Keep Your Home Pristine and Tidy With These iOS Cleaning and Organization Apps: Keeping a home clean and orderly ensures a safe and healthy environment for everyone living in it. Unfortunately, most people find it difficult to clean since it’s a chore that … Continue Reading...
Apple Offering Refurbished iPhone 6s and 6s Plus
It appears that Apple has updated its Refurbished Product Page to now offer refurbished iPhone 6s and 6s Plus models. Prices for a 16GB iPhone 6s is $449.00 which is … Continue Reading…
Mac Malware Alert – OverSight App
We previously reported on a Ransomware issue affecting Macs (read our report here). Now, a new piece of Mac malware has been discovered that could allow an intruder to monitor … Continue Reading…
Apple’s “Hello Again” Media Event
Here are the highlight from Apple’s “Hello Again” media event held at their Infinite Loop campus. Hello Again Opening Remarks by Tim Cook Apple is launching a new “accessibility” web … Continue Reading…
Questions About An Unlocked iPhone
Dear Apple Tech Talk: My wife and I just upgraded from an iPhone 5s to an iPhone 7. We purchased them at our local Apple Store because we were told … Continue Reading…
Apple Releases Software Updates
On October 24, 2016, Apple released software updates for all of their platforms. Here is summary of the various releases. MacOS Sierra 10.12.1 Adds an automatic smart album in Photos … Continue Reading…
Apple Tech Talk Joins Apple News
We are very proud to announce that Apple Tech Talk is now available as its own channel in the Apple News app. What is Apple News? Launched in iOS 9, … Continue Reading…
Evernote Confirms Data Loss for Some Mac Users
Some users of the note taking app Evernote are receiving emails alerting them that a bug in the Mac application has caused the loss of some data. What is Evernote … Continue Reading…
Adobe Flash Player Critical Update
Adobe has released security updates for Adobe Flash Player for Macintosh and other platforms. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. … Continue Reading…