In the February issue, we show you everything you need to know to secure your Mac and keep your data safe. Also, we help you choose the best video calling method. Plus: The cord-cutter's guide to free (and legal) TV streaming.
There are several tools that can block third-party advertising companies from zeroing in on your Web browsing.
Malicious DLLs will be executed if stored in the same directory as media files opened with the affected programs, researchers said.
Performing a Spotlight search opens email previews that load external images, even when the Mail client is asked not to do this
Glenn Fleishman describes the workings of the recent iDict attack and explains why the best defense against such attacks is a strong password.
OS X's Keychain Access provides the avenue for managing and retrieving your passwords. Topher Kessler dives deeper into its password powers.
The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said
Apple releases a critical security update that affects OS X Mountain Lion, Mavericks, and Yosemite users.
The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.
Elcomsoft's Phone Breaker can pull data from iCloud accounts with a person's knowledge