Don't-Miss Stories

16.cook

4 key takeaways (and 1 non-news tidbit) from Apple CEO Tim Cook's WSJD talk

Apple's boss was his usual coy self at an industry conference, but still revealed a few hints of the future.

yosemite continuity sms

Continuity and Spotlight highlight the need to closely examine where our data goes

SMS forwarding is great on its face, but it could weaken two-factor authentication schemes—and that's not the only problem.

ello

Ello makes its ad-free promise a legal one, too

The fast-growing social network makes its manifesto a legal document to prevent future profits from user data.

spotlight suggestions

Apple says Yosemite’s Spotlight Suggestions don’t violate your privacy

The company stands by its new feature, which doesn’t share your search results with third parties.

iphone 6 home button touch id

The scary side of Touch ID

iOS 8 greatly expanded what Touch ID can do. But also expanded is the damage that can be done if someone forces you to unlock your phone against your will.

googlebathrobe1

Google Glass: The fuzzy pink bathrobe of technology

Chris Breen and Susie Ochs discuss distracted driving and Google Glass, not-so-bendable iPhones, Apple and privacy, and the smugglers index.

techliberalarts

Looking for security at the intersection of technology and the liberal arts

As the recent celebrity photo breach has shown, security is a tricky business, but Apple is uniquely equipped to tackle it.

icloud authentication blurred

One more time: Use two-factor authentication on iCloud, even if there's a waiting period

Once more unto the password breach, dear friends, once more. Two-factor authentication might not have necessarily saved Jennifer Lawrence from getting hacked, but using it is still a good idea.

Google may offer accounts for kids, controls for parents

Children's accounts could go legit if Google can satisfy privacy requirements

on techhive.com

Apple tech note illuminates purported 'backdoor' services

The company's explained the purposes of three diagnostic tools that a security researcher claimed provided 'backdoor' access to users' information.