our pick for the best open-source option, which, ahead of Black Friday, is only $2.03\u002Fmonth if you agree to a two-year contract. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"6161795c-9321-426b-8b85-3b5d65fd0c60\" data-raw-url=\"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fbuy\u002Fcyberghost-vpn-3\" data-monetized-url=\"https:\u002F\u002Fwww.jdoqocy.com\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value\" data-link-shortcode-text=\"CyberGhost\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $2.03\u002Fmonth + four months free: CyberGhost is an excellent VPN option if you want a service that can handle streaming services without fuss. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"19ae30eb-1e12-4dbd-8228-12188756abf4\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $1.99\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ESurfshark's entry-level VPN plan is on sale ahead of Black Friday. You will only pay $1.99\u002Fmonth on a two-year contract, and as a bonus, you will be given four months of free access, added to the length of the contract.\u003C\u002Fp\u003E\u003Cp\u003EWe recommend Surfshark as an affordable VPN suitable for beginners and experienced users alike. It offers excellent value for money, reasonable speeds, and a solid server network.\u003C\u002Fp\u003E\" data-hed=\"Surfshark\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","title":"Surfshark VPN Mobile","filename":"surfshark-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F3e5d7128-8a4d-42c9-ae10-d3ecb0729a64\u002Fsurfshark-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1118835,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Surfshark VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"3e5d7128-8a4d-42c9-ae10-d3ecb0729a64","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsurfshark.com\u002Fpricing","url":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a73487c5-a7bb-4b31-b605-a970c0e81b25\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $1.11\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThree months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EPrivadoVPN is a consistently affordable VPN with a reasonably sized server network. If you sign up for a two-year plan, you will only pay $1.11\u002Fmonth, and you will be given three months of free access. This VPN service also comes with useful features such as ad blocking and parental controls.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Privado VPN\" data-superlative=\"Three months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Privado VPN","imageData":{"id":"1a46ee58-dae3-46db-b696-e89187590732","title":"privado-vpn-logo","filename":"privado-vpn-logo.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F11\u002F14\u002F1a46ee58-dae3-46db-b696-e89187590732\u002Fprivado-vpn-logo.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":132050,"width":1296,"height":720,"dateCreated":{"date":"2022-11-14 15:46:45","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-11-14 15:46:55","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Privado VPN","alt":"privado vpn logo","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1a46ee58-dae3-46db-b696-e89187590732","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Privado VPN","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"privado-vpn-logo.jpg","imageDateCreated":"2022\u002F11\u002F14","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Privado VPN\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2519239&u=514792&m=152571&afftrack=subid_value&urllink=privadovpn.com%2Fpricing%2F","offerMerchant":"PrivadoVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprivadovpn.com\u002Fpricing\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2519239&u=514792&m=152571&afftrack=subid_value&urllink=privadovpn.com%2Fpricing%2F"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0e3a2012-f69a-4767-9108-380f8707a8b6\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $3.59\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThree months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ENordVPN is one of our favorite VPNs for speed and security. It offers an excellent server network with 111 countries, easy-to-use apps across numerous operating systems, and great customer support. Ahead of Black Friday, you can pay $3.59\u002Fmonth (on a two-year contract) and enjoy three months of free access.\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Three months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"1eead599-77e0-4877-bff5-ca101ca11758","title":"Nord VPN Mobile","filename":"nord-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F1eead599-77e0-4877-bff5-ca101ca11758\u002Fnord-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1301632,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Nord VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"1eead599-77e0-4877-bff5-ca101ca11758","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nord-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnordvpn.com\u002Fpricing\u002Fnordvpn-plan-site\u002F","url":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ebdc07ca-fb03-462a-a67b-da9a809d78a6\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $2.03\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EPrivate Internet Access, also known as PIA, is a solid VPN that often launches promotional deals. Ahead of Black Friday, you can sign up for only $2.03\u002Fmonth if you are happy to agree to a two-year contract. As a bonus, four months of free access have been thrown in.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"87626edc-7682-4b14-9655-b980eed70a19","title":"Private Internet Access VPN Mobile","filename":"private-internet-access-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F87626edc-7682-4b14-9655-b980eed70a19\u002Fprivate-internet-access-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1161293,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Private Internet Access VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"87626edc-7682-4b14-9655-b980eed70a19","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"private-internet-access-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value","offerMerchant":"PIA","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002Fbuy-vpn-online","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-14351883-1682250314000?sid=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ab4d6d67-8bed-4c0a-9811-b832b0da885c\" data-edition=\"us\" data-description=\"\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ECurrent price: $2.03\u002Fmonth\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFour months free\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ECyberGhost is an excellent VPN option if you want a service able to handle streaming services without any fuss. Currently, the VPN provider has a promotional deal available on two-year contracts: you will pay the equivalent of $2.03\u002Fmonth and you will receive four&nbsp;months of free access at the end of your plan.\u003C\u002Fp\u003E\" data-hed=\"CyberGhost\" data-superlative=\"Four months free\" data-imagegroup=\"{"alt":"holiday-placeholder-image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"cf93d149-d4f6-41a4-ac08-29256c513cfd","title":"Cyberghost VPN Mobile","filename":"cyberghost-vpn-mobile.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002Fcf93d149-d4f6-41a4-ac08-29256c513cfd\u002Fcyberghost-vpn-mobile.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1082580,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:41","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Cyberghost VPN Mobile","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"cf93d149-d4f6-41a4-ac08-29256c513cfd","imageAltText":"holiday-placeholder-image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"cyberghost-vpn-mobile.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value","offerMerchant":"CyberGhost","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.cyberghostvpn.com\u002Fbuy\u002Fcyberghost-vpn-3","url":"https:\u002F\u002Fwww.dpbolvw.net\u002Fclick-9041660-15735261?url=https%3A%2F%2Fwww.cyberghostvpn.com%2Fbuy%2Fcyberghost-vpn-3&sid=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EBest Black Friday long-term VPN deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"0f49c4d5-3635-48f6-82a2-2f0d1e16e398\" data-raw-url=\"https:\u002F\u002Fwww.purevpn.com\u002Forder\" data-link-shortcode-text=\"PureVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99\u002Fmonth: If you want a set-and-forget VPN for up to five years, consider the discounts available when you sign up for a PureVPN subscription. Ahead of Black Friday, you will only pay $1.99\u002Fmonth on a standard five-year contract. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ff8f159c-bc05-46d0-887d-6d7fd35c5c78\" data-raw-url=\"https:\u002F\u002Fwww.expressvpn.com\u002Forder\" data-link-shortcode-text=\"ExpressVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $4.99\u002Fmonth (six months free): It's unusual for ExpressVPN to go on sale, so it's worth considering the Black Friday promotion on a two-year contract. Instead of the typical $6.67\u002Fmonth price, you will pay $4.99\u002Fmonth and you will be given six months of access for free. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EBest Black Friday family VPN deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"acff2af3-3d56-4c6d-b15f-2714c7958594\" data-raw-url=\"https:\u002F\u002Fsurfshark.com\u002Fpricing\" data-monetized-url=\"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786\" data-link-shortcode-text=\"Surfshark\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.99 (four months free): Surfshark's entry-level VPN plan is $1.99\u002Fmonth on a two-year contract and as it offers unlimited simultaneous connections, it's a great option for families. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3a1ec4ac-1917-4b8b-85f6-f4d04e7e3665\" data-raw-url=\"https:\u002F\u002Fprivadovpn.com\u002F\" data-link-shortcode-text=\"PrivadoVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $1.11 (three months free): PrivadoVPN, available for only $1.11\u002Fmonth, is a VPN service with a reasonable server network, parental controls, and ad blocking.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"6287b204-a70e-4a91-b04c-9c94c891c84d\" data-raw-url=\"https:\u002F\u002Fus.norton.com\u002Fpromo\u002Fpaid-search\u002Fvpn-fast\" data-monetized-url=\"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fus.norton.com\u002Fpromo\u002Fpaid-search\u002Fvpn-fast\" data-link-shortcode-text=\"Norton Ultra VPN Plus\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $60\u002Fyear: Norton Ultra VPN Plus is also offering a family plan for $5\u002Fmonth. This plan allows you to protect up to 10 devices and use parental controls, including screen time restrictions. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EBest Black Friday VPN router deals\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"bcbf09be-4b9c-447a-aef1-065ab518857d\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FASUS-AX1800-Router-RT-AX1800S-Subscription-Free\u002Fdp\u002FB09M9477NS\" data-link-shortcode-text=\"ASUS RT-AX1800S wireless router:\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E $69 (save $21 at Amazon): The ASUS RT-AX1800S is a budget-friendly router with a built-in VPN.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"eb852638-19f2-4965-992d-c6e6c8d8107b\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FGL-iNet-GL-AXT1800-Pocket-Sized-Extender-Repeater\u002Fdp\u002FB0B2J7WSDK\" data-link-shortcode-text=\"GL.iNet GL-AXT1800 travel router\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $93 (save $56 at Amazon): If you need a pocket-sized, travel-friendly router, this option supports AdGuard Home, OpenVPN, or WireGuard-based VPN services.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"d263fd29-c643-4741-886e-c6b3dee27ef6\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-Tri-Band-Archer-AXE75-Wireless\u002Fdp\u002FB0B3SQK74L\" data-link-shortcode-text=\"Archer AXE75 router\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $135 (save $65 at Amazon): You can also save $20 on the TP-Link Archer AXE75, a budget-friendly Wi-Fi 6 router with VPN client support.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"4ea617c1-3d5d-4664-a27b-d672bd74b124\" data-raw-url=\"https:\u002F\u002Fwww.flashrouters.com\u002Fcudy-m3000-mesh-vpn-router-by-flashrouters\" data-link-shortcode-text=\"M3000 WiFi 6 Mesh VPN FlashRouter\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $260 (save $120 at FlashRouters): If you need a VPN solution for large homes and multiple devices, consider the $120 discount on an M300 model.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"88a46782-11bf-4030-82a6-83a73c492e2a\" data-raw-url=\"https:\u002F\u002Fstore-us.gl-inet.com\u002Fproducts\u002Fbrume-2-gl-mt2500a-ultra-efficient-vpn-security-gateway-router\" data-link-shortcode-text=\"Brume 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $67 (save $22 at GL.iNet: If you need a compact VPN gateway, you can enjoy a $22 discount on the Brume 2, a device set with a USB-C connector and both Wireguard and OpenVPN pre-installed.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"c61b4b36-1829-4e71-857c-4b67b50794a5\" data-raw-url=\"https:\u002F\u002Fwww.bestbuy.com\u002Fsite\u002Fasus-rog-rapture-gt-ax11000-pro-tri-band-wifi-6-gaming-router-2-5g-port-black\u002F6531152.p?skuId=6531152\" data-link-shortcode-text=\"ASUS ROG Rapture GT-AX11000\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $360 (save $40 at Best Buy): You can take advantage of a great discount on a powerful VPN-ready router, the ASUS ROG Rapture, at Best Buy. \u003Cbr\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ceb794a1-4e7a-4286-9218-e718a8fa76dc\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-AC1900-Smart-WiFi-Router\u002Fdp\u002FB07Z56LHZV\" data-link-shortcode-text=\"TP-Link Archer A9\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $52 (save $7 at Amazon): If you are looking for a cheap router capable of handling VPN software, you can pick up a renewed model at Amazon for only $50.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"3fdd80e6-04c7-4267-94cd-628115123926\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FTP-Link-WiFi-6-Gaming-Router\u002Fdp\u002FB08TGKX9MT\" data-link-shortcode-text=\"TP-Link Archer GX90\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $230 (save $20 at Amazon): Another option is the TP-Link Archer GX90. This is a powerful, future-proof tri-band router that gamers will love.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"bcc1bb14-dc70-4526-b4c0-61ef40fafbd6\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-na\" data-link-shortcode-text=\"ExpressVPN Aircove\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E: $133 (save $57 at ExpressVPN): If you want a router with an inbuilt VPN -- and one of the best VPNs we currently recommend -- consider the discount available on the ExpressVPN Aircove. For a portable version, you can also save $51 on the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"29156f77-0a79-41fa-ac51-a5c0ef2529de\" data-raw-url=\"https:\u002F\u002Fstore.expressvpn.com\u002Fproducts\u002Faircove-go-na\" data-link-shortcode-text=\"Aircove Go\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2\u003EFAQs\u003C\u002Fh2\u003E\u003Ch3\u003EWhen is Black Friday?\u003C\u002Fh3\u003E\u003Cp\u003EIn 2024, Black Friday will launch on Nov. 29, one day after Thanksgiving, in the United States. Deals will appear not only on the actual day but also during the week of Black Friday and days afterward. The best sales will likely emerge from Nov. 29 to Dec. 2.\u003C\u002Fp\u003E\u003Ch3\u003EWhen is Cyber Monday?\u003C\u002Fh3\u003E\u003Cp\u003ECyber Monday will land on Dec. 2 this year. There will be plenty of deals on tech, accessories, clothing, and more in the run-up to Thanksgiving, throughout Black Friday week, and during Cyber Monday. \u003C\u002Fp\u003E\u003Ch3\u003EAre VPN deals really better on Black Friday?\u003C\u002Fh3\u003E\u003Cp\u003EThey can be. Many VPN providers use countdown timers as marketing tools and display the typical plan price as a \"sale\" rate, but this doesn't mean that the occasional promotion isn't genuine. Historically, we've seen some great deals appear for VPNs around Thanksgiving and Black Friday.\u003C\u002Fp\u003E\u003Ch3\u003EWhat's the difference between Black Friday and Cyber Monday?\u003C\u002Fh3\u003E\u003Cp\u003EBlack Friday and Cyber Monday are similar, but one appears before the other. Black Friday launches on Nov. 29, 2024, while Cyber Monda will launch on Dec. 2. The days in between are often called Cyber Week.\u003C\u002Fp\u003E\u003Ch3\u003EHow did we choose these Black Friday deals?\u003C\u002Fh3\u003E\u003Cp\u003EAt ZDNET, we only write about products we like or want to buy, and we endeavor to let you know about every deal we find that we believe offers great value. Our deal-hunting experts look for deals that are at least 20% off retail price, when possible, but we also highlight deals for products that are rarely on sale, such as Apple devices.\u003C\u002Fp\u003E\u003Cp\u003EWe consider customer reviews and our own hands-on product experience and conduct extensive research to ensure we only recommend the best deals. We aim to help you shop smarter and get the best return for your money. \u003C\u002Fp\u003E\u003Ch3\u003EWhere can you shop the best Black Friday and Cyber Monday deals? \u003C\u002Fh3\u003E\u003Cp\u003EYou can enjoy the in-store Black Friday and Cyber Monday sales at major retailers like Walmart, Best Buy, and Target. However, in recent years, many shoppers have opted to make their purchases online, with Amazon becoming one of the top retailers to visit.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"26af060d-46bc-4ba7-85be-be2f4246a469\" data-edition=\"us\" data-description=\"\u003Cp\u003EZDNET's experts have been searching through Black Friday sales live now to find the best discounts by category. These are the best Black Friday deals so far, by category:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-tv-deals-2024\u002F"\u003EBlack Friday TV deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-phone-deals-2024\u002F"\u003EBlack Friday phone deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-laptop-deals-2024\u002F"\u003EBlack Friday laptop deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-gaming-deals-2024\u002F"\u003EBlack Friday gaming deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-gaming-pc-deals-2024\u002F"\u003EBlack Friday gaming PC deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-tablet-deals-2024\u002F"\u003EBlack Friday tablet deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-smartwatch-and-fitness-tracker-deals-2024\u002F"\u003EBlack Friday smartwatch and fitness tracker deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-headphone-deals-2024\u002F"\u003EBlack Friday headphone deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-monitor-deals-2024\u002F"\u003EBlack Friday monitor deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fkitchen-household\u002Fbest-black-friday-robot-vacuum-deals-2024\u002F"\u003EBlack Friday robot vacuum deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fbest-black-friday-security-camera-deals-2024\u002F"\u003EBlack Friday security camera deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-storage-and-ssd-deals-2024\u002F"\u003EBlack Friday storage and SSD deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fenergy\u002Fbest-black-friday-portable-power-station-deals-2024\u002F"\u003EBlack Friday portable power station deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-streaming-deals-2024\u002F"\u003EBlack Friday streaming deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-vpn-deals-2024\u002F"\u003EBlack Friday VPN deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-chromebook-deals-2024\u002F"\u003EBlack Friday Chromebook deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-ipad-deals-2024\u002F"\u003EBlack Friday iPad deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-airpods-deals-2024\u002F"\u003EBlack Friday AirPods deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-apple-watch-deals-2024\u002F"\u003EBlack Friday Apple Watch deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-kindle-deals-2024\u002F"\u003EBlack Friday Kindle deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-roku-deals-2024\u002F"\u003EBlack Friday Roku deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fkitchen-household\u002Fbest-black-friday-roborock-deals-2024\u002F"\u003EBlack Friday Roborock deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-hp-deals-2024\u002F"\u003EBlack Friday HP deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-nintendo-switch-deals-2024\u002F"\u003EBlack Friday Nintendo Switch deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-playstation-5-deals-2024\u002F"\u003EBlack Friday PlayStation deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EYou can also find the best Black Friday deals by price:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-deals-under-25-2024\u002F"\u003EBlack Friday deals under $25\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-deals-under-100-2024\u002F"\u003EBlack Friday deals under $100\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAnd the best Black Friday deals by retailer:&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-amazon-deals-2024\u002F"\u003EBlack Friday Amazon deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-best-buy-deals-2024\u002F"\u003EBlack Friday Best Buy deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fbest-black-friday-walmart-deals-2024\u002F"\u003EBlack Friday Walmart deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-apple-deals-2024\u002F"\u003EBlack Friday Apple deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-black-friday-samsung-deals-2024\u002F"\u003EBlack Friday Samsung deals\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"What are the best Black Friday 2024 deals?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"83511191-1b07-4c24-92ec-d985f062f58c\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F83511191-1b07-4c24-92ec-d985f062f58c\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-22 09:24:00",timezone:"UTC",updated:c,published:c},description:"Looking for a deal on a VPN before Black Friday? We found the best promotions around for secure, private, and trustworthy VPN solutions that we've tested.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"38f6e5d5-4f2e-407a-b3d0-df5308ccc175",image:{id:"4d9748ea-120e-46ed-8c9d-274b053386c9",filename:"vpn.png",dateCreated:{created:c,date:"2023-10-23 17:41:45",timezone:"UTC",updated:c,published:c},alt:"holiday-placeholder-image",credits:"bymuratdeniz\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F10\u002F23\u002F4d9748ea-120e-46ed-8c9d-274b053386c9\u002Fvpn.png",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1296,height:720,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"deals-roundup",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"best-black-friday-vpn-deals-2024",startYear:c,summary:b,title:"The best Black Friday VPN deals 2024: Early sales live now",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"ab2ae5cc-62fd-4292-a0b0-fb223738c1de",username:"ksolino",profileUrl:c,email:c,firstName:"Kayla",lastName:"Solino",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"523fff3e-db1c-4997-8e16-2dfa40989bc3",filename:"img-2794.jpg",dateCreated:{created:c,date:"2023-10-02 14:47:16",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F10\u002F02\u002F523fff3e-db1c-4997-8e16-2dfa40989bc3\u002Fimg-2794.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Kayla Solino is a ZDNET Associate Editor based in New York City and New Jersey. She has a master's degree in journalism from the University of Alabama. Some of her past bylines include Inc., Fortune, and The Crimson White. In her spare time, she enjoys keeping up with all things Crimson Tide, binging British Bake Off, and baking.",profile:c,title:"Associate Editor",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EDid you know \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"f58c0548-5937-4629-b078-8eb89cbd8deb\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX532AM-A-AirTag\u002Fdp\u002FB0933BVK6T\" data-link-shortcode-text=\"AirTags\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E can be used for more than just locating your keys? \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fapples-airtag-4-pack-is-20-off-with-this-deal-ahead-of-black-friday\u002F\" target=\"_blank\"\u003EAirTags\u003C\u002Fa\u003E are handy for tracking your essentials, and in 2024, there are configurations that allow you to attach them to keys, pets, bags, and even water bottles. Perhaps one of the most useful places for an AirTag, though, is your wallet. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best Bluetooth trackers you can buy: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EAs with any functional accessory, the market is full of different AirTag wallets, accessories, and more. Keep in mind that what you may actually be looking for is a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthe-best-airtag-you-can-buy-for-your-wallet-isnt-made-by-apple-and-its-rechargeable\u002F\" target=\"_blank\"\u003EBluetooth tracking card\u003C\u002Fa\u003E or another nifty wallet gadget. That's why we tested plenty of the smart options available to ensure you never lose your wallet again, evaluating capacity, security, and cost. We also combined expert research and analysis to make sure we've considered the most functional AirTag wallets or tracking accessories for you.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EThe best AirTag accessories you can buy\u003C\u002Fa\u003E \u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Ch2\u003EWhat's the best AirTag wallet right now?\u003C\u002Fh2\u003E\u003Cp\u003EOur pick for the best AirTag wallet overall is the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"7a796acb-0200-4998-b80b-adb43a1baa07\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1\" data-link-shortcode-text=\"Ridge Wallet\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, because it offers plenty of room for cards and cash in a stylish and customizable design. It's also durable and offers great value over time. Keep reading to see how our other top AirTag wallets and accessories stack up and find the best option for your lifestyle. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fattention-apple-airtag-users-dont-ignore-this-warning\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EAttention Apple AirTag users: Don't ignore this warning\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EThe best AirTag wallets of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d91f856a-a907-4c05-b637-f98b4a639626\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge wallet is a slim RFID-blocking wallet designed to hold up to 12 cards. Cash can be stored via a cash strap or money clip on the outside of the wallet, and the brand offers three AirTag configurations for tracking: an AirTag holder designed to \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BXBL1345" target="_blank"\u003Efit into the cash strap\u003C\u002Fa\u003E or \u003Ca href="https:\u002F\u002Fwww.amazon.com\u002FRidge-Airtag-Case-Holder-Attachment\u002Fdp\u002FB0BQZCV5HY" target="_blank"\u003Ereplace the money clip\u003C\u002Fa\u003E for $25, or the \u003Ca href="https:\u002F\u002Fridge.com\u002Fproducts\u002Fcarbon-case-for-airtag" target="_blank"\u003EAirTag carbon add-on holder\u003C\u002Fa\u003E that attaches outside any Ridge wallet for $40.