Don't-Miss Stories

flint center

Stalking the Apple event

Serenity Caldwell and Chris Breen discuss two hot subjects of the day -- celebrity photo stalking and September 9th Apple event.

Apple says iCloud flaw not at root of celebrity photo hack

The company detailed progress in its ongoing investigation into the incident that led to publication of celebrities' private photos.

icloud icon 100310077 large

How to prevent your naughty pictures from appearing on the Internet

A reader has found images she thought safely locked up in her iCloud account slathered all over the Web. Here are the steps she should have taken to avoid this mess.

Periscope Pro

Periscope Pro review: Keep an eye on your domicile with this Mac surveillance app

Periscope Pro may not be super cheap, but it’ll still probably run you less than a professional security system, and it offers plenty of features.

Five ways to keep your student's digital life safe

Technology is as much a part of school as it is the business world, and device and data loss can be just as serious. Here's how to protect your student's digital stuff (without getting all up in his or her business).

00 intro

The Week in Mac Apps: Grab bag

From keeping your files safe to making sure that your servers are doing their jobs, this week’s roundup of new Mac apps brings you a veritable cornucopia of goodies for your Mac.

Hands-on: miniLock's powerful file encryption is dead simple to use

A new Chrome app called miniLock is making it easy to encrypt and share single files with others.

on pcworld.com

iphone side by

iPhone gets first free app for encrypting voice calls

Signal is compatible with RedPhone, its Android sibling, and scrambles voice calls placed via the iPhone.

instagram app

Using Instagram for iOS on public Wi-Fi poses risk of an account hijack, researcher says

Instagram is moving to full https encryption but isn't there just yet

Apple tech note illuminates purported 'backdoor' services

The company's explained the purposes of three diagnostic tools that a security researcher claimed provided 'backdoor' access to users' information.