Apple announced its latest iPhones and Apple Watches at its Wonderlust event on September 12th. Apple threw back the curtains on the new iPhone 15 lineup, Apple Watch Series 9 and Apple Watch Ultra 2. These devices all provide incremental improvements that make them attractive to people planning to purchase a new iPhone or Apple Watch, though… Continue reading Apple Announces iPhone 15 Lineup, Apple Watch Series 9 and Apple Watch Ultra 2
It has been a tough year for extreme weather events. While the connection between weather and technology may seem tenuous, heat waves, high winds and lightning strikes can play havoc with all sorts of powered and networked electronic devices. Why Protect Your Tech Anything that causes power fluctuations—spikes, surges, sags, brownouts and blackouts—can hurt your tech gear. Protecting… Continue reading Protect Your Tech Gear from Power Fluctuations
Most people fall into one of two extremes when it comes to device security. Many believe they’re not interesting enough to be targeted by online attackers and don’t take sensible precautions, like making sure every website account is protected with a strong, unique password. The truth is, most attacks these days come from bots, so whether… Continue reading Worried That You’re Being Targeted Online? Try Lockdown Mode
Cybercriminals have devised a new tactic that involves using images and no text to deceive recipients into scanning QR codes, leading to compromised accounts and stolen credentials. We’ve written before about how to recognize dangerous phishing attempt via email, and even how avoid being a victim of phone/voice-based scams. However, we want to be sure you know… Continue reading Beware of the Latest Phishing Email Trick: QR Code Scams
Apps are everywhere these days, but it can be hard to remember that many exist in multiple versions. You can often run the same app on a Mac, an iPhone or iPad and in a Web browser. There are benefits for each of them. Mac Apps Generally speaking, Mac apps: Have better-designed, more obvious interfaces that… Continue reading Which Should You Use — a Mac, iPhone or iPad or Web App?
Apple’s Worldwide Developer Conference keynote (full video or 2-minute recap) is primarily an opportunity for Apple to give developers a first look at new features coming in its operating systems, and this year was no exception. The news getting the most buzz is the introduction of the mixed-reality Vision Pro headset, due next year. However, there were… Continue reading Apple Releases New Macs, Previews New OS Features and Unveils Vision Pro
iOS 16.4 Adds Voice Isolation Feature to Improve Cellular Calls Do you find yourself on calls or FaceTime conversations while you are stuck in a noisy area? You’ll want to know about a setting that will help the other person hear you better. In iOS 15, Apple added the Voice Isolation feature to FaceTime calls to filter… Continue reading Voice Isolation Improves Calls and Avoid Phone Scams
If your iPhone were to be stolen or suffer an unfortunate accident, would you lose all your precious photos? Those using iCloud Photos are probably shaking their heads smugly, thinking that all those baby and vacation photos are backed up securely in iCloud. iCloud Photos does store a copy of all your photos, but you… Continue reading How to Back Up iPhone Photos on Your Mac
Many businesses, schools and other organizations have adopted cloud storage services like Box, Dropbox, Google Drive and Microsoft OneDrive for excellent reasons. Cloud storage provides a centralized spot for shared data without the up-front cost or maintenance issues of a network-attached storage device. It also allows individuals to access the same files on multiple devices and significantly enhances collaboration by allowing multiple… Continue reading Integrate Your Cloud Storage Service into the Finder
We all send sensitive data online, including passwords, financial information and personal details, all of which could be used for identity or outright theft. For those who work at home, this data may also include important corporate credentials and information. In addition, if your Wi-Fi network is open for everyone and has a bandwidth cap, you could… Continue reading Is Your Wi-Fi Network a Security Risk?