How to Turn On Advanced Data Protection for iCloud
If you want end-to-end encryption for (almost) all of your iCloud data, it is easy to turn on Advanced...
A highly sophisticated phishing e-mail campaign is exploiting Google’s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here’s what to watch out for so you don’t fall victim to this scam.
Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in...
You can connect a surprising variety of things to iPhones and iPads via their USB-C (or Lightning) ports, including storage devices, SD card readers,...
23andMe, the popular DNA ancestry and traits service, has filed for Chapter 11 bankruptcy. Should you tell the company to delete your data and...
Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.
If you want end-to-end encryption for (almost) all of your iCloud data, it is easy to turn on Advanced...
Focus allows you to pare down notifications according to which activity you're doing or where you are.
Twitter is turning off SMS-based two-factor authentication next month. Here's how to use a more secure form of 2FA.
Apple has issued an update for a zero-day, in the wild, WebKit vulnerability. The Kia Challenge has shown that...
Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild)...
Over the past two months, we’ve seen the emergence of a concerning new trend: the use of artificial intelligence...
Here are all the steps to securely reset any Mac, iPhone, iPad, or iPod touch to factory settings, so...
AI has reached an inflection point; we discuss ChatGPT and other AI tools and their potential security and privacy...
The new HomePod sounds better than the original, but still lacks in some areas. Its smart home features get...
This week's threats involve credential stuffing and pig butchering, and we examine whether you should use security keys to...