Computer >> Computer tutorials >  >> System >> Linux

Elon Musk’s Twitter Takeover, Personal Cybersecurity Responsibility, and How to Block Scam Calls

Elon Musk’s Twitter Takeover, Personal Cybersecurity Responsibility, and How to Block Scam Calls

Elon Musk’s Twitter Takeover, Personal Cybersecurity Responsibility, and How to Block Scam Calls

Published Apr 28, 2022, 6:30 AM EDT

Former Deputy Editor for Security, Linux, DIY, Programming, and Tech Explained. Christian has extensive experience as a writer and editor and has been published in Computer Weekly, Linux Format, Tech Radar, ComputerActive, and other titles.

Christian also produced MakeUseOf's weekly show, the Really Useful Podcast, from 2018-2024.

His current passions are his cigar box guitar, his retro gaming site (gamingretro.co.uk), and his family.

Sign in to your MakeUseOf account

As we recorded this show it was confirmed that Elon Musk had bought Twitter. So, hit play for our reaction, as well as to learn more about Google Chrome showing as a suspicious app in Windows, Bing's "ethical shopping" hub launch, and what to do with "Scam Likely" calls.

Shownotes

This week, we look at the following news, tips and tricks, and recommendations:

News:

  • 5 Things About Twitter Elon Musk Is Likely to Change
  • Microsoft Bing Ethical Shopping Hub Launched
  • Ubuntu 22.04 LTS Jammy Jellyfish Released
  • Microsoft Defender Flags Google Chrome Update as Suspicious

Tips and tricks:

  • Why Computer Security Is Your Responsibility
  • How to Block Scam Likely Calls
    • Windows Cold Caller Scam Recorded
  • Different Types of VPN Explained

Recommendations:

  • The Fudge Kitchen
  • Whisperify

Christian Cawley and Ben Stegner host the show. Follow them on Twitter (@thegadgetmonkey and @stegnersaurus) for updates and even make suggestions for future topics.

Don't forget to subscribe to the Really Useful Podcast on Apple Podcasts for more tech news and tips for technophobes!