Hundreds of millions of people had their names, addresses, and Social Security numbers revealed in the massive NPD breach. There isn’t much you can do to protect yourself, but we explain the one thing everyone should do.
It’s exciting to get a new iPhone, but take a few minutes to read our advice on what you need to do before—and after—transferring your data from your old iPhone.
It’s tempting to buy cheap USB-C and Lightning cables, but non-compliant, counterfeit, and defective cables can damage your hardware or even cause fires. Read on for more about keeping your cables working in the long run.
There are actually two types of Apple IDs: personal and managed. Regular users have personal Apple IDs; those who use employer-provided devices are often required to use managed Apple IDs. Learn more about both.
Although videoconferencing has become a part of everyday life for lots of us, many people don’t realize that macOS provides helpful options for improving our video, audio, and presentations.
Permissions are an essential aspect of the Unix underpinnings in macOS, but on some external drives, they can be problematic. Learn when you should and should not enable “Ignore ownership on this volume.”
Planning a vacation this summer? A little tech prep can help ensure that your devices don’t let you down while you’re away. We have advice for what to bring, essential apps, and more.
It’s frustrating to receive a small or fuzzy image via email or Messages. There’s no need for it in most cases, and we explain how you can be sure you’re sending full-size images.