• March 28, 2023

    A Practical Guide to Identifying Phishing Emails

    Phishing is becoming an ever more common way for people to get in trouble when using the Internet. A phishing attack is some communication, usually an email, that tries to lure you into revealing login credentials, financial information, or other confidential details. A Read more
  • January 24, 2023

    LastPass Security Breach: Here’s What to Do

    Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the... Read more
  • January 17, 2023

    If Your Holiday Gift Was a Tech Device, It’s Time to Change the Password!

    Whatever consumer electronics product you can name, there’s probably a “smart” version that you configure via an app or Internet-connected interface once you’ve connected it to your Wi-Fi network. For ease of setup and to keep costs down, many such devices come pre-configured with not just a default username and password, but the same default username and password as all other units. Tha... Read more
  • January 10, 2023

    Protect Your Hidden and Recently Deleted Albums in Photos

    Photos has long provided a hidden album you could use to hold images you wanted to keep a little more private. Until this year, however, it was security through obscurity: anyone who knew to reveal the album in Settings > Photos on an iPhone or iPad or by choosing View > Show Hidden Album on the Mac coul... Read more
  • March 22, 2022

    Apple Works to Improve Safety in the Wake of AirTag Stalking Reports

    Over the past few months, there has been a spate of media reports about how people may have been tracked without their knowledge using AirTags, Apple’s elegant location trackers. Like many mainstream media forays into the tech world, the reports are often short on detail and sometimes unclear on the reality of how the AirTags work. Nor is it clear that there have been many successful cases of A... Read more
  • June 29, 2021

    AirTag Basics and How to Protect Yourself from Stalking

    Apple’s new AirTag tracking device is an amazing bit of technology—it’s an elegant disc about the size of a stack of four US quarters that communicates its location with other Apple devices using Bluetooth and Ultra Wideband. Pair an AirTag with your iPhone and put it in your laptop bag, and from then on, you can use the... Read more
  • June 8, 2021

    What Is This “App Tracking Transparency” Apple Added to iOS 14.5?

    You’ve likely seen mention of the dispute between Apple and Facebook. It revolves around App Tracking Transparency (ATT), a technology Apple released in iOS 14.5. The goal of ATT is to give iPhone and iPad users more control over the extent to which app makers can track their data and activities across apps and websites owned by other companies. Before App Tracking Transparency, nothing prev... Read more