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe Ridge offers durability and functionality while also providing top-notch security and smart capabilities. Although it is a bit pricey, it has a lifetime warranty to keep up with your daily use and a risk-free 99-day trial period. All things considered, a quality, traditional leather-style wallet could easily run you over the $100 mark, too, which makes this long-term investment worth it, in my opinion.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EI gifted this wallet to my Dad a year before using one myself, and I can confidently say it's a winner. Prior to gifting him the Ridge, he used several other wallets, including a traditional leather and titanium case style, but none of them fit his needs.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMy Dad is a shove-everything-into-your-pockets-and-go kind of person, and no wallet could ever keep all his cards, cash, and receipts organized until the Ridge. The minimalist design helps ensure he can put what he really needs into his wallet and makes it easy to access cards and cash when he wants.\u003C\u002Fp\u003E\u003Cp\u003EI initially thought the maneuvering to slide the cards in and out would be annoying, but after a little practice, he said it became second nature and is surprisingly easier than opening and removing cards or cash from a traditional wallet. I agree that there's a brief learning curve involved, but once you get it down, it's a non-issue.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe practicality, coupled with the RFID technology, numerous color and metal options, and the addable AirTag tracker, makes the Ridge nearly faultless. Although it can get a little chunky when it's full to the brim with cards (but alas, what wallet doesn't?). This is a great wallet for small handbags, concert or stadium bags, and going out on the town, too.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ridge customers said on the website that they liked the wallet capacity, durability, design, and functionality of the Ridge wallet. The wallet features a 4.8\u002F5 starts online, and 97% of customers said they'd recommend the Ridge wallet to a friend. Several customers said they were repeat purchasers and that their wallets stood the test of time.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: The Ridge wallet is 20% off (save $20) on Amazon in select colors at the time of publication.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ERidge Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003EAluminum&nbsp;\u003Cstrong\u003E|\u003C\u002Fstrong\u003E RFID blocking | Accessories and add ons available | Several materials and designs&nbsp;| Cash strap or money clip for cash storage | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;86 x 54 x 6 mm&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ridge Wallet\" data-superlative=\"Best AirTag wallet overall\" data-imagegroup=\"{"alt":"img-0675","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","title":"ridge-wallet","filename":"img-0675.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002Fb5a3a5b6-041b-44b4-b2d1-5028597f10b3\u002Fimg-0675.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1303963,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-08 18:48:12","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 18:48:50","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":null,"alt":"img-0675","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"b5a3a5b6-041b-44b4-b2d1-5028597f10b3","imageAltText":"img-0675","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-0675.jpg","imageDateCreated":"2024\u002F04\u002F08","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offer=\"{"id":"a164cfc7-0f98-4b47-a698-ad7a30009aff","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","label":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"a164cfc7-0f98-4b47-a698-ad7a30009aff","name":"The Ridge Minimalist Slim Wallet For Men - RFID Blocking Front Pocket Credit Card Holder - Aluminum Metal Small Mens Wallets with Money Clip (Carbon Fiber)","slug":"the-ridge-minimalist-slim-wallet-for-men-rfid-blocking-front-pocket-credit-card-holder-aluminum-metal-small-mens","productType":"SERIES","updateType":"PRISM","mod":1732026171142,"displayDate":"Tue Nov 19 2024 09:22:51 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FRidge-Wallets-Men-Minimalist-Wallet\u002Fdp\u002FB0CN1SJ3X4?th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Durable ~ RFID-blocking ~ Relatively slim yet multi-functional ~ Minimalist design ~ Unique colors and designs\" data-dislike=\"~ Expensive ~ Must buy AirTag holder components as add-ons ~ Can become bulky for pockets when full ~ Certain finishes may scratch\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e223c11-5dbb-41f5-a4e3-2c83453971fc\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're not dead set on using an AirTag wallet or \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories" target="_blank"\u003EAirTag accessory\u003C\u002Fa\u003E to track your wallet, it may be worth it to consider a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E equipped with location tracking. The Journey LOC8 is the finder wallet version of our pick for best overall MagSafe wallet, the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Fezmo-magsafe-wallet-phone-stand?" target="_blank"\u003EEzmo wallet\u003C\u002Fa\u003E (pictured above).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EJourney's MagSafe wallet is the perfect balance of style and function with enough space to hold 5 cards. The wallet also doubles as a phone stand, so you can watch your favorite entertainment on the go or keep your phone screen visible at your desk. The stand has adjustable viewing angles in both portrait and landscape modes and features a protective lining to safeguard your cards' information with RFID-blocking technology while preventing them from becoming demagnetized.\u003C\u002Fp\u003E\u003Cp\u003EThe LOC8 takes all the great features of the Ezmo wallet one step further, offering location tracking -- no AirTag needed. It uses Apple's Find My technology for easy integration, is rechargeable, and comes with built-in speakers so you can easily ping the LOC8 wallet to find its location.\u003C\u002Fp\u003E\u003Cp\u003EI tested the Ezmo version of the Journey wallet for several weeks during my commute from New Jersey to New York City, and I like it enough to recommend the LOC8 with built-in tracking confidently. I like the premium feel and how easy the wallet makes it to access my transit cards during my commute. I also like how the wallet provides enough space for 5 cards and folded cash. It's perfect for holding my debit card, work badge, and other incidentals like paper train tickets. The phone stand was nice, too. Although it's one of the pricier options for a MagSafe wallet, I think it's well worth the investment due to its multi-functionality and excellent quality, especially if you use your MagSafe wallet every day.\u003C\u002Fp\u003E\u003Cp\u003ECurrent users on the Journey website said they liked the slim profile, smart design, larger card capacity, and sleek material -- so much so that the wallet has a 5\u002F5 star rating online, with one customer noting that it "does it all really well."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's Note: At the time of publication on Oct. 24, you can save 20% off at Journey's website thanks to a fall sale.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EJourney LOC8 tracking wallet and phone stand features:\u003C\u002Fstrong\u003E&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E&nbsp;MagSafe bifold&nbsp;| Multi-functional&nbsp;| RFID protection | Built-in lock to prevent card slippage | Water resistant | Built-in speaker | Apple Find My System compatible | Rechargeable |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;66 mm x 103 mm x 14 mm |&nbsp;\u003Cstrong\u003ECard capacity:\u003C\u002Fstrong\u003E&nbsp;Up to 5 cards&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Journey LOC8 Tracking Wallet and Phone Stand\" data-superlative=\"Best MagSafe tracking wallet\" data-imagegroup=\"{"alt":"journey-magsafe-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","title":"journey-magsafe-wallet","filename":"img-1053.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F12\u002F68736460-4a2c-4d02-aea5-b27ba0b0d87f\u002Fimg-1053.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243587,"width":6000,"height":4000,"dateCreated":{"date":"2024-03-12 14:29:02","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-12 14:30:18","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"journey-magsafe-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"68736460-4a2c-4d02-aea5-b27ba0b0d87f","imageAltText":"journey-magsafe-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1053.jpg","imageDateCreated":"2024\u002F03\u002F12","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand","offerMerchant":"Journey","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=2017698&u=514792&m=124934&afftrack=subid_value&urllink=journeyofficial.com%2Fproducts%2Floc8-finder-wallet-and-stand"}]\" data-usepricing=\"true\" data-like=\"~ Stylish ~ Sleek design ~ High-quality ~ Multi-functional ~ No AirTag necessary\" data-dislike=\"~ Pricier option ~ Takes time to get used to\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ffa55451-6a2e-4038-b15b-a48a7e99050c\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you like affordable luxury tech products, don't look any further than Bosca's AirTag wallet for all your card storage needs. Plus, if you're looking for a minimalist option, this could be a great fit for your needs. Part of my job at ZDNET includes testing tons of tech accessories, from MagSafe gear to AirTag accessories and beyond, so needless to say, I have tested a lot of different things, including MagSafe and AirTag wallets. This is the first AirTag wallet I've tested in a while that I was really impressed with, and it took me by surprise.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere's nothing overly unique about the design of this Bosca wallet. In fact, if you went on Amazon, you'd see tons of similar options at varying price points offering similar features: slim design, a few card slots, maybe an ID window, and, of course, that trusty little spot to tuck your AirTag. The hybrid card slot\u002Fwallet combo has become a popular option in 2024, as many people shift to cardless payment options like Apple Pay and Google Pay more and more and carry fewer cards daily.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBut what makes Bosca's stand-out is the craftsmanship and leather used to construct it. I knew right away upon opening up this wallet that it was, what the kids call, legit. The leather is smooth, and the Saddle color has a really striking tone that is not too orange and not too brown. Moreso, it looks like something that didn't fall out of Amazon's massive factory market, and that's thanks to the full grain, Italian, hand-stained leather and intentional construction. It holds cards great, has a dedicated ID slot with a slit to make grabbing your identification easy, and two pockets to hold extra cash, cards, or other incidentals. It's super easy to snap your AirTag in and be on your way, and most importantly, it's the kind of tech accessory that feels like it will withstand the test of time, and will perhaps get better with age. I compared the leather of this wallet to some of my own personal handbags and small goods from various other brands, and there's certainly a similar standard that I was impressed with.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt is certainly pricier than other options on this list (though not as expensive as a Ridge wallet) and I do wish there were perhaps more colored options, but for what is offered I feel that this wallet is a confident balance of affordable luxury that justifies its price tag, and potentially prevents the type of incessant rebuying that can often occur with tech accessories.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EAuthor's note: This product is currently unavailable on Amazon at the time of publication on 11\u002F19.&nbsp;\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBosca AirTag Wallet features\u003C\u002Fstrong\u003E:&nbsp;\u003Cstrong\u003EType:\u003C\u002Fstrong\u003E Hybrid cardholder design | \u003Cstrong\u003EDimensions\u003C\u002Fstrong\u003E: 4.375 H x 3.00 W x 0.125 D | \u003Cstrong\u003ECard capacity:&nbsp;\u003C\u002Fstrong\u003E3 Card Pockets, 2 card\u002Fcash pockets, 1 ID slot | Cash storage | Full grain, Italian, Hand-stained leather&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Bosca AirTag Wallet\" data-superlative=\"Best leather AirTag wallet\" data-imagegroup=\"{"alt":"bosca-airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"9183531b-994a-46db-a2fb-e002d45fe8c0","title":"bosca-airtag-wallet","filename":"img-2017.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F9183531b-994a-46db-a2fb-e002d45fe8c0\u002Fimg-2017.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3181064,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:30:40","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:30:58","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"bosca-airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"9183531b-994a-46db-a2fb-e002d45fe8c0","imageAltText":"bosca-airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2017.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML","url":"https:\u002F\u002Fwww.amazon.com\u002FBosca-Leather-Airtag-Seven-Pocket-Card-Saddle\u002Fdp\u002FB0D1SDK9ML?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bosca","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.bosca.com\u002Fproducts\u002F7-pocket-i-d-card-case-1?","url":""}]\" data-usepricing=\"true\" data-like=\"~ Quality leather ~ Minimalist design ~ Secure AirTag holder ~ ID slot ~Affordable luxury\" data-dislike=\"~ Pricier ~ Not ideal for over 5 cards ~ Only three colors\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c24940fd-c7ec-43c5-8565-91864f17cc70\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Spigen AirTag Wallet S is a more affordable and expandable wallet design. Similar in overall construction and function the the Ridge wallet, the main difference is the material and price point.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EDespite its streamlined design, the Spigen AirTag Wallet S holds up to 12 cards. The polycarbonate shell makes for a super-light build, so it won't weigh your purse or pockets down. The nylon elastic cash strap is an extra bonus to stow away your bills. It also incorporates special RFID-blocking protection to prevent RFID card readers from stealing your information.\u003C\u002Fp\u003E\u003Cp\u003E"The Spigen AirTag Wallet S's sleek design and compact form initially drew my attention," says Liz Ho, an experienced camping guide, travel expert, and founder of&nbsp;\u003Ca href="https:\u002F\u002Fcampingguidance.com\u002F"\u003ECamping Guidance\u003C\u002Fa\u003E. "Its built-in AirTag compartment gave me peace of mind, knowing I could easily locate my wallet if it ever went missing."&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Amazon customers said they liked that the Spigen S wallet was more affordable, had a dedicated, built-in spot for an AirTag, and held both cash and cards. However, some experienced damage early on and didn't like the plastic material. Overall, customers said they were happy with the appearance and value of the wallet but wished it had some improvements in material and performance.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESpigen AirTag Wallet S specs: Type:&nbsp;\u003C\u002Fstrong\u003EExpandable&nbsp;| RFID-blocking | Cash strap for cash storage |&nbsp;\u003Cstrong\u003EMaterial:&nbsp;\u003C\u002Fstrong\u003EPolycarbonate&nbsp;| Cash strap for cashe storage |\u003Cstrong\u003E Dimensions:\u003C\u002Fstrong\u003E&nbsp;1.18 x 3.15 x 1.97 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Spigen AirTag Card Holder Wallet S\" data-superlative=\"Best mid-range AirTag wallet\" data-imagegroup=\"{"alt":"spigen-airtag-wallet-s-","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Spigen\u002FZDNET","imageData":{"id":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","title":"spigen-airtag-wallet-s-","filename":"spigen-airtag-wallet-s-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F06\u002F8644ee4e-7ac0-4698-85a7-7919e1ad37a7\u002Fspigen-airtag-wallet-s-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":99656,"width":670,"height":372,"dateCreated":{"date":"2024-02-06 21:17:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-02-06 21:17:55","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Spigen\u002FZDNET","alt":"spigen-airtag-wallet-s-","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8644ee4e-7ac0-4698-85a7-7919e1ad37a7","imageAltText":"spigen-airtag-wallet-s-","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Spigen\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"spigen-airtag-wallet-s-removebg-preview.png","imageDateCreated":"2024\u002F02\u002F06","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Spigen\u002FZDNET\" data-offer=\"{"id":"4304727d-dd37-4970-9617-bf811bde1f17","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","label":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"4304727d-dd37-4970-9617-bf811bde1f17","name":"Spigen Wallet S Compatible with Airtag Wallet Card Holder Case Cover RFID Blocking Wallet Slim Minimalist Credit Card Holder for Men and Women - Black","slug":"spigen-wallet-s-compatible-with-airtag-wallet-card-holder-case-cover-rfid-blocking-wallet-slim-minimalist-credit-card","productType":"SERIES","updateType":"PRISM","mod":1732130514526,"displayDate":"Wed Nov 20 2024 14:21:54 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002Fgp\u002Fproduct\u002FB08M6KKNFS\u002Fref=ox_sc_act_title_1?smid=AB3N0UYX3QDQH&th=1&tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Cash strap ~ Lightweight ~ Dedicated AirTag slot ~ Budget friendly\" data-dislike=\"~ Limited colors ~ Not scratch-resistant ~ Cheap material\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"f047a9e0-bac2-4c03-8664-247677f447eb\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ekster Wallet for AirTag combines minimalism with affordable luxury functions. It holds up to 12 cards as well as cash. Plus, it features RFID-blocking technology, a dedicated AirTag slot, quick access with a push button, and an easy slide-up function to fan out cards.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt's an AirTag-compatible version of the brand's popular Parliament wallet, and it's slim enough to fit in your front or back pocket. However, it's slightly expensive and lacks color options.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECurrent Ekster wallet users on the Ekster website said they liked the high-quality construction, overall design, and easy function. One customer said they even upgraded to this AirTag wallet after losing their Parliament wallet on vacation, and another called it perfect. "If you have been looking for a wallet that is high-quality with all the features, this is definitely the wallet for you," one customer wrote in their review.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EEkster Wallet for AirTag specs: Type:\u003C\u002Fstrong\u003E Slide | \u003Cstrong\u003EMaterial: \u003C\u002Fstrong\u003ELeather | Slide-up function to fan cards | RFID-blocking | Minimalist design | AirTag slot | Quick card access with button | \u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E 4.1 x 2.5 x 0.4 inches&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Ekster Wallet for AirTag\" data-superlative=\"Best card slide AirTag wallet\" data-imagegroup=\"{"alt":"Ekster Parliament Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Ekster\u002FZDNET","imageData":{"id":"060cf5a9-e745-493f-a252-e63202f78cc3","title":"Ekster Parliament Wallet","filename":"ekster-parliament-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F07\u002F21\u002F060cf5a9-e745-493f-a252-e63202f78cc3\u002Fekster-parliament-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":20869,"width":1296,"height":720,"dateCreated":{"date":"2023-07-21 19:50:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-07-21 19:50:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Ekster\u002FZDNET","alt":"Ekster Parliament Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"060cf5a9-e745-493f-a252-e63202f78cc3","imageAltText":"Ekster Parliament Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Ekster\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ekster-parliament-wallet.jpg","imageDateCreated":"2023\u002F07\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Ekster\u002FZDNET\" data-offer=\"{"id":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","label":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"fb9f3132-0c6b-4b6c-906f-1b56eb9225c4","name":"Ekster Parliament AirTag Wallet | Smart Wallets for Men | Apple Air Tag with RFID Blocking Protective Layer | Slim & Minimalist Money Holder with Push Button for Quick Card Access (Nappa Black)","slug":"ekster-parliament-airtag-wallet-smart-wallets-for-men-apple-air-tag-with-rfid-blocking-protective-layer-slim","productType":"SERIES","updateType":"PRISM","mod":1729871219011,"displayDate":"Fri Oct 25 2024 11:46:59 GMT-0400 (Eastern Daylight Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9","url":"https:\u002F\u002Fwww.amazon.com\u002FEkster-Parliament-Blocking-Protective-Minimalist\u002Fdp\u002FB0BMM6MXQ9?tag=zdnet-buy-button-20"},{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F","offerMerchant":"Ekster","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ekster.com\u002Fproducts\u002Fwallet-for-airtag?","url":"https:\u002F\u002Fclick.linksynergy.com\u002Fdeeplink?id=IokOf8qagZo&mid=45176&u1=subid_value&murl=https%3A%2F%2Fwww.ekster.com%2Fproducts%2Fwallet-for-airtag%3F"}]\" data-usepricing=\"true\" data-like=\"~ High-quality leather ~ Minimalist design ~ Easy slide access ~ Dedicated AirTag slot ~Slim\" data-dislike=\"~ Pricey ~ Limited color options ~ No ID slot\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2433d834-099f-43d1-be78-2fb3675f2c22\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Doeboe AirTag Wallet is the best budget AirTag wallet with a surprisingly lightweight build despite its leather material.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ERicky Allen, marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, says, "It's a great wallet with all the necessities, like card slots, a pocket for bills, and an AirTag keychain holder."\u003C\u002Fp\u003E\u003Cp\u003EMade of Crazy Horse leather, this bifold wallet features 10 different card slots, including a bill pocket to stash your cash. It also has an ID window so you don't have to take your driver's license out whenever you need to show it. The simple, minimalist design is simple to manage and also lightweight, so it won't weigh your pockets down.\u003C\u002Fp\u003E\u003Cp\u003EAllen commented on the security as well. "I liked how easy it was to insert my AirTag and the anti-theft RFID protection it provides. Security is very important to me, and I'm glad this wallet provides the added protection of RFID-blocking."\u003C\u002Fp\u003E\u003Cp\u003ECurrent Doeboe wallet users on Amazon said they liked the appearance, durability, and compactness of the wallet, with several customers emphasizing the genuine leather construction.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EDoeboe AirTag Bifold Wallet specs: Type:&nbsp;\u003C\u002Fstrong\u003EBifold&nbsp;|\u003Cstrong\u003E Material:&nbsp;\u003C\u002Fstrong\u003ELeather&nbsp;| ID window | RFID blocking |&nbsp;\u003Cstrong\u003EDimensions:\u003C\u002Fstrong\u003E&nbsp;1.97 x 1.57 x 0.59 inches\u003Cstrong\u003E&nbsp;\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"Doeboe AirTag Bifold Wallet\" data-superlative=\"Best budget AirTag wallet\" data-imagegroup=\"{"alt":"doeboe AirTag Bifold Wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Doeboe\u002FZDNET","imageData":{"id":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","title":"doeboe AirTag Bifold Wallet","filename":"doeboe-airtag-bifold-wallet.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F04\u002F12\u002F2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06\u002Fdoeboe-airtag-bifold-wallet.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":92192,"width":1296,"height":720,"dateCreated":{"date":"2023-04-12 18:35:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-04-12 18:35:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09BHXPH8H","alt":"doeboe AirTag Bifold Wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b9b3251-6e11-4efa-bc30-1cb9a4a5ef06","imageAltText":"doeboe AirTag Bifold Wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Doeboe\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"doeboe-airtag-bifold-wallet.jpg","imageDateCreated":"2023\u002F04\u002F12","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Doeboe\u002FZDNET\" data-offer=\"{"id":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","label":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-techobjectinfo=\"{"uuid":"9db116ef-f9ab-40f2-8b38-c5a32d46e212","name":"doeboe Airtag Wallet Men, Wallet for Men with Airtag Holder, Genuine Leather Credit Card Wallet, Bifold Slim Wallet for Air Tag GPS Tracker, RFID Minimalist Front Pocket Wallet [No Airtags]","slug":"doeboe-airtag-wallet-men-wallet-for-men-with-airtag-holder-genuine-leather-credit-card-wallet-bifold-slim-wallet-for","productType":"SERIES","updateType":"PRISM","mod":1732130531292,"displayDate":"Wed Nov 20 2024 14:22:11 GMT-0500 (Eastern Standard Time)"}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4","url":"https:\u002F\u002Fwww.amazon.com\u002Fdoeboe-Genuine-Minimalist-Blocking-Accessories\u002Fdp\u002FB09DYK9HT4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\" data-like=\"~ Roomy ~ Traditional feel ~ RFID-blocking technology ~ ID Window ~ Affordable ~ Several color options\" data-dislike=\"~Bulkier, bifold design ~ Cheaper look and feel\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EHow to tell if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Ridge Wallet with an accompanying AirTag holder attachment is ZDNET's top pick for best overall AirTag wallet.&nbsp; \u003C\u002Fp\u003E\u003Cp\u003EWith a slim and stylish, yet easily expandable and durable design, the Ridge wallet handles up to 12 cards, and offers an efficient storage option for cash. Equipped with RFID-blocking technology and built of tough aluminum, the Ridge is the creme de la creme of trackable, practical wallets, and is a true buy-one-time purchase. \u003C\u002Fp\u003E\u003Cp\u003ESee how our other top picks compared to the Ridge wallet in type, cost, and card capacity below:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EBest AirTag wallet\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EType\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003ECard capacity\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EStarts at $95\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003E$90\u003C\u002Ftd\u003E\u003Ctd\u003EMagSafe bifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 5\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003E$85\u003C\u002Ftd\u003E\u003Ctd\u003EHybird card holder\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 6\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003E$50\u003C\u002Ftd\u003E\u003Ctd\u003EExpandable\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003E$99\u003C\u002Ftd\u003E\u003Ctd\u003ESlide\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 12\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bilfold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003E$26\u003C\u002Ftd\u003E\u003Ctd\u003EBifold\u003C\u002Ftd\u003E\u003Ctd\u003Eup to 10\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E*MSRP at the time of writing. Please note that actual prices may vary depending on available sales, deals, discounts, and coupons.\u003C\u002Fp\u003E\" data-hed=\"What is the best AirTag wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003EIt isn't easy to choose the best AirTag wallet when there are so many options on the market. These expert recommendations may help you in the buying process so you can be sure to find the right wallet for your needs.\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EChoose this AirTag wallet...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EIf you want...\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ERidge Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall AirTag wallet for function, style, security, and longevity. Easily customize this wallet to fit your lifestyle.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EJourney LOC8 Tracking MagSafe Wallet and Stand\u003C\u002Ftd\u003E\u003Ctd\u003EA MagSafe wallet option equipped with Apple's Find My tracking technology.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBosca AirTag Wallet \u003C\u002Ftd\u003E\u003Ctd\u003EAn affordable luxury, hybird AirTag wallet. \u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ESpigen AirTag Card Holder Wallet S\u003C\u002Ftd\u003E\u003Ctd\u003EThe best overall affordable AirTag wallet alternative with great value.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EEkster Wallet for AirTag\u003C\u002Ftd\u003E\u003Ctd\u003EThe best AirTag wallet for easy access. Store your cards with extra security while enjoying unrivaled convenience.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EDoeboe AirTag Bifold Wallet\u003C\u002Ftd\u003E\u003Ctd\u003EA budget bifold wallet. This best AirTag wallet offers a traditional design with a built-in AirTag holder.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which is the best AirTag wallet for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're in the market for an AirTag wallet, you already know the marketplace is copious. Here's a few things to keep in mind while you search that may help you narrow down your options and find the right fit for you.&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECapacity\u003C\u002Fstrong\u003E: Consider what you want to store in your wallet. How many cards? Cash? Any other incidentals like your work badge or transit passes? We'd recommend finding out your absolute bare minimum need for card capacity (maybe that's three cards or maybe it's ten) and factoring that into your search. You'll easily be able to cut a huge chunk of options out based on capacity alone.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: Many AirTag wallets provide RFID-blocking, which means that it blocks card scanners that can steal your information. If this is a top priority for you, you can drop many of the cheaper options, which often don't offer these capabilities.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003ECost\u003C\u002Fstrong\u003E: The price of AirTag wallets can vary considerably, and like with any purchase, establishing a budget is key. While we've included a budget, mid-range, and expensive pick on this list, you need to decide for yourself what your magic number is. Keep in mind that your wallet is often an everyday essential that lasts for a number of years, so it may be worth it to set a higher budget. Plus, many quality traditional leather wallets often cost over $100, too.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003EYour needs: \u003C\u002Fstrong\u003ESo you're here because you think you want an AirTag wallet. But maybe what you're actually looking for is a Bluetooth tracker card to upgrade your favorite traditional wallet. Or maybe you just want an AirTag card insert to do the same. Think about what you actually need right now and what makes the most sense for your lifestyle -- it may not be what you thought at first.&nbsp;\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing an AirTag wallet\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"aeb5de34-5d6e-45b1-9b25-8fa4c111c9e5\" data-edition=\"us\" data-description=\"\u003Cp\u003EWe combined our expert research and analysis, hands-on testing for select products, and our extensive testing and knowledge of alternative Bluetooth trackers to curate this list. We consider factors like lifestyle, construction, durability, tracking capabilities, and function while compiling these top picks and made sure to provide options for those who aren't sure if an AirTag wallet is right for them. If we think a new product is worth your money, we'll update this list or write a spotlight review highlighting its best qualities and specifying who it's for.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPlus, we are routinely scouring the web for new products that are worthy of testing, following news on product rollouts and upgrades, and sourcing the best deals.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How did we choose these AirTag wallets?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e338db83-da68-4ce6-9398-b4683b088f84\" data-edition=\"us\" data-description=\"\u003Cp\u003EAn AirTag is a type of tracking device. You can affix it to an object, and the AirTag will then provide tracking for that item. Simply log into the Find My app to track your device and see an exact location. You can also ping your phone so it sounds like an alert, helping you to find it that much easier.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What is an AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1a56e686-7136-4674-af80-65a8ebe65fd3\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, AirTags can be used to track anything like keys, bags, purses, wallets, and more. There's lots of \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003Eaccessories on the market\u003C\u002Fa\u003E to seamlessly configure an AirTag to your needs, and likewise, many AirTag wallets are specially designed to hold an AirTag to upgrade your traditional wallet with location-tracking capabilities.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best AirTag accessories of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can AirTags be used in a wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e33f8c0c-f5d2-483d-82ec-f5717cc0b4bd\" data-edition=\"us\" data-description=\"\u003Cp\u003ENo, by no means are AirTag wallets the only \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003Ebluetooth tracking\u003C\u002Fa\u003E accessories on the market. You can equip and configure traditional wallets with tracking cards like the KeySmart Smart Card, or use other alternative trackers like Tile. And if you want to upgrade to a \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F" target="_blank"\u003EMagSafe wallet\u003C\u002Fa\u003E, some are available with built-in tracking configurations already installed, like the \u003Ca href="https:\u002F\u002Fjourneyofficial.com\u002Fproducts\u002Floc8-finder-wallet-and-stand" target="_blank"\u003EJourney LOC8 wallet\u003C\u002Fa\u003E.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-bluetooth-tracker\u002F" target="_blank"\u003E\u003Cstrong\u003EThe best bluetooth trackers of 2024\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Are AirTag wallets the only tracking options out there?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"530a9dbb-0397-4823-9367-e052347b9bed\" data-edition=\"us\" data-description=\"\u003Cp\u003EThere's a few different types of products and configurations that will help you track your wallet, no matter where you leave it. Here are the most common:&nbsp;\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003EA wallet specially designed to house an AirTag tracker, either by design or with added attachments.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA Bluetooth tracker card that uses Apple's Find My technology that can slide into an existing wallet like any other card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EA tracker card designed to hold an AirTag that can slide into an existing wallet like a card.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EWallets that are already enabled with their own Bluetooth tracking systems and don't require an AirTag (these often use Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003Cli\u003EMagSafe wallet options are enabled with Bluetooth tracking (which also likely uses Apple's Find My technology).&nbsp;\u003C\u002Fli\u003E\u003C\u002Fol\u003E\" data-hed=\"What types of bluetooth tracking is available for my wallet?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"852bccff-11ea-40df-a48e-a5df96e0bc6b\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile this may not be the conventional route, if you're interested in tinkering and building your own custom AirTag setup, you actually can. ZDNET's Adrian Kingsley-Hughes did himself in April 2023, and wrote up his own \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003Estep-by-step guide\u003C\u002Fa\u003E that you can follow.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-built-a-custom-airtag-that-apple-will-hate-me-for-and-how-you-can-do-it-too\u002F" target="_blank"\u003E\u003Cstrong\u003EI built a custom AirTag that Apple will hate me for. Here's how you can too\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"Can I build my own custom AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9441c617-048c-459d-ae23-6b39c18c9b0a\" data-edition=\"us\" data-description=\"\u003Cp\u003EAirTags will not interfere with your debit or credit cards and they will not cause demagnetization. AirTags operate using Apple's Find My technology and a bluetooth connection, and the frequency does not disturb your cards. &nbsp;\u003C\u002Fp\u003E\" data-hed=\"Do AirTags interfere with credit cards?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"700087c7-33c1-4d66-b676-77be91ca990d\" data-edition=\"us\" data-description=\"\u003Cp\u003EAccording to the&nbsp;\u003Ca href="https:\u002F\u002Fwww.dhs.gov\u002Fradio-frequency-identification-rfid-what-it" target="_blank"\u003EDepartment of Homeland Security\u003C\u002Fa\u003E, RFID refers to Radio Frequency Identification (RFID) technology. This technology uses radio waves to identify people or objects.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThere are devices that can read information contained in a wireless device or "tag" from a distance without making any physical contact or requiring a line of sight -- for example, the chips in credit or debit cards. Wallets which feature RFID-blocking technology prevent these devices from accessing information stored in protected chips, which can help prevent your bank information from being compromised.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What does RFID mean?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2b70c98b-f3b7-4c83-85b8-f6aa453c96a7\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe beauty of an AirTag is that it can be tracked from anywhere. Your AirTag just needs to be within range of a Bluetooth connection while near an Apple device. It does not even have to be your own phone, so as long as you are close to an Apple device, you can use AirTag technology to locate your wallet.\u003C\u002Fp\u003E\" data-hed=\"How far can I track my AirTag?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d6ee353c-06e9-4aa0-a5b6-bc285c09ca55\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf you're an iPhone user, there's a few ways to recognize if an AirTag is tracking you. Your phone may alert you of an "AirTag found moving with you." This will happen if these things are true:\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cp\u003EThe AirTag is separated from its owner.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003EYour iPhone is awake.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-find-out-if-an-airtag-is-tracking-you\u002F" target="_blank"\u003E\u003Cstrong\u003EHow to find out if an AirTag is tracking you\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\" data-hed=\"How can I find out if an AirTag is tracking me?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EMore AirTag wallets to consider \u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003EIf you haven't found an AirTag wallet that feels right for you, here are a \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-magsafe-wallets\u002F\" target=\"_blank\"\u003Efew alternatives\u003C\u002Fa\u003E that may better suit your needs -- it may not be a traditional wallet that you're looking for at all. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fe2701ee-9351-4da3-adc5-9cf5eee59de4\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Geo Wallet is ESR's flagship tracking wallet, which also uses Apple's Find My technology to ensure you can always find your MagSafe wallet. It holds up to three cards, and like the Journey LOC8 wallet, it also doubles as a stand.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo MagSafe Tracking Wallet\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"906f0b35-4a46-4fc9-86ac-73ae744003a9","title":"esr-halo-lock-geo-wallet","filename":"img-1826.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F07\u002F906f0b35-4a46-4fc9-86ac-73ae744003a9\u002Fimg-1826.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1061142,"width":6000,"height":4000,"dateCreated":{"date":"2024-06-07 16:47:55","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-07 16:48:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"906f0b35-4a46-4fc9-86ac-73ae744003a9","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1826.jpg","imageDateCreated":"2024\u002F06\u002F07","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best Bluetooth tracking wallet alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1","url":"https:\u002F\u002Fwww.amazon.com\u002FESR-Magnetic-Functionality-Compatible-Adjustable\u002Fdp\u002FB0BY8RQC2R?tag=zd-buy-button-20&ascsubtag=b076ca3f0efa418e9b5e658060dd5f36%7C27bd105b-d0a3-4228-acc5-bea0dd153889%7Cdtp&th=1"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5ca868a1-1f05-47d2-92d7-5b67e33a4781\" data-edition=\"us\" data-description=\"\u003Cp\u003EMaybe you're not actually in need of an AirTag wallet option. This traditional-style wallet from ESR features plenty of card slots and a designated ID slot and is enabled with Apple's Find My technology -- the first of its kind. While it isn't made of the most premium material and certainly isn't a leather alternative, it's a great wallet if you want built-in Bluetooth tracking without all the hassle of an added AirTag.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"ESR Geo Wallet with Find My\" data-imagegroup=\"{"alt":"esr-halo-lock-geo-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"a7f849fb-6419-4135-9267-3c8952c8f262","title":"esr-halo-lock-geo-wallet","filename":"img-2021.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002Fa7f849fb-6419-4135-9267-3c8952c8f262\u002Fimg-2021.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":3663445,"width":6000,"height":4000,"dateCreated":{"date":"2024-10-24 15:31:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-10-24 15:31:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"esr-halo-lock-geo-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a7f849fb-6419-4135-9267-3c8952c8f262","imageAltText":"esr-halo-lock-geo-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-2021.jpg","imageDateCreated":"2024\u002F10\u002F24","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best bluetooth tracking traditional wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F","offerMerchant":"Esrgear","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.esrgear.com\u002Fgeo-wallet-with-find-my-discount\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1200223&u=514792&m=80610&afftrack=subid_value&urllink=www.esrgear.com%2Fgeo-wallet-with-find-my-discount%2F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6d2af2ec-b708-45a0-94cd-66b97f508fac\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeySmart's SmartCard lets you instantly turn any wallet into a trackable one by simply sliding it in place. It's super thin, works with Apple iOS Find My, has a wireless rechargeable battery, and is IPX7-rated. ZDNET's Adrian Kingsley-Hughes personally prefers these nifty cards over an AirTag, which needs battery replacing and can be bulky.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"KeySmart SmartCard\" data-imagegroup=\"{"alt":"KeySmart SmartCard","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Adrian Kingsley-Hughes\u002FZDNET","imageData":{"id":"0accc90e-03af-42d6-a3b2-691d4553c3e4","title":"KeySmart SmartCard","filename":"img-9077.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F18\u002F0accc90e-03af-42d6-a3b2-691d4553c3e4\u002Fimg-9077.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":328342,"width":1600,"height":900,"dateCreated":{"date":"2024-03-18 12:05:07","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-18 12:05:13","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Adrian Kingsley-Hughes\u002FZDNET","alt":"KeySmart SmartCard","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0accc90e-03af-42d6-a3b2-691d4553c3e4","imageAltText":"KeySmart SmartCard","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Adrian Kingsley-Hughes\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-9077.jpg","imageDateCreated":"2024\u002F03\u002F18","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Adrian Kingsley-Hughes\u002FZDNET\" data-linktext=\"Best non-AirTag tracking accessory to upgrade your current wallet\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?","url":"https:\u002F\u002Fwww.amazon.com\u002FKeySmart-SmartCard-Rechargeable-Reusable-Versatile\u002Fdp\u002FB0CB4VL6GC?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2518b7f0-697d-4804-be5d-febcac9e50b5\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad also offers a tracking card that is enabled with Apple's Find My technology. Newly released in May 2024, the tracking card was back ordered for several weeks but is finally back to purchase as of the last publication of this article.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Nomad Tracking Card\" data-imagegroup=\"{"alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Max Buondonno\u002FZDNET","imageData":{"id":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","title":"nomad-tracking-card-zdnet-1","filename":"nomad-tracking-card-zdnet-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F27\u002F2bd33f28-27e9-407b-af79-b0ff2c63a22e\u002Fnomad-tracking-card-zdnet-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1024037,"width":1600,"height":900,"dateCreated":{"date":"2024-05-27 20:57:05","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-27 20:57:21","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Max Buondonno\u002FZDNET","alt":"Nomad Tracking Card with Card Wallet Plus and iPhone.","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2bd33f28-27e9-407b-af79-b0ff2c63a22e","imageAltText":"Nomad Tracking Card with Card Wallet Plus and iPhone.","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Max Buondonno\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nomad-tracking-card-zdnet-1.jpg","imageDateCreated":"2024\u002F05\u002F27","imageWidth":1600,"imageHeight":900,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Max Buondonno\u002FZDNET\" data-linktext=\"Another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Ftracking-card","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Ftracking-card&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"0a5a8532-add5-40fe-add5-b637ca50be7c\" data-edition=\"us\" data-description=\"\u003Cp\u003EChipolo's Card Spot is shaped like a credit card, connects to Apple's Find My network, and gets ZDNET reviews editor Kerry Wan's pick for the best Bluetooth wallet tracker. The Card Spot is designed to live in your wallet, measuring a thickness of 0.09 inches -- about the same as two credit cards stacked together.\u003C\u002Fp\u003E\" data-hed=\"Chipolo Card Spot\" data-imagegroup=\"{"alt":"chipolo-iphone-here","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNet","imageData":{"id":"229910f6-af1c-4beb-bae9-4e9cffac574b","title":"chipolo-iphone-here","filename":"dsc00202.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F03\u002F11\u002F229910f6-af1c-4beb-bae9-4e9cffac574b\u002Fdsc00202.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":2785280,"width":6000,"height":3376,"dateCreated":{"date":"2022-03-11 23:07:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-03-11 23:07:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNet","alt":"chipolo-iphone-here","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"229910f6-af1c-4beb-bae9-4e9cffac574b","imageAltText":"chipolo-iphone-here","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNet","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dsc00202.jpg","imageDateCreated":"2022\u002F03\u002F11","imageWidth":6000,"imageHeight":3376,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNet\" data-linktext=\"Yet another bluetooth tracking card option\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09ZTZ47K4?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"47777800-8d9e-43f0-a72e-fae7294a820c\" data-edition=\"us\" data-description=\"\u003Cp\u003ENomad Goods also offers a card for the AirTag. Pop in your AirTag and slide it into your favorite wallet. It's as simple as that. \u003Cem\u003EAuthor's Note: This card is currently out of stock at the time of publication on 11\u002F19.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\" data-hed=\"Nomad Goods Card for AirTag\" data-imagegroup=\"{"alt":"airtag-wallet","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"ec6a4994-42cd-410c-84e8-c0cce3423f15","title":"airtag-wallet","filename":"img-1563.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F10\u002Fec6a4994-42cd-410c-84e8-c0cce3423f15\u002Fimg-1563.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1243591,"width":6000,"height":4000,"dateCreated":{"date":"2024-04-10 14:17:18","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-10 14:25:38","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Kayla Solino\u002FZDNET","alt":"airtag-wallet","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ec6a4994-42cd-410c-84e8-c0cce3423f15","imageAltText":"airtag-wallet","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Kayla Solino\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-1563.jpg","imageDateCreated":"2024\u002F04\u002F10","imageWidth":6000,"imageHeight":4000,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-linktext=\"Best AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value","offerMerchant":"Nomad Goods","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnomadgoods.com\u002Fproducts\u002Fcard-for-airtag","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-15735858?url=https%3A%2F%2Fnomadgoods.com%2Fproducts%2Fcard-for-airtag&sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bf136b08-c58a-4958-a14a-c2b857d0e137\" data-edition=\"us\" data-description=\"\u003Cp\u003ESimilar to the Nomad AirTag card, the TagVault allows you to pop an AirTag into a thin card-like casing, too. Plus, you get two in this pack.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Elevation Lab TagValut AirTag Insert (2-Pack)\" data-imagegroup=\"{"alt":"tagvault-airtag-insert","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Elevation Labs\u002FZDNET","imageData":{"id":"2b4b84ba-8975-448e-9a91-d60ec69b8026","title":"tagvault-airtag-insert","filename":"tagvault-airtag-insert-removebg-preview.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F08\u002F2b4b84ba-8975-448e-9a91-d60ec69b8026\u002Ftagvault-airtag-insert-removebg-preview.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":71497,"width":670,"height":372,"dateCreated":{"date":"2024-04-08 20:01:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-08 20:01:37","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":"Elevation Labs\u002FZDNET","alt":"tagvault-airtag-insert","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"2b4b84ba-8975-448e-9a91-d60ec69b8026","imageAltText":"tagvault-airtag-insert","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Elevation Labs\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"tagvault-airtag-insert-removebg-preview.png","imageDateCreated":"2024\u002F04\u002F08","imageWidth":670,"imageHeight":372,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Elevation Labs\u002FZDNET\" data-linktext=\"Best budget AirTag wallet insert\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB09GTM8FHN?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003ENeed the AirTag first? \u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"f98673a7-9eba-4967-bc24-e9c87a7d23e3\" data-edition=\"us\" data-hed=\"Apple AirTag 4-Pack\" data-imagegroup=\"{"alt":"","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"","imageData":{"id":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","filename":"img-0679.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002Fb14c53f9-6e74-4e39-b6f4-e44f7bff40b0\u002Fimg-0679.jpg","dateCreated":{"date":"2024-02-20 18:13:00","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"b14c53f9-6e74-4e39-b6f4-e44f7bff40b0","imageFilename":"img-0679.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0D54JZTHY?ref=ods_ucc_kindle_B0D54JZTHY_rc_nd_ucc\" data-offermerchant=\"Amazon\" data-monetizedurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-MX542AM-A-AirTag-Pack\u002Fdp\u002FB0932QJ2JZ?tag=zdnet-buy-button-20\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"2bb54237-6f2e-49cc-a125-d5bbe726cc2c\" data-edition=\"us\" data-hed=\"AirTag (1 Count)\" data-imagegroup=\"{"alt":"airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"16bed821-221f-4af3-aa35-0043a2afc64c","filename":"img-0685.