Leaks from the iPhone supply line over in China have become so common in recent years that covering them is now routine, but at last Apple supplier Foxconn is taking steps to crack down on some of them. One of the alleged culprits behind the leaks of the shell of the iPhone 6 is now in custody for selling the shells on the black market.
Being robbed is incredibly stressful, especially if you lose your Mac, but with Orbicule’s Undercover installed you stand a decent chance of getting it back. Simply log in to your account at undercoverhq.com and report your computer as stolen, and this lightweight, invisible app will then begin gathering evidence as soon as it’s used or goes online.
Every Monday we show you how to do something quick and cool using built-in OS X utilities such as Terminal, Apple’s command line application. These easy hacks can make life better and simpler, and don’t require any knowledge of coding — all you need is a keyboard to type 'em out!
Securely storing certain information in the universal PDF format can be a good thing — after all, your bank, insurance, or other personal information could be contained within PDF documents. That information, if it got into the wrong hands, could compromise your personal security. Lock down your PDF documents using this simple trick in the Preview application.
We've got a little bit of iPhone 6 news coming your way, but if you've heard what they're saying in Thailand, you already know some of it. But what about those sapphire crystal displays? Who's going to get those? You? Your rich relatives? Well, let's see what the rumor mill is going on.
Closer ever closer we creep to a potential release date for the newest iPhone. Will it look like these mockups? Probably, as despite Tim Cook's promises, leaks are endemic up and down the supply chain. And have we seen what the newest iPad Air will look like too? Yeah, probably that too. Nevertheless, there are still some Cupertino surprises we haven't anticipated, but let's take a look at some that might not be surprising anymore, as well as some other news percolating out there in the wide, wide world.
When you first set up your Mac, the only security measure that’s enforced is that you add a password to your user account. The Setup Assistant makes no mention of extra measures you might want to enable, even though several are built into OS X. The features we’re about to look at are defenses against local attacks, rather than protection against online attacks. The measures are particularly important if you work in an open environment, such as a library, an office, or a café, and if your Mac is stolen, because they help to keep your data under lock and key.
If the current events in Russia weren't tense enough, the homeland of Vladimir Putin has now asked Apple to hand over its source codes for iOS devices and Macs so it can sift through them and see if they're being used for spying. This surfaced earlier this week when Peter Engrob Nielsen, Apple's chief representative in Russia, met with Russian Communications Minister Nikolai Nikiforov.
Feeling a little insecure about how small and lightweight that swanky new late 2013 Mac Pro is? No need to worry about someone walking off with that small black tube, Apple is here to save the day with a security lock.
Privacy is one of the most important words in tech today. It seems like we hear about new threats to our identities almost daily, whether someone’s hacking into our credit card company’s files or the government is peeking into our emails and messages. But it’s not just our personal information that’s vulnerable. The files on our Macs that we never see — cookies, caches, download histories, recent items, even icons — can be used to track our digital fingerprints and compromise our privacy without us ever realizing it. If you don’t want all of this data to come back and haunt you, you should get rid of it.
Well, despite WWDC being just around the corner, the Apple rumor mill hasn't turned up anything spectacularly groundbreaking this week. Hmm, we wonder if Tim Cook's promise to knuckle down on security is paying off. Meanwhile, could the war also be coming to an end with Google? And what's this giant security risk with your iPhone and why didn't Apple reply to the hackers who brought it to their attention? Let's find out what's going on out there.