Security

How to see what third-party apps have access to your Google account, and how to revoke it

How to check and revoke third party access to your Google account.

Many websites and third-party apps will ask for permission to access your Google account for a variety of reasons. They will request different levels of access, ranging from basic profile info used to "sign in with Google" (similar to sign in with Facebook) up to full access to view and edit all data and even create content, which is a scary prospect. It should be obvious by now that you need to take great care regarding your data privacy, so you should know how to see who you've given access to, and how to revoke it if need be. Here's how to do it from your iPhone or iPad:

How to password protect your Pages, Numbers and Keynote documents on iPhone and iPad

How to require a password for Pages, Numbers and Keynote documents on iPhone and iPad.

Unless you have been living in a cave since the early 90s you know that cyber security is a huge issue and that you should protect your data as well as you possibly can. If you are sending private information in documents and spreadsheets over the internet via email, Dropbox, iCloud or any other service, it becomes vulnerable, regardless of how secure you think the medium is. And who knows how the recipient will handle the info?

How do I set up parental controls / restrictions on the iPhone?

Restrictions, otherwise known as parental controls, can be set on an iPhone. Content above a certain rating can be blocked and apps such as the Camera can be switched off. The user of the iPhone can be prevented from changing restrictions if they don't know the Restrictions Passcode, a four-digit number entered when first enabling restrictions.

To enable restrictions follow these instructions:

1. Navigate to Settings -> General -> Restrictions.

2. Touch Enable Restrictions and you will be prompted for a four-digit passcode.

tags: 

How to check if your Apple ID was leaked

Apple ID sign in iCloud

A long time ago, the Apple ID was like any other username. But nowadays Apple requires all Apple IDs to be verifiable email addresses. Since everyone's Apple ID is an email address, many of these have been found in data breaches and leaked online. While your actual iCloud or iTunes accounts may not be compromised, the email address you use for your Apple ID could have leaked along with billions of other account records.

How to turn off FaceTime on iPhone

FaceTime screenshots Apple

iPhone, iPad and iPod touch owners have been warned about a FaceTime bug that was recently discovered, which could affect privacy. In a nutshell, FaceTime callers can hear audio through your iOS device's microphone while it's ringing. The would-be eavesdropper has to follow a few steps to unlock the bug, however anyone receiving an incoming FaceTime call could be at risk, before the call is answered.

Pages

Subscribe to RSS - Security