TECH 6 days ago The best free sites for sharing photos and videos with your family Kurt the CyberGuy unpacks the best applications to share family photos with loved ones with privacy, security and ease of use for photo sharing.
TECH July 16 Simple steps to build your own website: A beginner’s guide Retirement is perfect for starting a passion project and earning money. Tech expert Kurt “CyberGuy" Knutsson shows you how.
TECH July 6 Let's take your Windows PC's security to the next level with these simple steps Technology wizard Kurt "CyberGuy" Knutsson explores some of the more obscure alternative security features to lock down your Windows PC.
TECH July 3 20 tech tricks to make life better, safer or easier Technology expert Kim Komando shares 20 great tech shortcuts for our devices that get new updates and features — learn how to move with the curve.
TECH June 26 Tech security check: Am I doing enough to keep my computer safe? Tech expert Kurt “CyberGuy" Knutsson shows you steps for securing your computer: Declutter, update and use strong passwords for safety and ease.
TECH June 25 Teenage typing phenom hits insane 305 words per minute Tech expert Kurt “CyberGuy" Knutsson reveals how "MythicalRocket," at age 17, hits a typing speed of 305 words per minute.
TECH June 24 Fake software fixes fuel money-stealing malware threat Kurt “CyberGuy" Knutsson reveals how new malware posing as Chrome and Microsoft can steal from Windows users.
TECH June 18 Emojis for dummies: How to add emojis into your text messages, emails Use emojis to lighten texts or emails for a casual tone or deeper meaning. Kurt “CyberGuy" Knutsson shows you the method.
TECH June 18 Could Microsoft's creepy 'Recall' AI feature become potent spy tool for crooks? New Microsoft AI tool sparks privacy and security concerns. Tech expert Kurt “CyberGuy" Knutsson has the details.
TECH June 16 Windows flaw lets hackers sneak into your PC over Wi-Fi A security flaw with Windows Wi-FI allowed hackers to break into PCs using wireless networks. Microsoft updated its security to address the vulnerability.