New Mac Pro: latest rumors

New Mac Pro: latest rumors

For years, Apple users have been holding on to nothing but online rumors concerning the release date of the new Mac Pro. Thankfully, Apple just confirmed a radical revamp of its high-end workstation. Although official information on the different models’ specs and features have not been confirmed, hints have been made about what could be in store for Mac Pro users.

Should you fear government surveillance?

Should you fear government surveillance?

Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation of compromised devices and applications. But in today’s climate, every headline needs to be taken with a grain of salt.

iOS 10.3: features and updates

iOS 10.3: features and updates

Since late January, Apple has been teasing early adopters with iOS 10.3. Seven beta versions later, Apple has finally released the major update on iPhone, iPad, and iPod Touch devices. Apple seems to have taken the time to iron out the kinks with this update before releasing it to the public, and by the looks of things, it paid off! Here are some of the exciting new features from the update.

Defend yourself from this new Mac ransomware

Defend yourself from this new Mac ransomware

Cybersecurity experts stumbled into a ransomware variant late last month, but this one doesn’t target Windows devices. The malware, known as OSX/Filecoder.E, encrypts Mac data like any cryptolocker strain many businesses have seen in the past. However, unlike normal ransomware that release files after the Bitcoin ransom is paid, this new strain makes no such promises.

US election hackers develop new Mac malware

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it.

Which web browser is best for you?

Which web browser is best for you?

The web browser battle has been raging for decades. The feud between Internet Explorer and Netscape has long since passed, and now we’re dealing with a much larger field of competition. Today, there are at least four browsers vying for domination, and we’ve broken down each one by its pros and cons.

The latest Apple malware takes over webcams

The latest Apple malware takes over webcams

“The first…of the new year,” is often a coveted title — but not always. With a reputation as a hardware provider whose devices outshine its competitors in the field of cybersecurity, Apple certainly isn’t happy that “The first Apple malware of the new year,” was awarded so early on.

Stolen iPads susceptible to security flaw

Stolen iPads susceptible to security flaw

There’s nothing worse than hardware vulnerabilities that put even the most cautious of users at risk. We could lecture you about how even unimportant tablets with little to no personal information are still a security liability, but until Apple releases a patch to the iPad’s newest vulnerability, everyone who owns one is at risk of losing control of his or her data.

“Report junk” feature to reduce iCal spam

“Report junk” feature to reduce iCal spam

A new form of spam is cluttering up iCloud Calendars, and Apple hopes its new feature will get it under control. By inviting users to report and remove items they never wanted on their calendar, Apple believes it can get to the root of the problem and stop it from growing altogether.

What Apple’s CallKit is all about

What Apple’s CallKit is all about

Over-the-Internet telephony systems, otherwise known as VoIP (Voice-over-Internet Protocol), have made personal and business communications much easier since they were first introduced. Communicating via the internet is undoubtedly a viable, cost-efficient substitute for traditional telephone systems, and enterprises of all sizes are smart to adapt to it.