Samsung Galaxy Chromebook 2 review: Second time’s the charm

Eric Zeman May 9, 2021

What devices are Android Authority readers using? (2021 edition)

Robert Triggs May 8, 2021

iPhone 12 Pro Max revisited: The good and bad six months later

Eric Zeman May 8, 2021

Did you know: Xiaomi’s first product wasn’t a phone

Hadlee Simons May 9, 2021
81 articles

On World Password Day, Google reveals that 2FA will eventually be mandatory

This means you'll need a password and a secondary form of authentication, such as an email or phone number.
C. Scott BrownMay 6, 2021

Google One’s VPN security holds up, according to an audit

There were a few issues Google didn't believe it could fix, however.
Jon FingasApril 21, 2021

WhatsApp flaw lets attackers suspend your account using your phone number

You don't even have to offer any input of your own.
Jon FingasApril 12, 2021

Tackle security threats before they arise with AT&T ActiveArmor

The internet can be a dangerous place if you browse unprotected. Learn more about AT&T's ActiveArmor and sign up today.
AA PartnersBrought to you by AT&T

What does a network administrator do?

What do network administrators do? Why is this a great role for IT professionals? We explain everything you need to know.
Adam SinickiMarch 21, 2021

Can your ISP see your browsing history? Here’s what you need to know.

In this day and age, online privacy is paramount. Here are some things you need to know about ISP tracking.
C. Scott BrownFebruary 24, 2021

What is a cyber security analyst?

This post exaplains the role of cyber security analyst in detail.
Adam SinickiOctober 27, 2020

Google apps will now deliver security alerts: What you need to know

Google Assistant is also adding a guest mode for anonymous commands.
Jon FingasOctober 7, 2020

Millions of Android phones are vulnerable to a Snapdragon security flaw

Fixes are on the way, but it could affect a large portion of the Android community.
Jon FingasAugust 10, 2020

Here’s how all those high-profile Twitter accounts got hacked

Twitter says an internal tool was used to hack accounts and spread the crypto scam. Here's how it all went down.
Adamya SharmaJuly 16, 2020
Load More
End of the line!