Apple has a “user-centric” business model but forces iOS users to choose between using the version of iOS they want and getting security updates.More
Many individuals and many organizations treat their router and WiFi network as a security perimeter. “The hostile world is outside. The warm, friendly, safe world is here, on our side of the fence.” The result is relaxed security inside the fence—printers anyone can talk to, media players with no passwords, open file sharing. Not to mention all the insecure IoT devices that may be on their network. The new KRACK Wifi exploit allows attackers to blow past Wifi’s built-in security.More
If you haven’t been busy this week choking on smoke and running from forest fires in the western US, recovering from flooding in Texas, preparing for one of the strongest Atlantic hurricanes ever in Florida and the Caribbean, or simply fighting the good fight, you might have heard about the Equifax data leak – Equifax, a consumer credit reporting company, admitted that their database was breached and information on roughly 143 million US citizens (and some in the UK and Europe).
When you register a domain name, you may expose personal information about yourself: your address, phone number email address. Here’s how to protect privacy.More
Credit card compromises and fraud are an epidemic. Here’s how to use Apple Pay to protect your credit card information from being exploited.More