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F02\u002F20\u002F16bed821-221f-4af3-aa35-0043a2afc64c\u002Fimg-0685.jpg","dateCreated":{"date":"2024-02-20 18:13:04","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"16bed821-221f-4af3-aa35-0043a2afc64c","imageFilename":"img-0685.jpg","imageDateCreated":"2024\u002F02\u002F20"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0933BVK6T\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"919366eb-c91a-486d-9d88-097ffd074900\" data-edition=\"us\" data-description=\"\u003Cp\u003EZDNET sourced external industry experts for this article. Here is more information about them:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ELiz Ho\u003C\u002Fstrong\u003E: An avid camper and outdoor enthusiast who runs the&nbsp;\u003Ca href="https:\u002F\u002Fwww.youtube.com\u002F@CampingGuidance" target="_blank"\u003ECamping Guidance YouTube channel\u003C\u002Fa\u003E, which has 16.5K subscribers.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ERicky Allen: \u003C\u002Fstrong\u003EAn interior designer and marketing director of&nbsp;\u003Ca href="https:\u002F\u002Feverwallpaper.com\u002F"\u003EEver Wallpaper\u003C\u002Fa\u003E, which sells eco-friendly wallpaper murals.\u003Cbr\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Meet the experts\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EOther AirTag accessories to explore\u003C\u002Fh2\u003E\u003Cp\u003EFrom keychains to mounts and more, there are many \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-airtag-accessories\u002F\" target=\"_blank\"\u003EAirTag accessories\u003C\u002Fa\u003E to choose from. Here are a few others we've tested. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"6b759340-3792-44f1-a52e-2fda9ea25fef\" data-edition=\"us\" data-hed=\"Belkin Secure Holder with Wire Cable \" data-imagegroup=\"{"alt":"belkin-wire-airtag-holder","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","filename":"img-1428.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F03\u002F1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe\u002Fimg-1428.jpg","dateCreated":{"date":"2024-04-03 19:49:28","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"1876b29e-8f6f-4aac-ac4f-5cf7c4f276fe","imageFilename":"img-1428.jpg","imageDateCreated":"2024\u002F04\u002F03"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FBelkin-Protective-Scratch-Resistance-Accessory\u002Fdp\u002FB09LCJFLXM\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"3779620b-f69a-4b91-bbc3-6fa5283a7b01\" data-edition=\"us\" data-hed=\"Pelican AirTag Sticker Mount\" data-imagegroup=\"{"alt":"pelican-sticker-mount-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Kayla Solino\u002FZDNET","imageData":{"id":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","filename":"img-1459.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F09\u002F5ba80891-52a3-43c0-9dc9-392fc2cd7248\u002Fimg-1459.jpg","dateCreated":{"date":"2024-04-09 19:21:10","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"5ba80891-52a3-43c0-9dc9-392fc2cd7248","imageFilename":"img-1459.jpg","imageDateCreated":"2024\u002F04\u002F09"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Kayla Solino\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fpelicanoutdoor.com\u002Fproducts\u002Fpelican-protector-airtag-sticker-mount-black\" data-offermerchant=\"Pelicanoutdoor\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"commercepromo\" data-id=\"417c2c85-77f2-4fb6-a72e-620264724a80\" data-edition=\"us\" data-hed=\"Apple AirTag Loop\" data-imagegroup=\"{"alt":"apple-airtag","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Jason Hiner\u002FZDNET","imageData":{"id":"d0d9c538-3c10-4cd2-a7db-707034c02254","filename":"apple-airtag.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F09\u002F12\u002Fd0d9c538-3c10-4cd2-a7db-707034c02254\u002Fapple-airtag.jpg","dateCreated":{"date":"2023-09-12 03:32:34","timezone":"UTC","timezone_type":3},"primeColor":null,"hasWarning":false},"uuid":"d0d9c538-3c10-4cd2-a7db-707034c02254","imageFilename":"apple-airtag.jpg","imageDateCreated":"2023\u002F09\u002F12"}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Jason Hiner\u002FZDNET\" data-offerurl=\"https:\u002F\u002Fwww.amazon.com\u002FApple-AirTag-Loop-Capri-Blue\u002Fdp\u002FB099C2472N?\" data-offermerchant=\"Amazon\" data-usemonetization=\"true\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-21 16:48:14",timezone:"UTC",updated:c,published:c},description:"We tested the best Apple AirTag wallets and tracking accessories from Nomad, ESR, Ridge, and more to help you keep track of your cards and cash.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"a687cfd4-f602-4ae8-86bc-38672bfd5ad1",image:{id:"28b4587d-26d8-4c01-9af3-9c90ebd6be03",filename:"img-2035.jpg",dateCreated:{created:c,date:"2024-10-24 15:33:27",timezone:"UTC",updated:c,published:c},alt:"airtag-wallets",credits:"Kayla Solino\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F10\u002F24\u002F28b4587d-26d8-4c01-9af3-9c90ebd6be03\u002Fimg-2035.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:6000,height:4000,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Wearables",relatedItems:[]},name:b,promoTitle:"The best AirTag wallets you can buy: Expert tested",section:b,slug:"best-airtag-wallet",startYear:c,summary:b,title:"The best AirTag wallets of 2024: Expert tested",topic:{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0f170e27-b89d-48a1-aa1e-6d5c3594737e",slug:"work-life",name:"Work Life",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"9841d7c0-1be2-42d4-963b-3d0c080290bc",slug:"tech",name:"Tech",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"a1897105-61bd-4610-abb3-4804906d4a9a",slug:"home-and-office",name:"Home & Office",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"eca19898-12cf-4e3a-bca9-73b9d72c405c",slug:"wearables",name:"Wearables",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"79d67b90-8175-11e2-9d12-0018fe8a00b0",username:"charlieosborne",profileUrl:c,email:c,firstName:"Charlie",lastName:"Osborne",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"2e4c50de-700f-4193-ab8f-046747723cf0",filename:"charlie-osborne.jpg",dateCreated:{created:c,date:"2022-08-05 15:00:38",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002F2e4c50de-700f-4193-ab8f-046747723cf0\u002Fcharlie-osborne.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNET and CNET from London. PGP Key: AF40821B",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Ch2\u003EWhat is the best no-log VPN in 2024?\u003C\u002Fh2\u003E\u003Cp\u003EZDNET's top no-log VPN this year is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"229a0e02-dba0-4427-8e81-22401ec1395f\" data-raw-url=\"https:\u002F\u002Fnordvpn.com\u002F\" data-link-shortcode-text=\"NordVPN\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E. NordVPN combines strong security, excellent speeds, and a vast server network with a no-logs policy and a transparent approach to privacy that many users trust. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best VPN services: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EZDNET writers have \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F\" target=\"_blank\"\u003Etested and reviewed\u003C\u002Fa\u003E VPNs for years. We rely on our experiences with the best VPNs on the market, frequent speed tests, and customer feedback to recommend the top VPNs you should consider before signing up. Below, you will find our selection of the best no-log VPNs.\u003C\u002Fp\u003E\u003Ch2\u003EThe best no-log VPNs in 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"baf4c70c-a089-41e9-a4d6-55dc4946e6ad\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordVPN is one of our top picks in the VPN market. While we would like to see support for unlimited simultaneous connections added in the future, NordVPN still stands out due to its excellent speeds, server network of over 110 countries, and multi-platform compatibility.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordVPN operates a strict no-logs policy that has been validated multiple times since 2018. Deloitte verified the policy's claims in 2023. Furthermore, NordVPN is based in Panama, which does not enforce any data retention laws that would force the VPN provider to abandon this policy.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnordvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003ENordVPN review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe've consistently found that NordVPN provides a stable, solid server network, fantastic speeds, and good connection times. Customers say this VPN is easy to use and that customer support is prompt and friendly.\u003C\u002Fp\u003E\u003Cp\u003EIf you're interested in trying out NordVPN, the biggest savings can be found on two-year contracts, starting at $3.59 per month. If you agree to such a contract you should also get three months of free access. Alternatively, one-year plans begin at $4.99 per month, or one month of access costs $12.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENordVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E10 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, tvOS, and routers |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;111 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Email address and billing information only | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on&nbsp;Android\u003C\u002Fp\u003E\" data-hed=\"NordVPN\" data-superlative=\"Best no-logs VPN overall\" data-imagegroup=\"{"alt":"NordVPN","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"ba0d3eda-fd61-4ad4-87e4-a664ccd7d814","title":"nordvpn-windows-1","filename":"nordvpn-windows-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F21\u002Fba0d3eda-fd61-4ad4-87e4-a664ccd7d814\u002Fnordvpn-windows-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":327970,"width":1296,"height":720,"dateCreated":{"date":"2024-05-21 09:42:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-21 09:42:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne\u002FZDNET","alt":"nordvpn-windows-1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ba0d3eda-fd61-4ad4-87e4-a664ccd7d814","imageAltText":"NordVPN","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nordvpn-windows-1.jpg","imageDateCreated":"2024\u002F05\u002F21","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378","offerMerchant":"NordVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnordvpn.com\u002F","url":"https:\u002F\u002Fgo.nordvpn.net\u002Faff_c?aff_sub=subid_value&aff_id=307&source=ZDNET&offer_id=378"}]\" data-usepricing=\"false\" data-like=\"~ Excellent speeds ~ Massive server network ~ Attractive user interface ~ Independent no-logs verification\" data-dislike=\"~ Expensive premium plans\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a19b1bfb-6aea-472f-98a9-09b447b7d821\" data-edition=\"us\" data-description=\"\u003Cp\u003EMullvad VPN is a lesser-known VPN provider, but its customers know the organization takes privacy and security seriously.\u003C\u002Fp\u003E\u003Cp\u003EBased in Sweden and protected by strict data privacy laws, Mullvad operates a strict \u003Ca href="https:\u002F\u002Fmullvad.net\u002Fen\u002Fhelp\u002Fno-logging-data-policy" target="_blank"\u003Eno-logs policy\u003C\u002Fa\u003E and does not collect or store activity logs. While payment data may be processed (and protected by local laws, including GDPR), the company focuses on user anonymity, going so far as to number accounts rather than ask you for personal details, such as your email address.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EFurthermore, we've seen how Mullvad deals with law enforcement requests. When subjected to a search warrant in \u003Ca href="https:\u002F\u002Fmullvad.net\u002Fen\u002Fblog\u002Fmullvad-vpn-was-subject-to-a-search-warrant-customer-data-not-compromised" target="_blank"\u003E2023\u003C\u002Fa\u003E, Mullvad discussed the situation publicly and confirmed that while police intended to seize computers with customer data, no such devices existed for them to take.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWe like how easy this VPN is to use and its upfront pricing structure, although it would be great to see an expanded server network in the future. Customers like the transparent nature of this VPN and its provider but would like to see more advanced features in the future.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMullvad offers a fixed pricing structure without changes or promotional deals. This way, you know whether you want a month, a year, or a decade of service, you will pay €5 ($5.48) per month.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMullvad VPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E5 |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Fedora Android TV, Fire TV, routers, and browser extensions |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;47 |&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;Numbered accounts, billing in accordance with law |&nbsp;\u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days, some payment methods&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: No\u003C\u002Fp\u003E\" data-hed=\"Mullvad VPN\" data-superlative=\"Best transparent no-logs VPN\" data-imagegroup=\"{"alt":"Mullvad VPN Web","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"June Wan\u002FZDNET","imageData":{"id":"4bb2a64d-f3fa-4249-b1b8-8f022c0659f1","title":"Mullvad VPN Web","filename":"mullvad-vpn-web.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F4bb2a64d-f3fa-4249-b1b8-8f022c0659f1\u002Fmullvad-vpn-web.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1543517,"width":4240,"height":2384,"dateCreated":{"date":"2023-11-07 20:11:42","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-11-07 20:14:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"June Wan\u002FZDNET","alt":"Mullvad VPN Web","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"4bb2a64d-f3fa-4249-b1b8-8f022c0659f1","imageAltText":"Mullvad VPN Web","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"June Wan\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"mullvad-vpn-web.jpg","imageDateCreated":"2023\u002F11\u002F07","imageWidth":4240,"imageHeight":2384,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"June Wan\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fsecure.money.com\u002Fpr\u002Fk7529e67c0ae?s1=subid_value","offerMerchant":"Mullvad","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fmullvad.net\u002Fen","url":"https:\u002F\u002Fsecure.money.com\u002Fpr\u002Fk7529e67c0ae?s1=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Search warrant transparency ~ Reasonable speeds ~ Fixed pricing\" data-dislike=\"~ Limited simultaneous connections ~ Low server network\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e6450c42-ecf4-401d-a289-2f6884c5340f\" data-edition=\"us\" data-description=\"\u003Cp\u003EProtected by Swiss privacy laws, Proton VPN is another great VPN if you want a service that prioritizes security and privacy -- even on its free plan.\u003C\u002Fp\u003E\u003Cp\u003EProton VPN operates a no-logs policy and does not collect or store data such as activity logs or session duration records. This VPN is also open-source, which means that any third party can examine its code for security or privacy flaws. We've picked this VPN as one of the best options if you want a free plan, because while limited, it is backed by paid subscribers -- meaning you aren't trading your data for the service.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fproton-vpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EProton VPN\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EIn general, customers like Proton's attitude to security and privacy, and many like the user interface. Although Trustpilot ratings are low, the feedback primarily relates to the firm's free plan limitations and customer support system. Despite this, as a free plan, Proton VPN is one of the few we recommend as a trustworthy service.\u003C\u002Fp\u003E\u003Cp\u003EProton VPN's pricing is reasonable, but not as cheap as some of its competitors. Plans lasting two years offer the best value for money and are priced at $4.49 per month. Alternatively, annual plans cost $4.99 per month, whereas one month of service is $9.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton VPN features:&nbsp;\u003C\u002Fstrong\u003EOpen-source | \u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: One to 10, depending on plan |&nbsp;\u003Cstrong\u003ECountries\u003C\u002Fstrong\u003E: 91 |&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No-logs policy | Security audits |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, Android TV, Fire TV, Kodi, and routers | VPN accelerator | \u003Cstrong\u003EMoney-back guarantee\u003C\u002Fstrong\u003E: 30 days |&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Free option\u003C\u002Fp\u003E\" data-hed=\"Proton VPN\" data-superlative=\"Best free no-logs VPN\" data-imagegroup=\"{"alt":"proton vpn","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ZDNET | Charlie Osborne","imageData":{"id":"8fff6f6d-9cc0-44fd-a860-54b829a99243","title":"proton vpn","filename":"protonvpn.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F19\u002F8fff6f6d-9cc0-44fd-a860-54b829a99243\u002Fprotonvpn.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":134307,"width":1296,"height":720,"dateCreated":{"date":"2024-04-19 10:59:59","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-19 11:00:05","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"proton vpn","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"8fff6f6d-9cc0-44fd-a860-54b829a99243","imageAltText":"proton vpn","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ZDNET | Charlie Osborne","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"protonvpn.jpg","imageDateCreated":"2024\u002F04\u002F19","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ZDNET | Charlie Osborne\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value","offerMerchant":"ProtonVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fprotonvpn.com\u002F","url":"https:\u002F\u002Fgo.getproton.me\u002Faff_c?offer_id=25&aff_id=4706&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Security pedigree ~ Open source ~ Free plan\" data-dislike=\"~ Limited simultaneous connections\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"844da452-b761-472e-a443-9be3eee9aca2\" data-edition=\"us\" data-description=\"\u003Cp\u003EPrivate Internet Access, also known as PIA, is another of our favorite no-logs VPNs. Not only is this service open-source, but its stringent privacy policy is frequently audited by independent parties, including Deloitte, verifying that PIA does not collect or store your data.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EPIA also makes use of RAM-only servers, which removes traces of online activity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fprivate-internet-access-review\u002F" target="_blank"\u003E\u003Cstrong\u003EPrivate Internet Access review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EDuring our speed tests, PIA performed reasonably well, and we like the fact that this VPN provides unlimited simultaneous connections for its price point. Customers, in particular, applaud its Linux support.\u003C\u002Fp\u003E\u003Cp\u003EPIA is a consistently affordable option. The best deal right now is for two-year contracts, which cost only $2.19 per month and come with two months of free service. You can also sign up for six months for the equivalent of $7.50 per month, or try out the VPN for one month for $11.99.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPrivate Internet Access features:&nbsp;\u003C\u002Fstrong\u003E\u003Cstrong\u003ESimultaneous connections:&nbsp;\u003C\u002Fstrong\u003EUnlimited&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes | \u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Linux, Chrome, Firefox, Edge, tvOS, routers, Fire TV, and NAS |&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;91 | \u003Cstrong\u003ELogging:\u003C\u002Fstrong\u003E&nbsp;No-logs policy |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days | \u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days, Android and iOS\u003C\u002Fp\u003E\" data-hed=\"Private Internet Access\" data-superlative=\"Best no-logs VPN with unlimited connections\" data-imagegroup=\"{"alt":"pia","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"58eb6769-6d6d-4277-bb1a-1309c64ae1b8","title":"pia","filename":"pia.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F31\u002F58eb6769-6d6d-4277-bb1a-1309c64ae1b8\u002Fpia.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1030099,"width":1296,"height":720,"dateCreated":{"date":"2024-05-31 13:20:22","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-31 13:20:35","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"pia","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"58eb6769-6d6d-4277-bb1a-1309c64ae1b8","imageAltText":"pia","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"pia.jpg","imageDateCreated":"2024\u002F05\u002F31","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-14570828-1657804763000?sid=subid_value","offerMerchant":"PIA","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.privateinternetaccess.com\u002F","url":"https:\u002F\u002Fwww.kqzyfj.com\u002Fclick-9041660-14570828-1657804763000?sid=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Unlimited simultaneous connections ~ Mobile trials ~ Open source\" data-dislike=\"~ Average speeds ~ Limited server network\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"419f93cb-950f-45c5-a96b-e6ca9cf12f91\" data-edition=\"us\" data-description=\"\u003Cp\u003EIf speed and customer service -- alongside a strict no-logs policy -- is what you're after, consider ExpressVPN.\u003C\u002Fp\u003E\u003Cp\u003EExpressVPN also operates a strict no-logs policy and will not collect or store personal data, including browsing history, traffic records, DNS queries, or IP addresses. The company uses RAM-only servers for additional data protection, and independent audits of its no-logs policy have been conducted since 2019.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fexpressvpn-review\u002F" target="_blank"\u003E\u003Cstrong\u003EExpressVPN review\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003EWe like this VPN's speed. It always performs well on our speed tests, often taking center stage as the best on offer, with a robust server network as a bonus. We would, however, like to see the price reduced, and this sentiment is reflected in customer reviews.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIt is an excellent service but not the cheapest, with annual plans priced at $6.67 per month. Three months of free access are included. If you want to sign up for a six-month contract, you will pay $6.66 per month. One month of service is priced at $12.95.\u003C\u002Fp\u003E\u003Cp\u003EExpress VPN now also offers dedicated IP addresses for $3.19 per month.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EExpressVPN features: Simultaneous connections:&nbsp;\u003C\u002Fstrong\u003E8&nbsp;|&nbsp;\u003Cstrong\u003EKill switch:\u003C\u002Fstrong\u003E&nbsp;Yes |&nbsp;\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: Windows, macOS, iOS, Android, Chrome, Firefox, Edge, Linux, Fire TV, Android TV, tvOS, and routers&nbsp;|&nbsp;\u003Cstrong\u003ECountries:\u003C\u002Fstrong\u003E&nbsp;105&nbsp;|&nbsp;\u003Cstrong\u003ELogging\u003C\u002Fstrong\u003E: No browsing logs, some connection logs |&nbsp;\u003Cstrong\u003EMoney-back guarantee:&nbsp;\u003C\u002Fstrong\u003E30 days&nbsp;|&nbsp;\u003Cstrong\u003ETrial\u003C\u002Fstrong\u003E: Seven days on Android and iOS\u003C\u002Fp\u003E\" data-hed=\"ExpressVPN\" data-superlative=\"Best no-logs VPN for speed, service\" data-imagegroup=\"{"alt":"expressvpn-windows-3","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne\u002FZDNET","imageData":{"id":"14737c6d-c3b7-44f4-b893-4b6468b816d7","title":"expressvpn-windows-3","filename":"expressvpn-windows-3.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F05\u002F17\u002F14737c6d-c3b7-44f4-b893-4b6468b816d7\u002Fexpressvpn-windows-3.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":190112,"width":1296,"height":720,"dateCreated":{"date":"2024-05-17 12:44:17","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-05-17 12:44:21","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne\u002FZDNET","alt":"expressvpn-windows-3","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"14737c6d-c3b7-44f4-b893-4b6468b816d7","imageAltText":"expressvpn-windows-3","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"expressvpn-windows-3.jpg","imageDateCreated":"2024\u002F05\u002F17","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1330033\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value","offerMerchant":"ExpressVPN","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.expressvpn.com\u002F","url":"https:\u002F\u002Fgo.expressvpn.com\u002Fc\u002F159047\u002F1330033\u002F16063?&sharedid=cnet&partnerpropertyid=235399&u=https%3A%2F%2Fwww.expressvpn.com%2F&subId1=subid_value"}]\" data-usepricing=\"false\" data-like=\"~ Excellent speeds ~ Large server network ~ Mobile trials\" data-dislike=\"~ Expensive\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\u003Cstrong\u003EAlso:\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-streaming-vpn\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best streaming VPNs: Expert tested\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"codesnippet\" data-code=\"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\" data-encoding=\"base64\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bcce56a4-5f76-4fd6-bb2a-b292d7e3fa10\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENo-logs VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENo-logs policy?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EWarrant canary?\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EServer network\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EPrice\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u002Ftransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E111\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$3.59\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EMullvad VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ENews publications\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E47\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$5.48\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E91\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$4.49\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPrivate Internet Access\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E91\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$2.19\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E✓\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003ETransparency reports\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E105\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003E$6.67\u002Fmonth\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"No-log VPNs, compared\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"6b5b6c37-06fe-4b85-8a52-c8c29147153e\" data-edition=\"us\" data-description=\"\u003Cp\u003EA VPN service is a virtual private network that encrypts your internet traffic, hides your IP address, and provides a relatively anonymous and secure connection. The point of a VPN is to make it more difficult for people to eavesdrop on you or monitor your online activities, but there is little point in using a VPN if your information is being collected or exposed.