Posts

Set macOS to Require a Password after Screen Saver Start or Display Sleep

Although paying attention to online security is of primary importance, don’t forget local security. You don’t want to go out for lunch and let someone wandering by your office poke through your email, messages, photos, and private files. To ensure this doesn’t happen, set your Mac to start the screen saver or sleep the display after a few minutes (on a laptop, just close the lid), and then set “Require password after screen saver begins or display is turned off” to a short duration. We recommend 1 or 5 minutes, though you can adjust to balance inconvenience against security. To eliminate the fuss almost entirely, use Touch ID or an Apple Watch to unlock your Mac without having to type your password.

(Featured image based on an original by iStock.com/Armastas)


Social Media: Don’t forget about local security on your Mac. Make sure to require a password shortly after the screen saver starts or the display sleeps to prevent people from riffling through your email, photos, messages, and more.

No More Ransom Website Offers Ransomware Decryption Tools

We’ve written in the past about how Apple-only companies can protect themselves from ransomware (strong security, isolated backups, monitoring software), but realistically, it’s primarily a threat to computers running Windows and Linux. If you, or anyone you know, is targeted by ransomware, look to the No More Ransom website, developed by Europol’s European Cybercrime Centre and the Dutch police, for advice and tools. The advice boils down to: “Don’t pay the ransom because it proves to the criminals that ransomware works, and there’s no guarantee it will solve your problem.” On the tools side, the Crypto Sheriff helps identify the type of ransomware in play, and No More Ransom provides decryption tools for 180 different forms and variants of ransomware. There are no guarantees, but anyone who has fallen prey to ransomware should start with No More Ransom.

(Featured image based on original by iStock.com/Suebsiri)


Social Media: Ransomware primarily affects Windows and Linux computers, but if you, or anyone you know, falls prey to it, visit the No More Ransom website for advice and decryption tools.

What You Need to Know Before Switching to a New iPhone

Are you planning to upgrade to a new iPhone 16? It’s exciting, we know, but it’s best to proceed deliberately when setting up your new iPhone to avoid causing yourself headaches. Follow these instructions when you’re ready to transfer your data—and, for many people, much of your digital life—to the new iPhone. Apple also has a series of videos you can watch.

  1. Update your old iPhone to the latest version of iOS. If you have an Apple Watch, update it to the latest version of watchOS. This process can take some time, so it may be best done overnight before you move data to your new iPhone.
  2. Make sure you know your Apple ID and password, and if you have an Apple Watch, its passcode. You will likely have to enter them at least once during this process.
  3. Back up your old iPhone to iCloud or your Mac. (If you back up to a Mac, be sure to encrypt the backup, or else it won’t include saved passwords, Wi-Fi settings, browsing history, Health data, and call history.) Or back up to both, for safety’s sake. We prefer iCloud backups because they’re easier and don’t introduce additional variables, like flaky USB cables. If you don’t usually back up to iCloud, Apple will give you temporary iCloud storage to make a backup when moving to a new iPhone. To initiate an iCloud backup, go to Settings > Your Name > iCloud > iCloud Backup and tap Back Up Now.
  4. If you have an Apple Watch, you don’t need to unpair it from your old iPhone at this point in the process. (Later, if the automatic transfer has not worked, you can unpair it manually and pair it again later. If you end up taking the manual route and have a cellular Apple Watch, you’ll be asked if you want to keep or remove your plan. If you’re keeping your Apple Watch to re-pair with your new iPhone, keep the plan.)
  5. You shouldn’t need to worry about transferring a SIM card. If you ordered your new iPhone through Apple and connected to your cellular carrier account during purchase, activating the new iPhone should cause it to take over your phone number. The same should be true if you’ve purchased directly through your carrier. Besides, it’s likely that iPhone 16 models sold in the US will rely on eSIM and lack SIM trays like the iPhone 15, so only non-US users might need to transfer the SIM card from the old iPhone to the new one. Even then, it’s better to contact your carrier and get them to activate the new SIM in the new iPhone because old SIMs don’t always support all current cellular features, such as full 5G support.
  6. Transfer your data, settings, apps, and purchased content in one of these three ways. None of them will be quick, despite the first one’s name, so initiate the transfer only when you have plenty of time:
    • Quick Start: With the Quick Start feature, content from your old iPhone copies directly from your old iPhone to your new one. We recommend this technique because it’s more likely to preserve app logins, something that’s less true when restoring from an iCloud backup. Put your iPhones next to each other (plugged into power), use the old iPhone to scan the animation on the new one, and then follow the rest of the steps.
    • iCloud: With this technique, the new iPhone will download your content from your old iPhone’s iCloud backup. Once you’ve joined a Wi-Fi network on the new iPhone and tapped the Restore from iCloud Backup button, you’ll have to select the correct backup—likely the most recent one you just made. Keep your new iPhone plugged into power the entire time to ensure that all your content syncs during this step.
    • Finder or iTunes: With this approach, you’ll restore your old iPhone’s content from a backup made to your Mac. Connect your new iPhone to your Mac using an appropriate cable, open a Finder window (or iTunes on an old Mac), select your device in the left-hand sidebar, click Restore Backup, and choose the appropriate backup—likely the most recent one.
  7. Perform post-transfer tasks. Ensure that you can make and receive a phone call. If necessary, pair your Apple Watch with the new iPhone. You’ll also need to pair your Bluetooth accessories—including AirPods—with your new iPhone. Plus, some app data needs to sync to your new iPhone, so open the Mail, Contacts, and Calendar apps and check if they have your data. It could take a few minutes for them to fill up. Apps may request notification permissions again, and you may need to download content and in-app purchases.
  8. If you use two-factor authentication with an app like 1Password, Authy, or Google Authenticator, ensure you can get your 2FA codes using your new iPhone. 1Password and Authy are good about providing access to 2FA codes from multiple devices—just log in to your account from each device—but Google Authenticator may require some additional setup since it didn’t initially offer any way to transfer codes to a new phone.
  9. Finally, if necessary, set up single sign-on for work or school. If your workplace or school uses a security system like Duo, you’ll likely want to activate your new iPhone and deactivate the old one. Using any device, navigate to a standard single sign-in login screen from your organization, look for a link for managing your logins, click that link, and follow the prompts.

