Starting in 2015, Chris attended the Computer Electronics Show (CES) in Las Vegas for five years running. His work has even appeared on the front page of Reddit.Īrticles he's written have been used as a source for everything from books like Team Human by Douglas Rushkoff, media theory professor at the City University of New York's Queens College and CNN contributor, to university textbooks and even late-night TV shows like Comedy Central's with Chris Hardwick. His roundups of new features in Windows 10 updates have been called "the most detailed, useful Windows version previews of anyone on the web" and covered by prominent Windows journalists like Paul Thurrott and Mary Jo Foley on TWiT's Windows Weekly. ![]() Instructional tutorials he's written have been linked to by organizations like The New York Times, Wirecutter, Lifehacker, the BBC, CNET, Ars Technica, and John Gruber's Daring Fireball. The news he's broken has been covered by outlets like the BBC, The Verge, Slate, Gizmodo, Engadget, TechCrunch, Digital Trends, ZDNet, The Next Web, and Techmeme. Beyond the column, he wrote about everything from Windows to tech travel tips. He founded PCWorld's "World Beyond Windows" column, which covered the latest developments in open-source operating systems like Linux and Chrome OS. He also wrote the USA's most-saved article of 2021, according to Pocket.Ĭhris was a PCWorld columnist for two years. Beyond the web, his work has appeared in the print edition of The New York Times (September 9, 2019) and in PCWorld's print magazines, specifically in the August 2013 and July 2013 editions, where his story was on the cover. With over a decade of writing experience in the field of technology, Chris has written for a variety of publications including The New York Times, Reader's Digest, IDG's PCWorld, Digital Trends, and MakeUseOf. Chris has personally written over 2,000 articles that have been read more than one billion times-and that's just here at How-To Geek. To learn more about mobile phone and online security, check out the FCC consumer guide: Wireless Connections and Bluetooth Security Tips.Chris Hoffman is the former Editor-in-Chief of How-To Geek. Public WiFi networks are another way that cyber criminals target travelers. If you plug your device into a USB port and a prompt appears asking you to select "share data" or “trust this computer” or “charge only,” always select “charge only.”.Consider carrying a charging-only cable, which prevents data from sending or receiving while charging, from a trusted supplier.Using AC power outlets can help you avoid any potential risks, so be sure to pack AC, car chargers, and your own USB cables with you when traveling.Here are some tips to guard against "juice jacking:" Criminals can then use that information to access online accounts or sell it to other bad actors.Īlthough "juice jacking" has been demonstrated to be technically possible as a proof of concept, the FCC is not aware of any confirmed instances of it occurring. Malware installed through a corrupted USB port can lock a device or export personal data and passwords directly to the perpetrator. You could become a victim of "juice jacking," yet another cyber-theft tactic.Ĭybersecurity experts warn that bad actors can load malware onto public USB charging stations to maliciously access electronic devices while they are being charged. If your battery is running low, be aware that juicing up your electronic device at free USB port charging stations, such as those found in airports and hotel lobbies, might have unfortunate consequences. Planning to travel? No doubt you'll have your cell phone or another portable device, and you'll need to re-charge it at some point.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |