October 23, 2018 Today is iPhone XR review day. We don't yet have our hands on the phone, but we'll be sure to post our own review just as soon as we do. The reviews from everybody else have been universally positive, which isn't surprising. Fun fact: the iPhone XR is actually $50 cheaper than the Pixel 3. Inside every iPhone or Google Pixel phone is a special security chip that is nearly impossible to crack, which is used to store sensitive information like your credit card or fingerprints. For today's cover story, we've got all the details on how it works. A lot of articles went up yesterday claiming something like "Apple reveals what the R stands for in iPhone XR", but they either took a quote out of context with something about cars, or they simply revealed that Apple confirmed the R has no meaning and the article was clickbait. So there you go, I just saved you a click. - Lowell Heddings | | Wiki was added to the online Oxford English Dictionary in 2007—13 years after the first wiki was unveiled. | | Today's Featured Articles | | Google’s new Pixel 3 phones have a “Titan M” security chip. Apple has something similar with its “Secure Enclave” on iPhones. Samsung’s Galaxy phones and other Android phones often use ARM’s TrustZone technology. Here’s how they help protect your phone. Read More » | Android may have a more open platform than Apple, but with that comes the potential for malware. Google is trying to take steps to correct it with things like Google Play Protect, but it’s still out there. WIth a little bit of care, though, it’s pretty easy to keep your phone safe and malware-free. Read More » | Mobile security is a big deal, probably now more than ever. Most of us live on our phones, with financial information, calendar appointments, family photos, and more stored on our devices. Here’s how to keep your Android phone secure. Read More » | The Windows Registry is a database where Windows and many programs store their configuration settings. You can edit the registry yourself to enable hidden features and tweak specific options. These tweaks are often called “registry hacks.” Read More » | You don’t need an antivirus for your iPhone or iPad. In fact, any “antivirus” apps you see advertised for iPhones aren’t even antivirus software. They’re just “security” programs that can’t actually protect you from malware. Read More » | Apple claims Face ID and Touch ID are secure, and for the most part that’s true. It’s extremely unlikely a random person could unlock your phone. But that’s not the only type of attack to worry about it. Let’s dig a little deeper. Read More » | Touch ID and Face ID have made unlocking iPhones super fast and secure. It's hard for someone to fake your fingerprint or face. Now, let’s do something about those short passcodes. Read More » | Apple products, with their high sale and resale values, have always been popular targets for thieves—none more so than the iPhone. Let's look at some of the steps you can take to protect your iPhone from thieves. Read More » | iPhones and Macs with Touch ID or Face ID use a separate processor to handle your biometric information. It’s called the Secure Enclave, it’s basically an entire computer unto itself, and it offers a variety of security features. Read More » |
FYI / Useful Tips and Headlines | |
Everything Else We Published Today | |
| CUPS (short for Common UNIX Printing System) is the printing system for UNIX, Linux, and macOS operating systems. | |
Want to Change Your Email Preferences? | |
At some point in the past you subscribed to the How-To Geek newsletter, but if you'd like to change the frequency or unsubscribe, you can do so by clicking the button. Change my Subscription (or unsubscribe) | |
| |
|
|
Tidak ada komentar:
Posting Komentar