Connect with us

Technology

Asus ROG Ally X review: the best Windows gaming handheld by a mile

Published

on

Asus ROG Ally X review: the best Windows gaming handheld by a mile

The Asus ROG Ally X is the best a Windows gaming handheld has ever been. It’s got the most comfortable grip, the smoothest gameplay, and the longest-lasting battery — three of the elements that make a PC gaming experience truly portable for me.

Most of this is no surprise: It’s smooth because Asus makes the only handheld that pairs AMD’s powerful Ryzen chips with a variable refresh rate screen, which better syncs up with your game. It’s got longer battery life because Asus now stuffs an 80-watt-hour pack in there, the biggest we’ve seen in a handheld to date. The battery’s so big, you can keep that AMD chip humming at higher power levels for higher framerates.

But what might surprise you is this: the Ally X is the first handheld I can recommend alongside my gold standard for handhelds: the Steam Deck OLED. That is, if you’ve got a few extra bills burning a hole in your pocket, don’t mind wrestling with Windows, and trust that Asus has actually learned its customer support lesson.

How we rate and review products

My ROG Ally X review unit arrived just before I went on vacation — the perfect opportunity to test its massive 80Wh battery. As of today, I’ve spent more than 24 hours playing actual games on the Ally X.

At first, the battery life didn’t seem like anything special. When I navigated the Japanese high school demon drama of Persona 3 Reload at maximum brightness in the car and on the beach, I got 2.5 hours per charge. That’s not enough to last the drive from Northern California to Southern California, at least not without an external battery. I did get an entire additional hour in Dave the Diver compared to the Lenovo Legion Go, but my total runtime of 3 hours, 19 minutes still paled in comparison to the Steam Deck OLED’s total of 4 hours, 42 minutes. 

But when I fired up more demanding games, the Ally X pulled far ahead. I got nearly an entire extra hour of Armored Core 6 (2h59m) and an extra half-hour of Shadow of the Tomb Raider (2h41m) at 720p and medium spec, using the Ally X’s default power mode. That’s the best I’ve seen handheld for games that intensive! 

Advertisement

1/25

Want to see some comparisons to the original ROG Ally and Steam Deck? Here are my photos with the final Ally X, followed by earlier comparos with a near-final one.
Photo: Sean Hollister / The Verge

Then, I played two full hours of one of the most demanding PC games currently in existence: Alan Wake II.

Advertisement

Technically, the ROG Ally X is the first handheld that even begins to meet Alan Wake II’s system requirements. It wants 16GB of system memory and 6GB of VRAM, and it’ll throw errors at launch if you’re short; on the original ROG Ally and Steam Deck OLED, which have to share 16GB between system memory and GPU, the game is a choppy mess.

But the ROG Ally X has a full 24GB of shared memory, and it shows! At a 540p render resolution, upscaled to 1080p with AMD’s FSR 2.1 tech, I could actually delve through the game’s lush, eerie forest without wanting to throw my handheld against the wall. The game did dip as low as 29fps in combat, but I saw a smooth 35–45fps just running around.

It felt playable enough that I finally sat down and beat the game on Ally X — and I had enough battery to do so for two full hours using the Ally X’s 25W “Turbo” mode.

As you can see in my comparison screenshots, the game’s only running 5fps faster on the Ally X when Saga’s standing still over this corpse. But when we’re playing a game that would dip below a smooth 30fps if not for that boost — on a handheld with VRR and Low Framerate Compensation that works right down to 30fps — it makes all the difference in the world.

In game after game, benchmark after benchmark, the Ally X produces the smoothest gameplay I’ve seen from any handheld, even in the valleys and caves of Shadow of the Tomb Raider where the Legion Go technically produces more frames per second. That’s because Asus’ screen is dynamically working to smooth things out. (Even the Steam Deck OLED’s brighter, more colorful, and faster-responding OLED panel can’t match it there.)

Advertisement

Speaking of benchmarks, Alan Wake II isn’t the only game where the Ally X pulls ahead. Despite having the same AMD Ryzen Z1 Extreme chip as the original ROG Ally, the faster memory, more efficient cooling, and power tweaks make their mark.

Tested at 720p low, save Dirt Rally at 720p ultra. Ally X tested with 15W custom TDP, 17W “Performance”, 25W “Turbo”, and 30W “Turbo” AC modes.

