29 November 2019

Pixpay is a challenger bank for teens focused on pocket money


Meet Pixpay, a French startup that wants to replace cash when you’re handing out pocket money to your kids. Anybody who is older than 10 years old can create a Pixpay account, get a debit card and manage pocket money.

Challenger banks are nothing new, but they’re still mostly targeted towards adults. If you want to create an N26 or Revolut account, you need to be at least 18 years old. You can create a Lydia account if you’re at least 14 years old with parental consent.

Pixpay, like Kard, wants to fill that gap and offer modern payment methods to teens so that you can ditch cash altogether. Parents and kids both download the Pixpay app to interact with the service.

A few days after creating an account, your child receives a Mastercard. It offers the same features that you’d expect from a challenger bank — you can customize the PIN code, lock it and unlock it, receive a notification with each transaction and restrict some features, such as limits, ATM withdrawals, online payments and payments abroad. Pixpay also lets you generate virtual cards for online payments.

In addition to some spending analytics, users can create projects and set money aside to buy an expensive thing after months of savings. Parents can also define an interest rate on a vault account to teach children how to save money. In the future, Pixpay wants to let teens collect money after a babysitting job for instance.

As for parents, they can send money instantly from the Pixpay app. You can top up your Pixpay account with your favorite debit card and send money on a regular basis (€4 per week for instance) or for one-off payment (here’s €15 for your movie ticket and fast food).

Parents can see an overview of multiple accounts in case you have multiple children using Pixpay. Eventually, the startup wants to let multiple parents manage the account of their child, which could be useful for separated couples.

Pixpay costs €2.99 per month per card. Payments and ATM withdrawals in the Eurozone are free. Transactions in foreign currencies cost 2% in foreign exchange and ATM withdrawals outside of the Eurozone cost €2.

The startup has raised $3.4 million (€3.1 million) from Global Founders Capital. The company partners with Treezor, a banking-as-a-service platform that lets you generate cards and e-wallet accounts using an API.


Read Full Article

Concerning 5G Security Risks You Need to Know About


5g-security-risks

5G phones and other devices have already begun to appear in stores. And soon the super-fast 5G will become the new standard for cellular technologies. With a 5G connection you’ll be able to stream high-quality video and play online games on your mobile device more easily.

However, as with any new technology, 5G comes with certain security concerns. Here we’ll explain some of the security risks of 5G so you can be more informed when you purchase or use 5G devices.

1. Optional Security Features in 5G

5G security risks - optional security

Concerns about 5G have been around for some time. US Senator Ron Wyden even wrote to the chairman of the Federal Communications Commission (FCC) in November 2019 to discuss some of these worries.

A major issue Senator Wyden raised in his letter was that some cybersecurity protections against known vulnerabilities are optional in 5G (what is 5G?). This includes features like encryption and authentication.

As these are not mandatory, each individual wireless carrier must decide whether to turn on these protections themselves. We can hope that most carriers will choose to do so. However, carriers are not obligated to use these protections.

“For decades, wireless carriers have ignored known cybersecurity vulnerabilities that foreign governments were and are still actively exploiting to target Americans,” Wyden wrote. “The market has failed to incentivize cybersecurity, in part because consumers have no way of comparing the cybersecurity practices of phone companies.”

This is a worry not only for 5G users whose carrier doesn’t take security seriously. It can impact others too. For example, if user A’s carrier is not secure and they send and receive messages from user B, then both users’ data is vulnerable.

In his letter, Senator Wyden raises the issue of foreign governments using these vulnerabilities to target Americans. But users are at risk from spying from their own governments as well.

2. Risks to 5G Hardware and Infrastructure

5G security risks - 5G hardware

A 2019 report by the US’s Cybersecurity and Infrastructure Security Agency (CISA) raises more concerns about 5G. It looked at the security risks currently present in 4G technology. The agency then considered how these risks could apply to 5G.

In particular, the report considers how hardware manufactured by untrustworthy company could compromise security. This is clearly a reference to Chinese companies like Huawei, which has been accused of spying on Americans.

“Even if US networks are secure, US data that travels overseas through untrusted telecommunication networks is potentially at risk of interception, manipulation, disruption, and destruction,” the report warns.

There is also the issue of the sheer number of components used in 5G, which is higher than previous wireless technologies. Much 5G support will require new physical architecture. That means carriers will need to build more cellular towers as well as more small cells or micro cells. The problem with this is that the more components present in a system, the more ways there are to attack it.

