Use Guided Access for Securely Allowing Others to Use an App on Your iPhone or iPad

If you’d like to allow a child, friend, or colleague to enjoy a specific app on your iPhone or iPad while keeping them focused and preventing access to everything else on the device, check out Apple’s Guided Access feature.

How to Minimize Downtime and Lost Work from Tech Failures

Macs may be more reliable than ever, but they still suffer from hardware and software failures. Follow our advice to minimize the impact of inevitable failures.

Restrict Access to Sensitive Apps in iOS 18 and iPadOS 18

Keep prying eyes — or mischievous children — out of sensitive or important apps by requiring Face ID or Touch ID access before the app opens. You can also hide such apps so they appear only after you authenticate.

Setting Up and Managing iCloud+ Storage

Although it may not be exciting, having more iCloud+ storage significantly improves the experience for those with multiple Apple devices. We explain what iCloud+ provides, how much you should get, and how to get started.

“Apple Account” is the new “Apple ID”

Apple has renamed Apple ID to Apple Account everywhere as of macOS 15 Sequoia, iOS 18, iPadOS 18, and watchOS 11. Nothing has changed functionally, but keep it in mind when reading tech articles or support documentation.

In iOS 18 and iPadOS 18, Control Center Is Now Highly Customizable

The new Control Center in iOS 18 and iPad OS 18 is vastly more customizable and has more options. Here’s what’s on offer and how to use it.

Reveal Mac Window Proxy Icons Permanently with This Setting

People who like using the Mac’s window proxy icons (and if you don’t know about them, you should!) can make them visible at all times with an option deep within System Settings. Here’s how to find it and what you can do with proxy icons.

Passwords Becomes a Real App in macOS 15 Sequoia, iOS 18, and iPadOS 18

Apple’s new Passwords app in macOS 15, iOS 18, iPadOS 18, and visionOS 2 makes the company’s longstanding password storage and syncing features more straightforward and easy to use. It’s password management for the rest of us!

Beware Fake “Sextortion” Scams

Scams are starting to incorporate personal information stolen in data breaches, so you may get “sextortion” threats that purport to know your phone number, address, and more. […]

“No More Ransom” Website Offers Ransomware Decryption Tools

Ransomware primarily affects Windows and Linux computers, but if you, or anyone you know, falls prey to it, visit the No More Ransom website for advice and decryption tools.