Stop Using Your Face or Thumb to Unlock Your Phone
Last week, the 9th Circuit Court of Appeals in California released a ruling that concluded state highway police were acting lawfully when they forcibly unlocked a suspect’s phone using their…
How to Clear the Cache on an iPad
Photo: Caitlin McGarry / Gizmodo Even if some of us have no idea what online cookies are, we accept a ton of them every day. Not only are they a…
Apple Users Are Getting Bombarded With ‘Reset Password’ Requests
Apple users are being targeted by an elaborate and annoying phishing scam that aims to change their password and lock them out of their devices, according to a new report…
Microsoft Under Constant Attack by Russian Hackers, Filing Says
File photo of a surveillance camera near the Microsoft office building in Beijing, China on July 20, 2021.Photo: Andy Wong, File (AP) Hackers linked to the Russian government keep trying…
Apple Is Forcing Users Who Forgot the Password to Their $3,500 Vision Pro to Reset It In-Store
Users were understandably annoyed at having to take their very expensive headsets back to the Apple Store to fix the password problem.Illustration: Jody Serrano / Gizmodo Imagine buying a new…
How to password-protect an Excel file on Windows and Mac
If you use a computer, you probably have some Microsoft Excel documents on your Mac or PC that you wouldn’t want other people to find and read. After all, Excel…
Stop Everything You’re Doing and Enable Stolen Device Protection on Your iPhone
Image: NurPhoto (Getty Images) Apple recently announced a Stolen Device Protection feature for iOS 17.3. With the new OS finally released Monday, the safety feature is now available to be…
Your iPhone Is About to Get a Lot Safer Against Theft
Apple’s strategy, if there was one at all, for protecting your phone’s data from theft has been pretty bad all along. If the thief can take a glance at your…
A New AI-Driven Cyberattack Can Steal Your Data Just By Listening to You Type
Photo: VALUA VITALY (Shutterstock) A new study published by a number of British researchers reveals a hypothetical cyberattack in which a hacker could leverage recorded audio of a person typing…