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThat's why choosing a no-logs VPN is crucial. Some free VPN providers offer a VPN in exchange for your data and records, negating the whole point of a VPN. That's why you should&nbsp;pick a paid plan from a reputable VPN with a no-logs policy.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fwhat-is-a-vpn-and-why-do-you-need-one-all-your-virtual-private-network-questions-answered\u002F" target="_blank"\u003EWhat is a VPN and why do you need one?\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\" data-hed=\"What is a no-log VPN service and why should you use one?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EHow to set up a no-log VPN\u003C\u002Fh2\u003E\u003Cp\u003EOnce you've chosen the VPN you want to install, head to an official software repository -- such as Apple's App Store or the Google Play Store -- or directly to the VPN's website, which should have links to all the download sources.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9236e0e2-6920-4e76-a41f-63f4b46ba109\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"June Wan\u002FZDNET\" data-image-alt-text=\"ExpressVPN Web\" data-image-filename=\"expressvpn-web.jpg\" data-image-date-created=\"2023\u002F11\u002F07\" data-image-width=\"4240\" data-image-height=\"2384\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EDownloaded the app and install it. You may have to provide the VPN with specific device permissions. Once the software is installed, open it and log in with your credentials, QR code, or one-time passcode. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"062b2dcb-90e4-48d6-a759-eeb9128e8d8b\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"ZDNET\" data-image-alt-text=\"expressvpn\" data-image-filename=\"192.jpg\" data-image-date-created=\"2022\u002F10\u002F31\" data-image-width=\"1296\" data-image-height=\"720\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ESelect a country or choose quick connect, and you're done.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESee also: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-set-up-a-vpn-on-your-router\u002F\" target=\"_blank\"\u003EHow to set up a VPN on your router\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"82b22c2d-24fe-4b59-a8a2-c96ec42a7e14\" data-edition=\"us\" data-description=\"\u003Cp\u003EMany providers recommended in this list have been subject to in-depth testing and reviews by the ZDNET team. We've been talking about VPNs for years, spoken with their management and their users, and developed a generally favorable impression. \u003C\u002Fp\u003E\u003Cp\u003EZDNET tests VPN services from multiple locations, but we can't test from all locations. Every home, community, local ISP, and nation has a different infrastructure. \u003C\u002Fp\u003E\u003Cp\u003EWe analyzed the no-log best VPNs below using the following criteria that are most important in helping you make an informed decision: \u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ENo-logs\u003C\u002Fstrong\u003E \u003Cstrong\u003Epolicies\u003C\u002Fstrong\u003E: We thoroughly examined the transparency and security standards of each VPN we recommend. Each VPN must operate a no-logs policy and keep user data collection to a minimum.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity\u003C\u002Fstrong\u003E: There's no point in using a VPN unless its security protocols and encryption levels are up to scratch. We also ensured the development team behind each recommended VPN cares about making security improvements and patching reported bugs.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPerformance:\u003C\u002Fstrong\u003E&nbsp;Our top VPNs must have a minimum level of performance. After all, there's no point in using a VPN if your connection continually drops or lags.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: Many VPNs limit the number of devices you can connect at the same time. If you have a phone, tablet, laptop, desktop, or smart TV you want to connect to a VPN, you need a service that allows at least five or six simultaneous connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EKill switch\u003C\u002Fstrong\u003E: A kill switch prevents you from having an unprotected connection. It is an important feature for a VPN, as it protects you by preventing a return to a default Wi-Fi connection should your internet connection unexpectedly drop.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EGeo-blocks and streaming\u003C\u002Fstrong\u003E: VPNs can be key to accessing local content and services while you're away from home. We ensured that our top recommendations performed well given these factors and are unlikely to slow down your connection while streaming.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPlatforms\u003C\u002Fstrong\u003E: What systems and devices can you run the VPN on? Our no-logs VPN recommendations naturally have to offer easy-to-use and intuitive apps.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESupport\u003C\u002Fstrong\u003E: As with any subscription software, you may encounter problems with installing apps, using the service, renewing, or canceling. We list VPNs with an available support team.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECountries and servers\u003C\u002Fstrong\u003E: In how many different countries does the VPN have servers? This can include physical and virtual servers, and whether there are enough -- at least 50 or so -- to provide variety.\u003C\u002Fli\u003E\u003Cli\u003E \t\t \t\t\t\u003Cstrong\u003ETrial length and price\u003C\u002Fstrong\u003E: Each VPN we recommend has a solid money-back guarantee.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor a more extensive breakdown, check out our comprehensive \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-we-test-and-review-vpns\u002F" target="_blank"\u003EVPN testing methodology page\u003C\u002Fa\u003E. \u003C\u002Fp\u003E\" data-hed=\"How we test VPNs\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"393e346a-0576-47e3-be0f-7828d3d6cb7e\" data-edition=\"us\" data-description=\"\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EChoose this VPN...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EIf you want...\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003ENordVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EThe best overall no-logs VPN. NordVPN provides the whole package: robust security, speed, and a validated no-logs policy.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EMullvad VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA transparent no-logs VPN. Mullvad is based in Sweden and subject to strict data protection laws. The company is transparent in regard to police activities.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EProton VPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA free VPN focused on security and privacy. While the free plan is limited, it is backed by paid subscribers, so your data should not be collected and sold.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EPrivate Internet Access\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA no-logs VPN with unlimited connections. PIA is open-source, uses RAM-only servers, and is known for its stringent approach to security.\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cp\u003EExpressVPN\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cp\u003EA speedy no-logs VPN. ExpressVPN provides fantastic speeds and is easy to use, and audits have been conducted to verify its no-logs policy.&nbsp;\u003C\u002Fp\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Choosing the right no-logs VPN\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"57ac28c4-d8ab-4957-89ba-69272e360ebc\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen you are selecting your new no-logs VPN, consider the following factors:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPrivacy\u003C\u002Fstrong\u003E: It is important that your new VPN takes user privacy and security seriously. Look for no-logs pledges, transparent security reports, warrant canaries, and practices like frequent patch updates.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPrice\u003C\u002Fstrong\u003E: You need to consider the overall price of your new VPN plan. Try to take advantage of promotions, but ignore countdown timers -- they typically are just marketing tools. While top-notch VPNs can cost upwards of $10 per month, many are available for only a few dollars. Many VPN providers will also offer free, limited mobile app trials. We recommend that you avoid free VPNs -- with a few exceptions -- as they may sell your data or bombard you with ads.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESimultaneous connections\u003C\u002Fstrong\u003E: If you're paying for a VPN, you might want to use it across multiple devices, such as a desktop, a laptop, or smartphone. We recommend that you sign up for a plan supporting at least six devices. Thankfully, many paid VPN plans now offer unlimited connections.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EContract length\u003C\u002Fstrong\u003E: You must also decide how long you want to use a VPN. If you opt for a two-year term, you tend to secure the best prices, but other options are available. After you've made a selection, you typically have a 30-day money-back guarantee.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EApps\u003C\u002Fstrong\u003E: When selecting a VPN, you should consider what devices you want to protect. For example, if you have a Windows PC and an iPhone, take a look at the apps on offer to see if you like their user interfaces and functions.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"What are the factors to consider when choosing a no-logs VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EFAQs\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8683a4cf-d532-4345-95c0-6a99f9382432\" data-edition=\"us\" data-description=\"\u003Cp\u003EA no-logs policy ensures that a VPN will not log your activity, including the websites you visit, the online services you access, or DNS queries when your requests are sent through its server network.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EA no-logs policy doesn't mean that the VPN provider doesn't log all traffic and data. For example, a VPN provider may still log your VPN usage records, sessions, and billing information. They may also be required to log some customer information to comply with the laws of the country they are headquartered in.\u003C\u002Fp\u003E\" data-hed=\"What does no-logs mean?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cf8d3f51-7b38-4a60-9449-cf33ccbf5be7\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe police can request user information from a VPN provider in the same way they do for any other organization. With a court order, the VPN vendor will have to comply, but the information they can provide depends on their logging activities.\u003C\u002Fp\u003E\u003Cp\u003ELaw enforcement may be able to detect VPN use and may investigate IP addresses associated with you, but it's highly unlikely they would go down this route unless you are suspected of involvement in illegal activity. Remember, a VPN is not a foolproof privacy barrier and does not guarantee full anonymity.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Can the police track a VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"9ca214e5-c61d-41f3-ac07-5c5f8108486e\" data-edition=\"us\" data-description=\"\u003Cp\u003ETo check if your VPN is safe and working properly, first choose a reputable vendor known to have a strong security background.\u003C\u002Fp\u003E\u003Cp\u003ENext, compare your IP address before and after enabling a VPN connection. You can find this under your device's settings (typically under Wi-Fi) or by visiting \u003Ca href="https:\u002F\u002Fwhatismyipaddress.com\u002F" target="_blank"\u003Ewhatismyipaddress.com\u003C\u002Fa\u003E. If they both display the same IP address, your VPN may not be working properly.\u003C\u002Fp\u003E\u003Cp\u003EYou can also visit \u003Ca href="https:\u002F\u002Fwww.dnsleaktest.com\u002F" target="_blank"\u003Ednsleaktest.com\u003C\u002Fa\u003E to see if any DNS leaks are detected while you are using a VPN, which could be a sign that your information is being leaked.\u003C\u002Fp\u003E\u003Cp\u003EFinally, be careful with free VPNs offered by unknown or shady companies, especially if they are outside of official app repositories. This could open your device to surveillance or malware.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How do I tell if my VPN is safe?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"647999d0-b2ee-4c24-96c9-0db60b00b50f\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, no-logs VPN services are legal in the US, but the legality of using VPNs varies from country to country.\u003C\u002Fp\u003E\u003Cp\u003EIt is important to check the laws of your location before using a VPN. Some countries ban their use outright, such as North Korea, Belarus, and Iraq, whereas other countries, including Russia and China, frown upon using any non-state-controlled VPN.\u003C\u002Fp\u003E\u003Cp\u003EFor a list of countries where VPN usage is illegal, check out NordVPN's \u003Ca href="https:\u002F\u002Fnordvpn.com\u002Fblog\u002Fare-vpns-legal\u002F" target="_blank"\u003Eguide\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\" data-hed=\"Are no-logs VPN services legal?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"5e4fc9f1-5c2e-41c7-a0d1-2729208823b6\" data-edition=\"us\" data-description=\"\u003Cp\u003EPotentially, yes. If your VPN is working properly, your data and activities are hidden within an encrypted tunnel, and you have improved protection and anonymity online, but this doesn't mean that your browsing history isn't logged through your browser or that monitoring software on corporate PCs isn't logging your activities. Corporate VPNs may also log your website visits.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Can my employer see my browsing history if I use a VPN?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"454c362f-b32b-4723-a726-83dc2759e56d\" data-edition=\"us\" data-description=\"\u003Cp\u003EOur recommendations above are the best no-logs-focused VPNs on the market today. If they aren't quite right for your particular needs, there are other trustworthy options below.\u003C\u002Fp\u003E\" data-hed=\"Are there alternative no-logs VPNs to consider?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"ae424410-5192-45b0-906d-e43c3a071b32\" data-edition=\"us\" data-description=\"\u003Cp\u003ESurfshark is an excellent alternative if you want a consistently affordable VPN. Surfshark operates a no-logs policy and maintains a warrant canary.\u003C\u002Fp\u003E\" data-hed=\"Surfshark\" data-imagegroup=\"{"alt":"surfshark-windows-1","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Charlie Osborne | ZDNET","imageData":{"id":"792b612d-1f0c-420c-93fb-e1bc6896f800","title":"surfshark-windows-1","filename":"surfshark-windows-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F06\u002F20\u002F792b612d-1f0c-420c-93fb-e1bc6896f800\u002Fsurfshark-windows-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":1093404,"width":1296,"height":720,"dateCreated":{"date":"2024-06-20 10:14:34","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-06-20 10:14:39","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Charlie Osborne | ZDNET","alt":"surfshark-windows-1","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"792b612d-1f0c-420c-93fb-e1bc6896f800","imageAltText":"surfshark-windows-1","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Charlie Osborne | ZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"surfshark-windows-1.jpg","imageDateCreated":"2024\u002F06\u002F20","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Charlie Osborne | ZDNET\" data-linktext=\"Best affordable alternative\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786","offerMerchant":"Surfshark","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fsurfshark.com\u002Fpricing","url":"https:\u002F\u002Fget.surfshark.net\u002Faff_c?aff_sub=subid_value&aff_id=1511&source=ZDNET&offer_id=786"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"c42d211c-cde6-49e1-b543-53f9115ef234\" data-edition=\"us\" data-description=\"\u003Cp\u003EIPVanish doesn't log user traffic and self-destructs connection diagnostic data after every session.\u003C\u002Fp\u003E\" data-hed=\"IPVanish\" data-imagegroup=\"{"alt":"ipvanish android","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"ZDNET | Charlie Osborne","imageData":{"id":"0ac08f82-963a-488d-8bf7-e55a75a868f3","title":"ipvanish android","filename":"ipvanishandroid.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F04\u002F29\u002F0ac08f82-963a-488d-8bf7-e55a75a868f3\u002Fipvanishandroid.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":191816,"width":1296,"height":720,"dateCreated":{"date":"2024-04-29 08:11:26","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-04-29 08:11:33","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"ZDNET | Charlie Osborne","alt":"ipvanish android","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"0ac08f82-963a-488d-8bf7-e55a75a868f3","imageAltText":"ipvanish android","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"ZDNET | Charlie Osborne","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"ipvanishandroid.jpg","imageDateCreated":"2024\u002F04\u002F29","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"ZDNET | Charlie Osborne\" data-linktext=\"Best alternative with audited no-logs policy\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value","offerMerchant":"IPVanish","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.ipvanish.com\u002F","url":"https:\u002F\u002Faffiliate.ipvanish.com\u002Faff_c?offer_id=14&aff_id=1296&source=ZDNET&aff_sub=subid_value"}]\" data-usepricing=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 16:40:00",timezone:"UTC",updated:c,published:c},description:"No-log VPNs claim to not keep records of their customers' online activities. These are the best no-log VPNs to protect your privacy.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"0ce755a9-86e9-4230-bf67-fbf22ad3ceaf",image:{id:"9236e0e2-6920-4e76-a41f-63f4b46ba109",filename:"expressvpn-web.jpg",dateCreated:{created:c,date:"2023-11-07 20:11:40",timezone:"UTC",updated:c,published:c},alt:"ExpressVPN Web",credits:"June Wan\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F11\u002F07\u002F9236e0e2-6920-4e76-a41f-63f4b46ba109\u002Fexpressvpn-web.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4240,height:2384,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^VPN",relatedItems:[]},name:b,promoTitle:"The best no-log VPNs of 2024: Expert tested and reviewed",section:b,slug:"best-no-log-vpns",startYear:c,summary:b,title:"The best no-log VPNs of 2024: Expert tested and reviewed",topic:{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"e5be9bf6-59dd-4954-b3b3-ee691565f832",slug:"vpn",name:"VPN",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"1147b242-ec91-11e3-95d2-02911863765e",slug:"smartphones",name:"Smartphones",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"ae164b3d-9f4e-461e-8353-db202258465a",slug:"cyber-threats",name:"Cyber Threats",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"af36937c-c95c-4bf0-9c02-831f70ad9a0c",slug:"best-lists",name:"Best Lists",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"f1f7db06-c6f9-4e80-8187-60ad48f035a1",slug:"zdnet-recommends",name:"ZDNET Recommends",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"0a6fffc2-2220-44ba-99e4-4c567f6f57bb",username:"maria-diaz-zd",profileUrl:c,email:c,firstName:"Maria",lastName:"Diaz",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"d89921b7-c002-40ef-8401-f002f1a769e9",filename:"maria-diaz.jpg",dateCreated:{created:c,date:"2022-08-05 14:44:33",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2022\u002F08\u002F05\u002Fd89921b7-c002-40ef-8401-f002f1a769e9\u002Fmaria-diaz.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Maria Diaz is a staff writer based in the Raleigh-Durham, NC area with a passion for home automation and a background in graphic design, photography, and filmmaking. She has a bachelor's in Mass Communication and experience in journalism.",profile:c,title:"Staff Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"9bd28cc2-5e0d-4026-9c5a-b6d463a77e0d\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"3.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Ch3\u003EZDNET's key takeaways\u003Cbr\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\u003Cli\u003EThe \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"963af709-bd70-4a79-8f23-3627bf0ba1c1\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-link-shortcode-text=\"Blink Mini 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E is available for $30 on its own or bundled with a \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"ad625748-25b0-42dc-ad57-dc29714e1d49\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-monetized-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20\" data-link-shortcode-text=\"weather-resistant power adapter for $40\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E.\u003C\u002Fli\u003E\u003Cli\u003EWith a stronger construction, improved video quality, a new spotlight, person detection, and weather resistance for outdoor use, the Blink Mini 2 is a definite upgrade from the first generation.\u003C\u002Fli\u003E\u003Cli\u003EAs an Amazon device, the Blink Mini 2 works with Alexa but not Google Home, Matter, or other smart home systems.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Chr\u003E\u003Cp\u003EIf you're looking for an affordable security camera to replace your Wyze Cam after this year's data breaches, Blink may have the one for you. The Blink Mini 2 is available now for 40% off.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fi-just-tested-the-new-eufycam-and-im-never-going-back-to-grainy-night-vision\u002F\"\u003EI just tested the new EufyCam, and I'm never going back to grainy night vision\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EI've been testing the Blink Mini 2 for the past week and noticed some big changes over the original \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"e88bbed6-7365-43c4-8c4e-37bc3d7ae191\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FBlink-Mini-White-1Cam\u002Fdp\u002FB07X6C9RMF\" data-link-shortcode-text=\"Blink Mini\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, which I've had for almost two years. Widely known as an affordable indoor camera (normally retailing for $49), the Blink Mini is a compact plug-in camera that can be installed anywhere inside or outside your home.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1fe4e93c-24bc-4b8b-908f-19ac782aa901\" data-edition=\"us\" data-description=\"\u003Cp\u003EThe Blink Mini 2 is a compact plug-in security camera fit for indoor or outdoor use, featuring on-device person detection, Alexa support, a 143-degree FOV, and a built-in spotlight.\u003C\u002Fp\u003E\" data-hed=\"Blink Mini 2\" data-imagegroup=\"{"alt":"Blink Mini 2","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Maria Diaz\u002FZDNET","imageData":{"id":"ddd4fa89-f37f-483b-b6af-a6a9b6c353ee","title":"Blink Mini 2","filename":"img-5595-copy.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F13\u002Fddd4fa89-f37f-483b-b6af-a6a9b6c353ee\u002Fimg-5595-copy.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":4931046,"width":4935,"height":2767,"dateCreated":{"date":"2024-03-13 18:31:59","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-13 18:32:12","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Maria Diaz\u002FZDNET","alt":"Blink Mini 2","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ddd4fa89-f37f-483b-b6af-a6a9b6c353ee","imageAltText":"Blink Mini 2","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Maria Diaz\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"img-5595-copy.jpg","imageDateCreated":"2024\u002F03\u002F13","imageWidth":4935,"imageHeight":2767,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Maria Diaz\u002FZDNET\" data-linktext=\"ZDNET RECOMMENDS\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20","offerMerchant":"Amazon","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94","url":"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94?tag=zdnet-buy-button-20"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe older Blink Mini has two-way audio, 1080p video resolution, Amazon Alexa integration, and works as a chime for the Blink video doorbell. The new Blink Mini 2 has all these features, plus weather-resistant indoor and outdoor construction, person detection, and a spotlight.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThe weather resistance is a feature that takes the Blink to the next level, making it a direct \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"9ca3375b-ae63-4fec-b157-c20479e588ee\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002FVision-Indoor-Outdoor-Camera-Assistant\u002Fdp\u002FB08R59YH7W\" data-link-shortcode-text=\"Wyze Cam v3\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E competitor. Wyze Cam maker Wyze Labs has recently been the \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fwyze-camera-breach-let-13000-strangers-view-other-peoples-homes\u002F\" target=\"_blank\"\u003Etarget of user frustration\u003C\u002Fa\u003E after a service outage led to a privacy incident where some users could temporarily see other users' live cameras and events.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"9a67c961-3fe8-4a14-8446-ae0657b10120\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003EThe Blink Mini 2 next to a Wyze Cam v3.\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2 vs Wyze Cam v3\" data-image-filename=\"1.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EAfter testing the Blink Mini 2, I spoke to Blink's head of product, Jonathan Cohn, to discuss the ins and outs of the new security camera. Cohn explained that after listening to user feedback, the company added weather resistance and a spotlight, which works as a light source for color night vision, to illuminate dark areas when motion is detected. The camera also has a recording indicator to deter would-be intruders.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fa-battery-powered-floodlight-camera-was-exactly-what-my-dark-backyard-needed\u002F\"\u003EA battery-powered floodlight camera was exactly what my dark backyard needed\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhile not as bright as an outdoor light, the spotlight is bright enough to illuminate people as they approach and light up pathways in the dark. This made me consider setting up the Mini 2 by the garbage cans beside my house, but I decided against it since I don't have a power source nearby, and the camera needs to be plugged in at all times. The Mini 2 would go perfectly in a garage or a carport to illuminate a driveway or surveil a back door. \u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"e89b5a18-b5dd-4cc6-b97e-5176ed0cb92c\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"4.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003ELike the Blink Outdoor 4, the Blink Mini 2 can notify you when a person has been detected, ignoring all other motion powered by the Blink's silicon.