More Featured Articles

Here's why you should turn on two-factor authentication

Here's why you should turn on two-factor authentication

These days, simple passwords aren't good enough to secure your data. Hackers are too good, and security systems flawed. Longer complicated passwords created by generators like 1Password and Safari's iCloud Keychain can help, but the best way to lock down your accounts is to add extra...
How to enable two-step verification for your Apple ID

How to set up two-factor authentication for iCloud

Most people use their Apple ID account not only for iCloud data, but to purchase content from iTunes and the App Store. That means that anyone who gets ahold of your account or manages to change your password could have access to your personal information and credit card information. If you want...
Apple to patch 'FREAK Attack' vulnerability in iOS, OS X next week

Apple to patch 'FREAK Attack' vulnerability in iOS, OS X next week

"FREAK Attack" is an SSL/TLS vulnerability disclosed by researchers on March 3, 2015 that can be exploited to force browsers into a weaker encryption state. Attackers can theoretically use FREAK Attack to intercept what should be a secure HTTPS connection — the one with the lock icon in the...
Security RSS Feed
Regarding web ads redirecting to the App Store

Regarding web ads redirecting to the App Store

You land on a web page in mobile Safari and all of a sudden you're torn away and dumped into some game on the Apple Store. We've gotten complaints about this — and experienced it ourselves — for what feels like a couple years. Something causes a web page, when opened, to immediately redirect you...
Headlines still trying, failing to link fraud to Apple Pay

Headlines still trying, failing to link fraud to Apple Pay

There is absolutely no reason for anyone using Apple Pay to be concerned at all about using Apple Pay. It's important to keep saying that because publications keep making it a point to link Apple Pay and "fraud" in their headlines. It's important because those publications are spreading fear,...
Here's why you should turn on two-factor authentication

Here's why you should turn on two-factor authentication

These days, simple passwords aren't good enough to secure your data. Hackers are too good, and security systems flawed. Longer complicated passwords created by generators like 1Password and Safari's iCloud Keychain can help, but the best way to lock down your accounts is to add extra...
USB-C and BadUSB attacks: What you need to know

USB-C and BadUSB attacks: What you need to know

Apple announced the new MacBook with USB-C connector last Monday and already headlines are appearing linking it to known security issues, like BadUSB. BadUSB is an attack that uses the way computers interface with the universal serial bus (USB) standard to try and load malware onto the machine....
How to set up two-step authentication for Google and Gmail on your iPhone, iPad, and Mac

How to set up two-step authentication for Google and Gmail on your iPhone, iPad, and Mac

Don't lose your Google info or Gmail archives to a password hack. Set up two-step authentication to protect your most important assets. When it comes to data you want secured, your email accounts are probably close to the top of the list. Though email is technically an unencrypted medium, the...
How secure is the Apple Watch?

How secure is the Apple Watch?

That was a question posed by MarketWatch today. It's also an important question. Unfortunately, MarketWatch didn't treat the question that way. And that's a profound disservice to its readers. The Apple Watch is, by Apple's own admission the most personal, most intimate device the company has...
How to manage two-factor authentication on your iPhone, iPad, and Mac with Authy

How to manage two-factor authentication on your iPhone, iPad, and Mac with Authy

Passwords are weak and often cracked. Two-factor authentication, which uses your phone number to send a secondary code you have to enter, is much stronger. I know first-hand how scary password hacks can be, but I still put off two-factor authentication for years — relying instead on a strong...
How to set up two-factor authentication for Twitter

How to set up two-factor authentication for Twitter

Twitter can be a powerful mouthpiece for yourself, your brand, or your business — and an even more powerful weapon if your login credentials fall into the wrong hands. You can protect your account by enabling Twitter's two-factor authentication options; here's how. To prevent your Twitter...
Banks, retailers 'stung', Apple Pay still secure

Banks, retailers 'stung', Apple Pay still secure

Earlier this week we debunked sensational headlines mislabeling bank fraud as Apple Pay fraud. Now those same headlines are being repeated, but with a new twist. This time Apple Pay has apparently been "stung" by people using false credit card numbers obtained from last year's Target and Home...
Apple to patch 'FREAK Attack' vulnerability in iOS, OS X next week

Apple to patch 'FREAK Attack' vulnerability in iOS, OS X next week

"FREAK Attack" is an SSL/TLS vulnerability disclosed by researchers on March 3, 2015 that can be exploited to force browsers into a weaker encryption state. Attackers can theoretically use FREAK Attack to intercept what should be a secure HTTPS connection — the one with the lock icon in the...

Pages