Kurt "Cyberguy" Knutsson answers a reader's question as to how to protect one's private information remotely on your personal device when either lost or stolen.
You've got tech trouble? I've got a solution. We recently received an email from Linda who lives in Hemet, California. She wrote in about her concerns over phone theft and the potential ease with which someone could charge products using a lost or stolen phone's apps. Here's what she asked us: If a phone is
With shortcuts, you can create different personal automation, like changing the charging sound of an iPhone, changing app icons, and so on. However, it will