Everything You Need to Know About the Pepsi Data Breach

Hackers need less than a minute to perform a successful data breach. It will be over before you can even finish your cup of coffee. Unfortunately, it can take companies several weeks ...

Cloudflare Detects and Mitigates Largest DDoS Attack Recorded

During the weekend of Feb. 11-12, 2023, content delivery network provider Cloudflare detected and mitigated an unusually high number of hyper-volumetric DDoS attacks. It did not disclose the targets but mentioned some ...

What’s the Difference between Removing and Deleting an App?

There are many reasons you might want to get rid of apps from your iPhone or iPad. To begin, touch and hold on a blank spot on a Home Screen to enter “jiggle mode.” Then tap the ⊝ icon for ...

Quickly Put Lots of Files in a Folder with One Command

Imagine that you’re working with a bunch of files, and you want to put a set of them in a new folder. You could stop what you’re doing, make a new folder, select all the files, and drag them into ...

Find Devices and People from Your HomePod

This feature evokes one of those “living in the future” moments for us. The recently released HomePod Software 16.3 now supports Find My, which means you can ask Siri to locate one of your devices or a friend or family ...

Need to Back Up or Export a Messages Conversation? Try PDF or iMazing

Occasionally, we hear from a client who needs to document a Messages conversation with timestamps, perhaps as part of a lawsuit. The only way to do that on an iPhone or iPad is to take a series of screenshots, but ...

Is Your Wi-Fi Network a Security Risk?

With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your ...

FAQs about Apple’s Messages App and What Can Go Wrong When Using It

Most of us rely on Messages every day to text with family, friends, and colleagues. Not surprisingly, we’ve fielded numerous questions surrounding common confusions with this popular app. We hope our answers here will help you use Messages more effectively ...

A Practical Guide to Identifying Phishing Emails

Phishing is becoming an ever more common way for people to get in trouble when using the Internet. A phishing attack is some communication, usually an email, that tries to lure you into revealing login credentials, financial information, or other ...

Protect Your iPhone Passcode by Using Face ID or Touch ID

This is troubling. Joanna Stern and Nicole Nguyen of the Wall Street Journal have published an article (paywalled) and accompanying video that describes attacks on hundreds of iPhone users in major cities throughout the United States. Some attacks involve drugging ...