Connect with us

Technology

How to safeguard your older PC

Published

on

How to safeguard your older PC

Whether you have an older PC lying around your home or you’re considering buying a used/refurbished PC to save money, there’s nothing wrong with doing this. However, there is one problem you should know about: older computers can be more vulnerable to security threats because they haven’t been given updates in a long time. This not only puts you at risk, it can also make your computer run more slowly. Additionally, if you sell or giveaway an older PC without properly clearing out the system, you never know who could still have access to your files and data.

So, how can you make sure your old PCs – whatever you intend on doing with them – are up to date and don’t pose a risk for you? Let’s find out.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Man on his PC (Kurt “CyberGuy” Knutsson)

What are the risks associated with using an older PC?

Using an older computer poses a number of security risks based primarily on the fact that the software it’s running is outdated. This includes operating systems and applications that may lack essential security patches. These systems are more susceptible to known vulnerabilities and exploits, increasing the likelihood of malware infections and other potential cyberattacks.

Advertisement

Additionally, older hardware may have inherent vulnerabilities that simply can’t be mitigated through any type of software update, and compatibility issues with modern security software that you could potentially install to mitigate this could only exacerbate the problem. Essentially, as newer systems receive more attention and updates, older computers become increasingly vulnerable and less capable of defending against evolving threats.

Man working on his PC (Kurt “CyberGuy” Knutsson)

MORE: DON’T TOSS YOUR OLD INTERNET ROUTER UNTIL YOU DO THIS

How to keep an older computer secure

Knowing the security risks that come with older computers doesn’t mean you should always just resort to buying a new computer. But, it is important to take security seriously and ensure that old computer is as secure as any new one.

Here are five steps you can take to keep your system safe:

Advertisement

1) Regular updates: Ensure your operating system, antivirus and firewall programs are up to date. This helps patch security vulnerabilities and guards against known threats.

2) Consider upgrading your OS: Unsupported operating systems like Windows XP are particularly vulnerable. Consider upgrading to a newer OS or switching to a free alternative like Linux to access current security updates and support.

3) Use secure browsing alternatives: Opt for safe and private browsers instead of Internet Explorer, which has officially been retired and is out of support.

4) Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information on your PC is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

5) Maintain best practices: Adopt good habits like shutting down your computer regularly, uninstalling unused programs and backing up your files to mitigate the risk of data loss due to hardware failure or cyberattacks.

Advertisement

Man at his computer taking notes (Kurt “CyberGuy” Knutsson)

MORE: WHY DOES MY PC FREEZE AND HOW DO I FIX IT? EXPERT ANSWERS

How to speed up an old computer

Free up disk space: Remove unnecessary software and delete unused files to free up disk space, which can help improve overall performance. Tools like “Disk Cleanup” on Windows can be very helpful for this.

Defragment your hard drive: Regularly defragmenting your hard drive organizes data more efficiently, making it easier for your computer to access and improving its speed. This process is automated on modern versions of Windows (7 and later), so there’s no need to do it manually. However, if you’re using an older version, you can use the built-in defragmentation tool.

Consider adding more memory: Increasing the amount of RAM in your computer can significantly enhance its multitasking capabilities and overall speed. Research the type of RAM your computer uses and consider adding more if needed. If you’re not comfortable with this, a professional or a tech-savvy friend can help.

Advertisement

Update your drivers: Ensure your device drivers are up to date to prevent compatibility issues and optimize performance. Many drivers update automatically, but it’s wise to check periodically. You can also visit the manufacturer’s website for instructions.

Manage start-up processes: Control which programs launch during startup to reduce boot time and improve performance. Disable unnecessary startup processes using guides tailored to your operating system. On Windows, you can use the “Task Manager” to disable start-up programs.

Woman on her PC (Kurt “CyberGuy” Knutsson)

MORE: 10 TIPS TO SPEED UP YOUR PC’S PERFORMANCE

What to do if you sell an old computer?

Before selling or getting rid of an older computer, it’s crucial to take steps to protect your personal information and ensure the next user doesn’t have access to your data. Here’s what you should do:

Advertisement

Back up your data: First, make sure to back up any important files, documents, photos or other data you want to keep. You can transfer these files to an external hard drive, cloud storage or another computer.

Securely erase data: Simply deleting files or formatting the hard drive may not completely erase your data, as it can still be recovered using specialized software. Consider using a data erasure tool or disk-wiping software to securely erase the entire hard drive, making it nearly impossible for anyone to retrieve your personal information. Check out our top data recovery software solutions by clicking here.

Sign out of accounts: If your computer is linked to any online accounts or services like your email, social media accounts or software subscriptions, make sure to log out of these accounts before resetting the computer. This prevents the next user from accessing your accounts unintentionally.

Remove external devices: Don’t forget to remove any external devices connected to the computer, such as USB drives, external hard drives or printers, as they may contain personal data as well.

Perform a factory reset: Performing a factory reset is not only essential to wipe all your personal data from the computer and restore it to its original settings, it’s often the easiest and quickest option instead of manually doing all the steps above. This process removes all files, applications and user accounts, essentially giving the next user a clean slate. Be sure to follow the specific instructions for your computer model to initiate a factory reset properly, and make sure to check that it worked and none of your files are still there!