This is especially concerning when you think of the technologies which will be using 5G, such as autonomous cars, remote medical procedures, and Internet of Things devices. These are all vulnerable to cyberattacks and a successful attack could have very serious consequences.

3. A Vulnerability in 5G Authentication Protocol

5G security risks - authentication

As well as these more general threats, researchers have identified specific security issues in 5G. Researchers from SINTEF Digital Norway and the Technical University of Berlin described a vulnerability in the Authentication and Key Agreement (AKA) protocol that 5G uses in a 2019 paper.

The AKA protocol is what devices uses to communicate with the 5G network. A similar protocol is used in 3G and 4G networks too. The AKA protocol generates a one-time password so that devices and cellular networks can send data back and forth, and be sure that the data is not being interfered with.

The new, 5G version of the AKA protocol was designed to be more secure and to protect against a type of attack called a fake base station attack.

However, the new AKA protocol has introduced a weakness of its own. The researchers uncovered a logical vulnerability, which means a problem in the way the system operates as opposed to a weakness in any underlying code. The protocol is supposed to use randomized encryption to protect data. But the researchers were able to get around this. They created a new class of attack which they named an activity monitoring attack.

This means that hackers could steal steal information which is carried over 5G. The researchers have suggested a fix for the vulnerability, but the fix has yet to be adopted.

4. 5G Is Not Safe from IMSI Catchers

5G security risks - IMSI catchers

There’s also a way that governments can spy on users through 5G. Considerable attention has been focused on a security issue raised in 2018. The US Department of Homeland Security announced it had discovered electronic surveillance devices called International Mobile Subscriber Identity (IMSI) catchers in Washington, D.C.

IMSI catchers are devices which pretend to be cell towers, so devices like mobile phones connect to them. But when a device is connected, the owner of the IMSI catcher can intercept phone calls and messages. The FBI has been using similar technology called Stingray devices in order to track cell phone communications since the mid-1990s.

Despite public outcry about Stingray in the last five years, the FBI continues to use the technology. Law enforcement in Canada and the UK also use the devices.

5G was supposed to protect users against IMSI catchers. However, it appears that there are a number of ways attackers can get around the protections in 5G.

One way is using the vulnerability in the AKA protocol described above. Another is an attack called Torpedo. This takes advantage of a weakness in the paging protocol which notifies a phone to be ready when a call or message is about to arrive. Hackers could use Torpedo to spoof Amber alerts or to block incoming messages altogether.

If hackers deployed Torpedo, they could then follow this with a pair of followup attacks called Piercer and IMSI-Cracking. Together, these can access IMSI data on both 4G and 5G networks.

So 5G is not protected against IMSI catchers after all.

Security Issues in 5G

5G technology will bring faster internet speeds and enable new functions like streaming games on mobile devices. However, this new technology will carry some security risks with it as well. Before you jump into 5G, you should consider your devices’ security. And you should consider whether devices could be compromised by being connected to a 5G network.

To learn more about security for your connected devices, check out our list of best security and privacy apps for smartphones and tablets.

Image Credit: fotokitas/Depositphotos

Read the full article: Concerning 5G Security Risks You Need to Know About


Read Full Article

How to Transfer Files Between a Virtual Machine Guest and Host PC


transfer-files-vm

Using a virtual machine can improve your productivity considerably. But there’s often a sticking point: copying text or files from the host PC to the guest, or vice-versa.

The thing is, it’s not as difficult as it initially seems. Here’s how to transfer files between your VM guest operating system and host PC, using VirtualBox or VMware.

How You Can Share Data Between Your Host PC and a Virtual Machine

Share data with USB on a virtual machine

A virtual machine is a software environment that emulates the hardware required to install an operating system (OS). In very general terms, this lets you install an operating system on an existing OS much like an app.

Our guide to virtual machines explains this in more detail.

You won’t be surprised by the options for sharing data between a host PC an any guest operating system running in a virtual machine. What may surprise you is how tricky they can be to set up. Your options are:

  • Copy and paste
  • USB drive
  • Network share

Clearly, each option is best for a specific type of data. For example, copy and paste is best for sharing text and small files, such as copying code from a browser on your host PC into a terminal session in the guest OS.

Below, we’ll look at sharing data using these three methods on virtual machines running on Oracle VirtualBox and VMware Workstation Player.

Copy and Paste Data

The simplest option is to copy the data from your host PC and paste it into the window of the guest VM. Or copy from the guest VM and into an open file browser on the host. But is it as simple as it sounds?

