More Featured Articles

How to erase all of your personal data off an iPad or iPhone

How to wipe all personal data and erase your iPhone and iPad

Whether you want to re-install your iPhone, iPod touch, or iPad as new or you want to sell or give it away to someone else entirely, you first need to make sure you've wiped it clean and erased all of your personal data, including your photos, messages, and files. It only takes a few steps, and...
Thunderstrike 2: What you need to know

Thunderstrike 2: What you need to know

There's not much new to Thunderstrike 2, but you should still stay informed about it. Thunderstrike 2 is the latest in a line of OS X 10.10 Yosemite security vulnerabilities that, due to sensationalized reporting, are often a greater risk to customer stress levels than they are actual physical...
Headlines still trying, failing to link fraud to Apple Pay

Headlines still trying, failing to link fraud to Apple Pay

There is absolutely no reason for anyone using Apple Pay to be concerned at all about using Apple Pay. It's important to keep saying that because publications keep making it a point to link Apple Pay and "fraud" in their headlines. It's important because those publications are spreading fear,...
Security RSS Feed
Google, sadly, tells ad developers how to disable Apple's transport security

Google, sadly, tells ad developers how to disable Apple's transport security

Instead of helping developers turn off app transport security, Google should help them apply as much of it as possible. App Transport Security is Apple's forward-looking way to make sure any communications between an app and a web server are done using TLS 1.2 and SHA256 or better security. That...
Nothing to fear but fear-mongering itself

Nothing to fear but fear-mongering itself

Some text was put up on the internet this weekend that contends Apple has such centralized control over iOS that, if it were ever to turn evil and become the instruments of surveillance states, there'd be nothing to protect us because Apple actively patches jailbreak exploits and doesn't allow...
tpwn OS X exploit: What you need to know

tpwn OS X exploit: What you need to know

tpwn is a vulnerability that affects OS X 10.9.5 Mavericks through OS X 10.10.5 Yosemite, but does not affect the currently-in-beta OS X 10.11 El Capitan. With tpwn, malicious code on your Mac could escalate its privileges—gain "root" access—and potentially exploit the system. The vulnerability...
Lenovo once again reminds everyone why it's better to get a Mac

Lenovo once again reminds everyone why it's better to get a Mac

Lenovo once again accused of attacking their own customers. Maybe it's time to switch to Mac? Back in February Windows PC manufacturer Lenovo was caught injecting Superfish adware onto some of their laptops, not only exploiting their own customers but leaving those customers open to man-in-the-...
Masque attack: Media scaring people via misreported security flaw

Masque attack: Media scaring people via misreported security flaw

Media 'scareware' is a greater threat to most people than Masque Attack malware. Masque Attacks—the abuse of Apple's iOS developer certificates to try and trick people into installing malware apps on their iPhones or iPads—is once again making headlines because the recently hacked Hacking Team...
DYLD_PRINT_TO_FILE and malware: What you need to know

DYLD_PRINT_TO_FILE and malware: What you need to know

DYLD_PRINT_TO_FILE is an OS X 10.10 Yosemite vulnerability that could allow malicious code on your Mac to escalate its privileges—gain "root" access—and potentially exploit the system. Now an anti-malware company named Malwarebytes has reported finding just such an exploit "in the wild", meaning...
Thunderstrike 2: What you need to know

Thunderstrike 2: What you need to know

There's not much new to Thunderstrike 2, but you should still stay informed about it. Thunderstrike 2 is the latest in a line of OS X 10.10 Yosemite security vulnerabilities that, due to sensationalized reporting, are often a greater risk to customer stress levels than they are actual physical...
Apple Pay to the rescue!

Apple Pay to the rescue!

Last week, I received an all-too-familiar call: One of our credit cards had been used to make a fraudulent transaction. Card fraud is a huge problem that generates billions of dollars of losses every year. It affects businesses, banks and consumers alike. It's never convenient to get this call...
How to erase all of your personal data off an iPad or iPhone

How to wipe all personal data and erase your iPhone and iPad

Whether you want to re-install your iPhone, iPod touch, or iPad as new or you want to sell or give it away to someone else entirely, you first need to make sure you've wiped it clean and erased all of your personal data, including your photos, messages, and files. It only takes a few steps, and...
Security writer says 'Goodbye Android', switches to iPhone

Security writer says 'Goodbye Android', switches to iPhone

I've written about the security and privacy advantages of iPhone and the benefits of timely and wide-ranging iOS software updates before but many of my Android friends dismiss it because I write about it here on an Apple-centric website. Fair enough. Lorenzo Franceschi-Bicchierai is a longtime...

Pages