Getting an apartment in San Francisco is a competitive nightmare, which is why I was excited to find that the landlord I had been texting with to set up an apartment viewing just happened to be friends with another good friend of mine. She didn't tell me, and we aren't Facebook friends: I found out because she has her phone number stored on the social network. When we started coordinating apartment viewing times, my phone automatically pulled in her profile pic and linked to her account.


Hi Lifehacker. When I was looking for browsers I discounted a lot because I didn't know who made them and what information they collected and how trustworthy they are. Could a dodgy company be selling information I entered into my browser, or my browsing history? Should I reconsider Opera? How do all these companies making browsers make money?


Hopefully you took advantage of Microsoft's free upgrade offer that allowed consumers to update computers running Windows 7 or 8 to Windows 10 (and if you didn't, it isn't too late!). If you did, you should take advantage of one of the most convenient and downright pleasant features in Windows 10: The ability to login by simply looking at your PC, using Windows Hello. It's easy to setup, but may cost you a few bucks depending on the PC and accessories you currently own.


Phishing attacks, wherein scammers pretend to be legitimate companies in order to trick you into handing over sensitive information such as usernames, passwords or credit card information, are getting more difficult to spot. Even Google is susceptible to more sophisticated attacks, which have popped up everywhere from email attachments to shared Google documents.


If the rise of true crime podcasts and TV over the past few years is any indication, we seem to have a macabre fascination with serial killers. There's something deeply unnerving but intriguing about the evil inside other human beings - like staring at a black mirror that reflects a different, disturbed version of ourselves. Australia has been home to some gruesome acts of violence over the past 50 years, but there are some things we can learn from these cases.

Here are five of Australia's worst murderers and some ideas we can learn from their MO's and arrests.


Certain users of the privacy-minded Tor web browser should download the app's latest update, which adds a temporary fix to prevent the browser from leaking identifying information, namely IP addresses. The TorMoil bug, as named by the security research company that discovered the vulnerability, We Are Segment, can take advantage of a flaw in the browser to uncover a user's real IP address, outing anonymous browsers should they click on a particular type of link.


You don't need to have evil motives for wanting to fake your identity or go incognito online; for many people, it's a matter of privacy and avoiding spammers and scammers. Thankfully, there are a great many tools for staying anonymous online. Here are a few of the best.


As an anti-theft measure, clothing stores fasten certain items with security tags so you'll set off an alarm when you leave with the tag still on the garment. Some also spill ink from the tag if you try to remove it yourself.

This isn't a problem so long as the tag gets removed before you leave the store, but sometimes a tag will get missed at the checkout. If that's happened to you, here's what you can do about it.