Thankfully, yes, it is.

Copy and Paste Data in VirtualBox

If you’re using VirtualBox, with your virtual machine running, select Devices > Drag and Drop. Here, you can choose from Host to Guest, Guest to Host, and Bidirectional. There’s also the default option, Disabled. For the best results, use Bidirectional.

That’s all there is to it.

How to Copy and Paste Data in VMware

For VMware users, you’ll need to first install the VMware Tools package, which brings additional features. You can commence this via VM > Install VMware Tools. If you haven’t already downloaded VMware Tools, instructions for doing so will be given.

You can then enable copy and paste in VM > Settings > Options. Select Guest Isolation, then Enable copy and paste and confirm with OK.

Sharing data between the guest and host operating systems in this way is best suited for smaller files. You might also share text strings, URLs, that sort of thing. Steer clear of large files though—you have other options for those.

USB Stick

Using a USB stick to transfer data between two physical machines is a time-honored tradition. USB flash drives essentially replaced 3.5-inch floppy disks in the early 2000s.

But how can you use a USB drive to share data between a virtual machine and your host PC?

Share Files From a USB Stick in VirtualBox

To be able to access USB devices from within VirtualBox, you’ll need to enable USB access. For this, the VirtualBox Extension Pack is required from www.virtualbox.org/wiki/Downloads.

Once you’ve done that, insert the USB device you wish to use. Next, open VirtualBox and click File > Preferences, then Extensions and click +. Browse to the downloaded Extension Pack, click Open, then when prompted, Install. Follow the prompts to complete the process. You can then check to confirm USB is enabled in Settings > USB.

Check USB support in VirtualBox

With the USB support added, you’ll need to enable it. In the main VirtualBox window, right click the VM you want to use and select Settings > USB. Click + then browse for the USB device. It will be available when you launch the VM. Additional drives can be added in the same way.

Copy Files from USB in VMware

With VMware, when a USB device is connected and the VM is the active window, the device is detected. However, it will not be detected by the host PC in this scenario. For this to happen, remove the drive, minimize the VM, then reconnect.

It’s simple but can get messy if you forget which operating system the USB stick is connected to.

This option is best for large files. Of course, you’re limited by the capacity of the USB device, so keep that in mind. Whatever VM software you use, safe ejection of USB devices is recommended on both host and guest virtual machines.

Create a Shared Drive

Your third option is to set up a network share on your host PC that the guest VM can access. This means designating a portion of your PC’s hard disk drive as accessible over the local network. With this set up, the VM can then connect to the network and access the drive.

Although physically all on the same computer, this adds higher capacity to your virtual machine data sharing.

Create a Share in VirtualBox

You should have already downloaded VirtualBox Guest Additions. This should be installed via Devices > Install Guest Additions, where you should browse for the appropriate EXE file. Follow the steps to the end, choosing the default options, then Finish.

Launch VirtualBox and open Devices > Shared Folders > Shared Folders Settings. Click +, then in Folder Path click the arrow and select Other. Browse (the host OS) for the folder you’re using as a share, highlight it, then Select Folder.

Share folders between host OS and guest virtual machines

In the Add Share window, give the share a name (keeping the same name in the guest OS as in the host OS is wise). Check Auto-mount and Make permanent, then OK.

From the guest OS you’ll find the share set up in the usual location for network shares. For example in Windows 10, this will be under Network Locations in Windows Explorer.

Share a Network Drive in VMWare

Sharing data via a drive is enabled by default in VMware. All you need to do is follow the usual OS-specific steps to set up a network share. For example, if you were running Windows as a host and Linux as a guest OS, follow these steps to share files between Windows and Linux.

This will work for Windows, Linux, and BSD.

Note that folder sharing is not available in the free VMware Player.

While this is the most complicated option to set up, you will be able to effortlessly share larger files. These might include installers, disk image files, and hi-res videos.

Share Data to Maximize Virtual Machine Productivity

Not everyone needs to use a virtual machine, but those of us who do almost always need to share data. If you’re not copying files from the host to the guest OS, there’s reason to copy data from the VM. This is typically when you’re about to destroy the VM and want to back up your data.

Learning how to share data between a VM and host OS will help super-charge your VM use. These tips to improve virtual machine performance will also help.

Read the full article: How to Transfer Files Between a Virtual Machine Guest and Host PC


Read Full Article

Amazon Alexa Can Now Express More Emotions


Alexa is getting more emotional, with Amazon enabling its virtual assistant to express more emotions. Going forward, Alexa will be able to use different speaking styles, and express both excitement and disappointment, depending on the context.

