Hundreds of millions of people had their names, addresses, and Social Security numbers revealed in the massive NPD breach. There isn’t much you can do to protect yourself, but we explain the one thing everyone should do.
		
		Hundreds of millions of people had their names, addresses, and Social Security numbers revealed in the massive NPD breach. There isn’t much you can do to protect yourself, but we explain the one thing everyone should do.
		It’s exciting to get a new iPhone, but take a few minutes to read our advice on what you need to do before — and after — transferring your data from your old iPhone.
		QR codes — those blocky squares you scan with your iPhone camera — are an easy way to open a Web page. Unfortunately, scammers also use them to trick people into visiting malicious websites, so read our tip about scanning these codes safely.
		If you have parked domains that never send email, it’s important to set up SPF, DKIM, and DMARC so scammers can’t forge legitimate-looking email from those domains.
		When you connect to a public Wi-Fi network, you often must authenticate or agree to terms on a captive portal login page. Here’s the solution if that page doesn’t appear.
		Sorry, 27-inch iMac lovers, but Apple isn’t going to release a 27-inch iMac with Apple silicon chips. We explain why and run down the upgrade options for those who need to move on.
		Artificial intelligence dominates the tech news these days, but it’s hard to separate the hype from the reality. Here’s a no-nonsense look at what tools like ChatGPT do well, what they do poorly, and how to make the best use of them.
		Do you have a rat’s nest of random cables behind your Mac? Follow our quick tips to bring order to the mess, reduce the chance of accidents, and avoid de-graded data signals.
		You can take advantage of Apple’s Live Text feature in Photos to catalog books, boxes, or any other items with text names. Think of it as a lazy person’s ad hoc database.