Time-based one-time passwords are a second step, but not always a second factor. Still, for a lot of people they're a step up in security.
Trust is a difficult commodity to measure, but Glenn Fleishman has some advice for how to tell if a company or service deserves your confidence.
Virtual private networks (VPNs for hire) are cheap and very easy to use on your Mac, iPhone, and iPad.
Glenn Fleishman describes the workings of the recent iDict attack and explains why the best defense against such attacks is a strong password.
The myriad cloud backup services use different methods for encrypting not just your data, but the keys to it. Glenn Fleishman explains it all.
New Year's is the perfect time to review your Internet security measures, and help your family do the same.
Just unwrapped a shiny new Mac? Seek out these essentials first, and thank us later.
Traveling for the holidays? There have never been more options for acquiring high-speed Internet access, whether you're staying at your old family home or a hotel.
Apple should provide more granular controls for location tracking, and families need to understand how device wiping works.
Do you know where your Apple ID Recovery Key is? Keeping track of it could save your digital life.
Not all passwords are created equal, and password generators like 1Password, LastPass, and iCloud Keychain are your best bet against hacking.
If these little security dongles catch on, we won't have to type in second-factor codes anymore.
Tools have never been more powerful, and we've never had as many options from which to choose. It's about to get even better.
WireLurker and Masque Attack show the different paths Apple has taken for app security, and how Apple could loosen the reins of iOS without putting most users at additional risk.
It's a feature, not a bug, but Glenn Fleishman thinks Apple should at least give users a choice.
Articles by Glenn FleishmanNext Page