Private Internet Access VPN review
Using Private Internet Access VPN is a sure-shot way to curb eavesdroppers, avoid geo-discrimination, and generally surf the web with peace of mind.
XXI century cybercrime stats and what to expect in the 2020s
Get insights into the noteworthy cybercrime statistics for the XXI century and find out how the global threat landscape will change in the 2020s.
Apple patches an actively exploited UXSS bug in iOS, iPadOS, and watchOS
Operating systems running on Apple mobile devices and wearables have been updated to address a security gap that may have been used in real-world attacks.
Apple fixes an arbitrary code execution flaw in Safari
In a series of updates tailor-made for its different platforms, Apple has rolled out important security fixes that address a serious Safari vulnerability.
Side effects of Apple’s security philosophy
The rigid control of software and hardware in Apple devices is both an obstacle to exploitation and a way for high-profile threat actors to persevere inside.
Apple publishes annual update of its Platform Security documentation
The refreshed security round-up highlights Mac M1 architecture defenses, tweaks in biometrics, safe app usage practices, and more.
Delete spammy Calendar Events on Apple iOS devices (iPhone/iPad) and Mac
This article provides detailed walkthroughs to get rid of misleading events that recurrently poison the Calendar app on an iOS device or Mac computer.
With iOS 14.5 release, Apple will prevent Google from seeing users’ IPs during Safe Browsing checks
Researchers who had a sneak peek at iOS 14.5 beta revealed an interesting feature that relates to handling Google Safe Browsing traffic in Safari.
Remove Safari virus warning scam from iPhone/Mac
Here is a hands-on summary of the Safari virus warning, a multi-pronged pivot of numerous online scams targeting Mac and iPhone users for years.
iOS update reveals a trio of now-patched security vulnerabilities
The recent releases of iOS 14.4 and iPadOS 14.4 fix three security loopholes that, according to Apple, may have been used in real-world attacks.