Virtual Assistants Don’t Have to Sound Robotic

We have got used to hearing virtual assistants speaking with robotic voices. After all, that seemed an obvious starting point for the likes of Siri, Cortana, and Alexa. However, there’s no reason why virtual assistants shouldn’t express more emotions.

So, with that in mind, Amazon is giving Alexa the ability to express emotions and to speak in more naturalistic styles. As outlined in a post on the Alexa Skills Kit Blog, this will “help create a more natural and intuitive voice experience for […] customers.”

Amazon Launches Alexa Emotions and Speaking Styles

Alexa’s new capabilities can be split in two: Alexa Emotions and Speaking Styles.

Alexa Emotions

Alexa can now sound either disappointed or excited, depending on the type of response. These two emotions can also be employed at three different levels of intensity: Low, Medium, and High. And this is made possible by Amazon’s text-to-speech technology.

Amazon cites examples of when an excited or disappointed tone would be appropriate. If a user answers a trivia question correctly, Alexa could adopt an excited tone. Alternatively, she’ll adopt a disappointed tone when reporting that your sports team has lost.

Speaking Styles

Alexa can also now adopt a couple of different speaking styles, labelled News and Music. News is designed to mimic the style of a news anchor, while Music is designed to mimic the style of a radio DJ. These also use Amazon’s text-to-speech technology.

Both styles change the intonation, emphasis, and pausing to tailor responses to the information being delivered. And in blind tests conducted by Amazon, both new speaking styles were perceived to be more natural than Alexa’s standard voice.

Give Alexa the Smarts to Handle Her Emotions

Amazon is making the new emotions and speaking styles available to developers in the US. There’s also “an Australia-specific news speaking style” available in Australia. The rest of the world is sure to follow, though it may take some time to filter through to users.

While you’re waiting for Alexa to get more emotional, why don’t you help Amazon make Alexa smarter? Amazon has added an element of gamification, which means you can earn points every time Alexa uses an answer you have provided for her.

Read the full article: Amazon Alexa Can Now Express More Emotions


Read Full Article

What Does a Forensic Analyst Do? Is This Job for You?


forensic-analyst

A computer forensics analyst sounds like a job out of a TV crime show, but is the real-life career as exciting as it sounds? What does a forensic analyst do in the real world, and is it the right career path for you?

Let’s explore the definition of “computer forensics,” and how to get a job analyzing it.

What Is Computer Forensics?

If regular forensics involves checking crime scenes for evidence, computer forensics takes this skill into the digital world. With cybercrime on the rise, businesses and individuals turn to computer forensics analysts to keep their data safe.

A computer forensics analyst specializes in cybercrime. They know how criminals can access systems and what they do with the contents within.

As such, they can play one of two roles; first, they can act as an advisor for clients concerned about their security. Second, they can investigate the damage done after a hacker successfully enters a system and find the culprit.

Because of their ability to do their job either before or after a hack occurs, computer forensics analysts find themselves in different workplaces. They may work with clients to prevent an attack, or with the law to analyze an attack that previously occurred.

Some employers will also use the term “computer forensics investigator” for this job. There’s no difference between an analyst and an investigator, so be sure to search for both terms when researching.

What Does a Computer Forensics Analyst Do?

The role of the analyst depends on what they’ve been hired to do. If the analyst were brought in to stop hackers, they’d check the system for any weak spots. They’ll check for flaws from external attacks (hackers) and internal agents (espionage and theft). They’ll inform the client about their investigation, and tell them how to fix the problems they found.

If the analyst is working with the law to investigate crimes, they’ll use their knowledge to piece together a story. As UCAS states, the analyst may recover deleted files, go through phone logs, and find evidence that someone has doctored an image that’s crucial for the case.

Once the analyst has found evidence, they then type up their findings in a report. They may even appear in a court of law to present testimony for the judge!

Whichever path the analyst takes, they require the same skillset. They need in-depth knowledge of how a criminal works, and the methods they use to get into a system.

What Are Computer Forensics Salaries Like?

According to PayScale, computer forensics jobs pay between $48k-$116k. This figure is before taxes or bonuses, but it gives a good idea of what to expect. While a starting analyst won’t strike riches from day 1, it’s a career that can grow to become a great way to make a living.

How Do You Become a Computer Forensics Analyst?

