Legal and moral arguments about piracy will never die. But the practical implications of running illegitimate software are what really scares Marco Tabini.
The fingerprint authentication technology, developed by Validity Sensors, may someday replace your smartphone’s passwords and pin numbers.
Kensington's Proximo uses Bluetooth-enabled fobs and tags that enable you to use your iPhone to find your keys or other valuables.
Mac and iOS may have dominated Apple news this year, but they weren't the only developments. Dan Moren and Lex Friedman recount the rest of what happened in 2012.
Agile Bits's from-the-ground-up rewrite of its popular password-management software brings many crucial improvements over its predecessor.
Security expert Rich Mogull runs down Apple's year in security over at TidBits. If it's detail you're looking for, it's here in spades.
A security researcher published on Friday another attack on Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account.
What's your biggest password weakness? Probably the security questions that let you reset your passwords for iCloud, Gmail, and other services. Keep ahead of the hackers with these tips.
Even if you trust most of your passwords to a password manager, you'll have to remember a few. Here's the best way to make memorable ones without compromising security.
Little Snitch provides network and privacy protection in a package that's easy to recommend to an entire range of users, from beginner to sophisticated. It's easy to use and train, yet it’s powerful enough for demanding users.