Glenn Fleishman describes the workings of the recent iDict attack and explains why the best defense against such attacks is a strong password.
The myriad cloud backup services use different methods for encrypting not just your data, but the keys to it. Glenn Fleishman explains it all.
New Year's is the perfect time to review your Internet security measures, and help your family do the same.
Just unwrapped a shiny new Mac? Seek out these essentials first, and thank us later.
Traveling for the holidays? There have never been more options for acquiring high-speed Internet access, whether you're staying at your old family home or a hotel.
Apple should provide more granular controls for location tracking, and families need to understand how device wiping works.
Do you know where your Apple ID Recovery Key is? Keeping track of it could save your digital life.
Not all passwords are created equal, and password generators like 1Password, LastPass, and iCloud Keychain are your best bet against hacking.
If these little security dongles catch on, we won't have to type in second-factor codes anymore.
Tools have never been more powerful, and we've never had as many options from which to choose. It's about to get even better.
WireLurker and Masque Attack show the different paths Apple has taken for app security, and how Apple could loosen the reins of iOS without putting most users at additional risk.
It's a feature, not a bug, but Glenn Fleishman thinks Apple should at least give users a choice.
The Magazine publisher Glenn Fleishman opens up about the realities of going all-in on Newsstand, and what publications give up when they do.
Authenitication apps streamline the process of getting that all-important second login code.
SMS forwarding is great on its face, but it could weaken two-factor authentication schemes—and that's not the only problem.