The New York Times has revealed that iPhone apps are constantly reporting our every movement to a shadowy collection of location-data companies. If that creeps you out (as it should!) read on to learn how to protect your location privacy.
Austin Mac Works Blog: Security
Two-factor authentication provides a useful additional layer of security, but it can be a pain to use. With iOS 12 and Safari in Mojave, Apple has made it dead simple to autofill SMS-based login codes. Learn how.
Don’t send passwords via plain text in an email or text. Always use a site that lets you turn a password into a Web link that can be opened only once. Learn more now.
On today’s Internet, you must use a password manager like iCloud Keychain, @1Password, or @LastPass to generate, store, and enter strong passwords. Any other approach risks your accounts being hacked. Here’s why a password manager is so important.
They’re all complete scams, and clicking a link in them takes you to a malicious Web page that will try to steal your password or credit card details.
Would you or your employees click a login link in email or open an attachment from an unknown sender? Phishing—forged email designed to extract private information—is one of the greatest threats to business today.
If you’re passing an old Mac on to a colleague, friend, or family member—or returning it to Apple for recycling—follow these steps to prepare it for its next stage in life and ensure that no one will be able to access your data.
Have you received email from a hacker who claims to have taken over your Mac and is backing up the claim by showing one of your passwords? We explain how it happened and what to do about it.
Many of the big Internet companies make their money by assembling a dossier of information about you and then selling advertisers targeted access to you. Luckily, that’s not true of Apple—here are a few of the ways Apple protects your privacy.
Take some time to check for and update compromised, vulnerable, and weak passwords. Start with more important sites, and, as time permits, move on to accounts that don’t contain confidential information.