\u003C\u002Fp\u003E\u003Cp\u003E\"Blink makes its chip and uses the chip on our cameras, which means we own the end-to-end experience and design of our camera,\" Cohn explained. Using proprietary silicon and design ensures Blink can guarantee the entire privacy and security experience from when the light enters the lens to the recorded video clips, Cohn added.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fsmart-home\u002Fwyze-camera-breach-let-13000-strangers-view-other-peoples-homes\u002F\"\u003EWyze camera breach let 13,000 strangers look into other people's homes\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThough the Blink Mini and Mini 2 feature 1080p HD resolution video recording, the difference in the recorded clips is noticeable. Cohn explained that Blink significantly improved the Mini 2's video quality, increasing the field-of-view from 110 to 143 degrees for more coverage, increasing the sensor's lowlight capability, and improving the dynamic range.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"image\" data-uuid=\"0abe0e3c-3abe-4370-85f8-6fe8ea8961bc\" data-size=\"original\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"Blink Mini 2\" data-image-filename=\"2.jpg\" data-image-date-created=\"2024\u002F03\u002F13\" data-image-width=\"4935\" data-image-height=\"2767\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EThis means the Mini 2 can capture clearer and more detailed images in mixed lighting, even if very bright and dark areas are in a single frame. A better dynamic range can show details in shadowy and brightly lit areas in a single video, making it easier to identify people and objects.\u003C\u002Fp\u003E\u003Ch2\u003EZDNET's buying advice\u003C\u002Fh2\u003E\u003Cp\u003EIn my home, the \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"625ecebe-6c5e-4c16-a831-7e1b60e54f59\" data-raw-url=\"https:\u002F\u002Fwww.amazon.com\u002Fdp\u002FB0CRZC2R94\" data-link-shortcode-text=\"Blink Mini 2\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E replaced a Wyze Cam v3 in my sunroom. This is a fairly humid room with direct entry to my home, so a camera with a spotlight is better than one without. Since making the switch, I won't be going back.\u003C\u002Fp\u003E\u003Cp\u003EBlink cameras come with a 30-day free trial to the Blink Subscription Plan. The monthly subscription gives users cloud storage and extra features, like person detection and a continuous live feed for up to 90 minutes. You can bypass the subscription by purchasing a Blink Sync Module and a USB flash drive to store video clips, which is the solution I've set up in my home.\u003C\u002Fp\u003E\u003Cp\u003ESince my home relies on Amazon's Alexa, I appreciate that the Blink Mini 2 is quicker to connect to multiple Echo Shows than the Wyze camera, showing me what's happening in the sunroom. Blink doesn't integrate with Google Home, Apple HomeKit, Samsung SmartThings, or other smart home systems, which is a factor to consider if your smart home uses one.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F47b1617b-799d-4263-9878-ccc4bc00d4b9\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 15:28:21",timezone:"UTC",updated:c,published:c},description:"The Blink Mini 2 is feature-rich, and it includes a waterproof adapter that makes it that much sweeter. Currently, it's available on Amazon for just $30.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"d1d0894f-8501-4ed1-931e-2af58b95c9c1",image:{id:"ac5435dc-534f-4bbc-8021-67b19f13e6c3",filename:"5.jpg",dateCreated:{created:c,date:"2024-03-13 18:39:28",timezone:"UTC",updated:c,published:c},alt:"Blink Mini 2",credits:"Maria Diaz\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F13\u002Fac5435dc-534f-4bbc-8021-67b19f13e6c3\u002F5.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:4935,height:2767,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"product-promo",hubTopicPathString:"Home & Office^Smart Home^Home Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"why-i-recommend-the-blink-mini-2-security-camera-over-the-wyze-cam-and-its-only-30-right-now",startYear:c,summary:b,title:"Why I recommend the Blink Mini 2 security camera over the Wyze Cam (and it's only $30 right now)",topic:{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"c6e55fd2-3f9e-48b8-b0b3-544c501e35fd",slug:"home-security",name:"Home Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"60832ece-f84e-43d8-a207-9697d20dc673",slug:"kitchen-household",name:"Kitchen & Household",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"81fcf152-44b9-45ff-8a25-04f5b2472176",slug:"yard-outdoors",name:"Yard & Outdoors",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"97e096ab-1a2f-479b-b8c6-7abec11c1087",username:"lancewhitney",profileUrl:c,email:c,firstName:"Lance",lastName:"Whitney",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"6835195a-fcd2-43b2-918b-8f61bcdb9fd2",filename:"lance-31.png",dateCreated:{created:c,date:"2023-05-12 19:35:23",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F05\u002F12\u002F6835195a-fcd2-43b2-918b-8f61bcdb9fd2\u002Flance-31.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Lance Whitney is a freelance technology writer and trainer with a background in IT. He's written for a host of sites and publications, including TechRepublic, PCMag, Macworld, AskWoody, Time, Fortune, and AARP Magazine. He spent seven years writing breaking news for CNET and six years writing a monthly column about Microsoft utilities for the late TechNet Magazine. He's written two books for Wiley & Sons - \"Windows 8: Five Minutes at a Time\" and \"Teach Yourself Visually LinkedIn.\" He also teaches both online and in-person computer classes on such topics as Windows, Microsoft Office, eBay, social media, and cybersecurity. And in a past life, he worked in IT for an international company providing product management and systems support in the U.S. and abroad.",profile:c,title:b,bio:b,bureau:"AU",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"d407d1fb-ec8d-409a-858f-07ec24198d49\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Maria Diaz\u002FZDNET\" data-image-alt-text=\"iOS 18 on iPhone 14 Pro Max\" data-image-filename=\"4.jpg\" data-image-date-created=\"2024-09-17 20:41:09.000000\" data-image-width=\"1920\" data-image-height=\"1080\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EApple has rushed out emergency patches for the iPhone, iPad, and Mac that squash a couple of serious security bugs. The two zero-day vulnerabilities may have already compromised Intel-based Macs in the wild, but the updates are designed for iPhones and iPads as well.\u003C\u002Fp\u003E\u003Cp\u003EThree new support documents describe the bugs: \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F121752\"\u003Eone for iOS 18.1.1 and iPadOS 18.1.1\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F121753\"\u003Eanother for MacOS Sequoia 15.1.1\u003C\u002Fa\u003E, and a \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F121756\"\u003Ethird for Safari\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fi-replaced-my-m1-macbook-pro-with-a-base-model-m4-and-it-blew-my-3000-laptop-away\u002F\"\u003EI replaced my M1 MacBook Pro with a base model M4 - and it blew my $3,000 laptop away\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe update for iOS and iPadOS is aimed at the Phone XS and later, the 13-inch iPad Pro, the 12.9-inch iPad Pro 3rd generation and later, the 11-inch iPad Pro 1st generation and later, the iPad Air 3rd generation and later, the iPad 7th generation and later, and the iPad mini 5th generation and later. The update for MacOS is designed for \u003Ca href=\"https:\u002F\u002Fsupport.apple.com\u002Fen-us\u002F120282\"\u003Eany computer compatible with MacOS Sequoia\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ELabeled \u003Ca href=\"https:\u002F\u002Fnvd.nist.gov\u002Fvuln\u002Fdetail\u002FCVE-2024-44308\"\u003ECVE-2024-44308\u003C\u002Fa\u003E and titled JavaScriptCore, the first flaw is defined as: \"processing maliciously crafted web content may lead to arbitrary code execution.\" This means that a malicious website designed to exploit the vulnerability could allow an attacker to take control of your device. In resolving the issue, Apple said only that it was addressed with improved checks.\u003C\u002Fp\u003E\u003Cp\u003EKnown as \u003Ca href=\"https:\u002F\u002Fnvd.nist.gov\u002Fvuln\u002Fdetail\u002FCVE-2024-44309\"\u003ECVE-2024-44309\u003C\u002Fa\u003E and titled WebKit, the second flaw is defined as \"processing maliciously crafted web content may lead to a cross site scripting attack.\" This one means that an attacker who injects malicious scripts into an otherwise safe website could compromise or steal sensitive data. The fix here, according to Apple, was to resolve a cookie management issue.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EIn both cases, Apple said it was aware of reports that the issue may have been actively exploited on Intel-based Mac systems. But flaws that can affect a Mac can sometimes affect an iPhone or iPad. At the very least, updating all three types of devices at the same time prevents attackers from further exploiting the vulnerabilities.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fhow-to-make-mac-apps-open-automatically-at-startup-and-save-time-and-energy\u002F\"\u003EThis quick Mac tip will save you lots of clicks over time. Here's how\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\"The practical implications of these vulnerabilities can be discerned without official vendor commentary, as both issues were discovered by researchers from \u003Ca href=\"https:\u002F\u002Fblog.google\u002Fthreat-analysis-group\u002F\" target=\"_blank\"\u003EGoogle's Threat Analysis Group\u003C\u002Fa\u003E (TAG),\" said Mike Walters, President and co-founder of patch management vendor Action1. \"These zero-days are likely being exploited by spyware developers and operators. As of 2024, the total count of zero-day vulnerabilities [for Apple] stands at six, which is notably fewer than the previous year when 20 such vulnerabilities were addressed.\"\u003C\u002Fp\u003E\u003Cp\u003ETo update your iPhone or iPad to the latest 18.1.1 version, head to Settings, select General, and then tap Software Update. Allow the new version to download and install. To update your Mac to MacOS Sequoia 15.1.1, click the Apple menu and select System Settings. Go to General, click Software Update, and then trigger the installation. With the new macOS update, Safari is automatically updated as well.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 14:03:00",timezone:"UTC",updated:c,published:c},description:"The emergency updates resolve two zero-day flaws that may have already been exploited in the wild.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"6d3d1481-9264-4ecf-be82-10c52e67b009",image:{id:"d407d1fb-ec8d-409a-858f-07ec24198d49",filename:"4.jpg",dateCreated:{created:c,date:"2024-09-17 20:41:09",timezone:"UTC",updated:c,published:c},alt:"iOS 18 on iPhone 14 Pro Max",credits:"Maria Diaz\u002FZDNET",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F09\u002F17\u002Fd407d1fb-ec8d-409a-858f-07ec24198d49\u002F4.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:1920,height:1080,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Tech^Smartphones^iPhone",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"update-your-iphone-ipad-and-mac-now-to-patch-these-serious-zero-day-security-flaws",startYear:c,summary:b,title:"Update your iPhone, iPad, and Mac now to patch these serious zero-day security flaws",topic:{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"1093d9cb-ec91-11e3-95d2-02911863765e",slug:"iphone",name:"iPhone",typeName:"content_topic",uuid:b,primary:a,topicPath:[]},{id:"0fbd54d0-ec91-11e3-95d2-02911863765e",slug:"apple",name:"Apple",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"108f2b14-ec91-11e3-95d2-02911863765e",slug:"ios",name:"iOS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"1091623b-ec91-11e3-95d2-02911863765e",slug:"ipad",name:"iPad",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},{id:"d0aee31d-965e-4a8b-97f0-5c7c1b8bf7f1",slug:"mac-os",name:"Mac OS",typeName:"content_topic",uuid:b,primary:d,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"df4e6daa-3a40-4260-a6b4-c53410513a75",username:"emily.long",profileUrl:c,email:c,firstName:"Emily",lastName:"Long",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"b12e2baf-1e9f-41bb-9c45-e6d3c9a6faaf",filename:"elong-headshot.png",dateCreated:{created:c,date:"2024-08-08 17:06:46",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F08\u002Fb12e2baf-1e9f-41bb-9c45-e6d3c9a6faaf\u002Felong-headshot.png",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Emily Long is a freelance writer based in Salt Lake City, Utah. She covers consumer tech, privacy, and personal finance, and her work has been featured on sites like Lifehacker, Tom's Guide, and Wirecutter, among others. She has been reporting and writing for over a decade.",profile:c,title:"Contributing writer",bio:b,bureau:c,awards:b,expertise:b,authorDisclosure:c},body:"\u003Cp\u003EWe all become a little lethargic as the days grow shorter and colder air sets in. A good password manager helps us by streamlining our logins. It's one less thing we need to worry about. Complex passwords, passkeys, unique login names... all of it can be handled by a password manager, allowing us to hibernate in comfort. \u003C\u002Fp\u003E\u003Cp\u003EWe tested the best free password managers over the past year to help you stay safe online while warm at home. These are robust tools that won't cost you a dime. \u003C\u002Fp\u003E\u003Ch2\u003EWhat is the best free password manager right now?\u003C\u002Fh2\u003E\u003Cp\u003EAt ZDNET, we've tested a wide range of free password managers to find those you can trust to keep your passwords secure from threats and accessible when you need them. Our pick for the best free password manager is \u003Cspan data-shortcode=\"commercelinkshortcode\" data-id=\"8672d897-e47d-4434-a0d7-246af88d12ef\" data-raw-url=\"https:\u002F\u002Fbitwarden.com\u002F\" data-link-shortcode-text=\"Bitwarden\" data-use-monetization=\"true\" data-edition=\"us\"\u003E\u003C\u002Fspan\u003E, which allows you to sync as many logins as you want across all your devices while protecting your data with strong encryption and several layers of security. \u003C\u002Fp\u003E\u003Cp\u003EThese are the best free password managers to securely store your data in 2024. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\" target=\"_blank\"\u003E\u003Cstrong\u003EThe best antivirus software\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2\u003EThe best free password managers of 2024\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"2869633c-add8-4055-9874-55f85096cf8a\" data-edition=\"us\" data-description=\"\u003Cp\u003EBitwarden offers everything you need in a basic password manager -- plus some premium features -- at no cost, which makes it our top pick for free password management (and \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F5-bitwarden-features-that-make-it-my-favorite-password-manager\u002F"\u003Eone of our favorite password managers\u003C\u002Fa\u003E, period).&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EUsers on Bitwarden's free tier can create and store an unlimited number of logins that sync across an unlimited number of devices with access wherever you need them: Windows, macOS, Linux, iOS, and Android as well as Chrome, Firefox, Safari, Vivaldi, Edge, Brave, Opera, Tor, and DuckDuckGo (currently in beta on macOS). The free plan also includes useful tools like encrypted text sharing via Bitwarden Send, the ability to share vault items with another user, and a handful of multi-factor authentication (MFA) options for accessing your vault.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBitwarden is open source, meaning its code is available for anyone to identify security flaws that need to be patched, and the platform undergoes regular security audits and testing. It also supports passkeys both for saved logins and access to your Bitwarden vault, adding a layer of security beyond even a complex password and two-factor authentication. The free tier also includes basic vault health reporting, so you'll be alerted if any of your saved usernames were exposed in a data breach.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBitwarden has a no-frills interface, and some of its features -- like autofill and its built-in password generator -- are clunkier than other platforms. But as a completely free password manager, it's a solid choice for most people.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBitwarden features:&nbsp;\u003C\u002Fstrong\u003EUnlimited passwords on unlimited devices | Multi-platform |&nbsp;Autofill and autosave |&nbsp;Secure vault sharing between two users |&nbsp;Secure note storage |&nbsp;Password generator |&nbsp;Encrypted text sharing via Bitwarden Send |&nbsp;Passkey support |&nbsp;Biometric unlock |&nbsp;Multi-factor authentication for vault |&nbsp;Username data breach reports\u003C\u002Fp\u003E\" data-hed=\"Bitwarden\" data-superlative=\"Best free password manager overall\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Bitwarden\u002FZDNET","imageData":{"id":"9fce214e-c3e4-44f1-83de-5a195090414f","title":"Bitwarden password manager","filename":"bitwarden-1.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F13\u002F9fce214e-c3e4-44f1-83de-5a195090414f\u002Fbitwarden-1.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":60050,"width":1296,"height":720,"dateCreated":{"date":"2024-08-13 15:05:03","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-13 15:05:16","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Bitwarden\u002FZDNET","alt":"bitwarden","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"9fce214e-c3e4-44f1-83de-5a195090414f","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Bitwarden\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"bitwarden-1.jpg","imageDateCreated":"2024\u002F08\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Bitwarden\u002FZDNET\" data-offer=\"{"id":"0f9c337e-f584-4a9d-91f9-2c50dd39b2e8","slug":"bitwarden","label":"Bitwarden","edition":["US","ES"],"imageId":null,"imgWidth":null,"imgHeight":null,"objectType":"content_product_series","typeLabel":"Series","imgUrl":null,"icon":""}\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Bitwarden","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fbitwarden.com\u002F","url":""}]\" data-usepricing=\"true\" data-like=\"~ Syncs unlimited passwords on unlimited devices ~ Open source ~ Passkey support ~ Data breach reporting\" data-dislike=\"~ Premium features such as emergency access require paid plan\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"78000d68-5c97-40b9-95c5-77631010cc05\" data-edition=\"us\" data-description=\"\u003Cp\u003ENordPass is the password manager from Nord Security, the cybersecurity company behind \u003Ca href="https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fnordvpn-review\u002F"\u003ENordVPN\u003C\u002Fa\u003E and secure cloud storage service NordLocker. Its free tier offers the essentials of password management: unlimited password storage with autosave and autofill, a built-in password generator, and passkey support, all in a user-friendly interface that's consistent across platforms.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordPass's most significant limitation is that you can only be logged into your vault on one device at a time -- accessing your account via mobile app will log you out on desktop, and vice versa. This is more of a minor inconvenience for most users, as it simply requires logging back into your vault using your master password, biometrics, or one-time code when you switch devices. NordPass is multi-platform, with apps for iOS, Android, Windows, macOS, and Linux and extensions for Chrome, Firefox, Safari, Opera, and Edge.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EWhile signing up for NordPass does require you to create a universal Nord Account login in addition to a master password for your vault, you can access all of Nord Security's tools under the same credentials. Like other trusted password managers, NordPass uses strong encryption and has undergone an independent security audit. You can also enable multi-factor authentication as an extra measure to protect your vault. &nbsp;\u003C\u002Fp\u003E\u003Cp\u003ENordPass's intuitive platform on its free tier is a good choice for users new to password management who don't mind having to log in with each device switch. Note, though, that if you want any extra features like security monitoring, file storage, or emergency access, you'll need to upgrade to a paid account, which starts at $1.39 per month for a single user.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENordPass features:&nbsp;\u003C\u002Fstrong\u003EUnlimited passwords on one device at a time | Multi-platform |&nbsp;Autofill and autosave&nbsp;|&nbsp;Secure note storage&nbsp;|&nbsp;Username and password generator&nbsp;|&nbsp;Passkey support&nbsp;|&nbsp;Biometric unlock &nbsp;|&nbsp;Multi-factor authentication for vault&nbsp;|&nbsp;24\u002F7 customer support\u003C\u002Fp\u003E\" data-hed=\"NordPass\" data-superlative=\"Best free password manager for new users\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Nord\u002FZDNET","imageData":{"id":"17db69d3-027b-45a2-a3d1-3faf15b5aeed","title":"NordPass free password manager","filename":"nordpass.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F13\u002F17db69d3-027b-45a2-a3d1-3faf15b5aeed\u002Fnordpass.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":63092,"width":1296,"height":720,"dateCreated":{"date":"2024-08-13 16:47:25","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-13 16:47:37","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Nord\u002FZDNET","alt":"nordpass","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"17db69d3-027b-45a2-a3d1-3faf15b5aeed","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Nord\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"nordpass.jpg","imageDateCreated":"2024\u002F08\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Nord\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fnordpass.com\u002F","offerMerchant":"Nord Security","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fnordpass.com\u002F","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fnordpass.com\u002F"}]\" data-usepricing=\"true\" data-like=\"~ Unlimited password storage ~ Clean, consistent user interface ~ Passkey support\" data-dislike=\"~ Can only be logged in on one device at a time\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"fbcf7c40-812b-49b2-b8f7-1337da4ec796\" data-edition=\"us\" data-description=\"\u003Cp\u003EProton Pass is an open-source password manager that combines highly secure storage with premium features for all users, including those on its free tier. With a free account, you get unlimited password storage accessible on an unlimited number of devices and across multiple platforms, including Windows, macOS, Linux, iOS, Android, Chrome, Firefox, Safari, Brave, and Edge. Proton Pass has a user-friendly design and a simple, guided setup process, making it a solid alternative to NordPass for those new to password management.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EA free Proton Pass account includes several features usually found only on paid plans. You get up to 10 hide-my-email aliases, which can minimize tracking and spam tied to your personal address, and vault health reports as part of Pass Monitor. Proton Pass does offer integrated two-factor authentication support, but this is limited to three accounts unless you upgrade to a premium tier.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAs the password management solution from Proton, the Swiss privacy company known for its VPN and encrypted email services, Proton Pass meets high security standards. Like Bitwarden, its code is available for independent review, and the platform undergoes audits that are made available to the public.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you are looking for a well-designed and highly secure password manager with a handful of unique features, Proton Pass is worthy of consideration.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EProton Pass features:&nbsp;\u003C\u002Fstrong\u003EUnlimited passwords on unlimited devices | Multi-platform |&nbsp;Autofill and autosave&nbsp;| Secure password sharing |&nbsp;Integrated two-factor authentication (up to 3 logins)&nbsp;|&nbsp;Hide-my-email aliases (up to 10)&nbsp;|&nbsp;Password generator&nbsp;|&nbsp;Password health reports&nbsp;|&nbsp;Passkey support&nbsp;|&nbsp;Biometric unlock on mobile\u003C\u002Fp\u003E\" data-hed=\"Proton Pass\" data-superlative=\"Best free password manager for privacy\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Proton Pass\u002FZDNET","imageData":{"id":"25f99682-3588-4465-9b67-d31b99b4bb2b","title":"Proton Pass free password manager","filename":"proton-pass.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F13\u002F25f99682-3588-4465-9b67-d31b99b4bb2b\u002Fproton-pass.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":63738,"width":1296,"height":720,"dateCreated":{"date":"2024-08-13 16:34:16","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-13 16:34:30","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Proton Pass\u002FZDNET","alt":"proton-pass","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"25f99682-3588-4465-9b67-d31b99b4bb2b","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Proton Pass\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"proton-pass.jpg","imageDateCreated":"2024\u002F08\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Proton Pass\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"Proton","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fproton.me\u002Fpass","url":""}]\" data-usepricing=\"true\" data-like=\"~ Unlimited passwords on unlimited devices ~ 10 hide-my-email aliases included ~ Basic security monitoring with Pass Monitor ~ Open source\" data-dislike=\"~ Integrated 2FA limited to three logins\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"49f53d39-1f54-40fc-9b80-19ea978fa6e3\" data-edition=\"us\" data-description=\"\u003Cp\u003ELogMeOnce is a decent password manager with some interesting offerings on its ad-supported free tier, but it's not as user-friendly as other tools we recommend. You get unlimited password synching across unlimited devices and multi-platform access on iOS, Android, macOS, Windows, Linux, Chrome, Firefox, Edge, Internet Explorer, and Safari.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESeveral extra features that set LogMeOnce apart, including a security scorecard, which tracks password strength and usage, and the option to assign a beneficiary who can access your logins in an emergency. The free plan also includes limited file and note storage, password sharing, and credit card credential storage.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ELogMeOnce isn't intuitive to use, however. The interface is outdated, and the process to download and set up apps and extensions is clunky (in testing, the mobile app repeatedly asked for credentials and froze multiple times). There is also no MFA support on the free tier, although you can enable 2FA via email or Google Authenticator to access your vault.