Glenn FleishmanSenior Contributor, TechHive

Follow me on Google+

Glenn Fleishman is the author of dozens of books, including his newly released A Practical Guide to Networking, Privacy, and Security in iOS 10, a book that has information and step-by-step advice on connecting to and managing networks, and securing your data and your privacy. He's a senior contributor to Macworld, where he writes the Private I and Mac 911 columns and hosts the Macworld podcast, and contributes regularly to many periodicals.

HomeKit logo

The state of the Apple HomeKit market: Apple's smart-home ecosystem has yet to coalesce

The smart home space remains the domain of the early adopter, but Apple's HomeKit market is more scattered than most.

twitter ios app

How to protect yourself on Twitter with its improved mute, report, and filter tools

Twitter has ramped up filtering and reporting options on its website and in its mobile apps.

pizero1 3

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked

A security researcher finds a gaping hole in automatic network connections made by plugging in a dongle.

hackers

Why the Internet broke and you couldn't do anything about it

The Dyn DDoS attack is like a war in heaven. Mortals beware.

Nighthawk X10

Netgear Nighthawk X10 AD7200 Smart WiFi Router goes all the way to 11

The new router sports 802.11ac and 802.11ad, a built-in Plex server, 10Gbps networking, and bonded gigabit Ethernet.

keys ring of old antique keys stock

The best online backup service for securely encrypting your data

Every hosted backup solution manages encrypted storage a little differently. We look at who gives subscribers the keys to the castle.

screen shot 2016 09 07 at 11.15.23 am  2  720

Two cameras in iPhone 7 Plus allow synthetic zoom, soft-focus backgrounds

Apple's latest camera innovation turns photos into data streams that can be prodded for many different kinds of enhanced results.

ios 9 icon

Apple advises immediate update to iOS 9.3.5 after discovery of targeted iPhone spyware

Independent researchers tracked down malware sent to a Middle Eastern human-rights activist and alerted Apple, which patched three separate zero-day exploits.

on macworld.com

AT&T logo on Boston store

AT&T Mobile Share Advantage mimics T-Mobile, dropping overages in favor of throttling

AT&T Mobile Share Advantage plans will drop overages in favor of throttling, following T-Mobile and Sprint in this consumer-friendly trend. We dig into the details here.

apple campus headquarters

Apple announces invitation-only bug bounty program at Black Hat conference

The company had lagged behind competitors in providing financial incentives to report exploits to it.

skype for ios

The Sky(pe) is falling! Skype moves to the cloud, but what about security?

Microsoft's move of Skype to the cloud comes with a continuing lack of disclosure on security and privacy.

on macworld.com

f secure ransomeware

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.

pokemon go iphone 3up

Pokémon Go for iOS will stop requiring full Google account access

Pokémon Masters, beware: The iPhone app gains access to your Google account, but you can revoke the access now, and a better fix is coming.

Your cell phone number could be hijacked unless you add a PIN to your carrier account

Two-factor authentication and other verification systems are for naught if someone can call your phone carrier and get your number transferred to them.

thinkstock dollar on fire primary

Crowdfunding tech can serve backers poorly, even when the thing gets made

Another spate of failed and much-delayed high-profile crowdfunded projects should give pause to potential funders, especially of giant hardware projects.