A Trusted Friend in a Complicated World

Technology

For better or for worse, technology is the new frontier. When it comes to navigating the web, avoiding hackers, and enjoying our devices—Reader’s Digest is here to lead the way and help you get the most out of our interconnected world.

View More in:

Add Filter

Tout icon

Here’s What Hackers Can Do with Just Your Cell Phone Number

Scammers can use your phone number to impersonate, steal from, and harass you and others. Here's what to do if your info is compromised.

Tout icon

What Is Doxxing—and How Does It Set You up to Be Hacked?

Here's how to avoid becoming the next target of a doxxing attack and how to keep your personal information safe...


Tout icon

How to Block Annoying Emails for Good

Ready to finally stop getting those pesky spam emails? Here's how to block them—and clean up your inbox for good.


Tout icon

How to Remove Spyware on an Android Phone

Worried that someone’s watching you? You have good reason to be concerned. Here’s how to spot and remove spyware on...

Tout icon

How to Remove Hidden Malware from Your Android Phone

When your phone is hacked, you need to act fast. Here’s how to tell if your Android has been infected...


Tout icon

How to Use AirDrop on Any Apple Device

AirDrop is an incredibly convenient way to share photos, videos, and other kinds of files. Here's how to use it—and...

Tout icon

How to Tell If Your Phone Has Been Hacked

Could cybercriminals be infiltrating your bank account or stealing your identity right now? Here’s how to find out if your...


Tout icon

How to Remove Spyware on an iPhone

Someone might be spying on you right now. These simple steps will get rid of spyware on your iPhone and...


Tout icon

How to Stop (and Remove) iPhone Calendar Spam

It’s not only annoying—it can also be dangerous. Here's what you can do to get rid of invasive iPhone calendar...


Tout icon

What Is Smishing?

Don't let the funny name confuse you. Smishing is a major scam that could cost you big bucks.

If You Hear This 4-Word Phrase When You Pick Up the Phone, Hang Up Immediately

These four words are a red flag that you might be dealing with a phone scammer. Here's what you should...


Tout icon

9 Signs an Instagram Ad Can’t Be Trusted

Enhance your detective skills so you don't fall victim to these common scams.


Tout icon

Your iPhone Can Be Hacked with a Laser Pointer—Here’s How

Beware: New research has found a scary way for attackers to secretly hack your iPhone's virtual assistant.

Tout icon

8 Signs You Shouldn’t Accept a LinkedIn Request

LinkedIn is a place to connect with people in your career field and grow your network, but before accepting every...


Tout icon

8 Red Flags Someone’s Tracking Your Cell Phone

It's scary to think that someone might be spying on your iPhone, but you can take steps to prevent and...


Tout icon

The Dangers of TikTok That Are Worth Your Attention

We all love TikTok, but there are many things we don't know yet about the app. After you click agree,...


8 Apps Security Experts Would Never Have on Their Phone

With data breaches on the rise, it's more important than ever to safeguard the treasure trove of personal information that...


Tout icon

3 Signs Your Streaming Accounts Have Been Hacked

Binge-watch safely! Be on the lookout for these red flags, and learn how to protect your streaming accounts—and your bank...


Tout icon

The FBI Warns About This Online Shopping Scam

The FBI has issued a warning about a scary, new online shopping scam—and you could be the next target.


Tout icon

8 Immediate Steps to Take After Your Smart Home Is Hacked

If you suspect your smart home has been hacked there are steps you can take to stop the intruder.

Magazine Cover

Subscribe & SAVE

Save Up To 84%!

Tout icon

This Hacking Horror Story Is a Warning to Take Online Security More Seriously

Hacking is something we should all be worried about, but unfortunately something not many people think about until they've already...


Tout icon

4 Things That Happen Right After Your Credit Card Is Stolen

If you're a victim of credit card hacking or fraud, you should know what goes on after the thieves have...


Tout icon

Top Security Threats of Smartphones (2022)

You might be surprised by the hidden security threats lurking inside your trusty mobile device.