Fire up your Mac's firewall
A few weeks back, after the Working Mac column about scanning your Mac for viruses I received an email message from Yolanda:
Jeffery Battersby | 26 Jun | Read more
A few weeks back, after the Working Mac column about scanning your Mac for viruses I received an email message from Yolanda:
Jeffery Battersby | 26 Jun | Read more
Google recently added another option to its Takeout service that lets you export data from your Google account, and the latest addition is one of the most important: Your Google search history.
The Internet of Things is based on sensors and controls in all sorts of devices. When those types of devices are used to create a smart home, they can give residents unprecedented control and insight. The proliferation of smart devices, however, also opens the door to new dangers and threats.
Jake Widman | 10 Mar | Read more
In our last episode of Private I, I explained the basics of public-key (PK) cryptography, a way to scramble messages in a way that only someone possessing a particular key can decrypt, without that key ever having to be publicly disclosed or shared. It's an effective system that has no known theoretical exploits, and currently deployed implementations are considered robust.
Glenn Fleishman | 02 Mar | Read more
The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.
Victoria Ivey | 16 Dec | Read more
Your email address is like your home address: Never give it out unless absolutely necessary.
Rick Broida | 09 Jul | Read more
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Kristin Burnham | 25 Apr | Read more