Skip to main content
Zak Islam

Zak Islam

Former Digital Trends Contributor

Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the computing field. A fan of anything pertaining to tech from the latest gadgets to the newest graphics cards and CPUs, Zak has also written for Tom's Hardware.

A person using a laptop with a set of code seen on the display.

How to check your Mac for viruses and malware

Mac systems are considered among the safest systems, but there's no guarantee they won't get infected. Here’s how to check your Mac for viruses and malware.
A person typing on a MacBook keyboard.

Here’s how to unlock a keyboard that’s locked

A locked keyboard can be a major inconvenience as we rely on keyboards to operate our PCs and laptops. Here's a guide to how to unlock a keyboard that's locked.
A man using a PC to view an Excel spreadsheet.

How to create a drop-down list in Excel on Windows and Mac

Adding a drop-down list in Excel is a quick and efficient way to choose predefined data. Here's how to create a drop-down list in Microsoft Excel.
Checking a Wi-Fi router and internet connection on a phone.

How to fix slow upload speeds (common causes and solutions)

If you're experiencing unusually slow upload speeds -- lower than what you’re actually paying for -- then check out our guide on how to fix slow upload speeds.
The Gmail app icon on an iPhone.

How to log out of a Gmail account on your iPhone

If you want to log out of your Gmail account on an iPhone, it's not as simple as clicking a button. Here’s how to log out of a Gmail account on your iPhone.
The MacBook Air on a table in front of a window.

How to keep your MacBook from sleeping

If you find yourself using a MacBook that needs to stay on at all times, there are a few ways to stop it from sleeping. Here's how to do it.
Microsoft word document.

How to recover unsaved Word documents

If you lose all your work in a Word document, never fear, there's a way to get it all back. Here’s a guide on how to recover unsaved Word documents.
A person looking at bar charts on a PC.

How to make a graph in Excel

Graphs in Excel help break down your data into an easily digestible format. Here’s how to make a graph in Microsoft Excel.
A depiction of a hacker breaking into a system via the use of code.

This Chrome extension lets hackers remotely seize your PC

Malicious extensions on Google Chrome are being used by hackers remotely in an effort to steal sensitive information.
Woman Checking Her Email

New COVID-19 phishing emails may steal your business secrets

Google Forms are being used by cybercriminals as a way to obtain sensitive information of business owners through COVID-19 phishing emails.
Computer user touching on Microsoft word icon to open the program.

This dangerous new hacker tool makes phishing worryingly easy

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.
A depiction of a hacker breaking into a system via the use of code.

Over 1M credit cards just leaked to criminals on the dark web

Over 1.2 million credit cards have been distributed via the dark web through a recently launched underground marketplace.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to hack you that you’d never expect

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.
A depiction of a hacked computer sitting in an office full of PCs.

Hackers may be hiding in plain sight on your favorite website

Security researchers have detailed how domain shadowing is becoming increasingly popular for cybercriminals.
A depiction of a hacker breaking into a system via the use of code.

This huge DDoS attack was one of the longest ever recorded

An unprecedented distributed denial of service (DDoS) attack saw over 25.3 billion requests being sent to a target.
Person using iPhone and MacBook.

How to back up Notes on Mac and iPhone

The Notes app on Mac and iPhone can contain a lot of sensitive information, so it's a good idea to back them up. Here's how to back up Notes on Mac and iPhone.
Google Chrome icon in mac dock.

Chrome extensions with 1.4M users may have stolen your data

Researchers from McAfee have discovered five Google Chrome extensions that steal browsing activity, with the add-ons racking up more than a million downloads.
A computer on a desk with the Microsoft Teams program open.

How to delete or hide chats in Microsoft Teams

Sending messages by mistake or with typos is familiar to those who use Microsoft Teams. Here's a guide on how to delete chats on Microsoft Teams.
A depiction of a hacked computer sitting in an office full of PCs.

Hackers are hiding a nasty secret in James Webb telescope images

Space images from the James Webb telescope are being used by hackers to hide and distribute malware.
A MacBook on a table using Google Sheets.

How to convert Excel files to Google Sheets

Google Sheets is known for its versatility, namely its compatibility with Excel files. Here's a guide on how to convert Excel files to Google Sheets.
iPhone placed on MacBook.

How to delete messages on your Mac

Instead of manually checking your iPhone, you can control all your messaging needs directly through a Mac, including deleting individual texts. Here's how.
A depiction of a hacker breaking into a system via the use of code.

Beware, these free Windows apps are hiding a dangerous secret

The installation of malware that is being spread via free software sites has been found to be activated following a month delay, helping it avoid detection.
A Starlink dish next to an RV.

Elon Musk’s SpaceX to reveal ‘something special’ with T-Mobile

Elon Musk’s Starlink will be hosting a live stream today with T-Mobile, with the satellite internet company set to reveal plans to 'increase connectivity.'
An individual opening a MacBook.

How to find a lost or stolen MacBook

If you’ve accidentally misplaced your MacBook when traveling or it’s been stolen, Apple's Find My feature provides a straightforward method to finding it.
A Dell laptop with Windows 10 sitting on a desk.

How to create a system restore point in Windows 10

Creating system restore points in Windows 10 is a utility that can prove to be extremely useful if you're experiencing technical issues. Here's how to use it.
windows 10 october update

How to tag files in Windows 10

One of the most effective ways to optimize your Windows 10 experience is to take advantage of the tag system, helping you identify your files. We show you how.
A digital depiction of a laptop being hacked by a hacker.

Hackers are using fake WordPress DDoS pages to launch malware

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare DDoS protection pages, a new report has found.
MacBook on a desk with Control Center open.

How to show the battery percentage of your Mac

The indicator that displays the exact battery percentage for your Mac system is one of the most useful tools available. Let's take a look at how to enable it.
A depiction of a hacker breaking into a system via the use of code.

Google just thwarted the largest HTTPS DDoS attack in history

Google has confirmed that one of its cloud customers was targeted with the largest HTTPS distributed denial-of-service (DDoS) attack ever reported.
A package with a fake Microsoft Office USB stick.

Don’t fall for this devious new Microsoft Office scam

With packaging looking legitimate enough at first glance, scammers are sending out fake Microsoft Office USB sticks -- loaded with ransomware -- to individuals.
Graphics card in the Acer Predator Orion 7000.

GPU prices may be about to crash to incredible new lows

Nvidia may be preparing to apply yet another price drop for its RTX 30-series GPUs, according to reports emerging from China.
An individual using a laptop's keyboard.

Top 10 Windows shortcuts everyone should know

You may be satisfied with the Windows shortcuts you already use, but you can enhance your PC experience with these 10 Windows shortcuts everyone should know.
A MacBook with Google Chrome loaded.

How to avoid third-party cookies in every browser

Third-party cookies can track your web activity in general and collect data on you. Here's how to disable and avoid third-party cookies in every browser.
A Starlink dish next to an RV.

Elon Musk’s Starlink satellites hacked by $25 homemade device

A $25 hacking tool that can seemingly breach Starlink’s internet terminals has been revealed by a security researcher.