Has your iPhone, iPad, or iPod touch been hacked? Here’s how to find out

Has your iPhone, iPad, or iPod touch been hacked? Probably not, but there’s so much information on a smartphone — not to mention the fact that it can also be used to precisely pinpoint its owner — that more and more tools exist to help unscrupulous people get a foot in the door of your digital fortress. The good news is that tools exist to help you determine whether your device has been compromised. One such tool that I’ve been testing is Certo AntiSpy. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How you ever wondered if your iPhone has been hacked?Join the conversation on our Facebook Page!

New ThiefQuest ransomware discovered targeting macOS users

Security researchers have discovered this week a new ransomware strain targeting macOS users.  Named OSX.ThiefQuest (or EvilQuest), this ransomware is different from previous macOS ransomware threats because besides encrypting the victim’s files, ThiefQuest also installs a keylogger, a reverse shell, and steals cryptocurrency wallet-related files from infected hosts. “Armed with these capabilities, the attacker can main full control over an infected host,” …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your Mac?Join the conversation on our Facebook Page!

The slow death of the Mac as we know it

The future of the Mac is in the hands of people who see a laptop or a desktop as an accessory to an iPhone or iPad, not the other way around.  … For existing Mac users, this is the slow death of the Mac as we know it. Now, nothing is going to happen overnight. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you still using a Mac?Join the conversation on our Facebook Page!

Apple’s new iPhone SE has no credible Android alternative

You can’t find an Android handset that comes close to the iPhone SE.  And this is a real problem for Google and the whole Android ecosystem. The first obstacle is the power. The A13 Bionic processor is a powerhouse. It blows out of the water the Snapdragon 865 chip found in high-end handsets like the Samsung Galaxy S20 Ultra in benchmark tests such as Geekbench 5.  … And Apple put this chip into a smartphone costing $399.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Will you switch?
Join the conversation on our Facebook Page!

 

Macs saw almost double the number of malware threats than Windows PCs last year

Macs don’t get viruses,” or so the long-time saying goes. But according to Malwarebytes’ annual State of Malware report, that’s far from true. In fact, there was almost double the number of threats targeting Macs compared to Windows PCs in 2019.  The report states that Macs saw an average of 11 threats per endpoint in 2019, whereas Windows systems had an average of 5.8 threats—the first time Macs outpaced PCs when it comes to malware threats. …

TechSpot.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your Mac’s?Join the conversation on our Facebook Page!

Teens get sneaky with their Apple AirPods. Will business follow?

This week, a video has wafted around the web that may turn your head away or your stomach around. Or your mind toward emigration to undeveloped land.  You see, this video showed the fun way kids are apparently communicating in class. With each other, that is.  It appears they’re swapping a single Apple AirPod of theirs for a single Apple AirPod of their friends

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen employee’s doing this?Join the conversation on our Facebook Page!

 

This simple malware still plagues one in 10 Mac users

A prolific trojan campaign that tries to trick macOS users into downloading malicious software remains the most common malware Mac users are likely to encounter.  The Shlayer malware first emerged in early 2018 and is predominantly used to install malicious adware on users’ systems, with the intention of generating revenue from pop-up adverts and links that relentlessly appear in the victim’s browser.  Now, two years on from Shlayer’s arrival, figures from Kaspersky Lab reveal that the malware has targeted over one in ten macOS users, making it the most widespread macOS malware threat.

ZDNet.com click the link to read the rest of the story. Get our free tools here.

How do you protect your Mac devices?Join the conversation on our Facebook Page!

The ultimate smartphone guide to killing spyware and stalkerware

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Did you find anything on your smartphone?

Join the conversation on our Facebook Page!

How to secure your iPhone or iPad from hackers, snoopers, and thieves

Chances are high that your iPhone or iPad is an absolute treasure trove of personal information that you don’t want falling into the hands of others. And while iOS does a great job of keeping data safe, it’s possible to make the device a lot more secure.

Here are settings you should check (and change) and tweaks you should make to harden the security and lock down your device.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you hardened your iPhone from threats?

Join the conversation on our Facebook Page!

Microsoft now the World’s Number 1 Technology Leader overtaking Apple

Thomson Reuters in its new list for Top 100 Global Technology Leaders confirms that Microsoft has taken the leading spot overtaking Apple and Google to become the World’s Number 1 Technology Leader.  Microsoft is followed by Intel and Cisco with Apple and IBM also making it to the Top 10 list of Number 1 technology leaders.  …

windowslatest.com click the link to read the rest of the story. Our FREE Tools can help!

Does this surprise you?

Join the conversation on our Facebook Page!

