This beginner’s guide to Windows 10 security will help protect your device.

Securing your new Windows 10 machine (or one you've recently upgraded, now that support for Windows 7 has ended) doesn't have to be complicated. With a quick run-through, you can enable some of the basic security features of the operating system and disable some of the more annoying ones, without compromising your device. 

Here's how to do it. 

Create your save point

The first thing you should do with a new Windows 10 machine is enable a system restore. Think of it like a save point for your machine. If things go south while you're trying to set up a safer machine, you get to come back to this nice fresh install and start with a clean slate. Since it's disabled by default in Windows 10 ($130 at Walmart), you'll need to manually enable it by following these steps:   

1. Go to the Windows Cortana search box and type system restore

2. Select the Control Panel and click Create a restore point

3. When the System Properties dialog box appears, click the System Protection tab.

4. Select the drive you've got Windows installed on. For most people this is going to be the C drive

5. Click Configure

6. Click Turn on system protection, then click OK.

From here on out, you can always come back to the System Properties box and click System Restore to bring your machine back to this moment in time. 

Read more: The best antivirus protection of 2020 for Windows 10

Kill the bloatware


Mojo Vision's smart contacts put text in my eye and let me see in the dark. They're aiming for even more than that.

There aren't many meetings in Las Vegas during CES that still make my jaw drop. The few I can think of mostly involved Oculus. I had no idea what a company I've never met with before, called Mojo Vision, was going to show me. I knew they made very, very small displays. I knew the company was pursuing some sort of AR contact lens. They weren't even officially a part of CES. You can see why I was intrigued.

At a suite at the Palazzo hotel in Las Vegas, I approached a table where a single contact lens lay in a case. This lens had some circuitry embedded in it, and at the center, there was a tiny dot. I held the lens in my hand. This was it. Without a doubt, the smallest piece of tech I've ever demoed.

I didn't actually get to stick this lens in my eye. Mojo wouldn't allow it yet. Instead, I held up a transparent plastic wand with the lens mounted on it. I held it very, very close to my eye, as I stared at a projected screen in front of me. And through a pin-sized glowing green dot, I saw text, displayed in a demo loop. The time. A sports score. The weather. Health data, like heart rate. A message, as if sent from a friend. It was like the world's smallest pair of smartglasses, right in my eye. A smart contact lens. This is what Mojo Vision is gunning for, and it feels... well, it feels like tech that came from the year 2020.

"We didn't want to get overhyped and show something that was just vaporware," says Steve Sinclair, vice president of product and marketing at Mojo Vision. Sinclair has a background that includes the original iPhone launch at Apple, and vice president of product marketing at Motorola Mobility during the launch of the Moto 360, Moto Hint earbuds, and Moto X under Rick Osterloh (now head of Google's hardware).

source: bbc. com

US politicians expressed concerns about the accuracy and growing use of facial recognition software, at a hearing on Wednesday.

The technology is being developed by firms including Amazon and Microsoft and increasingly used by law enforcement worldwide.

Some facial recognition technologies misidentify women and people of colour.

Civil liberties and privacy groups have raised concerns about how the data for these programs is being gathered.

"This is some real-life Black Mirror stuff that we're seeing here," said New York congresswoman Alexandria Ocasio-Cortez, a reference to a science-fiction TV show that explores the dark side of technology.

US lawmakers are working on a proposal for a bill to limit the use of facial recognition.

'Pause the technology'

Some tech experts have raised concerned about how growing facial recognition databases- controlled by governments and private companies - are being used.

"I think we need to pause the technology and let the rest of it catch up," said Meredith Whittaker, co-director of New York University's AI Now Institute and a witness at the hearing.

She argued rules needed to be put in place requiring consent for facial recognition software. Currently, in the US it is enough for a person to be able to see the camera to grant consent.


High-risk users are aware that they are more likely to be targeted by hackers compared to the general population, but many of them still have bad security habits, a Google survey shows.

High-risk user groups include business executives, politicians and their staff, activists, journalists and online influencers. Individuals in these categories are more likely to be targeted in cyberattacks due to their occupation or their online activities.

Google has commissioned The Harris Poll to survey 500 high-risk users from the United States; 100 people from each of the five aforementioned categories.

The results of the survey show that 78% of high-risk users are aware that they are more likely to be targeted by hackers compared to the general population, and 65% of them are more concerned about their accounts being hacked today than they were one year ago — a majority are mainly concerned about their work account being targeted.

Nearly three-quarters of respondents have been targeted in a phishing attack and 39% admitted having their accounts compromised. In many cases the phishing attempts relied on personal details, such as their name or organization, to increase the chances of success.

While roughly three-quarters of high-risk users believe their work and personal accounts are secure, with 91% of them claiming that they have taken steps to secure their accounts, the survey shows that many of them actually have bad security habits.

Specifically, over one-third of respondents admitted not using two-factor authentication, and 71% use the same passwords for at least some accounts. Only half of them use a security key for two-factor authentication, and 76% admit using their personal email accounts for work-related communications, which is generally considered an unsafe practice.