Glenn FleishmanSenior Contributor, Macworld

Follow me on Google+

Glenn Fleishman is the author of A Practical Guide to Networking and Security in iOS 8, and a senior contributor to Macworld, where he writes the Private I and Mac 911 columns. He is also a regular contributor to the Economist, Fast Company, and Boing Boing.

filevault

How to encrypt your Mac with FileVault 2, and why you absolutely should

Apple made whole-disk encryption of your Mac as easy as a few clicks, but there are a few warnings you should heed.

1password 5 mac icon

1Password's update highlights the difference between two-step and two-factor verification

Time-based one-time passwords are a second step, but not always a second factor. Still, for a lot of people they're a step up in security.

two men shaking hands trust

When it comes to security, who can you trust?

Trust is a difficult commodity to measure, but Glenn Fleishman has some advice for how to tell if a company or service deserves your confidence.

internet security thinkstock 1200w

How and why you should use a VPN to protect your data's final mile

Virtual private networks (VPNs for hire) are cheap and very easy to use on your Mac, iPhone, and iPad.

Latest iCloud crack can't beat a good password

Glenn Fleishman describes the workings of the recent iDict attack and explains why the best defense against such attacks is a strong password.

backuponline

Private I: Lock your cloud backups away with an encryption key

The myriad cloud backup services use different methods for encrypting not just your data, but the keys to it. Glenn Fleishman explains it all.

password stock image

How to help your family stay more secure online

New Year's is the perfect time to review your Internet security measures, and help your family do the same.

macbook air

The first 10 apps to install on your brand-new Mac

Just unwrapped a shiny new Mac? Seek out these essentials first, and thank us later.

wi-fi in the sky

How to stay connected in unconnected places

Traveling for the holidays? There have never been more options for acquiring high-speed Internet access, whether you're staying at your old family home or a hotel.

family sharing hero

Family Sharing is convenient, but comes with its own risks

Apple should provide more granular controls for location tracking, and families need to understand how device wiping works.

icloud security primary

Without your Recovery Key, your Apple ID could be lost forever

Do you know where your Apple ID Recovery Key is? Keeping track of it could save your digital life.

Private I: Choosing whether to sync your passwords

Not all passwords are created equal, and password generators like 1Password, LastPass, and iCloud Keychain are your best bet against hacking.

security key by yubico in usb port on keychain

Two-factor authentication gets physical with USB U2F devices

If these little security dongles catch on, we won't have to type in second-factor codes anymore.

smartphone encryption

Private I: It's time to encrypt everything

Tools have never been more powerful, and we've never had as many options from which to choose. It's about to get even better.

wirelurker

Let the right one in: Apple uses two doors to manage malware

WireLurker and Masque Attack show the different paths Apple has taken for app security, and how Apple could loosen the reins of iOS without putting most users at additional risk.