While you should note that the Ally X now defaults to a new 17W “Performance” mode rather than 15W, I’m getting better numbers in almost every game with the newer handheld, regardless of wattage.

See how Returnal is now hitting 38fps in my 720p benchmark in the 25W “Turbo” mode, up from 33 with the original Ally? Like Alan Wake II, I bet that means it’s finally enjoyable on a handheld.

The ROG Ally X’s massive 80Wh battery is bigger than that of most laptops. It’s also easy to remove: four Philips head screws, no glue.
Photo: Sean Hollister / The Verge
Advertisement

But again, power is only half the performance story. A year ago, the original ROG Ally drained its 40-watt-hour battery pack at 40–50 watts in Turbo mode, meaning you’d get less than an hour of gameplay if you ran the Ally that fast away from a charger. With the Ally X, I’m draining an 80-watt-hour battery pack at 33–40 watts in Turbo mode, generally giving me two full hours in a worst-case scenario.

I’m not even seeing any slowdown as the battery reaches empty — it’s good all the way down to the 3 percent mark, when it puts itself in hibernation, and I can begin playing again at full speed almost as soon as I plug into the wall.

Even configured to its lowest wattage of 7W TDP, the Ally X isn’t as power-hungry as the original. Balatro gave me over eight hours of magic roguelike poker at 50 percent brightness, by draining under 10 watts the whole time. So far, my best result was total battery drain of 7 watts in Slay the Spire, down from 9 watts with the OG Ally. At that rate, the Ally X should be able to play for 10 entire hours before shutting down.

The ROG Ally X is still easy to repair — though slightly harder to pop open — and Asus tells me it’ll offer spare parts this year. More insides here.

I’m not going to rehash everything I already told you about the ROG Ally X in my early hands-on — there are so many substantive little changes they deserve their own story, and I’ve already written that one. But I suspect you may have three distinct questions that deserve answers here:

  • How are the revised ergonomics and other physical changes?
  • Can Windows really be so bad that you’d choose a Steam Deck with worse performance?
  • Why trust Asus when it dodged our SD card reader defect questions and its customer support reputation is in the toilet?

I find the ROG Ally X so much more comfortable to hold than the original, despite its additional weight. The meatier grips, triggers, and pebble-shaped omnidirectional back buttons no longer have any protrusions to get in the way. The joysticks and bumpers feel tighter and more premium, the face buttons have a deeper (though noisier) throw, and the D-pad has gone from meh to quite decent — though I am already getting an annoying squeaky sound when I press the down arrow. The fan is also genuinely quiet, not that it was an issue with the original.

I like that you can activate the back buttons from practically any angle. The ROG microtexture is neat, too.

It’s also nice to have twin USB-C ports for charging and peripherals, even if I haven’t yet been able to hook up a Thunderbolt eGPU (Asus tells me there’s a driver issue with AMD eGPUs at the moment).

Advertisement

But I vastly prefer the Steam Deck’s symmetrical analog sticks, which always lie right under where my thumb naturally lands, instead of the Ally’s offset right analog stick that makes me uncomfortably shift my grip. I miss the larger screen I get on other handhelds and their less cramped 16:10 aspect ratio.

And I cannot stand that Windows still cannot reliably make a gaming handheld Go the Fuck to Sleep and reliably wake up again. The Nintendo Switch does it perfectly, and the Steam Deck does it nearly perfectly, but I couldn’t keep track of the number of times Windows decided it could no longer recognize my fingerprint on the sensor or black-screened my game, or the Ally X simply woke up again the moment I set it down, or Asus’ Armoury Crate settings app simply forgot my choices (like whether to turn on my joysticks’ RGB lights) on wake.

Windows is still lurking under the surface.

I’m happy to say that Armoury Crate has actually improved tremendously over the past year — the game launcher now intelligently sorts my games, lets me easily map buttons and gyro controls for fine aiming, and seamlessly downloads updates (including BIOS updates) without navigating to a website or separate app.

But it’s nothing compared to the ease of use of SteamOS and its compatibility with generations of older PC games thanks to community support — and Windows itself is more of a pig than ever. I spent nearly 45 minutes waiting for mandatory updates and clicking through unwanted offers for various Microsoft products before I could use the Ally X for the first time.

Advertisement

Did I get a joystick-navigable virtual keyboard or PIN screen or a pre-mapped Alt-Enter shortcut for my trouble? Nope — instead, Asus added a Copilot shortcut, there’s a copy of Outlook sitting on my taskbar, and OneDrive is on by default. The only mercy is that Microsoft Teams doesn’t launch on startup this time.

