Do you use a passcode on your iPhone? Apple marketing boss Phil Schiller thinks you should, and even has a new feature on the iPhone 5S that will let you make iTunes purchases with the touch of a finger.
As two-factor authentication becomes more widespread, users start relying more on apps like Google Authenticator, which thankfully received a much-needed facelift — and, less thankfully, one show-stopping bug.
Apple already has a lot of security features baked into the Mac. From its strong, well-tested Unix foundation to the built-in privacy features of OS X, it’s one of the most secure operating systems available to consumers. A lot of users, however, make mistakes in their daily usage that can severely compromise the security of their Mac. We’ll show you these pitfalls and help you lock down your Mac to make your privacy, digital information, and even your hardware less likely to be compromise, covering everything from user accounts to the physical security layer of your computing workflow.
It's bad enough when Facebook's official policies cause concerns about privacy; it's worse when undiscovered bugs in the gigantic social network start revealing your data to other users. And that's apparently what's been happening, as this afternoon Facebook confirmed that a bug that disclosed private contact information had affected around six million users over the last year. It has since been removed.
Every Monday, we'll show you how to do something new and simple with Apple's built-in command line application. You don't need any fancy software, or a knowledge of coding to do any of these. All you need is a keyboard to type 'em out!
Ever wanted to share a group of sensitive files, but didn’t want to trust them to just any sharing service, or email provider? While you could certainly hand deliver the files on physical media to the recipient, sometimes you just have to trust your files to the Internet. For these times, it’s good to encrypt your files, and that’s exactly what we’ll show you how to do in this Terminal 101. We’ll be creating encrypted ZIP files that can be emailed or uploaded securely to an online sharing service.
Email (like other forms of communication) makes it rather difficult to verify authenticity. Just because you receive an email from someone doesn’t mean it actually came from that person. Perhaps the email was forged, perhaps the mail server was hacked to send email, or perhaps the sender’s device was stolen. There’s one sure-fire way for recipients to verify the authenticity of your messages, however, and that way is through digital certificates and digital signing. We’ll walk you through the process of creating a certificate and using it to sign your emails in this how-to.
So Google dropped two items, two pricey items, out into the public sphere recently. Only one of which is for sale for anyone, while the other is still in test mode. Meanwhile we've got some serious review love this week. So if you want our take on the email app du jour and more, you've come to the right place.
Logitech is a brand well known to many Mac and iOS users for their frequently awesome accessories, but all isn't quite wine and roses following the company's quarterly results, with big changes coming in 2013.