Audit Your Trusted Device Lists for Greater Security

One of the ways companies protect critical account information is by remembering the devices you use to log in as “trusted devices” or “authorized devices.” Those logins will usually have been protected by two-factor authentication or another mechanism that guarantees...

Apple’s iCloud Keychain Password Management Is All Many People Need

Apple’s iCloud Keychain Password Management Is All Many People Need We constantly recommend using a password manager like 1Password, BitWarden, or Dashlane. But many people resist committing to yet another app or paying for yet another service. Isn’t Apple’s built-in...

Feel Free to Upgrade to macOS 14 Sonoma When You’re Ready

Although we’re cautious about recommending that people upgrade to the latest major release of macOS, we think Apple has done a good enough job with macOS 14 Sonoma that anyone who wants to upgrade can do so now. That doesn’t mean you have to upgrade immediately, but...

Nine Ways of Moving Data from One Mac to Another

You have a file on one Mac and want to copy it to another Mac, either yours or someone else’s. Sounds easy, and it is, but the best way to go about it varies widely depending on circumstances, and your go-to method may not be the best choice, depending on the size of...

Faster Copying of Two-Factor Authentication Codes from Messages

One welcome feature of Safari is its automatic detection and auto-filling of SMS-based two-factor authentication codes you receive in Messages. It allows you to complete your login quickly, without having to retrieve the code from Messages. But what if you use a...
Skip to content