Category: Security

  • How to Remove Location Data from Photos Before Sharing on iPhone & iPad

    How to Remove Location Data from Photos Before Sharing on iPhone & iPad

    Go to OSX Daily to read How to Remove Location Data from Photos Before Sharing on iPhone & iPad The camera app on the iPhone and iPad collects geographic data of all the photos you take by default (though geotagging photos can be disabled on the camera). This is called geotagging, which essentially lets you…

  • How to Use AirPods as a Remote Spying Tool

    How to Use AirPods as a Remote Spying Tool

    Go to OSX Daily to read How to Use AirPods as a Remote Spying Tool Did you know you can use AirPods and iPhone as a remote spying tool, or simply to boost the volume of some distant sound or speaker? Indeed, with a little planning and know-how, you can use AirPods, AirPods Pro, and…

  • How to Control What Apps Can Access Files & Folders in MacOS Catalina

    How to Control What Apps Can Access Files & Folders in MacOS Catalina

    Go to OSX Daily to read How to Control What Apps Can Access Files & Folders in MacOS Catalina You can control which apps have access to files and folders on the Mac. This article will walk you through how to manage what apps can access files and folders in macOS. This is a security…

  • How to Fix Cron Permission Issues in MacOS Catalina & Mojave

    How to Fix Cron Permission Issues in MacOS Catalina & Mojave

    Go to OSX Daily to read How to Fix Cron Permission Issues in MacOS Catalina & Mojave Some advanced Mac users may have noticed that certain shell scripts with cron, cron jobs, and crontab are either not working at all, or not able to function properly in the newest versions of MacOS, notably Mojave 10.14,…

  • How to Set Time Limits on iPhone & iPad Apps with Screen Time

    How to Set Time Limits on iPhone & iPad Apps with Screen Time

    Go to OSX Daily to read How to Set Time Limits on iPhone & iPad Apps with Screen Time Want to set a time limit for app usage on iPhone or iPad? Screen Time lets you do just that. At a time where we all perhaps use our iPhones a little too much, knowing exactly…

  • How to Delete VPN from Mac

    How to Delete VPN from Mac

    Go to OSX Daily to read How to Delete VPN from Mac If you have previously setup a VPN on Mac but no longer use the VPN service, you may want to delete and remove the VPN from MacOS. Additionally, you may wish to remove a VPN configuration from a Mac that is not needed…

  • How to Setup a VPN on Mac

    How to Setup a VPN on Mac

    Go to OSX Daily to read How to Setup a VPN on Mac Need to setup a VPN on Mac? Setting up a VPN on MacOS is very easy, as this tutorial will walk you through the steps to accomplish a manual VPN configuration on the Mac. VPN stands for Virtual Private Network, and VPN…

  • How to Spot iOS Apps That Are Scams

    How to Spot iOS Apps That Are Scams

    We tend to call out shady apps found on the Google Play Store pretty regularly, but there are also some iOS apps looking to pull one over on unsuspecting Apple customers. In this case, these apps are trying to scam users into costly—and in some cases, undisclosed—in-app transactions. One such app is a notorious iOS…

  • How to Delete Voice Recordings From Alexa, Google Assistant, Facebook Portal, and Siri

    How to Delete Voice Recordings From Alexa, Google Assistant, Facebook Portal, and Siri

    We can control so many devices through voice interactions with digital assistants like Alexa, Siri, and Google Assistant. This can be incredibly convenient, but it can also be nerve-wracking, knowing that technology companies now possess recordings of your voice and interactions. That’s not to say digital assistants are unsafe to use, but users should know…

  • How To Prevent and Respond to a SIM Swap Scam

    How To Prevent and Respond to a SIM Swap Scam

    SIM swap attacks are “off the hook right now,” as described in a November 2018 article from security maven Brian Krebs. While most of you probably have never, and won’t ever, encounter one, it’s good to be prepared should this irritating hack happen to you. What is SIM swapping? SIM swapping involves a hacker duping…