To become a computer forensics analyst, it’s worth having a degree under your belt. Criminal Justice Degree Schools say that keen future analysts should get a Bachelor’s degree in computer forensics. A degree will give you a foot in the door when applying to companies.

Study says you can also get a Computer Science degree with a criminal justice background. As such, if you can’t find a university near you that teaches cyber forensics, try Computer Science instead. Computer Science is a core subject in IT academia, so you’ll have better luck finding courses teaching it than cyber forensics.

You can also try climbing the job ladder to reach the analyst role. The National Careers Service for the UK recommends beginning as an IT support technician. From there, you can put in the years and go up the ladder until you finally land yourself in a forensics job.

Is a Computer Forensics Analyst Career Right for You?

If you’re interested in this career, you should have a deep passion for cybersecurity and digital forensics. You want to learn how criminals break into systems, and how to defend against them.

A good analyst will know how to recover after an attack. They’ll know that a deleted file can linger on a file system, and how drives never securely erase data unless cleaned by a third-party tool. They’ll know how to check system logs to find unauthorized entry and find how the hacker got in.

To be an efficient forensic computer analyst, you need to “be a thief to catch a thief.” You’ll need to learn hacking techniques so that you can advise companies on how to defend themselves properly. Your expertise could make or break catching a criminal, so you’ll have to be confident in your abilities!

Fortunately, there are legal ways you can test your hacking skills. If you want to learn more, try a website that you can hack legally and take on their challenges.

Where To Learn More About Cyber Forensics

If you made it to this point and you’re eager to become a computer forensics analyst, why not take the first step? These days, you can download resources and attend online courses to see if a career is right for you. These will teach you what computer forensics is, and what would be expected of you as an analyst.

For one, there’s the Guide to Computer Forensics and Investigations textbook. While it’s quite expensive, it’s the best way to learn more about the career and what’s needed. Unlike a full course, you can take it at your own pace with zero commitment.

If you want to commit a little more, you can try looking for local colleges and universities that offer a course. If you’re not sure you can invest the time, try Udemy online courses. You can do Udemy courses in your spare time, and each course awards you a certificate that proves you completed it.

The Computer Forensics Fundamentals course is an affordable and quick way of learning the basics. Once you graduate from that, you can step up your game with the Digital Forensic Series: Computer Forensics course, which contains over 13 hours of video content at the time of writing!

Finding the Right Tech Job for You

The world of tech jobs is vast, and with it comes a variety of different roles. Digital forensics jobs are one such niche and require in-depth knowledge of how hackers operate. If this sounds exciting, try a course or a textbook and see how it fits you.

If you’re looking for an IT job but don’t know your C# from your Java, why not try the tech jobs you can get that doesn’t require coding?

Read the full article: What Does a Forensic Analyst Do? Is This Job for You?


Read Full Article

How to Save Money Over the Christmas Holidays: 6 Apps and Sites


save-money-christmas

Christmas is an incredibly expensive time of year. You’ve got lots of friends and family you need to buy gifts for, decorations to put up, and meals to prep. If your budget is already tight, you might be feeling some financial strain.

Fortunately, there are ways to make the most out of the holidays, even if it’s with limited cash. Here are the best tech tools, websites, and apps to help you get through Christmas on a budget.

1. Get Sale Alerts From Your Local Grocery Store

Holiday Sales Alert Grocery Store Near Me

A really easy thing that you can do to save money over the holidays is to use an app or email notification service that gives you daily updates on holiday-themed sales at your local grocery store.

This not only helps you cut back on your own food costs but allows you to budget for holiday guests, too.

If you’re looking for sales from your grocery store, you can still grab one of the printed flyers in-store, which will give you a roundup on what will be available next week.

However, downloading a grocery store app will often give you access to additional benefits. The apps that you need to use will vary, depending on which region you live in and what stores you go to.

For example: My app would be “Safeway Deals & Rewards,” available for Android and iOS.

To find your own app, either go to your app store directly or type your grocery store name into Google. Next, add your phone type (iOS or Android), plus the word “app.” Google should pull up the app associated with your grocery store of choice.

2. Shop on Black Friday, Cyber Monday, or Another Winter Sale

Buy Steam Gift Card for Friend Christmas

It should go without saying, but shopping on Black Friday or Cyber Monday has become somewhat of a tradition in North America. If you want to find a good gift deal for your friends or family, it’s a great time to go shopping.

If you miss Black Friday or Cyber Monday, no worries. There are often rolling sales for retail goods all throughout the month of December.

