News
Entertainment
Science & Technology
Life
Culture & Art
Hobbies
News
Entertainment
Science & Technology
Culture & Art
Hobbies
14 | Follower
Apple has a new policy on how the data on your device will be used to train its AI features. iMessage phishing scams seem to work because they're still thriving worldwide. Google may say it's cracking down on ad spam, but they don't seem to be able to prevent it from proliferating. And buying a refurbished phone may save you some money, but we're here to remind you of some other factors also worth considering.
A privacy-focused search engine can help limit the amount of data that big companies like Google and Microsoft collect about you. Learn everything you need to know about four privacy-centric search engines—Brave, DuckDuckGo, Startpage, Kagi, Mojeek, and Qwant—and how you can use them to improve your privacy.
We discuss new US tariffs placed on China might affect the price of Apple products in the coming months. We now know more about how a journalist was added to a supposedly private Signal chat among White House officials. Researchers claim any Bluetooth device can be converted to behave like an AirTag tracker. And we've got a few ideas and tricks on how you can use the buttons on your iPhone and iPad.
A highly sophisticated phishing e-mail campaign is exploiting Google’s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here’s what to watch out for so you don’t fall victim to this scam.
The Better Business Bureau advises Apple to curb its deceptive Apple Intelligence marketing. What is "slopsquatting"? It doesn't sound very appealing, but it is to cyber criminals. And we've got another reason why phishing scammers love Google services.
Apple has just released critically urgent security updates—including macOS Sequoia 15.4.1 and iOS 18.4.1—to address two zero-day vulnerabilities that have been actively exploited in the wild. Researchers have exposed details to the public.
File converter sites claim to solve a common problem—but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don’t need to worry about such scam sites.
A banal Mac app to granularly adjust Light Mode and Dark Mode was bought out by a shady company, and enlists Macs in a botnet. A new Intel CPU vulnerability may affect older Macs. And a lot of LinkedIn accounts have been hacked; we offer some suggestions on how to protect your account.
SMS text messaging is ubiquitous and here to stay. But given its lack of encryption, is it safe to rely on SMS for two-factor authentication? Here are the key things to know about SMS, MMS, and more modern texting standards.
A blogger recently claimed that NightOwl, a popular app, enlists Macs in a botnet. Apple seemed to agree that something was off, revoking the NightOwl code-signing certificate. But is the app really malware? Here is the full story.
Chrome will move to weekly security patches, and Google is encrypting RCS chats by default. A $5 billion lawsuit against Google highlights misunderstandings about private browsing, or incognito mode. Meanwhile, Amazon sells expired Chromebooks, and a new acoustic attack is 95% accurate at stealing your keystrokes.
We look at what Apple presented at this year's worldwide developers conference. We discussed the key features in macOS Sonoma, iOS 17, and iPadOS 17, and we talk a bit about Apple's new Vision Pro AR/VR headset. We also discuss some recent Chrome vulnerabilities.
Google Chrome and other Chromium-based browsers require an urgent security update to address a zero-day vulnerability that has been actively exploited in the wild. Here is everything you need to know to stay protected.
Apple's Worldwide Developer Conferences launches on Monday, and we discuss what to expect. We also talk about RomCom malware, PyPi 2Fa, Hot Pixels - which may not be so hot - and other malware and vulnerabilities.
A new hacking tool, BrutePrint, can unlock lots of smartphones, but not iPhones. Router infections can be hard to remove, and we wonder why Apple got out of the wi-fi business. And we take a close look at whether it's safe to use an iPhone, if it can no longer run the latest version of iOS.
New top-level domains use common file extensions, and this could lead to confusion, and dangerous downloads. Apple announces a new personal voice modeling feature. And Google warns dormant users: log in, or get shut out.
The FBI has shut down servers for Snake malware, which we wrote about back in 2017. Apple's lockdown mode has been found to prevent some serious malware attacks. And Apple is testing the water with app subscriptions for two of its pro apps on the iPad.
Apple has issued the first of a new type of updates to its operating systems: Rapid Security Response. We discuss several new types of Mac malware, and we look at how Google's cloud sync for its Authenticator app is insecure.
Apple released its first-ever Rapid Security Response updates for Mac, iPhone, and iPad. These updates may fix vulnerabilities that have been actively exploited in the wild, but so far Apple is being vague about it.