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ELogMeOnce is a good option for users who don't mind tinkering with all of its features and settings, or those who might want to upgrade to a paid plan for unique features like 2FA via selfie and the ability to grant emergency access via photo and GPS location.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ELogMeOnce features:&nbsp;\u003C\u002Fstrong\u003EUnlimited passwords on unlimited devices | Multi-platform |&nbsp;Autofill and autosave |&nbsp;Secure password sharing (up to 5) |&nbsp;Secure note storage (up to 3) |&nbsp;Password generator |&nbsp;Encrypted file storage (1 MB)&nbsp;|&nbsp;Biometric unlock |&nbsp;Two-factor authentication for vault |&nbsp;Vault security audit |&nbsp;Beneficiary for emergency access\u003C\u002Fp\u003E\" data-hed=\"LogMeOnce\" data-superlative=\"Best free password manager for extra features\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"LogMeOnce\u002FZDNET","imageData":{"id":"d57f91ed-e838-4ee1-9931-f3490beb18f0","title":"LogMeOnce free password manager","filename":"logmeonce.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F13\u002Fd57f91ed-e838-4ee1-9931-f3490beb18f0\u002Flogmeonce.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":63043,"width":1296,"height":720,"dateCreated":{"date":"2024-08-13 15:03:21","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-13 15:03:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"LogMeOnce\u002FZDNET","alt":"logmeonce","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"d57f91ed-e838-4ee1-9931-f3490beb18f0","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"LogMeOnce\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"logmeonce.jpg","imageDateCreated":"2024\u002F08\u002F13","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"LogMeOnce\u002FZDNET\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=logmeonce.com%2F","offerMerchant":"LogMeOnce","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Flogmeonce.com\u002F","url":"https:\u002F\u002Fshareasale.com\u002Fr.cfm?b=1199476&u=514792&m=80525&afftrack=subid_value&urllink=logmeonce.com%2F"}]\" data-usepricing=\"true\" data-like=\"~ Unlimited passwords on unlimited devices ~ Security audit report included on free tier ~ Can assign a beneficiary for your logins\" data-dislike=\"~ Outdated interface and clunky setup process\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"8e068ed3-abb4-472a-a2c2-1ca8604bcf1d\" data-edition=\"us\" data-description=\"\u003Cp\u003EBitwarden is our pick for the best free password manager thanks to its ease of use, approach to security, and unlimited password storage across unlimited devices and an extensive list of platforms. However, there are several other free password managers worthy of consideration. When selecting an alternative, you should compare each service's password and device limits, compatibility with the platforms you use, and standout features.&nbsp;\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EBest free password manager\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EDevice limit\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EPassword limit\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EOpen source?\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EMulti-platform?\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EKey feature\u003C\u002Fstrong\u003E\u003Cstrong\u003Es\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBitwarden\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003EBitwarden Send, data breach reports\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ENordpass\u003C\u002Ftd\u003E\u003Ctd\u003E1 device at a time\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003Ex\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003EPasskey support, secure note storage\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EProton Pass\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003EHide-my-email aliases, Pass Monitor password health reports\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ELogMeOnce\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003EUnlimited\u003C\u002Ftd\u003E\u003Ctd\u003Ex\u003C\u002Ftd\u003E\u003Ctd\u003E✓\u003C\u002Ftd\u003E\u003Ctd\u003EBeneficiary for emergency access, vault security reports\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"What is the best free password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"65474b26-90c2-4eee-bda5-a005bcbe6f10\" data-edition=\"us\" data-description=\"\u003Cp\u003ETo help you choose the best free password manager for your needs, consider these options:\u003C\u002Fp\u003E\u003Ctable\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Cstrong\u003EChoose this free password manager…\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003Ctd\u003E\u003Cstrong\u003EIf you want…\u003C\u002Fstrong\u003E\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EBitwarden\u003C\u002Ftd\u003E\u003Ctd\u003EAn all-around solid and secure password management tool that works across platforms with unlimited device access.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ENordPass\u003C\u002Ftd\u003E\u003Ctd\u003EA simple, easy-to-navigate password manager that you can access on one device at a time.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003EProton Pass\u003C\u002Ftd\u003E\u003Ctd\u003EA highly secure password manager with features that prioritize your privacy.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003Ctr\u003E\u003Ctd\u003ELogMeOnce\u003C\u002Ftd\u003E\u003Ctd\u003EA basic password manager with included security monitoring.\u003C\u002Ftd\u003E\u003C\u002Ftr\u003E\u003C\u002Ftbody\u003E\u003C\u002Ftable\u003E\" data-hed=\"Which free password manager is right for you?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"a6b61a7d-64b5-4cc4-bf4a-8cfbff854ee8\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhen selecting a free password manager, consider the following factors:&nbsp;\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ESecurity:&nbsp;\u003C\u002Fstrong\u003EGood password managers have high levels of encryption and undergo regular security audits to ensure your data is kept safe and sound. Some of the best free password managers are also open source, meaning their code is available to review for security vulnerabilities.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EDevice and password limits: \u003C\u002Fstrong\u003ESome premium password managers limit the number of passwords you can save and\u002For the number of devices on which you can access your vault if you are on a free plan, while others offer unlimited storage and syncing.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECompatibility:\u003C\u002Fstrong\u003E Most password managers work on major operating systems and popular browsers, but be sure to check that your selected tool is compatible with what you use.&nbsp;\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPremium features:\u003C\u002Fstrong\u003E At a minimum, you need a password manager that can store passwords and fill them on login pages. Some free plans also offer extras for improved privacy or ease of use, like email aliases, MFA support, and vault health reports.&nbsp;\u003C\u002Fli\u003E\u003C\u002Ful\u003E\" data-hed=\"Factors to consider when choosing a free password manager\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"023f67f2-1e4e-4603-921c-efe3f9fdd0e9\" data-edition=\"us\" data-description=\"\u003Cp\u003ETo select the best free password managers, we identified established and trusted password management services that offer no-cost tiers, narrowing down to the password managers with minimal or no limits on the number of logins that can be stored or devices that can be synced as well as those that work across most major platforms to meet the needs of a variety of users. We then did hands-on testing to determine ease of use and compare features, including the factors listed above.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"How we test password managers\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Ch2\u003EFAQs about free password managers\u003C\u002Fh2\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"e338db83-da68-4ce6-9398-b4683b088f84\" data-edition=\"us\" data-description=\"\u003Cp\u003EAll of the password managers listed here meet basic security standards, such as high levels of encryption and submission to independent audits, but Bitwarden and Proton Pass stand out thanks to their open-source code.\u003C\u002Fp\u003E\" data-hed=\"Which password manager is the most secure?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"d19732e9-2115-46ee-bd0c-8d50d410ef31\" data-edition=\"us\" data-description=\"\u003Cp\u003ESecurity experts generally recommend using password managers to create and save strong, unique passwords that you can access across multiple devices as an alternative to reusing the same basic passwords over and over.\u003C\u002Fp\u003E\" data-hed=\"Do security experts recommend password managers?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"cdb4d865-c9ed-437a-969c-f41b27684f88\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile password managers can help improve password hygiene, \u003Ca href="https:\u002F\u002Fssd.eff.org\u002Fmodule\u002Fchoosing-the-password-manager-that-s-right-for-you" target="_blank"\u003Ethe Electronic Frontier Foundation notes\u003C\u002Fa\u003E that they create a single point of access to your data, so you should also have a strong master password and multi-factor authentication set up for your vault. Some of the most popular password managers \u003Ca href="https:\u002F\u002Fwww.forbes.com\u002Fsites\u002Fdaveywinder\u002F2023\u002F12\u002F11\u002Fandroid-warning-1password-dashlane-lastpass-and-others-can-leak-passwords\u002F" target="_blank"\u003Ehave been vulnerable\u003C\u002Fa\u003E to data leaks and security breaches.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"What is the main risk of using a password manager?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"596df7ed-fb75-4d6a-81b8-38410801ca79\" data-edition=\"us\" data-description=\"\u003Cp\u003EYour browser's built-in password manager is an easy entry point into creating and storing passwords, and it's probably better than not using any type of password manager at all. However, these tools typically work best within the browser or operating system they are built for, and they lack a lot of the features available in standalone password managers. They also handle encryption differently: for example, only Apple's iCloud Keychain is end-to-end encrypted by default.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Should I use my browser's password manager? \" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"545b1442-b95b-4dff-adb1-8aa3bc2dd82a\" data-edition=\"us\" data-description=\"\u003Cp\u003EMost password managers will generate a strong password for you. You can set up different strong passwords for each login you have, and let the password manager log in for you. Some password managers will also audit your passwords, looking for weak or easily-solved passwords. The best will even let you know when one of your passwords has shown up in a data leak.\u003C\u002Fp\u003E\" data-hed=\"What else can a free password manager do?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"b68bc7d1-208c-4765-8e8a-c4d359a075bb\" data-edition=\"us\" data-description=\"\u003Cp\u003EYes, many free password managers now support passkeys. These work by storing cryptographic keys on your device. They can only be unlocked with your own password or biometrics, like fingerprint or face ID scans. Passkeys are much more secure than passwords and are practically unhackable. Plus, because no data is stored online, there's nothing to leak.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EBitwarden and NordPass both offer passkey support.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Do free password managers handle passkeys?\" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"1555caca-a976-4e78-b5df-4435662a7042\" data-edition=\"us\" data-description=\"\u003Cp\u003EWhile those willing to pay for password management have an abundance of choices, the list of truly free password managers is brief, and other premium services that do offer free tiers significantly limit the number of logins or devices (or both) available to users. That said, if none of our recommendations fit the bill, there are a few alternatives to consider.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"Are there alternative free password managers to consider? \" data-imagegroup=\"{}\" data-merchantoffers=\"[]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"3808163d-6157-443c-b1f4-ebe9afbf1e7f\" data-edition=\"us\" data-description=\"\u003Cp\u003EKeePass is a free, open-source password manager that stores your data locally in an encrypted file on your Windows device (with unofficial ports to other platforms), but it is complex for the average user and lacks the updated features of most password management tools.\u003C\u002Fp\u003E\" data-hed=\"KeePass\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Screenshot by Alison DeNisco Rayome\u002FZDNET","imageData":{"id":"efbf8fdf-b66b-46dc-b3cf-9147d1c1e835","title":"KeePass free password manager","filename":"screenshot-2024-08-12-at-4-16-56pm.png","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F12\u002Fefbf8fdf-b66b-46dc-b3cf-9147d1c1e835\u002Fscreenshot-2024-08-12-at-4-16-56pm.png","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":61350,"width":801,"height":461,"dateCreated":{"date":"2024-08-12 20:17:08","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-08-12 20:17:22","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fpng","deleted":false,"credits":null,"alt":"Screenshot by Alison DeNisco Rayome\u002FZDNET","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"efbf8fdf-b66b-46dc-b3cf-9147d1c1e835","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Screenshot by Alison DeNisco Rayome\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"screenshot-2024-08-12-at-4-16-56pm.png","imageDateCreated":"2024\u002F08\u002F12","imageWidth":801,"imageHeight":461,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Screenshot by Alison DeNisco Rayome\u002FZDNET\" data-linktext=\"Best alternative for tech-minded users\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"","offerMerchant":"KeePass","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fkeepass.com\u002F","url":""}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"bebb6e56-1846-4cb7-a634-5fd147011fcf\" data-edition=\"us\" data-description=\"\u003Cp\u003ERoboForm offers unlimited passwords on one device with extras like data breach monitoring and time-based one-time password (TOTP) authentication.&nbsp;\u003C\u002Fp\u003E\" data-hed=\"RoboForm\" data-imagegroup=\"{"alt":"zdnet-image-instructions","caption":"\u003Cp\u003Esponsored\u003C\u002Fp\u003E","credits":"RoboForm\u002FZDNET","imageData":{"id":"a00716a5-8a3e-427e-bacd-a072f2d452c0","title":"roboform","filename":"roboform.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F03\u002F19\u002Fa00716a5-8a3e-427e-bacd-a072f2d452c0\u002Froboform.jpg","caption":"\u003Cp\u003Esponsored\u003C\u002Fp\u003E","size":89475,"width":1296,"height":720,"dateCreated":{"date":"2024-03-19 16:46:20","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2024-03-19 16:46:32","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"RoboForm\u002FZDNET","alt":"roboform","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"a00716a5-8a3e-427e-bacd-a072f2d452c0","imageAltText":"zdnet-image-instructions","imageCaption":"\u003Cp\u003Esponsored\u003C\u002Fp\u003E","imageCredit":"RoboForm\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"roboform.jpg","imageDateCreated":"2024\u002F03\u002F19","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003Esponsored\u003C\u002Fp\u003E\" data-overridecredit=\"RoboForm\u002FZDNET\" data-linktext=\"Best alternative for a single device\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fwww.roboform.com\u002F","offerMerchant":"Roboform","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.roboform.com\u002F","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Flinks\u002F9041660\u002Ftype\u002Fdlg\u002Fsid\u002Fsubid_value\u002Fhttps:\u002F\u002Fwww.roboform.com\u002F"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"cnetlisticle\" data-id=\"155e7792-d5a1-4735-a378-1a1049ef6b83\" data-edition=\"us\" data-description=\"\u003Cp\u003EDashlane's no-cost tier limits users to just 25 logins on one device. However, if you are interested in upgrading to the platform's premium features, you can try out the basic interface on a free plan.\u003C\u002Fp\u003E\" data-hed=\"Dashlane\" data-imagegroup=\"{"alt":"Placeholder image","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","credits":"Dashlane\u002FZDNET","imageData":{"id":"ea950b06-8a07-49c0-8262-fd75f19c9048","title":"dashlane","filename":"dashlane.jpg","path":"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F03\u002F07\u002Fea950b06-8a07-49c0-8262-fd75f19c9048\u002Fdashlane.jpg","caption":"\u003Cp\u003E\u003C\u002Fp\u003E","size":89585,"width":1296,"height":720,"dateCreated":{"date":"2023-03-07 21:57:48","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2023-03-07 21:58:28","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image\u002Fjpeg","deleted":false,"credits":"Dashlane","alt":"dashlane-uses-zero-knowledge-architecture-so-it-doesn't-access-your-passwords","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"uuid":"ea950b06-8a07-49c0-8262-fd75f19c9048","imageAltText":"Placeholder image","imageCaption":"\u003Cp\u003E\u003C\u002Fp\u003E","imageCredit":"Dashlane\u002FZDNET","imageDoNotCrop":false,"imageDoNotResize":false,"imageWatermark":false,"imageFilename":"dashlane.jpg","imageDateCreated":"2023\u002F03\u002F07","imageWidth":1296,"imageHeight":720,"imageParallax":"","imageCrop":"","imageEnlarge":false}\" data-overridecaption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-overridecredit=\"Dashlane\u002FZDNET\" data-linktext=\"Best alternative for a test run\" data-linkurl=\"Design: Mini Listicle\" data-merchantoffers=\"[{"useMonetization":true,"monetizedUrl":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-15832565-1717701958000?sid=subid_value","offerMerchant":"Dashlane","offerPrice":"","offerPriceRange":"","offerPriceText":"","offerType":"Single Product","monetizationStatus":"on","rawUrl":"https:\u002F\u002Fwww.dashlane.com\u002F","url":"https:\u002F\u002Fwww.anrdoezrs.net\u002Fclick-9041660-15832565-1717701958000?sid=subid_value"}]\" data-usepricing=\"true\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2050571\" data-copy=\"ZDNET Recommends\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F12922153-5c9c-495e-a36a-5dbbc9302a9f\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-20 13:00:22",timezone:"UTC",updated:c,published:c},description:"Discover the best free password managers of 2024, tested for security and ease of use.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"67d88987-007e-436f-8667-ffcd2dcf17ad",image:{id:"91c995d1-2c2e-4f0b-8b9d-995e194ddee4",filename:"gettyimages-1318046334.jpg",dateCreated:{created:c,date:"2024-08-12 20:22:02",timezone:"UTC",updated:c,published:c},alt:"Placeholder product image alt text",credits:"Placeholder image",caption:"\u003Cp\u003EAlso, notice the image file name is descriptive. Please don't upload images that have \"screenshot\" or \"image\" or something unknown in the file name. In other words, if the image is of an iPhone 13, make sure the image's file name says iPhone 13. \u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F08\u002F12\u002F91c995d1-2c2e-4f0b-8b9d-995e194ddee4\u002Fgettyimages-1318046334.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:6720,height:4480,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"best-list",hubTopicPathString:"Tech^Security^Password Manager",relatedItems:[]},name:b,promoTitle:"The best free password managers: Expert tested",section:b,slug:"best-free-password-manager",startYear:c,summary:b,title:"The best free password managers of 2024: Expert tested",topic:{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:"f2cbf828-9507-490c-aefd-dff02f47ee1a",slug:"password-manager",name:"Password Manager",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d},{author:{id:"a4c60cb0-1265-4fd2-bbc6-960ba1bca457",username:"abeaty",profileUrl:c,email:c,firstName:"Artie",lastName:"Beaty",jobTitle:c,dateCreated:{created:c,date:c,timezone:c,updated:c,published:c},image:{id:"e162cc7e-cfeb-49ed-8d5a-d98d162d327e",filename:"artie.jpg",dateCreated:{created:c,date:"2023-06-08 15:26:03",timezone:"UTC",updated:c,published:c},alt:c,credits:c,caption:c,path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2023\u002F06\u002F08\u002Fe162cc7e-cfeb-49ed-8d5a-d98d162d327e\u002Fartie.jpg",cropGravity:c,crop:c,typeName:"content_image",imageUrl:c,width:c,height:c,bucketPath:c,bucketType:c,title:c},socialProfileIds:c,authorBio:"Artie Beaty is a freelance writer, based just outside Charlotte, with a passion for smart home tech and tech news. He has a bachelor's in journalism from UNC Charlotte and has been writing for over 15 years. On the weekends you'll find him leading haunted ghost tours of uptown Charlotte.",profile:c,title:"Contributing Writer",bio:b,bureau:"US",awards:b,expertise:b,authorDisclosure:c},body:"\u003Cdiv data-shortcode=\"image\" data-uuid=\"b833f0c7-aa8b-475a-bbfe-8ecbb00d1f5d\" data-size=\"large\" data-float=\"none\" data-image-caption=\"\u003Cp\u003E\u003C\u002Fp\u003E\" data-image-credit=\"Kulpreya Chaichatpornsuk\u002FGetty Images\" data-image-alt-text=\"danger\" data-image-filename=\"gettyimages-1735183098.jpg\" data-image-date-created=\"2024\u002F11\u002F19\" data-image-width=\"2060\" data-image-height=\"1455\" data-image-do-not-crop=\"false\" data-image-do-not-resize=\"false\" data-image-watermark=\"false\" data-lightbox=\"false\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003EMost people are keeping a close eye out for \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002F48-of-people-have-been-scammed-while-holiday-shopping-online-what-to-watch-for\u002F\"\u003Eonline scams\u003C\u002Fa\u003E these days, but if you're not careful, you might do the scammers' work for them.\u003C\u002Fp\u003E\u003Cp\u003EA \u003Ca href=\"https:\u002F\u002Fwww.gendigital.com\u002Fblog\u002Finsights\u002Freports\u002Fthreat-report-q3-2024\"\u003Enew study\u003C\u002Fa\u003E from Gen, the company behind cybersecurity brands like Norton, Avast, LifeLock, AVG, ReputationDefender, and CCleaner, shines some light on \"scam yourself\" attacks that are on the rise dramatically. Instead of using other nefarious methods, these scams rely on social engineering to get people to download malware themselves. \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fthis-lifelike-ai-granny-is-infuriating-phone-scammers-heres-how\u002F\"\u003EThis 'lifelike' AI granny is infuriating phone scammers. Here's how - and why\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EMillions of people have fallen for these scams, Gen says, with a 614% increase in the third quarter of this year over the second quarter.\u003C\u002Fp\u003E\u003Cp\u003EWhat is a \"scam yourself\" attack? Here's what you need to know.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EFake updates\u003C\u002Fstrong\u003E – The next time your browser tells you it's time to update, take a second to make sure it's a real notification. The fake update scam, where a site tricks you into downloading software hidden as a necessary update, is on the rise. Make sure you only trust updates that appear directly from a settings menu instead of popups, and check the URL to verify the website.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EClick fix\u003C\u002Fstrong\u003E – If you've ever Googled any sort of computer issue, you've likely run across an authentic-looking webpage that promises a quick fix to your problem if you simply copy and paste a certain text into your command prompt. Unfortunately, you'll open your computer to attackers if you do that.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EFake tutorial\u003C\u002Fstrong\u003E – Thanks to community forums and sites like YouTube, remedying a tech problem has never been easier. Unfortunately, scammers are aware that many online aren't savvy about tech problems, so they're creating fake tutorials. Instead of fixing a problem, these guides lead to malware. The tutorials usually include a \"critical instruction\" like \"You'll need to turn off your \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Farticle\u002Fbest-antivirus\u002F\"\u003Eantivirus\u003C\u002Fa\u003E for this to work and then involve running a line of text through a command prompt. The end result is you installing dangerous software on your system. \u003C\u002Fli\u003E\u003Cli\u003E\u003Cp\u003E\u003Cstrong\u003EFake Captcha\u003C\u002Fstrong\u003E – How often do you really pay attention to the little \"I'm not a robot\" prompts you see every day? Those are known as captchas, and scammers are taking advantage of people's casual attitudes. With this scam, you click on what looks to be a real captcha. When you pass the initial verification, you're told to follow more instructions (like pressing the windows button + R to open a command prompt and pasting a text string) that install malware on your computer. Norton says more than 2 million people globally were targeted by this scam in the past quarter.\u003C\u002Fp\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cdiv data-shortcode=\"newsletter\" data-id=\"2051361\" data-copy=\"ZDNET Tech Today\" data-image=\"{"id":null,"alt":null}\"\u003E\u003C\u002Fdiv\u003E\u003Cp\u003E\"Scam-Yourself attacks have become a cybercriminal's dream,\" Gen explains. \"Users are unknowingly following instructions that do the attackers' bidding for them, whether through fake CAPTCHAs, misleading YouTube tutorials, or cleverly disguised README files.\" \u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAlso: \u003Ca href=\"https:\u002F\u002Fwww.zdnet.com\u002Fhome-and-office\u002Fhome-entertainment\u002Fai-songs-are-infiltrating-spotify-heres-why-its-an-issue-for-fans-and-creators\u002F\"\u003EAI songs are infiltrating Spotify - here's why it's an issue for fans and creators\u003C\u002Fa\u003E\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhat can you do to avoid these scams? Start by not relying on the fastest fix. We've grown so accustomed to allowing updates and searching online for a quick answer that we often don't take the time to verify what we're seeing. But if you take a second to reconsider what you're looking at, scams are often obvious.\u003C\u002Fp\u003E\u003Cp\u003EThese fakes aren't going anywhere, the study concludes, so it's important to recognize them before it's too late.