As far as the whole SD card situation, Asus has only told me that it’s not the same reader as the old one that it won’t admit has an issue — it’s the one it uses on laptops. That’s somewhat reassuring, I guess. I haven’t yet had issues playing games from SD after a week of play, in case you’re wondering.

The ROG Ally X doesn’t check all the boxes I personally need in a handheld. The one-two punch of performance and battery life is tempting, but not tempting enough to steer me away from a $549 or $649 Steam Deck OLED that will play my legacy library of Steam games more easily, then reliably go to sleep when I want to put it away. The customer support controversy is just one more reason to hesitate.

But if you must have Windows or play the latest games on the go, the Ally X is the best Windows handheld yet. I hope it normalizes bigger batteries and VRR screens, and I hope Asus will seriously consider a SteamOS version, too. I hope to test it with Bazzite, an unofficial SteamOS clone, later this year.

Photography by Sean Hollister / The Verge

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

New technology makes it nearly impossible to kill house plants

Published

on

New technology makes it nearly impossible to kill house plants

Remember that “pandemic garden” you started in 2020 that didn’t quite make it? 

Well, you’re not alone in your plant care struggles. In fact, many people unintentionally send their houseplants to the great compost heap in the sky each year. 

But fear not. There’s a new gadget out there that could change the way we care for our plants.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

SmartyPlants smart sensor (SmartyPlants)

Advertisement

Meet the plant whisperer you never knew you needed

SmartyPlants is a smart sensor designed specifically for houseplants. It takes the guesswork out of plant care. This clever little device monitors crucial factors such as light, humidity, temperature, soil moisture and nutrients and sends all that vital info straight to an app on your smartphone.

SmartyPlants 2

SmartyPlants smart sensor (SmartyPlants)

HOW TO FIND ANY RECIPE WITH JUST A PHOTO ON IPHONE

No more guessing games when it comes to plant care

Gone are the days of wondering, “Does my ficus need water, or am I just being paranoid?” SmartyPlants provides real-time updates on your plant’s needs. And here’s a fun twist: You can name your plants in the app. So when “Dave needs a drink,” you’ll know exactly which of your green buddies is feeling parched.

SmartyPlants 3

SmartyPlants smart sensor (SmartyPlants)

BEST HOME SECURITY SYSTEMS 

From serial plant killers to green thumb gurus

The brains behind SmartyPlants know the struggle is real. In fact, the Founder and CEO Ben Beaver’s partner was a self-proclaimed “serial plant killer” who had managed to keep only one hardy cactus alive for six years. Drawing on his background in biology and technology, the CEO realized there had to be a better way. After numerous prototypes and tests, SmartyPlants was born, giving even the most challenged plant parents a fighting chance at nurturing thriving indoor jungles.

Advertisement

CLICK HERE FOR MORE US NEWS

SmartyPlants4

Founder and CEO of SmartyPlants Ben Beaver (SmartyPlants)

ARE THESE ROBOTS MAKING HUMANS OBSOLETE FOR HOME AND REPAIR TASKS

More than just a water reminder

SmartyPlants is packed with features that go well beyond simple watering reminders. It can assess your space and recommend plants that would thrive in that specific environment. You can set up automatic watering systems over Wi-Fi, perfect for worry-free vacations.

The device uses AI image analysis to monitor your plant’s progress over time and keeps tabs on past issues to prevent future problems. It doesn’t just measure light intensity but looks at the full spectrum to maximize photosynthesis.

SmartyPlants 5

SmartyPlants smart sensor (SmartyPlants)

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement

SmartyPlants quickly became a sensation

Launched on Kickstarter, SmartyPlants quickly became a sensation. Within just four days, the campaign had over 500 backers and raised more than 10 times its initial target. By the middle of the campaign, they had over 1,000 backers, putting them in the top 1% of all Kickstarter projects. They even snagged a coveted “Projects We Love” award from Kickstarter, given to only the top 10% of projects on the platform.

SmartyPlants 6

SmartyPlants app (SmartyPlants)

How can you snag one of these?

You can get your hands on a SmartyPlants sensor by heading over to the SmartyPlants Kickstarter page. For a single sensor, you can grab an early bird discount of approximately $43, 15% off the regular price. If you’re dreaming big, a monster pack of 20 sensors is available for about $605, a whopping 40% discount. Simply back the project and wait for updates on shipping and delivery.