The downsides of buying a new Mac

The hefty price tag is only the beginning of the pain that comes as a result of buying a new Mac.  … The first problem is the hardware selection on offer.  When planning to buy a Windows-based PC, there’s almost no end of options from a wide array of OEMs. Want a certain kind of laptop with a specific screen size and battery life? Chances are good that, with a bit of internet sleuthing, you’ll find one that matches your needs.

When buying from Apple, that’s all different.

ZDnet.com click the link to read the rest of the story.

Are you thinking of buying a new Mac?
Join the conversation on our Facebook Page!

Something Better Than Apple’s new AirPods

The competition has caught up and surpassed Apple with more reasonable prices. Don’t jump too quickly on the new version just because it’s an Apple product. …  Jason Cipriani (see his full review) and I have been using the new Samsung Galaxy Budsand they are clearly better than even the new AirPods at a price $70 less.

ZDNet.com click the link to read the rest of the story.

What are you going to buy?

Join the conversation on our Facebook Page!

The 9 Best Email Clients for Macs in 2019

While reviewing dozens of dedicated email clients, we focused on “full-fat” email experiences. This means leaving out the smaller assistants, menu bar apps, browser plugins, and generally cut-down software. Our chosen apps each contain a full range of email features, including the ability to read, compose, search, and organize your mail.

Zapier.com click the link to read the rest of the story.

Which email client would work best for you?Join the conversation on our Facebook Page!

Facebook Messenger users: You now have 10 minutes to unsend a message

With the new Facebook Messenger app, users have “up to 10 minutes” to remove a message for everyone on a chat.

After the 10 minutes is up, users will only be able to remove a message from their own chat, which leaves it visible to everyone else.

ZDnet.com click the link to read the rest of the story.

Have you ever wished you had this before?Join the conversation on our Facebook Page!

Simple changes that Minimize Risk While Surfing the Web on Your Phone

Here are a total of 10 simple and mostly free solutions to help you take better control of your mobile security. Take it slow, but by all means: Do take it. It’s worth the effort.

Medium.com click the link to read the rest of the story.

Have you taken the time to secure your phone?Join the conversation on our Facebook Page!

Mac Users Beware: New Ad Technique Infects You With Trojans

Recent months have seen an uptick in reports of JavaScript malware that hides in image files. This is often referred to as “image based malware” or “steganography malware” in more technical contexts. …

Medium.com click the link to read the rest of the story.

Have you been hit by this attack?Join the conversation on our Facebook Page!

Battle of the Note Taking Apps – Google Keep vs. Evernote: The best is …

If you’re in the market for a note-taking app and are trying to decide between Google Keep and Evernote, defining exactly what you plan to do with the app is an important first step. Each app is designed for very different purposes:

  • Google Keep functions like a digital bulletin board covered in sticky notes. Its lightweight interface and minimal features make it perfect for capturing ideas and to-dos quickly and easily.
  • Evernote is more like a multi-subject notebook or digital filing cabinet. It’s better for writing detailed notes, saving a variety of types of multimedia, and building an archive of information you can reference well into the future.

Zapier.com click the link to read the rest of the story.

Do you have a favorite?  What make it useful to you?Join the conversation on our Facebook Page!

‘Apple support’ phishing scams are getting really good

You know those voice mails you get claiming to be from “Windows support”? It looks like scammers are upping their game with convincing phishing calls claiming to be from Apple, security expert Brian Krebs said in a report Thursday.

The scam starts an automated call showing Apple’s logo, address and legitimate Apple phone number that warns the user to return the call because of a data breach, according to the security website. The message then gives a 1-866 number to call back. That number is “a known phishing source,” the security analyst said.

CNet.com click the link to read the rest of the story.

Have you been hit with this scam?Join the conversation on our Facebook Page!

Cult of Mac’s 50 Essential iOS Apps

If you are looking for the perfect app to boost productivity, make life more convenient or just give you a jolt of fun, you’re sure to find something that fills the bill on our list of 50 Essential iOS Apps.

Thecultofmac.com click the link to read the rest of the story.

What is you most essential app?Join the conversation on our Facebook Page!

Forget the new iPhones: Apple’s best product is now privacy

Apple makes its hundreds of billions every year by selling physical products that have a high markup. Facebook and Google, on the other hand, have a business model built around advertisers who want as much data about users as possible so they can better target them. This is why, for example, Google would never build the types of anti-tracking and privacy protections into the Android OS that Apple has done with MacOS and iOS. Google–and Facebook–aren’t going to cut off their access to all that black gold.

 

Fastcompany.com click the link to read the rest of the story.

Are you willing to pay for more privacy?Join the conversation on our Facebook Page!

Apple iOS Users Targeted By New Exploit

The scam starts with an email informing users that their phones have been locked due to “illegal activity” and instructing them to call “Apple Care” to get the problem fixed.

DWPia.com click the link to read the rest of the story.

Have you received these emails?Join the conversation on our Facebook Page!