Advertisement

By following these steps, you can ensure that your personal information is safeguarded and that the next user receives a clean and secure computer.

Kurt’s key takeaways

Computers that are regularly updated tend to have less security risk. But that doesn’t mean you need to trade in your perfectly good PC for a new one. It just means you have to pay extra attention and take a few additional steps to keep your PC secure. Doing these steps can also ensure your older computer isn’t slowing down either.

How has the evolution of technology influenced your decision-making when it comes to updating or replacing your devices? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Samsung will debut two new wireless speakers at CES 2026

Published

on

Samsung will debut two new wireless speakers at CES 2026

For years, Samsung has made products that try to camouflage what they are by displaying works of art. The Frame TV is the most famous example, but the company also released the Music Frame, a speaker disguised as a picture frame, at last year’s CES. Now, instead of hiding a speaker with a piece of art, Samsung worked with designer Erwan Bouroullec to make a speaker into a piece of art.

According to Samsung, the Music Studio line of speakers, debuting at CES 2026, draw inspiration from the “timeless dot concept” found throughout music and art. As a musician, the Music Studio 5 reminds me of a fermata, the symbol meant to hold a note or silence. It has a 4-inch woofer and dual tweeters with built-in waveguide.

The larger Music Studio 7 is a 3.1.1-channel speaker that can be used on its own, in a pair for wider stereo sound, or with compatible Samsung Wi-Fi speakers, soundbars, or TVs using the company’s Q-Symphony technology. The Studio 7 is capable of playing high-resolution audio up to 24-bit/96kHz, and it and the Music Studio 5 use AI Dynamic Bass Control to extend bass response.

Sometimes these aesthetic-first speakers forget about the most important part of a speaker — its sound quality. But Samsung has done an impressive job over the past few years with its audio tuning which makes me optimistic for the Music Studio’s performance.

Continue Reading

Technology

Apple patches two zero-day flaws used in targeted attacks

Published

on

Apple patches two zero-day flaws used in targeted attacks

NEWYou can now listen to Fox News articles!

Apple has released emergency security updates to fix two zero-day vulnerabilities that attackers actively exploited in highly targeted attacks. 

The company described the activity as an “extremely sophisticated attack” aimed at specific individuals. Although Apple did not identify the attackers or victims, the limited scope strongly suggests spyware-style operations rather than widespread cybercrime.

Both flaws affect WebKit, the browser engine behind Safari and all browsers on iOS. As a result, the risk is significant. In some cases, simply visiting a malicious webpage may be enough to trigger an attack.

Below, we break down what these vulnerabilities mean and explain how you can better protect yourself.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Apple released emergency updates after confirming two zero-day WebKit flaws were actively exploited in targeted attacks. (Reuters/Thomas Peter/File Photo)

NEW IPHONE SCAM TRICKS OWNERS INTO GIVING PHONES AWAY

What Apple says about the zero-day vulnerabilities

The two vulnerabilities are tracked as CVE-2025-43529 and CVE-2025-14174, and Apple confirmed that both were exploited in the same real-world attacks. According to Apple’s security bulletin, the flaws were abused on versions of iOS released before iOS 26, and the attacks were limited to “specific targeted individuals.”

CVE-2025-43529 is a WebKit use-after-free vulnerability that can lead to arbitrary code execution when a device processes maliciously crafted web content. To put it simply, it allows attackers to run their own code on a device by tricking the browser into mishandling memory. Apple credited Google’s Threat Analysis Group with discovering this flaw, which is often a strong indicator of nation-state or commercial spyware activity.

Advertisement

The second flaw, CVE-2025-14174, is also a WebKit issue, this time involving memory corruption. While Apple describes the impact as memory corruption rather than direct code execution, these types of bugs are often chained together with other vulnerabilities to fully compromise a device. Apple says this issue was discovered jointly by Apple and Google’s Threat Analysis Group.

In both cases, Apple acknowledged that it was aware of reports confirming active exploitation in the wild. That language is important because Apple typically reserves it for situations where attacks have already occurred, not just theoretical risks. The company says it addressed the bugs through improved memory management and better validation checks, without sharing deeper technical details that could help attackers replicate the exploits.

Devices affected and signs of coordinated disclosure

Apple has released patches across its supported operating systems, including the latest versions of iOS, iPadOS, macOS, Safari, watchOS, tvOS and visionOS.

According to Apple’s advisory, affected devices include iPhone 11 and newer models, multiple generations of iPad Pro, iPad Air from the third generation onward, the eighth-generation iPad and newer and the iPad mini starting with the fifth generation. This covers the vast majority of iPhones and iPads still in active use today.

Apple has patched the flaws across its entire ecosystem. Fixes are available in iOS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2 and Safari 26.2. Because Apple requires all iOS browsers to use WebKit under the hood, the same underlying issue also affected Chrome on iOS.

Advertisement

6 steps you can take to protect yourself from such vulnerabilities

Here are six practical steps you can take to stay safe, especially in light of highly targeted zero-day attacks like this.

REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

Because WebKit powers Safari and all iOS browsers, even a malicious webpage may be enough to put unpatched devices at risk. (Jakub Porzycki/NurPhoto via Getty Images)

1) Install updates as soon as they drop

This sounds obvious, but it matters more than anything else. Zero-day attacks rely on people running outdated software. If Apple ships an emergency update, install it the same day if you can. Delaying updates is often the only window attackers need. If you tend to forget about updates, let your devices handle them for you. Enable automatic updates for iOS, iPadOS, macOS and Safari. That way, you are protected even if you miss the news or are traveling.

2) Be careful with links, even from people you know

Most WebKit exploits start with malicious web content. Avoid tapping on random links sent over SMS, WhatsApp, Telegram or email unless you are expecting them. If something feels off, open the site later by typing the address yourself.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

3) Use a lockdown-style browsing setup

If you are a journalist, an activist or someone who deals with sensitive information, consider reducing your attack surface. Use Safari only, avoid unnecessary browser extensions, and limit how often you open links inside messaging apps.

4) Turn on Lockdown Mode if you feel at risk

Apple’s Lockdown Mode is designed specifically for targeted attacks. It restricts certain web technologies, blocks most message attachments, and limits attack vectors commonly used by spyware. It is not for everyone, but it exists for situations like this.

5) Reduce your exposed personal data

Targeted attacks often start with profiling. The more personal data about you that is floating around online, the easier it is to pick you as a target. Removing data from broker sites and tightening social media privacy settings can lower your visibility.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Apple urges users to install the latest updates, especially those who may face higher-risk, targeted threats. (Cheng Xin/Getty Images)

6) Pay attention to unusual device behavior

Unexpected crashes, overheating, sudden battery drain or Safari closing on its own can sometimes be warning signs. These do not automatically mean your device is compromised. However, if something feels consistently wrong, updating immediately and resetting the device is a smart move.

Advertisement

Kurt’s key takeaway

Apple has not shared details about who was targeted or how the attacks were delivered. However, the pattern fits closely with past spyware campaigns that focused on journalists, activists, political figures and others of interest to surveillance operators. With these patches, Apple has now fixed seven zero-day vulnerabilities that were exploited in the wild in 2025 alone. That includes flaws disclosed earlier this year and a backported fix in September for older devices.

Have you installed the latest iOS or iPadOS update yet, or are you still putting it off? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Technology

Pixel 10 phones and Switch 2 games round out this week’s best deals 

Published

on

Pixel 10 phones and Switch 2 games round out this week’s best deals 

If you’re taking it easy during the slow, in-between week between Christmas and New Year’s, now’s a good time to catch up on deals you might’ve missed. Many of our favorite discounts from the past week are still hanging around, making this an especially convenient moment to shop. Whether you’re eyeing a new phone, gearing up for travel, or just looking to treat yourself before the year wraps up, we’re seeing notable price drops on Google’s Pixel 10 lineup, AirTags, and a wide selection of Nintendo Switch games, along with a handful of other Verge-approved picks worth grabbing now. Here are the best deals worth checking out before the year comes to a close.

Google’s Pixel 10 phones are among the best Android phones you can buy, and this week they’ve dropped to some of their lowest prices yet. Amazon is selling the Pixel 10 for $499 ($300 off) with promo code PIXEL10, marking its second-best price to date. If you want better cameras, Amazon is also offering record-low prices on the Pixel 10 Pro and 6.8-inch Pixel 10 Pro XL, down to $649 ($350 off) and $799 ($400 off), respectively, with the same code.

All three phones support Qi2 wireless charging with built-in magnets and run on Google’s snappy Tensor G5 chip. In her review, The Verge’s Allison Johnson called the Pixel 10 a great, basic Android phone with meaningful upgrades, including a bright 6.3-inch OLED display with a 120Hz refresh rate and up to 3,000 nits of peak brightness. It also adds a dedicated telephoto lens — a first for a non-Pro Pixel — which makes a noticeable difference for portraits.

If you’re aiming for great (not just good) photos, though, the 6.3-inch Pixel 10 Pro or 6.8-inch Pro XL are better picks. Both offer improved main and 48-megapixel ultrawide cameras, and additional AI-powered features like Pro Res Zoom and an upgraded portrait mode. They also come with extra memory for smoother multitasking along with sharper displays.

Anker’s Laptop Power Bank is once again on sale at Amazon and Walmart for $87.99 ($47 off), which matches the record-low price we last saw a month ago. A favorite among Verge staffers, the 25,000mAh / 90Wh power bank features a retractable USB-C cable along with a second built-in USB-C cable that doubles as a handle for easier portability. You also get a handy LCD screen that shows remaining battery life, total power output, and temperature at a glance. It includes a USB-A port and an extra USB-C port as well, letting you charge a MacBook Pro and up to three other devices at the same time. Power output tops out at 165W when charging two devices, or up to 130W with more plugged in — and since it’s carry-on compliant, you can bring the power bank along on flights.

Advertisement

A few more deals we’re digging:

Continue Reading
Advertisement

Trending