Archives - iPhone


Use the built-in iOS feature to share Wi-Fi passwords

When you have friends, family or other guests to your home, chances are some of them may want access to your Wi-Fi. Instead of typing in a long password that the other person might see, you can use the Wi-Fi sharing feature in iOS 11 or higher that allows you to grant access to others […]

How to disable in-app purchases

The advent of the modern smartphone came with a slew of marketing with the slogan “there’s an app for that.” And it’s all but true: there’s an app for nearly any and everything. A lot of these apps come for the low, low price of free, but of course, there’s a catch. Free apps can […]

Enable the “Do Not Disturb” feature on your phone

Some phones come with a feature called “Do Not Disturb,” which sends all calls from people who are not saved to your contacts directly to voicemail. This can save you from answering the phone when a scammer calls and getting swindled out of personal information. Just remember to frequently empty your voicemail inbox so you […]

Disable automatic Bluetooth connectivity on your iPhone

Similar to automatic Wi-Fi connectivity, your iPhone searches for nearby available Bluetooth connections. Assailants can use a Bluetooth connection as a potential entry point to hack into your device and steal your personal information. To turn off automatic Bluetooth activity on iOS: Go to “Settings.” Go to “Bluetooth.” Turn Bluetooth off. A safer way to […]

Use Apple Pay through your iPhone

Apple Pay is a third-party digital wallet. Your credit card number is stored in this application, and you can use it to pay for your purchases with tokenization instead of giving your credit card number to an online store. This will ensure that no one has your credit card information but you.

Don’t allow your iPhone to automatically connect with trusted networks

The iPhone has a default setting that allows the device to automatically connect with known networks. Hackers can take advantage of this by setting up a fake network with the same name as a trusted source. If your iPhone connects to one of these malicious networks, the host will have access to your data. Avoid […]