Quick Tip: Don’t Let Hackers Hold You Hostage! Use a Unique iCloud Password

There has been a rash of reports from people whose Macs have been locked remotely via Find My Mac, with the criminals responsible holding the Mac hostage until they receive a ransom in Bitcoin. First, if this happens to you, do not pay the ransom! Any Apple Authorized Service Provider or Apple Store can unlock[…]

Malicious Password-Stealing Instagram App Is Back in the App Store

In November of 2015 a new kind of internet threat emerged, this one from within Apple’s “walled garden” of the App Store. InstaAgent rose to popularity in November as it promised Instagram users the ability to easily see the top users and commenters on their profile. It was discovered by Peppersoft developer David L-R that InstaAgent[…]

How to Have the Best Umbrella – Using on-site and cloud-based backups to prepare the for the worst rainy day

As computers become a bigger part of our lives, our pictures, documents, movies, and other data are increasingly stored on our computers or devices. Those hard drives and gadgets are susceptible to being dropped, stolen, damaged, or lost, not to mention the fact that they fail on their own once in a while. The need[…]

UPDATE: Apple releases 10.9.2, closes SSL Security hole

Today Apple released Mac OS X 10.9.2, which fixes the SSL vulnerability in OS X (discussed in detail previously). In addition to patching the security hole, OS 10.9.2 also fixes a number of bugs in OS X Mavericks. arstechnica.com writes, Apple has included a large number of other fixes and features too. The most prominent[…]

How to Spot a Fake Email

For the last couple of weeks I have been receiving fake emails alerting me to an important message at either Facebook, Google, or iTunes.   As you can see in the pictures, the emails look legitimate, and contain the correct email addresses and mailing addresses of Google and Facebook (and LinkedIn, Twitter, etc). When we[…]