\u003C\u002Fp\u003E\u003Cdiv data-shortcode=\"pinbox\" data-uuid=\"635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-uri=\"\u002Fapi\u002Fcomponent\u002Feditorial\u002F635210bb-41ff-11e4-b6a0-d4ae52e95e57\" data-float=\"none\"\u003E\u003C\u002Fdiv\u003E",gallery:c,category:c,children:c,contentType:b,contentUrl:b,coreImages:c,date:c,datePublished:{created:c,date:"2024-11-19 21:36:04",timezone:"UTC",updated:c,published:c},description:"Millions of people are falling for these scams, but they're not unavoidable. Here's what you need to know.",filterKey:c,filterLabel:c,genreGroups:c,icon:b,nodeId:b,subCategory:c,id:"08e01079-c352-45d6-a7d9-1b140eac5224",image:{id:"b833f0c7-aa8b-475a-bbfe-8ecbb00d1f5d",filename:"gettyimages-1735183098.jpg",dateCreated:{created:c,date:"2024-11-19 21:34:18",timezone:"UTC",updated:c,published:c},alt:"danger",credits:"Kulpreya Chaichatpornsuk\u002FGetty Images",caption:"\u003Cp\u003E\u003C\u002Fp\u003E",path:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fimg\u002F2024\u002F11\u002F19\u002Fb833f0c7-aa8b-475a-bbfe-8ecbb00d1f5d\u002Fgettyimages-1735183098.jpg",cropGravity:o,crop:c,typeName:"content_image",imageUrl:c,width:2060,height:1455,bucketPath:c,bucketType:c,title:c},label:b,metaData:{typeTitle:"news",hubTopicPathString:"Tech^Security",relatedItems:[]},name:b,promoTitle:b,section:b,slug:"scam-yourself-attacks-just-increased-over-600-heres-what-to-look-for",startYear:c,summary:b,title:"'Scam yourself' attacks just increased over 600% - here's what to look for",topic:{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:d,topicPath:[]},topics:[{id:i,slug:"security",name:"Security",typeName:"content_topic",uuid:b,primary:a,topicPath:[]}],hubTopicPathString:c,type:"content_article",typeName:b,url:b,isSponsored:d}],componentLabel:c,description:c,filters:c,paging:c,slug:"dynamic-topic-river-alt-latest-offset-10",title:c,label:c,viewMoreText:c,viewMoreUrl:c,relatedItems:c}];k.footer=[];k.debug=c;k.isSeamless=d;n[0]=b;return {layout:"default",data:[{content:k}],fetch:{},error:c,state:{brand:e,edition:f,hasAffiliateDisclosure:d,overlayActive:d,breakingNews:d,innovationIndexTrends:d,trackedComponents:{components:{}},routeHistory:{currentPath:l},dynamicComponents:{fiveStoryFeatures:c},i18n:{routeParams:{}},services:{features:{debug:a,"core.abtest":a,ads:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},adDisplay:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},adSense:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},amazonNative:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},mediaNet:a,taboola:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},amazonNca:a,bidbarrel:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},indexexchange:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["sem-landing"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}}}},auth:a,dapi:d,disqus:a,editions:a,mpulse:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}},myfinance:a,newsletter:a,iterable:a,bluehornet:d,gdpr:d,wamhmd:d,oneTrust:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d}},serverScripts:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}},seamless:{positiveNextStep:{key:"seamless",criteriaValueHolder:{allowedValues:[a],notAllowedValues:[b]},isKeyRequired:d,positiveNextStep:{clientFunc:h,crawlers:["Yeti","Baiduspider","Linespider","googlebot"],criteriaValueHolder:{allowedValues:[],notAllowedValues:[]},allowedValues:["Yeti","Baiduspider","Linespider","googlebot"],positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]},positiveNextStep:{criteriaName:"isWaUser"}}}}},"core.shortcode.render":a,"core.shortcode.inject":a,vanity:a,"vanity.mask":a,chartbeatVideo:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d}},cohesion:a,tagular:a,googleAnalytics:{positiveNextStep:{criteriaName:"isWAHealthRoute"}},chartbeat:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d}},comscore:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}},"comscore.pageView":{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}},facebook:a,"500px":a,flickr:a,gifv:a,google_maps:a,imgur:a,instagram:a,playbuzz:a,reddit:a,seoclarity:{positiveNextStep:{criteriaName:"isWAHealthRoute"}},scribd:a,soundcloud:a,twitter:a,video:a,vimeo:a,youtube:a,admiral:d,audiencescience:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},branch:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},crazyegg:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},dw:a,facebookmarketing:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},googleremarketing:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},nielsen:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},qualtricsNoTealium:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}},sitecatalyst:{positiveNextStep:{criteriaName:"isWAHealthRoute"}},trackonomics:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},trueanthem:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},viglink:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},bomboraNoTealium:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute",positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}}}},metapixel:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d,positiveNextStep:{criteriaName:"isWAHealthRoute"}}},isWaUser:d,adDisplayCriteria:{positiveNextStep:{criteriaValueHolder:{allowedValues:[a],notAllowedValues:[]}}},admiralZD:a,article:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d}},articleWatchAndReadVideo:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"siteSection",criteriaValueHolder:{allowedValues:["top_funnel"],notAllowedValues:[]}}}},bestList:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["credit-cards"]}}}}},bestListExcludeHO:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"siteHier",criteriaValueHolder:{allowedValues:[],notAllowedValues:["home-and-office"]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["credit-cards"]}}}}}},bottomFunnel:{positiveNextStep:{key:"siteSection",criteriaValueHolder:{allowedValues:["bottom_funnel"],notAllowedValues:[]}}},bottomFunnelDesktop:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"siteSection",criteriaValueHolder:{allowedValues:["bottom_funnel"],notAllowedValues:[]},positiveNextStep:{criteriaValueHolder:{allowedValues:[g],notAllowedValues:[]},positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:[],notAllowedValues:["zd-academy"]}}}}}},bottomFunnelExcludeHO:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"siteSection",criteriaValueHolder:{allowedValues:["bottom_funnel"],notAllowedValues:[]},positiveNextStep:{key:"siteHier",criteriaValueHolder:{allowedValues:[],notAllowedValues:["home-and-office"]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["credit-cards","zd-academy"]}}}}}},codesnippet:{positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]}}},disableVideoShare:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["video-share"]},strictCompare:d}},excludeNewsletterGenerator:{positiveNextStep:{criteriaValueHolder:{allowedValues:[],notAllowedValues:["newsletter-generator"]},strictCompare:d}},excludeScrappyLiveArticle:{positiveNextStep:{key:"tagSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["live-blog-article-page"]}}},excludeWAHealthRoute:{positiveNextStep:{criteriaName:"isWAHealthRoute"}},excludeWaUser:{positiveNextStep:{criteriaName:"isWaUser"}},isBl1AdCapMobileTest:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:["mobile"],notAllowedValues:[]},positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["artificial-intelligence","energy","gaming","headphones","fitness","ipad","kitchen-household","laptops","mobile-accessories","services-software","smartphones","smart-watches","tablets","tvs","video-streaming-services","wearables"]}}}}}},isBl2AdCapMobileTest:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{criteriaValueHolder:{allowedValues:["mobile"],notAllowedValues:[]},positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:["artificial-intelligence","energy","gaming","headphones","fitness","ipad","kitchen-household","laptops","mobile-accessories","services-software","smartphones","smart-watches","tablets","tvs","video-streaming-services","wearables"],notAllowedValues:[]}}}}}},isCtaPricingTest:{positiveNextStep:{criteriaValueHolder:{allowedValues:["article","article-topic"],notAllowedValues:[]},strictCompare:d,positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:[],notAllowedValues:["credit-cards","services-software","video-streaming-services","vpn"]}}}}},isHealthTopic:{positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:["health","wearables"],notAllowedValues:[]}}},isNotSpecialFeature:{positiveNextStep:{key:"collectionTypeSlug",criteriaValueHolder:{allowedValues:[],notAllowedValues:["special-feature"]}}},isPrecapVsHeroTest:{positiveNextStep:{key:"articleId",criteriaValueHolder:{allowedValues:["5b09adba-7d6c-47b3-a695-c30c1244a9cc","aebbd157-dec9-4804-9499-11b0d037179f"],notAllowedValues:[]}}},isSponsoredArticle:{positiveNextStep:{key:"articleId",criteriaValueHolder:{allowedValues:["44e0db41-5168-4c68-acb2-55345dc5bde5","92885a43-226b-429e-83fd-b76f19aae5be"],notAllowedValues:[]}}},isSponsoredArticleWithSkybox:{positiveNextStep:{key:"articleId",criteriaValueHolder:{allowedValues:["8d8721c6-ebcd-4d72-a396-b9af076bb405","dd6973c9-262a-466b-aba6-7c7d24d8f7a0","d5410db3-aa5a-45dc-99f1-be33bb78b973","be40c610-c7cd-47fa-99ed-331b7c8670c5"],notAllowedValues:[]}}},isWAHealthRoute:{positiveNextStep:{key:"wamhmd",criteriaValueHolder:{allowedValues:[a],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:["health","wearables"],notAllowedValues:[]}}}},review:{positiveNextStep:{criteriaValueHolder:{allowedValues:["review"],notAllowedValues:[]},strictCompare:d}},reviewSingle:{positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["review-single"],notAllowedValues:[]}}},topFunnel:{positiveNextStep:{key:"siteSection",criteriaValueHolder:{allowedValues:["top_funnel"],notAllowedValues:[]}}},bestListAdTestLessAdsIds:{positiveNextStep:{key:"articleId",criteriaValueHolder:{allowedValues:["2a3b69e3-908b-4052-8285-5a388a1b4e0f","ca375b14-e3c6-442d-9072-31bbf137d891","4f2d3656-fe98-4a02-b003-8676e8d82b65","005432f8-3869-421b-8f89-c96960c36722","7319b498-b3e0-43c6-83d0-6504b6290197","19ad1910-5f95-4876-aa7a-bda2bedfab4d","09a2aae1-f64b-4b75-9d84-9b259c2a746d","fc7753cd-3de2-4b7c-9035-b8de4b757865","8cb942fe-abc6-4e01-8125-b61ddd1892b4","c047e1cd-17ec-4b81-89b6-61e04233d0a4","ac1c579d-aacf-418a-8522-6796b481ea6c","dac15bdb-4836-46c4-abfb-a347e885da69","fab6d15f-a60c-4210-a370-afe798ab99a7","3343a465-879b-4402-bd0e-93a1010e2a64","e89c2b8d-2a78-42d3-9578-011ce641d6dd","6c573a1e-b1ce-40a4-b54c-02557b47f8fe","60f264ba-02bd-4d14-8a6e-de9c7d818fb2","3a2692a2-f74b-46d4-a36c-0c82397e3092","8b9a60a3-bef0-4ec1-84f2-f91a82f514d9","4fbede34-929d-4f04-b609-78205cae5eef","c921b114-35a4-41d7-afc0-5f530fbba76c","caf8707e-56be-464e-b86d-8dc48695ffd9","62e2b1ae-d79f-4c9b-aa86-77df5c59d690","1ab5800a-a5ef-4594-93d2-716d844f4bdf","04556907-5e7e-43bd-9d53-f1174f8cc1ec","9db28842-64be-4359-9895-5d0b497d327a","c594fe7d-bba9-40e5-b4cc-2434cca0a226","a3b61f52-3d2f-4f66-8b9c-97b5067d9e60","5c9727e6-2cce-4e59-a55c-ecd12081d321","04a3966d-3338-4f97-a80b-56d2531a7288","f137fbf7-7abc-493f-b321-4c6da363c0de","640c8359-754e-4e2d-b502-6c834ecbf9cc","3e22955e-a2cb-415f-a33a-3dd3d8f0c807","2406e917-ad41-4ac3-a1e2-5e059cb230aa","0a6c81c1-9494-4c13-860a-2763fdf7c1c5","be5e5ff6-01c0-4a15-916a-093de5305f00","2fb4a5d2-3ca4-4af4-bc44-b0d44124d408","e94c5622-d76e-4116-b1cf-999c9b1280bd","8ed23e97-0313-4eed-93ab-f919abde4b0c","d582c94f-6422-48f0-a40b-fa366086f9ba","d99d179b-ffcc-4f72-b17e-3fab36bfe1cc"],notAllowedValues:[]}}},bestListAdTestMoreAdsIds:{positiveNextStep:{key:"articleId",criteriaValueHolder:{allowedValues:["831d5ebe-c592-45d5-93d2-0d96149acff8","68275bf6-b8ae-4305-8b43-b5262a76642d","5337f3f5-0ce7-4387-9ca3-1c70f02ed1ef","7bae68f7-7eab-4eef-bb3d-85a18d942caa","d2054c3e-fd41-4653-b9a2-a4c2912af497","6104864b-ee9d-42df-b56a-de0c8c24a6bc","fc351358-34ac-4c8b-8679-6578e88ebc0e","135d1307-3a85-4e26-aa32-fdf8591678b9","298e07bf-cadd-4161-9b8e-54841d4527dd","d2dc4f4d-bfff-4c89-a638-f09d636bc455","b57bdedd-e9f7-4432-b4c3-100783e3a8e1","8ccd4e32-280f-4b36-b9c0-0270b6a043f5","f2c14b2e-3553-426c-be17-27a995c4e9c4","9103ef46-5706-4a57-92d5-324fb42f20b1","5a2a5a16-4145-4bde-91a7-865fef73f5eb","d80397e4-f60e-4b86-a9e3-ed5acc0fb574","8abb6389-8ee2-49dc-b33e-f4e9d079431d","de8ce092-a96c-4ef3-9e2f-35c806a2ac9f","5b09adba-7d6c-47b3-a695-c30c1244a9cc","aebbd157-dec9-4804-9499-11b0d037179f","5e896849-0228-4e4f-8e53-a4493a1eb218","6b1102e8-0086-42c7-82c4-9504ccd8e9d5","48efe642-56f4-41e5-8f28-f40448e6ea85","71d33bfd-40cb-4841-ae93-d45fc2d8a30e","cbc5b859-bde1-428b-988b-5246605ebbe6","90f335e0-47a1-4749-a0bb-e70f29034f3d","852ac291-7c06-4257-8a5f-7acfee841bc0","5a434871-8e85-4891-ae35-9f5978fbf33f","868a7ec8-2dfa-422d-869a-90e798041951","e645c91c-542d-45f1-979b-bd548bc69bf3","f8f4d7cc-a5cd-4a6b-b3b8-f141d2a15452","14d909f9-34c1-4d19-aa8c-7e20010fa6f0","dc50f9c0-6a8c-420a-a458-b4b1e88e97da","02d6bcfa-cd61-4fab-9975-aaeb1f7bc669","face0478-3781-430d-b2ba-7495bee62f30","efd76db9-0a86-4fb8-b340-dc13064abaac","829c2f2e-cb16-4691-9f86-115ea9ee0062","76f2fe0a-3125-4bb1-9c67-9ada01b43877","c77e10c2-d0d1-417d-85e7-a107f681417d","719267fd-1bfa-47ee-9426-c930c97bd83b","d1d68c0c-bc80-424f-a429-3f2ba0d6c995","08b2c43e-4253-4e2c-b3f1-3071978a89b0","a5e9bb15-5c74-47ed-8ef6-907044f93841","0a295d91-e65b-4fc4-8d69-bcbdc99706dd","b8abfdca-7152-4d34-91e1-63e0cf092234","fc56430b-8730-46ca-904b-92ecbad4da50"],notAllowedValues:[]}}},viewDetailsPrecap:{positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["best-list"],notAllowedValues:[]},positiveNextStep:{key:"topicSlugs",criteriaValueHolder:{allowedValues:["laptops","vpn"],notAllowedValues:[]}}}},isAdLibVariant:{positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:[],notAllowedValues:["best-list"]}}},isProductPromo:{positiveNextStep:{key:"articleSubType",criteriaValueHolder:{allowedValues:["product-promo"],notAllowedValues:[]}}}},hidLoaded:{"ld+json":a,"chartbeat/config":a,"cohesion/abtest":a},overrides:{}},root:{environment:"production",version:b},scripts:{loadedTagIds:["window-watcher","vguid","neutronWaitForService","mpulse-BOOMR","bidBarrel","bidbarrel-lib","gpt","index-exchange","amazon-bidder","amazon-nca","ad-sense","media.net-init","ot-sdk-stub","font-semiBold","font-regular","trueanthem","utag_data","qualtrics","cohesion","google_analytics_vars","google_analytics","chartbeat\u002Fmab","facebook","ziffcore"],scripts:[]},ab:{id:c,version:c,bucket:c},ads:{adDisplay:{containerId:b,disableAdIncrement:d,disableInitialLoad:d,slotVars:{topics:b,network:h,platform:g,siteName:e},skyboxBodyClasses:c,skyboxRefresh:c,skyboxSlotName:"pageDynamicDoorSkybox",skyboxHasOmnibar:d,targeting:{cid:i,collection:b,edition:f,section:b,pageType:b,ptype:j,pid:h,tag:b,topic:b,ptopic:b,type:"content_topic",device:g,env:m,test:b},enabled:a},adSense:{ads:[],pageOptions:{personalizedAds:d}}},auth:{fetchComplete:d,loggedIn:d,profile:c,user:c},device:{device:g},disqus:{isOpen:d,page:{api_key:b,identifier:b,remote_auth_s3:c,title:b,url:b},units:{}},newsletter:{newsletters:c,userSubscriptions:c},page:{pages:[k,h],header:[{id:"d324d261-6567-42d5-a310-90ebae26beb1",meta:{componentName:"editorial-links-header",componentDisplayName:"Editorial Header Links",componentType:"EditorialLinks"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Feditorial\u002Fmixed_editorial\u002Fheader-topics-us\u002Fweb?searchBy=slug&componentType=EditorialLinks&componentName=editorial-links-header&componentDisplayName=Editorial Header Links"}},componentLabel:"Header Links US",description:"Provides links for the header",items:[{label:c,linkText:"Black Friday 2024: Everything you need to know about holiday shopping",linkUrl:"\u002Farticle\u002Fearly-black-friday-2024-everything-you-need-to-know-about-holiday-shopping\u002F",trackingName:"header-trendingmenu|black-friday-2024:-everything-you-need-to-know-about-holiday-shopping"},{label:c,linkText:"Best Black Friday deals overall 2024",linkUrl:"\u002Fhome-and-office\u002Fbest-black-friday-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-deals-overall-2024"},{label:c,linkText:"Best Black Friday TV deals 2024",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-tv-deals-11-18-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-tv-deals-2024"},{label:c,linkText:"Best Black Friday Walmart deals 2024",linkUrl:"\u002Fhome-and-office\u002Fbest-black-friday-walmart-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-walmart-deals-2024"},{label:c,linkText:"Best Black Friday Amazon deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-amazon-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-amazon-deals-2024"},{label:c,linkText:"Best Black Friday Target deals 2024",linkUrl:"\u002Fhome-and-office\u002Fbest-black-friday-target-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-target-deals-2024"},{label:c,linkText:"Best Black Friday Sam's Club deals 2024",linkUrl:"\u002Fhome-and-office\u002Fbest-black-friday-sams-club-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-sam's-club-deals-2024"},{label:c,linkText:"Best Black Friday soundbar deals 2024",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-soundbar-and-speaker-deals\u002F",trackingName:"header-trendingmenu|best-black-friday-soundbar-deals-2024"},{label:c,linkText:"Best Black Friday phone deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-phone-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-phone-deals-2024"},{label:c,linkText:"Best Black Friday AirPods deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-phone-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-airpods-deals-2024"},{label:c,linkText:"Best Black Friday Apple Watch deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-apple-watch-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-apple-watch-deals-2024"},{label:c,linkText:"Best Black Friday gaming PC deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-gaming-pc-deals-11-19-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-gaming-pc-deals-2024"},{label:c,linkText:"Best Black Friday Nintendo deals 2024",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-black-friday-nintendo-switch-deals-11-19-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-nintendo-deals-2024"},{label:c,linkText:"Best Black Friday laptop deals 2024",linkUrl:"\u002Farticle\u002Fbest-black-friday-laptop-deals-2024\u002F",trackingName:"header-trendingmenu|best-black-friday-laptop-deals-2024"},{label:c,linkText:"Vizio 5.1 Soundbar SE is $80 off ahead of Black Friday",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fone-of-the-best-cheap-soundbars-ive-tested-performs-as-well-as-models-twice-its-price-and-its-on-sale\u002F",trackingName:"header-trendingmenu|vizio-5.1-soundbar-se-is-$80-off-ahead-of-black-friday"},{label:c,linkText:"GE Opal 2.0 ice maker is $150 off ahead of Black Friday",linkUrl:"\u002Fhome-and-office\u002Fkitchen-household\u002Fi-tested-a-luxury-nugget-ice-maker-and-its-totally-worth-it-and-its-on-sale-for-black-friday\u002F",trackingName:"header-trendingmenu|ge-opal-2.0-ice-maker-is-$150-off-ahead-of-black-friday"},{label:c,linkText:"Hisense U8N TV is up to $1,100 off ahead of Black Friday",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fhisense-u8n-black-friday-deal-11-20-2024\u002F",trackingName:"header-trendingmenu|hisense-u8n-tv-is-up-to-$1,100-off-ahead-of-black-friday"},{label:c,linkText:"How to use Bluesky Social",linkUrl:"\u002Farticle\u002Fhow-to-use-bluesky-social-everything-to-know-about-the-popular-x-alternative\u002F",trackingName:"header-trendingmenu|how-to-use-bluesky-social"},{label:c,linkText:"How to download YouTube videos for free",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fhow-to-download-youtube-videos-for-free-2-ways\u002F",trackingName:"header-trendingmenu|how-to-download-youtube-videos-for-free"},{label:c,linkText:"ZDNET Recommends",linkUrl:"\u002Fzdnet-recommends\u002F",trackingName:"header-trendingmenu|zdnet-recommends"}]},{id:"53da97c5-3f36-4980-accd-8a8f70ef58a9",meta:{componentName:"editorial-links-header-buying-guides",componentDisplayName:"Editorial Header Links Buying Guides",componentType:"EditorialLinks"},metadata:{},links:{self:{href:"https:\u002F\u002Fbender.cnetstatic.com\u002Fapi\u002Fneutron\u002Fcomponents\u002Fzdnet\u002Feditorial\u002Fmixed_editorial\u002Fheader-topics-buying-guides\u002Fweb?searchBy=slug&componentType=EditorialLinks&componentName=editorial-links-header-buying-guides&componentDisplayName=Editorial Header Links Buying Guides"}},componentLabel:c,description:c,items:[{label:c,linkText:"See all Buying Guides",linkUrl:"\u002Fbest-products\u002F",trackingName:"header-buying-guidesmenu|see-all-buying-guides"},{label:c,linkText:"Best Samsung phones",linkUrl:"\u002Farticle\u002Fbest-samsung-phone\u002F",trackingName:"header-buying-guidesmenu|best-samsung-phones"},{label:c,linkText:"Best Android phones",linkUrl:"\u002Farticle\u002Fbest-android-phone\u002F",trackingName:"header-buying-guidesmenu|best-android-phones"},{label:c,linkText:"Best smart rings",linkUrl:"\u002Farticle\u002Fbest-smart-ring\u002F",trackingName:"header-buying-guidesmenu|best-smart-rings"},{label:c,linkText:"Best blood pressure watches",linkUrl:"\u002Farticle\u002Fbest-blood-pressure-watch\u002F",trackingName:"header-buying-guidesmenu|best-blood-pressure-watches"},{label:c,linkText:"Best headphones for sleeping",linkUrl:"\u002Farticle\u002Fbest-headphones-for-sleeping\u002F",trackingName:"header-buying-guidesmenu|best-headphones-for-sleeping"},{label:c,linkText:"Best robot vacuum mops",linkUrl:"\u002Fhome-and-office\u002Fkitchen-household\u002Fbest-robot-vacuum-mop\u002F",trackingName:"header-buying-guidesmenu|best-robot-vacuum-mops"},{label:c,linkText:"Best web hosting services",linkUrl:"\u002Farticle\u002Fbest-web-hosting\u002F",trackingName:"header-buying-guidesmenu|best-web-hosting-services"},{label:c,linkText:"Best travel VPNs",linkUrl:"\u002Farticle\u002Fbest-travel-vpn\u002F",trackingName:"header-buying-guidesmenu|best-travel-vpns"},{label:c,linkText:"Best VPNs",linkUrl:"\u002Farticle\u002Fbest-vpn\u002F",trackingName:"header-buying-guidesmenu|best-vpns"},{label:c,linkText:"Best AI image generators",linkUrl:"\u002Farticle\u002Fbest-ai-image-generator\u002F",trackingName:"header-buying-guidesmenu|best-ai-image-generators"},{label:c,linkText:"Best AI chatbots",linkUrl:"\u002Farticle\u002Fbest-ai-chatbot\u002F",trackingName:"header-buying-guidesmenu|best-ai-chatbots"},{label:c,linkText:"Best 75-inch TVs",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-75-inch-tv\u002F",trackingName:"header-buying-guidesmenu|best-75-inch-tvs"},{label:c,linkText:"Best smartphones",linkUrl:"\u002Farticle\u002Fbest-phone\u002F",trackingName:"header-buying-guidesmenu|best-smartphones"},{label:c,linkText:"Best iPhones",linkUrl:"\u002Farticle\u002Fbest-iphone\u002F",trackingName:"header-buying-guidesmenu|best-iphones"},{label:c,linkText:"Best MagSafe battery packs",linkUrl:"\u002Farticle\u002Fbest-magsafe-battery\u002F",trackingName:"header-buying-guidesmenu|best-magsafe-battery-packs"},{label:c,linkText:"Best digital notebooks",linkUrl:"\u002Farticle\u002Fbest-smart-notebook\u002F",trackingName:"header-buying-guidesmenu|best-digital-notebooks"},{label:c,linkText:"Best TV antennas",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv-antenna\u002F",trackingName:"header-buying-guidesmenu|best-tv-antennas"},{label:c,linkText:"Best TVs",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-tv\u002F",trackingName:"header-buying-guidesmenu|best-tvs"},{label:c,linkText:"Best laptops",linkUrl:"\u002Farticle\u002Fbest-laptop\u002F",trackingName:"header-buying-guidesmenu|best-laptops"},{label:c,linkText:"Best tablets",linkUrl:"\u002Farticle\u002Fbest-tablet\u002F",trackingName:"header-buying-guidesmenu|best-tablets"},{label:c,linkText:"Best smartwatches",linkUrl:"\u002Farticle\u002Fbest-smartwatch\u002F",trackingName:"header-buying-guidesmenu|best-smartwatches"},{label:c,linkText:"Best headphones",linkUrl:"\u002Farticle\u002Fbest-headphones\u002F",trackingName:"header-buying-guidesmenu|best-headphones"},{label:c,linkText:"Best live TV streaming services",linkUrl:"\u002Fhome-and-office\u002Fhome-entertainment\u002Fbest-live-tv-streaming-service\u002F",trackingName:"header-buying-guidesmenu|best-live-tv-streaming-services"}]}],footer:c,seamless:[]},video:{video:c,players:[],hasVideo:d,playerState:{autoplay:d,autoplayType:"MANUAL",contentStartTime:c,isAd:c,player:c,sticky:c,videoState:"UNPLAYED"},videoPlaylist:[],inlineClick:{id:b,click:d}},tracking:{data:{pageNumber:1,_pageComponents:"zz01",pageType:j,collectionId:n,contentId:"security",contentType:"content_feature",siteEdition:f,siteSection:b,tagSlugs:[],topicId:[],topicName:[],topicSlugs:[],articleId:i,brand:e,_collectionPrimaryId:n,deviceType:g,edition:f,error:m,isDev:d,limit:4,pageViewGuid:c,reportSuiteId:"cnetzdnetglobalsite",siteName:e,siteType:"responsive web",soastaBucket:b,soastaPageType:b,testGroup:b,testName:b,testVersion:b,traffic_source:"cloud"},pageComponents:{zz01:a},pageType:j,postId:i,pageScrolledFiredPercentages:[],pageViews:o,sessionId:c,sessionPageViews:o,vguid:c}},serverRendered:a,routePath:l,config:{_app:{basePath:p,assetsPath:p,cdnURL:"https:\u002F\u002Fwww.zdnet.com\u002Fa\u002Fneutron\u002F"}}}}(true,"",null,false,"zdnet","us","desktop",void 0,"113c25b6-ec91-11e3-95d2-02911863765e","category_door",{},"\u002Ftopic\u002Fsecurity\u002F","prod",Array(1),0,"\u002F"));</script><script>!function(){var e=document,t=e.createElement("script");if(!("noModule"in t)&&"onbeforeload"in t){var n=!1;e.addEventListener("beforeload",function(e){if(e.target===t)n=!0;else if(!e.target.hasAttribute("nomodule")||!n)return;e.preventDefault()},!0),t.type="module",t.src=".",e.head.appendChild(t),t.remove()}}();</script><script nomodule src="https://www.zdnet.com/a/neutron/83b9d85.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/a250f9c.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/647e0d2.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/5866a8f.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/a554ae3.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/fa51d66.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/1a23142.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/0732cbc.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/803abeb.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/15d3a1f.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/1c7d819.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/ebaa0c8.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/8d9e729.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/fb8ce3b.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/b0c6b76.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/87f7cf7.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/89a9aca.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/a2d9d80.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/c60f492.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/0726656.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/7b6326f.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/6779bab.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/1a4d792.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/554f0f0.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/5657e25.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/1eaf284.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/37434c0.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/9ddf158.modern.js" defer></script><script nomodule src="https://www.zdnet.com/a/neutron/3f4d9fe.js" defer></script><script type="module" src="https://www.zdnet.com/a/neutron/6d48520.modern.js" defer></script> </body> </html>