Although Apple works hard to make the process of transferring from an old iPhone to a new one as painless as possible, some things may fail to transfer seamlessly. For that reason, we strongly recommend holding onto your old iPhone for a week or so to ensure the new one can do everything the old one could. During that time, put the new iPhone through its paces with an eye toward checking every app you need.

(Featured image by iStock.com/valiantsin suprunovich)


Social Media: It’s exciting to get a new iPhone, but take a few minutes to read our advice on what you need to do before—and after—transferring your data from your old iPhone.

Be Careful When Scanning Unknown QR Codes

QR codes, those square, blocky codes you scan with your iPhone’s camera to load a Web page, have become ubiquitous. So much so that we seldom pause before scanning any QR code we see. But if you think about it, that’s the same as clicking random links in emails or texts, which is a terrible idea from a security perspective. “Quishing” (QR code phishing) isn’t commonplace yet, but some sources say there are thousands of cases per month. To avoid falling victim to a quishing scam, only scan QR codes from trusted sources, try to verify what a code will do once scanned, and evaluate the yellow URL preview Safari provides (when using other browsers, all you see is Open in Browser Name). Finally, always install iOS security updates promptly because they often address vulnerabilities that could be exploited with malicious data.

(Featured image based on an original by iStock.com/B4LLS)


Social Media: QR codes—those blocky squares you scan with your iPhone camera—are an easy way to open a Web page. Unfortunately, scammers also use them to trick people into visiting malicious websites, so read our tip about scanning these codes safely.

Missed an Alert? Check Notification Center

iOS, iPadOS, and macOS all let you specify whether any given app should show no notifications, temporary banners, or persistent alerts: look in Settings > Notifications and System Settings > Notifications. Temporary banners appear briefly and then automatically disappear, which is appropriate for notifications requiring no acknowledgment. But what if you see a temporary banner only as it’s disappearing and can’t read it in time? You can find a historical list of notifications in Notification Center. To open it from the Lock Screen on an iPhone or iPad, swipe up from the middle of the screen. From any other screen, swipe down from the center of the top of the screen. On the Mac, click the date and time in the upper right corner. If your Mac has a trackpad, you can also swipe with two fingers from the right edge.

(Featured image based on an original by iStock.com/Shutthiphong Chandaeng)


Social Media: If a temporary banner disappears from your iPhone, iPad, or Mac before you have a chance to read it, you can find it in Notification Center.

