10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance

You may not understand how end-to-end encryption works, but you use it all the time. It protects your messages and emails, your purchases and bank transfers, and your access to websites and services. Governments around the world have tried to prohibit end-to-end encryption because they want to be able to listen in on what you say and spy on what you do.

In the UK, the government is planning a PR blitz to try to paint end-to-end encryption as dangerous, in reaction to Facebook adding end-to-end encryption to its Messenger app. The main thrust of their campaign is to paint end-to-end encryption as endangering children.

If end-to-end encryption is made illegal, you would not be able to do very much on the internet, at least not securely. Here are 10 ways that end-to-end encryption protects you.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #223: How to Run Windows on an M1 Mac

A new Safari vulnerability can leak your browser history, 5G can interfere with airplane altimeters, Google Analytics is being targeted by EU courts, and we take a deep dive into running Windows on an M1 Mac.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode #222: SysJoker Malware and Scams in the App Store

New SysJoker malware attacks Mac, Windows, and Linux computers. Apple has difficulty managing scams and copycat apps in its App Stores. And iCloud Private Relay is provoking ire among phone carriers.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode #221: Look-Alike Letters Lead Users to Lose Moola

Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple’s two-factor authentication, which more and more users need to use Apple devices.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode #220: The Challenge with Alexa

Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you’ve forgotten your password, and one that lets you set up a legacy contact.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

How to Set iCloud Account Recovery Contacts, Legacy Contacts, and Trusted Phone Numbers

If you use Apple devices, your iCloud account is one of your most important repositories of your personal data. You don’t have to use iCloud, of course; you may use Google services for your calendar and photos, or Microsoft for email and online storage. But most Apple users store data in an iCloud account, and if you get locked out of that account, you may need a way to access your data.

Also, in the event of your death, you may want to ensure that your spouse, partner, or children can access your photos, emails, and other data.

In this article, I’ll explain how to nominate contacts to help you recover your iCloud account, if you get locked out, and how to access your account in the event of your death.

Read the rest of the article on The Mac Security Blog.

How to Use Two-Factor Authentication for Your Apple ID and iCloud Account

Protecting the data in your accounts is essential, and no account is more important to users of Apple devices than their Apple ID account. This account covers many features, from email to calendars, from online storage to online purchases. We have long recommended the use of two-factor authentication whenever possible, and these days it is almost essential that you set this up for your Apple ID.

In this article, I’m going to explain how Apple’s two-factor authentication (2FA) works, how to set it up, and how to prepare for situations where you may not be able to get 2FA codes.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #219: $1,139 of Gelato

A four-year old child, using his father’s phone, ordered $1,139 worth of gelato. We discuss the risks of lending your iPhone or iPad to a child, and we look at the new App Privacy Report, in iOS and iPad OS 15.2, which tells you what apps are doing behind your back.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

How to Keep Kids from Making Purchases on Your iPhone or iPad

iPhones and iPads don’t have user accounts, so if you lend a child your device, they could make purchases, even accidentally, as well as access a lot of your personal data.

A story grabbed my attention recently: a father in Sydney, Australia, gave his phone to his four-year-old, to keep him occupied, and was surprised to later find that the child had ordered $1,139 of gelato and cakes which was sent to the father’s workplace. The child didn’t do this intentionally; he was just tapping things, as children do on portable devices. It turned out that he had been tapping images in the UberEats app, and, since there was no password or passcode required to approve purchases, there was nothing to prevent the child from doing this.

There are many ways that children could make purchases – either intentionally or unintentionally – on an iPhone or iPad. In this article, I’m going to explain how you can prevent your kids from spending all your money on your device.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #218: Does the Log4j Vulnerability Affect You?

The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple’s new feature to detect nude photos in children’s messages, and we discuss the potential demise of the NSO Group.

Follow the The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.