When you have guests over, they might ask you for your Wi-Fi password. If you use Apple devices, you can share it easily without having to tell them what it actually is. Make sure Bluetooth and Wi-Fi are enabled on both devices, Personal Hotspot is turned off and your guest has your Apple ID in […]
June, 1988: The CyberAIDS and Festering HateApple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering […]
If your computer were ever lost, you’d want the peace of mind that the data contained on it wouldn’t be recoverable by whoever stole or found it. Full-disk encryption is the best solution here. Both Microsoft Windows and Apple MacOS contain built-in utilities – BitLocker and FileVault, respectively – for encrypting all of your local […]
Desktop apps can consume a lot of power even when you’re not using them. Plus, they might be collecting considerable information and transmitting it to servers, or worse. To save electricity and reduce your exposure to harm, consider closing any program from your web browser to your conferencing app if you’re not currently using them.
If you use an iPhone or iPad, you now that the their OS receives frequent updates. It’s important to apply these as soon as possible to avoid security issues. When you see news about iOS updates, look in the Settings apps if an update is available. Also, major updates almost always occur in late September […]
The Messages app on any iPhone or Mac collects both your SMS texts and iMessage chats. For the latter, you can configure a setting that disables notifications for any iMessage from a phone number or email address that’s not already in your contacts list. That can filter out phishing scams and general message spam.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.