Remember, this is a Kickstarter campaign, so the usual crowdfunding caveats apply. But given the project’s success and the team’s dedication, it looks like a pretty safe bet for plant lovers.

After reading this article about the SmartyPlants gadget, are you now considering a houseplant to add to your home or office? Well, you’re in luck. After evaluating a wide selection of plants and suppliers, I highly recommend a plant subscription service. Services like these offer a variety of beautiful and easy-to-care-for plants delivered right to your door. It’s a perfect way to start or expand your indoor garden, ensuring you always have fresh greenery to brighten your space. For more information and to get started, check out this link.

Advertisement
SmartyPLants 7

SmartyPlants app and smart sensor (SmartyPlants)

Kurt’s key takeaways

Let’s face it, constantly replacing dead plants can get expensive and disheartening. At around $43 for an early-bird Kickstarter deal, SmartyPlants seems like a solid investment if it can keep your green friends alive and thriving. While it can’t protect your plants from curious pets (sorry, Fluffy) or magically turn you into a botanist overnight, SmartyPlants might be the tool you need to achieve that lush, Pinterest-worthy indoor garden you’ve finally been dreaming of.

What’s your most memorable experience with trying to keep plants alive, and how might a device like SmartyPlants have changed that outcome? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Amazon is discontinuing my favorite Echo — the one with a dot-matrix clock

Published

on

Amazon is discontinuing my favorite Echo — the one with a dot-matrix clock

I have six Amazon Echo smart speakers in my house, and I’ve tested more, but my favorite is the Echo Dot with Clock. I love how the fabric-covered LED dot matrix display makes time unobtrusively accessible, beaming its gentle white light from my dresser across my blackout-curtained dark bedroom. (It definitely beats asking Alexa the time.)

So I’m sorry to be the bearer of bad news: Amazon has discontinued the Dot with Clock in favor of a more expensive, less eye-pleasing model.

Amazon didn’t tell us why it’s going away. At first, I mistakenly thought it might be due to hidden defects — my own Echo Dot with Clock began mysteriously freezing a few weeks back, completely unresponsive to voice commands and with images stuck on its display. Multiple resets didn’t help.

But after I successfully argued for Amazon to credit me for a replacement Echo, it began working again. (I had to hard reset it, then go through the setup process multiple times in the Alexa app to get it working.)

When I went looking for a replacement $60 Echo Dot with Clock, I was surprised to find Amazon didn’t stock it anymore — only refurbished models were available when I checked, even though the blue model is available again at Amazon and Target today. So instead, I took a chance on the company’s spiritual successor: the $80 Echo Spot, which replaces the dot-matrix display with a screen.

Advertisement

But despite being more expensive, I’m finding the Spot inferior for my purposes. While its screen isn’t too bright for a dim bedroom, it’s not what I’d call visually pleasing. It never lets me forget I’m staring at a cheap screen. Plus, the whole screen is tilted upwards, presumably for nightstand use, not my tall dresser. I have no nightstands in my bedroom.

The Echo Dot with Clock and the Echo Spot, flanked by other small smart displays.
Photo by Jennifer Pattison Tuohy / The Verge

My colleague Jennifer Pattison Tuohy is currently working on a full review of the Echo Spot, and she likes it a good bit better than me!

But she says it doesn’t sound quite as good as the Dot either (though audio’s more directional), and it still doesn’t let you do anything as basic as setting an alarm with touch like you can with other smart displays. The main benefits are music playback controls and the ability to display time, date, temperature, and the weather simultaneously.

Now that my Echo Dot with Clock is working again, I’ll be returning the Spot — and the money that Amazon credited me.

Advertisement
Continue Reading

Technology

What exactly is a data breach and why should I care?

Published

on

What exactly is a data breach and why should I care?

Data breaches have become common, and if you’ve actively used online services in the past year, you might have been affected by them. For example, the Advance Auto Parts breach exposed more than 2.3 million users’ personal information, while a recent AT&T incident allowed hackers to access around six months of customer call and text interactions. But what do bad actors do with all this data?

John from Jackson, Mississippi, asked a similar question that I want to highlight and address because it helps all of us:

“What do you mean when you say a company has exposed 2.3 million or whatever in a data breach? This happens often, but there is never any follow-up. It’s like throwing address labels in a trash can, and then they are carried to the landfill. So? What really happens with a data breach?”

