We all accumulate “trusted devices” in our Apple, Google, and password man-ager accounts, but it’s important to remove devices you no longer use because they could be security risks.
Category: Articles
Apple’s iCloud Keychain password manager keeps improving, and we now recommend it, especially for those not already using a third-party password manager. Here’s how to use iCloud Keychain to store and enter secure passwords.
If your organization has its own domain for email addresses — [email protected] — set up email authentication to help ensure your email is delivered and your domain can’t be spoofed for phishing.
Major upgrades aside, we recommend installing updates as soon as they’re available. The danger from unpatched security holes is just too great nowadays.
Although it may feel like you’re having a private conversation with an AI chatbot, don’t share anything you wouldn’t tell a stranger.
We recommend everyone who uses Face ID and Touch ID turn on Stolen Device Protection.
Many people use screenshots to clip portions of their Mac screen for later reference. For example, you could save a screenshot of an error dialog to show tech support, store a confirmation number from a Web page, or keep a chat from social media. You can even record screen movies to show a developer how […]
How do you use an iPhone with no Home button? Turns out it’s pretty easy to get the hang of it.
At Apple’s Halloween-themed Scary Fast event on October 30, the company unveiled its next-generation Apple silicon chips for Macs, the M3, M3 Pro, and M3 Max. Apple also showcased new 14-inch and 16-inch MacBook Pro models and a faster version of the 24-inch iMac based on these chips.
September is here, and with it, Apple’s latest iPhones and Apple Watches. At its Wonderlust event on September 12, Apple threw back the curtains on the new iPhone 15 lineup, Apple Watch Series 9, and Apple Watch Ultra 2.