Don't-Miss Security Stories
Chris Breen shows you how to stow your most sensitive data in a protected archive.
Yosemite introduces some useful features that allows your Mac greater access to the Web. But how safe are they? Chuck La Tournous explains.
As of October 9, 2014, those using two-step verification will have to generate app specific passwords for third-party apps the use iCloud data.
The 'Shellshock' Bash shell bug is a big deal, but it's relatively easy to keep your home PC safe.
In this collection of Mac 911 quick hits Chris Breen addresses issues of two-factor authentication without a mobile phone, a too-bright HipChat client, iTunes' "Other" entry, and iPhoto metadata.
A reader has found images she thought safely locked up in her iCloud account slathered all over the Web. Here are the steps she should have taken to avoid this mess.
Technology is as much a part of school as it is the business world, and device and data loss can be just as serious. Here's how to protect your student's digital stuff (without getting all up in his or her business).