Amazon is an obvious choice for sales. We have a handy list of Amazon features and services, too—so you know which service to use for sales and when. But Amazon is not the only online retailer that will have multiple sales leading up to the holidays.

Another option for on-sale Christmas gift ideas is Steam. Through this service, you can either give a “Steam Gift” to another player, buy a discounted game during a sale, or send a gift card to someone. It’s the perfect choice for your gaming friend or family member.

3. Use Finance or Budget-Tracking Apps

Personal Budget Tracker Christmas

Finance or budget-tracking apps are a good thing to use year round, but they’re especially useful when you need to track down what you’re spending and where during expense-heavy months like December.

The idea behind a budget app is that if you know where your money is going, the better equipped you’ll be to stretch your budget further.

Mint: Budget Tracker & Planner and Goodbudget Budget Planner are great choices for budget-tracking apps. Both of them are available on iOS and Android.

On these apps, you can calculate how much you have to spend each month in total, along with how much money you can allot to specific tasks or categories, like gift-giving. They can also help you keep track of hidden or often-overlooked daily expenses that might be cutting into your holiday plans.

Download: Mint Budget Tracker & Planner for Android | iOS (Free)
Download: Goodbudget Budget Planner for Android | iOS (Free, in-app purchases available)

4. Use DIY Blogs to Make Christmas Gifts

DIY Christmas Gifts

So let’s say you’ve been tracking your budget, and you’ve learned that even if you manage your finances, a lot of these pre-bought gifts are still out of your price range.

Or let’s say the person you’re buying a gift for really loves unique items, to begin with. Maybe they want you to add a personal touch.

Another way that you can save money over the holidays is by making your own gifts from scratch. This “DIY” approach requires that you have time to make these gifts, of course, along with the skills. Fortunately, there are tons of DIY blogs out there that will give you Christmas gift ideas that work well on a budget.

A great place to start? The DIY Network’s Holidays and Occasions section, which talks about different homemade creations that you can make.

Another way that you can find great gift ideas is by searching “DIY gifts” on Pinterest. If you’ve never visited the site before, here’s a good rundown on what Pinterest is and how to use it.

5. Use Secret Santa Games to Keep Everyone Happy

Secret Santa Name Generator

Sometimes, even with all this budgeting and DIY gifts, you’ll find you’re still too stretched for time or cash. Maybe there are just too many people to make gifts for, and because your friend circle is so large, other people are struggling, too.

When it comes to situations like these—and everyone’s struggling—sometimes it’s best to institute a Secret Santa game, to keep gift-giving manageable.

Secret Santa is a game where everyone gives one another a gift, but the gift-giver remains anonymous. It’s a gift-giving technique that is popular in workplace settings when you want to keep your budget low.

If you need some help trying this idea out, there are a lot of Secret Santa name generators out there. Elfster is one of the top-rated. It also has an accompanying app.

Download: Elfster on Android | iOS (Free)

6. Find a Good Deal on a Christmas Tree

Christmas Tree Sale Amazon

Lastly, one of the biggest worries for Christmas is the Christmas trees itself.

What are you going to do about the Christmas tree, if you don’t have one yet and you’re on a budget? Even worse, how do you decorate a Christmas tree on a budget?

While real Christmas trees are beautiful, they might not be feasible for you and your family because of allergies. To combat this, artificial Christmas trees can be a good alternative, but they can also get expensive.

The same goes for Christmas tree decorations, which take time to collect if you don’t want to spend a ton of money all at once.

Amazon has lots of Christmas tree options. If you’re looking for a tree or Christmas decorations on a budget—and you don’t want to shop at Amazon—Wayfair is another easy, affordable option, too.

Lastly, while most Christmas decorations will not go on sale until after Christmas, you can find moderately priced ones if you hunt for them. Amazon and Wayfair are once again good sites to find Christmas decorations on a budget.

You might also be able to find brick-and-mortar stores in your area that sell discounted items, too.

Have a Merry, Stress-Free Christmas

These tech tools, websites, and apps will not necessarily guarantee that you’ll have no extra expenses over the holidays. It might not be feasible for you to implement all these budget-saving tips at once, too.

However, even if you use just a couple of these suggestions, you might be able to cut down on your costs. Looking for other ways that you can make the winter holidays magical? Here are the best sites for genuinely unique Christmas gifts.

Read the full article: How to Save Money Over the Christmas Holidays: 6 Apps and Sites


Read Full Article