1. Blogs
    December 19th, 2014 by Glenn Fleishman
    Family Sharing is convenient, but comes with its own risks

    No Mac is an island and every iPad is part of the main. But Apple has, for many years, had trouble with letting a group of allied people – let’s...

  2. Blogs
    December 12th, 2014 by Zach Miners
    How your in-store shopping affects the ads you see on Facebook

    While many activities have migrated online, Facebook is still eager to know how its users shop in physical stores. That information helps companies...

  3. Blogs
    December 12th, 2014 by Glenn Fleishman
    Without your Recovery Key, your Apple ID could be lost forever

    Here’s a question that could change the rest of your digital life: Where is the Recovery Key for your Apple ID account? If you haven’t enabled two-step...

  4. Blogs
    December 10th, 2014 by Christopher Breen
    Top five tips for this year’s tech Santa

    Perhaps, between this month’s tinselly advertisements, you’ve heard that this is the Season of Giving. While many people consider the name nothing...

  5. Blogs
    December 10th, 2014 by Christopher Phin
    Think Retro: Why the cute and quirky eMate was Apple’s most human product

    It’s not that I don’t like Apple’s current hardware and software, but I fondly recall the days when its computers were suffused with a chirpy,...

  6. Blogs
    December 9th, 2014 by Ted Landau
    Why the iPad is anything but doomed

    Tis the season to dis the iPad. What’s going on exactly? How could a product that has been such a huge success, the leader of Apple’s march to...

  7. Blogs
    December 5th, 2014 by Glenn Fleishman
    Choosing whether to sync your passwords

    Every password you create should be unique: every site, service or system needs its own. Also, they should be long, not contain any words found in...

  8. Blogs
    December 3rd, 2014 by Christopher Phin
    Think Retro: Apple’s Adjustable Keyboard harks back to the days of touch typing

    You’ll recognise the picture to the right if you’re a Mac user of a certain vintage (does secret Vintage Mac User handshake), but anyone who came...

  9. Blogs
    December 1st, 2014 by Glenn Fleishman
    Two-factor authentication gets physical with USB U2F devices

    I’ve written a few times about two-factor authentication (2FA), where a password (something you know) is paired with a second item, like a device-generated...

  10. Blogs
    November 28th, 2014 by Keith White
    Hands on with ScreenFlow 5

    For many years the Mac OS lagged behind Windows in screen capture technology. This all changed when ScreenFlow arrived on the scene in 2008. After...

  11. Blogs
    November 28th, 2014 by Susie Ochs
    Which search engine should be crowned king of Mobile Safari?

    In the search engine game, it’s all about eyeballs. Google, Yahoo and Microsoft rake in billions each year from search ads, and now those companies...

  12. Blogs
    November 27th, 2014 by Jared Newman
    Apple Watch and Android Wear: Same destination, different paths

    The more we learn about the Apple Watch, the less it seems like a revolutionary departure from the existing wearable market. In particular, it has...

  13. Blogs
    November 26th, 2014 by Mike Elgan
    Can’t wait for the Apple Watch? You’re not alone

    Apple CEO Tim Cook unveiled the Apple Watch at a special event in September. The press was herded into a special tent to look at prototype watches...

  14. Blogs
    November 26th, 2014 by Christopher Phin
    Think Retro: When Apple packaging made the hard sell

    Today, every one of Apple’s products comes in a clean white box. They’re barely decorated, just a picture of the product that nestles inside and...

  15. Blogs
    November 21st, 2014 by Glenn Fleishman
    It’s time to encrypt everything

    If we’ve learned anything from the last few years, it’s that given the opportunity to snoop on or scarf up our data or our metadata, criminals,...

  16. Blogs
    November 20th, 2014 by Michael Simon
    10 Android Lollipop features Apple should ‘borrow’ for iOS 9

    Apple and Google are locked in a never-ending game of catch-up. Each time a new version of iOS or Android is announced, there are just as many borrowed...

  17. Blogs
    November 14th, 2014 by Glenn Fleishman
    Let the right one in: Apple uses two doors to manage malware

    Two recent security incidents, WireLurker and Masque Attack, highlight both the ease and difficulty of slipping malware onto iOS. But they also...

Contact us
x
Sign up to the Macworld Australia newsletter

Receive the latest:

  • Apple news directly to your inbox
  • Features, opinion, tips and tricks
  • Information on the tools that will run your business more efficiently

Sign up now!
X


Sign up to the newsletter