I get what you’re saying, John. Data breaches make headlines, but you rarely hear about the fallout. It’s tough to link a specific breach to a specific problem later on. Below is a detailed look at what a data breach actually means.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Advertisement

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

Data breach explained

A data breach occurs when an unauthorized person gains access to information that is meant to be confidential, private, protected or sensitive. Think of it this way: You have personal information that you trusted a friend with, but while sharing it, someone who wasn’t supposed to know it overheard it.

A real-life example is the AT&T data breach mentioned earlier. Your call logs and text interactions that were meant to be private and which you trusted AT&T to protect ended up in the hands of hackers. These details can now be used by bad actors to scam you.

Data breaches can happen in a few ways. Hackers might target specific organizations or launch broad attacks hoping to steal certain kinds of data. They can also use targeted cyberattacks to go after specific individuals.

Advertisement

Sometimes, data breaches occur due to honest mistakes or oversights by employees. Weaknesses in an organization’s systems and infrastructure can also leave them vulnerable to data breaches.

hacker on keyboard

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS’ PERSONAL INFORMATION TO CYBERCRIMINALS

Anatomy of a deliberate data breach

Here’s what typically happens in a data breach that’s deliberately caused:

Research: Cybercriminals often begin by identifying a target, such as a large corporation like AT&T, focusing on the type of data they want, which could include personal customer information. They search for weaknesses in the company’s security, which might involve exploiting system flaws or targeting network infrastructure.

Attack: The attackers make their initial move using either a network or social attack. Common methods include phishing attacks, where individuals are tricked into revealing personal information; malware attacks that can steal or encrypt data; and denial-of-service attacks that disrupt services. These tactics can compromise the personal information of customers, such as names, addresses, phone numbers and even payment information.

Advertisement

Exfiltration: Once inside the company’s systems, cybercriminals tunnel their way to confidential data. For individuals, this means that their personal information can be extracted and sold on the dark web, used for identity theft or for other malicious purposes. The impact on individuals can be severe, including financial loss, damage to credit scores and the emotional stress of having personal information exposed and misused.

hacker typing

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

What happens once the hackers have the data?

Once the hackers obtain protected and confidential data, they have various ways to profit from it. They can use compromised data for illegal activities, including identity theft, financial fraud, spamming or even extortion. Information such as email addresses and phone numbers can be used in phishing scams.

Sometimes, this data is also posted on dark web forums for sale. It can be purchased by other criminals, who may use it for various illicit activities. Just as you don’t hear about every burglary, homicide or battery, you don’t hear about each instance of these criminal activities.

They only make headlines when something significant occurs, such as the incident where hackers scammed a Colorado woman out of $25,000 or when a man was arrested for scamming a Kalispell, Montana, woman of $150,000.

Advertisement

Data breaches impact not only customers but also the companies involved. These companies may face government fines or lawsuits. For example, AT&T is currently dealing with a class-action lawsuit due to a security breach in 2022 that exposed months’ worth of data from nearly all its customers. Similarly, T-Mobile is facing a lawsuit related to a data breach that affected millions of people.

hacker at work

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE

How to protect yourself from data breaches?

It’s primarily the responsibility of companies or online services to keep your data safe, but if it gets exposed, here are some tips to keep in mind:

1. Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

2. Enable two-factor authentication

Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

Advertisement

3. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

CLICK HERE FOR MORE US NEWS

4. Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.

5. Use personal data removal services

Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. These services employ advanced tools and techniques to identify and eliminate your data from people-search sites, data brokers and other platforms where your information might be exposed. By using a data removal service, you can minimize the risk of identity theft and fraud, especially after a data breach. Additionally, these services often provide ongoing monitoring and alerts, keeping you informed of any new instances of your data appearing online and taking immediate action to remove it. Check out my top picks for data removal services here.

Advertisement

6. Sign up for identity theft protection

Identity theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

7. Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Kurt’s key takeaway

The impact of a data breach may not be immediate, but once your data is on the internet, it can be misused by bad actors. They can steal your hard-earned money, cause emotional and mental harm or affect your loved ones. So, even if you don’t see the immediate impact of a data breach, take action. Ensure your devices are protected, and keep a close eye on your bank accounts.

Have you ever noticed unusual activity in your accounts after a data breach was reported? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Trending