In part 1 of a series on PGP, Glenn Fleishman explains the problem with email and why end-to-end encryption is within your reach.
iOS 8 offers precise enough control over who can see your location and when that even a privacy lover like Glenn Fleishman is on board.
Glenn Fleishman distills everything you need to know about encrypting files, disk images, or your Mac's entire hard drive.
A big storm. A power outage. Then suddenly, eight songs starting with the letter M appear in Glenn Fleishman's purchase history. Huh?
Apple made whole-disk encryption of your Mac as easy as a few clicks, but there are a few warnings you should heed.
Time-based one-time passwords are a second step, but not always a second factor. Still, for a lot of people they're a step up in security.
Trust is a difficult commodity to measure, but Glenn Fleishman has some advice for how to tell if a company or service deserves your confidence.
Virtual private networks (VPNs for hire) are cheap and very easy to use on your Mac, iPhone, and iPad.
Glenn Fleishman describes the workings of the recent iDict attack and explains why the best defense against such attacks is a strong password.
The myriad cloud backup services use different methods for encrypting not just your data, but the keys to it. Glenn Fleishman explains it all.
New Year's is the perfect time to review your Internet security measures, and help your family do the same.
Just unwrapped a shiny new Mac? Seek out these essentials first, and thank us later.
Traveling for the holidays? There have never been more options for acquiring high-speed Internet access, whether you're staying at your old family home or a hotel.
Apple should provide more granular controls for location tracking, and families need to understand how device wiping works.
Do you know where your Apple ID Recovery Key is? Keeping track of it could save your digital life.