How to Remove ‘Continue Watching’ On Netflix?

We all know about the Netflix, it offers a Save feature in which you can save your show or movie from where you left, so that if you ever stop and come again, then you can easily start the show where you left off. Though it’s an amazing feature, sometimes it proves very irritated for the users. So here we will tell you how to remove the continue watching from Netflix.

How to Remove 'Continue Watching' On Netflix

It might be possible that you are using any of your friend or member Netflix account, or sometimes you watched something that you don’t want significant to see the other person. Whenever you try any new show and you don’t like it, and you want from the Netflix to keep suggesting it. There is also one probability that you finished the movie or any other show in the Netflix, but you stopped at the end credits.

So, here whatever the matter or issue, we will try our best to provide you easy and simple steps so that you can easily find the reason and also get the steps of how to remove the continue watching on Netflix. Below we are discussing the steps:

Steps to Remove Continue Watching on Netflix

These given steps are easy to understand and follow, but we suggest you follow the steps in a given sequence so that you can be easily able to solve the problems. And it will also save your time and take fewer efforts.

Delete Items from Viewing Activity

  1. To start the process, follow the below-given procedure:
  2. Click to “Log in” into Netflix account.
  3. Select “Profile,” since you want to remove the continue watching items.
  4. Move towards Viewing Activity tab.

Delete Items on Mobile Devices:

  1. Click on More (three horizontal lines) menu. It is located at the bottom right corner of the screen.
  2. Choose “Account” to edit.
  3. Click on Account button. It will open a mobile browser window and direct towards Netflix mobile site.
  4. Alternatively, scroll down and click on “Viewing Activity.” It is located at the bottom of the screen.

Delete Items on Desktop Browser:

  1. Click on “Down Arrow,” next to your Profile picture.
  2. Choose “Account.”
  3. Select “Viewing Activity.”

When you are in viewing activity option then either you are on mobile device or desktop, the process is always the same.

Here the steps we discuss will apply to both mobiles as well as desktop.

  1. Search for the movie or show, to delete from your watch list.
  2. Choose “Circle with the line through it” option.
  3. To remove the entire series, choose “Hide series?” option.

However, when you return to the menu option, then the deleted items will no longer be available in your “Continue Watching” list. Still, the Netflix’s algorithms will use this info in its suggestion algorithms, so you still might receive suggestions which are based on watching a partial show or movie.

David Martin is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at

Cisco to Buy Cybersecurity Firm Duo Security for $2.35 Billion

Cisco System Incorporation revealed on Thursday that it would buy Duo Security to expand its cloud computing. The company is trying to transform itself from its long-established business of making switch and routers to cybersecurity and cloud computing. Several companies are looking forward to deals like this to expand their cybersecurity offerings.

Cisco to Buy Cybersecurity Firm Duo Security

Last year, Cisco had a deal with a company called AppDynamics. Cisco Incorporation bought AppDynammics for $3.7 billion and now again it is the biggest deal for Cisco since then. According to the head of Cisco’s corporate development, the company has made a move towards software. He further said that it would be moving to boosting the recurring revenue through a new subscription-based solution. In an interview, Security Executive of Cisco noted that the team has been working to build exemplary security architecture and with Duo, Cisco will be able to extend the architecture to users.

Cisco is making software which can add the steady recurring revenue to its core networking business. The platform provided by Duo will allow the users with two-step identity verification and the architecture that Cisco is building will be like a ‘key’ since the customers, who use Macs, personal computers and mobile devices, will be able to connect to it in more securely in the cloud. Dug Song and Jon Oberheide, the Co-founders of Duo told in an interview that they would be developing a firewall for cloud and mobile and the combination with Cisco will expand the business.

Regarding the concerns of the deal to provide a more secure platform to the customers, Cisco said, the integration of its network with Duo Security’s Trusted-Access products will let it offer its customers, access to connect securely to any application on any networked device. Before granting permission to access the application, Duo’s Trusted Access, will verify the health of the device and the identity of the users. The acquisition is expected to close in the first quarter of Cisco’s fiscal in 2019.

Source –


11,000 Private Twitter Messages sent by Supporters to Wikileaks Published

While Wikileaks has been vying for transparency, its own opacity has often been questioned. The organization is notoriously known for leaking out guarded secrets and posting it on their websites. However, how it obtains this information and how it conducts its business is still a mystery even to staunch supporters of Wikileaks. To fuel allegations of secrecy against the group and to offer a sneak peek into the working of Wikileaks, an activist has released over 11,000 direct messages sent to Wikileaks over Twitter.

OR: WikiLeaks Releases DNC Emails

It is speculated that Julian Assange, the head of Wikileaks, is responsible for sending the messages through the official Wikileaks’ Twitter handle. These messages were published after Emma Best, the activist, fell out with the organization due to her criticism of Wikileaks. Emma is a freedom of information activist and has been very vocal about her distaste for the manner in which the organization operated behind the closed doors.

Emma posted the conversations on Sunday over her personal blogs. She believes that once the supporters go through these conversations, they can make up their minds as to what Wikileaks truly is. In an excerpt, Wikileaks was shown to be supporting the Democrats during the 2016 elections and used some choice words for the Democratic candidate, Hillary Clinton.

The messages bore a general resentment towards the Clintons than any political party. However, the chats date back to as late as 2015 where Wikileaks projected hostility towards President Barack Obama as well. There has been a fleeting mention of the tampering of the 2016 elections, but it is not conclusive to know whether Wikileaks had any role to play in it.

The string of messages is nicknamed “Wikileaks +10” since the 11,000 messages revolve around the discussion the official Wikileaks Twitter account had with 10 of its supporter. Through this revelation, it has been found out that Wikileaks would host and coordinate smear campaigns against eminent personalities, including journalists opposing the organization. These exchanges also reeked of transphobia, homophobia, misogyny, racism, and anti-semitism.

Emma has ensured to redact the names of the receivers since she did not wish to cause any harm to the third party, rather her aim was to reveal the hidden propaganda of Wikileaks. The documents released by Emma have undergone scrutiny for verifiability, and it has been proven that they were not tampered with and were, indeed, original conversations. Wikileaks has stayed mum on the topic and has not released any statement in this regard.

Mexwell is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at