Richard BaguleyMacworld

Richard Baguley has been writing about, testing and breaking technology for the past 20 years. He has written for Wired, Macworld, USA Today, Amiga Format and many others

The everyday agony of the password

We all have to use passwords each and every day, and security expert Rich Mogull thinks that's a shame.

Tablet apps for photo pros

What do pro photographers use on their tablets? Find out which apps help them take better shots.

on techhive.com

photo apps

Must-have apps for photography nuts

Tablets can be a valuable complement to your camera, or a capture tool on its own.

on techhive.com

Keep your mobile device clean

Tired of all the grunge on your screen? Follow these steps to clean your mobile phone or tablet—and keep it that way.

on techhive.com

Java security threats: What you need to know

Hackers have discovered two vulnerabilities in Java that could, under the right circumstances, allow them to access and control your computer. The good news: Most Mac users should be immune to those attacks. Rich Mogull explains why and how to be really sure your Mac is safe.

Apple's elegant 'sealed' Mac designs come with a costly tradeoff

Apple's new top-of-the-line, 15-inch MacBook Pro, with its ground-breaking Retina display, is drool-worthy, says columnist Richard Hoffman. But it comes with a price: Its design makes it nearly impossible to upgrade yourself.

What you need to know about the Flashback trojan

The success of the Flashback trojan means we've entered a new era in Mac security. But that doesn't mean we need to panic. Rich Mogull explains what Flashback means and what you need to do about it.

Keep your iPad safe

macworld.com

Security is vital if you're going to use an iPad a business device. Rich Mogull shares how to protect both your tablet and its data.

How to use your iPad securely

Security is vital if you're going to use an iPad a business device. Rich Mogull has some advice on how to keep the tablet and its data safe.

Mac Defender: Pay attention but don't panic

Mac Defender doesn't mark the beginning of the Mac Malware Apocalypse. But Mac users should still pay attention and be prepared to change their computing habits.

It's not just Apple developers that are threatened by Lodsys

The Lodsys patent threats don't just affect iOS developers, argues Computerworld's Richi Jennings. They're just the tip of the iceberg.

Privacy: what bad guys do with stolen data

macworld.com

When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.

Protect your privacy: social networking

macworld.com

Maintaining privacy on social networks is much like hanging all your dirty laundry on a highway billboard, then asking only your friends to look. While it's possible to avoid sharing your life's story with the entire world, it takes effort.

Protect your privacy: Web browsing

macworld.com

Ad networks, search engines, Internet service providers, and social networks all track, analyze, and sell almost everything you do online.

Protect your privacy: what happens to your data?

When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.