Protect Domains That Don’t Send Email from Email Spoofing

We recently wrote an article for those who manage their own Internet domain names about using SPF, DKIM, and DMARC to prevent your domains from being used in phishing attacks and enhance the deliverability of legitimate email. But what about other domains you own but don’t use for email? To make phishing attacks more believable, spammers sometimes forge email so it appears to come from parked domains that aren’t protected. You can use SPF, DKIM, and DMARC to ensure that forged email that seems to come from your unused domains isn’t accepted. The details are too specific to go into here, but Cloudflare has an excellent article outlining what you need to do.

(Featured image based on an original by iStock.com/Igor Kutyaev)


Social Media: If you have parked domains that never send email, it’s important to set up SPF, DKIM, and DMARC so scammers can’t forge legitimate-looking email from those domains.

Having Trouble with a Public Wi-Fi Network’s Captive Portal Login Page?

When you connect to a public Wi-Fi network at an airport, hotel, coffee shop, or school, you may need to interact with a captive portal login page to be granted access to the network. It might require you to enter login credentials, ask for your name, or make you agree to terms of service. But what if that login page doesn’t appear, or something kicks you off the network and you can’t reconnect? In Safari, navigate to captive.apple.com, which should force the captive portal to display its login page again. If that doesn’t work, remove any custom DNS servers and restart. On the Mac, find custom DNS servers in System Settings > Network > Wi-Fi > Details > DNS. On an iPhone or iPad, go to Settings > Wi-Fi > Network Name > Configure DNS and choose Automatic.

(Featured image based on an original by iStock.com/CreativaImages)


Social Media: When you connect to a public Wi-Fi network, you often must authenticate or agree to terms on a captive portal login page. Here’s the solution if that page doesn’t appear.

Apple Explains Its Approach to Device Longevity

We Apple users tend to believe that our devices usually last longer—both physically and functionally—than Windows PCs and Android smartphones. For instance, Apple’s current operating systems work on nearly all Macs, iPhones, and iPads introduced in 2018 and later, albeit with some feature loss on the oldest devices. In a white paper entitled “Longevity, by Design,” Apple has now outlined how it works to increase product longevity through design and manufacturing, ongoing software support, and access to repair services. The white paper may be partially aimed at dissuading elected officials from passing Right to Repair legislation that could force unwanted design changes, but it still offers an illuminating look at how the company balances environmental impact, protecting customer privacy and safety, and enabling repair transparency. It’s worth a read if you’re interested in why Apple makes the design decisions it does.

(Featured image based on an original by Apple)


Social Media: Apple has published a white paper that offers an illuminating look at how the company works to increase device longevity while balancing environmental impact, protecting customer privacy and safety, and enabling transparency in repair.

Quickly Catalog Books or Other Named Items on Shelves

If you have trouble finding particular items across multiple shelves of books, labeled boxes, or anything else that’s clearly identified with a text name, take carefully composed photos that capture all the titles without glare. Later, you can search for any text in those photos to find them—tap the Search button in Photos on the iPhone or iPad, or use the Search field in Photos on the Mac. Photos highlights the search term on the found photo. (If Photos on the Mac doesn’t surface an expected photo, try again on your iPhone, which seems to get more hits on harder-to-read text.) This capability comes courtesy of Apple’s Live Text feature, which uses machine learning to identify text in photos. Think of it as the lazy person’s database!

(Featured image by Adam Engst)


Social Media: You can take advantage of Apple’s Live Text feature in Photos to catalog books, boxes, or any other items with text names. Think of it as a lazy person’s ad hoc database.

Find Some Ham Amidst Your Email Spam

Spam filters work pretty well—99% of the messages in your spam mailbox are probably spam. But it’s frustrating to miss an important message that was caught by an overeager spam filter. Here’s an easy way to find many good messages, also known as “ham,” amidst all the spam. Think of keywords that might appear in legitimate email to you: the name of your city, major employers in your area, nearby colleges, companies whose products you use, their products, and so on. Then search for those terms inside your spam mailbox, either one at a time or, if your email app supports it, as a single search with OR statements for each keyword, like this Gmail search (use your actual town name and so forth): in:spam townName OR employerName OR clubName OR companyName. Of course, your keywords will appear in some spam messages, but if the searches reveal ham messages you would otherwise have missed, they’re worthwhile. Be extra cautious around any message that wants you to click a link, log in, or provide private information. The fact that your spam filter caught a message is a red flag.

(Featured image by iStock.com/Igor Kutyaev)


Social Media: Rather than frequently skimming your entire spam mailbox for incorrectly captured messages, try searching for specific keywords that are likely to appear in legitimate email.