Anyone using FTP or SFTP to connect to their Web site or other servers should consider a tweaky but significant security upgrade that swaps passwords for encryption keys.
Apple says that the dangers of allowing customers to load arbitrary apps are too severe and that the iOS App Store is a bulwark against ransomware, device hijacking, the invasion of children’s privacy, and other problems common on Android.
New services and features in operating systems coming later this year will improve security and privacy for everyone using Apple products, even outside the Apple walled-garden ecosystem. iCloud+ even adds anonymized browsing.
Apple’s new AirTag trackers have provoked considerable interest about their potential for misuse. That’s why your iPhone or iPad can alert you if you’re being tracked by one, with or without your knowledge. We detail exactly when and why.
A little-noticed fact about M1-based Macs has started to get some attention. If the Mac’s internal drive is dead or fully erased, you can’t boot from an otherwise valid external drive. Why would Apple make that choice? Security, security, security.
Apple’s new tracking devices have a lot of potential uses: some good and some not so good. We look at a number of likely scenarios and how they could play out.
T-Mobile has furthered its reputation as the most competitive of the big three cellular companies in the United States by rolling out an unlimited usage broadband service that relies on the company’s 4G and 5G networks.
Rosetta 2 for Apple silicon Macs is the latest in a line of emulators and virtual machines that Apple has released to provide continuity across hardware and operating system transitions. What’s next to come? A full Intel chip emulator for Apple’s M-series ARM chips? We’ll see.
Prices for SSDs and Thunderbolt 3 enclosures have plummeted, so Glenn Fleishman finally bit the bullet to upgrade the storage for his lagging 2017 iMac. Doing so probably extended the useful lifespan of his iMac by years.
Two interlocking technologies that phone carriers began rolling out a couple of years ago are helping dramatically reduce unwanted calls from spammers and fraudsters, while giving law enforcement better tools to track those that remain.
Master the techniques necessary to present slide decks, images, and demonstrations in Zoom by sidestepping limitations in presentation software and learning how to configure some of Zoom’s more fiddly settings.
Apple has quietly revised some core elements of its message-handling system in iOS, iPadOS, and macOS to make it far less likely that a maliciously formatted text or attachment would succeed in bypassing other protections.
Facebook is unhappy with the enhanced privacy requirements that Apple recently unveiled. Apple will soon require that apps ask for and get explicit consent from their users in order to track them across apps and sites—and that’s a good thing. Apple has already added detailed privacy disclosure requirements. Let’s dig into how Apple’s new rules will enhance your privacy.
The latest set of cellular networking standards—collected under the rubric of “5G”—improves mobile networking performance ever closer to Wi-Fi and wired connections, but it’s not worth all the hype. Not yet, anyway.
You can use a home security camera without sending its video stream off to cloud storage that’s accessible by the camera’s maker—or anyone who can log into the account. Apple’s HomeKit Secure Video works with existing iCloud subscriptions and numerous third-party cameras. Glenn Fleishman, author of “Take Control of Home Security Cameras,” looks at HomeKit Secure Video’s strengths and weaknesses.