<div id="popup_box_thanks" style="display:none" onClick="close_popup_thanks('popup_box_thanks', 'ts')"><br>Thanks for submitting your tip! All submissions are moderated by an editor before appearing online. We've reset the form so you can enter another tip. Or you can close the tip submission box. <div class="x_close" id="thanks_upper_right"><a href="javascript:void(0)" onmousedown="close_popup_thanks('popup_box_thanks', 'ts'); return true;">Close</a></div></div>
<div class="tbf_row"><div class="tbf_wide_extra_top not_bold">Please submit only technical tips that will help other TidBITS readers better use their Macs, iPhones, and related software and hardware. All product announcements should be sent to <a href="mailto:releases@tidbits.com">releases@tidbits.com</a>.</div></div>
<div class="tbf_left">URL</div><div class="tbf_right"><input type="text" value="" name="tip_link_url" tabindex="3"><span class="tip_description"><br>Enter the URL to a Web page that supports your tip.</span></div>
</div>
<div class="spacer"></div>
<div class="tbf_row">
<div class="tbf_left">Linked text</div><div class="tbf_right"><input type="text" value="" name="tip_link_label" tabindex="4"><span class="tip_description"><br>Enter the name of the page linked above.</span></div>
<div class="tbf_wide"><input type="submit" value="Preview Your Tip" name="preview_tip" onClick="fill_preview('tipbits_enclosure_preview', 'ts', this.form); return false;" tabindex="7"> <input type="submit" value="Send Us Your Tip!" name="submit_this_tip" onClick="handle_tip_submission('ts', '', this.form, 'tip'); return false;" tabindex="8"></div>
</div>
<div class="spacer"></div>
<div class="tbf_row">
<div class="tbf_wide"><span class="fine_print">When you submit a tip, you give us permission to use it. Read <a href="javascript:void(0)" onClick="generic_show_hide('tip_terms')">our terms</a> for more details. All submissions are reviewed before publication.</span></div>
<div class="tbf_wide"><span class="fine_print">Our terms: By submitting a tip, you agree to assign TidBITS Publishing Inc., a non-exclusive, worldwide, perpetual license to reproduce, publish, and distribute your tip in connection with the TidBITS Web site and associated products in any media. You agree that you created the content you submitted, and that you have the right to assign us this license. You give us permission to use your name, but your email address won't be publicly displayed or shared. We review all submissions before publication, and reserve the right to select which submissions we feel are appropriate for our readers and to edit those we publish.</span></div>
<div id="comment_thanks" style="display:none" onClick="close_popup_thanks('comment_thanks', 'comm')"><br>Thanks for submitting a comment! Please check your email for a link that, when clicked, will verify that you're a real person and cause your comment to appear immediately. <div class="x_close" id="comment_upper_right"><a href="javascript:void(0)" onmousedown="close_popup_thanks('comment_thanks', 'comm'); return true;">Close</a></div></div>
<div class="tbf_wide"><span class="fine_print">Our terms: We reserve the right to edit or delete any comment, so please post thoughtfully. We use your email address <i>only</i> to send you a one-time verification message confirming that you posted this comment. We also store your address to allow you to verify using other Web browsers in the future. For more info, see our <a href="http://db.tidbits.com/privacy.html">privacy policy</a>.</span></div>
<li><a href="/feeds/tidbits.rss" title="Subscribe via RSS" class="gettb">RSS <img src="/images/feed-icon-12x12.gif" width="12" height="12" border="0" class="nav_img" alt="Subscribe via RSS"></a></li>
<li><a href="http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=276986548" title="Subscribe to the podcast" class="gettb">Podcast <img src="/images/feed-icon-12x12_podcast.gif" width="12" height="12" border="0" class="nav_img" alt="Subscribe to the postcast"></a></li>
<li><a href="http://www.twitter.com/TidBITS" title="Get Article Updates via Twitter" class="gettb">Twitter <img src="/images/feed_icon_12x12_twitter.png" width="12" height="12" border="0" class="nav_img" alt="Get Article Updates via Twitter"></a></li>
<li><a href="http://www.facebook.com/pages/TidBITS/195314925519" title="Go to the TidBITS Page at Facebook" class="gettb">Facebook <img src="/images/feed_icon_12x12_facebook.gif" width="12" height="12" border="0" class="nav_img" alt="Go to the TidBITS Page at Facebook"></a></li>
<li><a href="javascript:void(0)" title="Sections" class="tabhead" onClick="return showhide('articleslist')">Sections <span id="articleslist_triangle"><img src="/images/nav_triangle_open.gif" width="9" height="9" border="0" class="navtriangle" id="articleslist_tri_image" alt="Click to show or hide the contents of this section."></span></a></li>
<li><a href="javascript:void(0)" onClick="return showhide('stafflist')" title="Staff" class="tabhead">Staff <span id="stafflist_triangle"><img src="/images/nav_triangle_closed.gif" width="9" height="9" border="0" class="navtriangle" id="stafflist_tri_image" alt="Click to show or hide the contents of this section."></span></a></li>
<li><a href="javascript:void(0)" title="Issues" class="tabhead" onClick="return showhide('issuelist')">Weekly Issues <span id="issuelist_triangle"><img src="/images/nav_triangle_closed.gif" width="9" height="9" border="0" class="navtriangle" id="issuelist_tri_image" alt="Click to show or hide the contents of this section."></span></a></li>
<li><a href="javascript:void(0)" onClick="return showhide('abouttidbits')" title="About TidBITS" class="tabhead">About TidBITS <span id="abouttidbits_triangle"><img src="/images/nav_triangle_closed.gif" width="9" height="9" border="0" class="navtriangle" id="abouttidbits_tri_image" alt="Click to show or hide the contents of this section."></span></a></li>
<div class="center_top">Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling <a href="http://www.takecontrolbooks.com/?pt=TB-TAGLINE" style="color:yellow">Take Control</a> ebooks.</div>
<!-- begin centercolumn -->
<div id="centercolumn">
<!-- begin rightcolumn_container -->
<div id="rightcolumn_container">
<!-- begin rightcolumn -->
<!-- rightcolumn is embedded within centercolumn so featured text wraps around it -->
<div id="rightcolumn">
<p class="top"> </p>
<!-- begin tearoff box wide for bio -->
<div class="tearoffbox_wide_container">
<div class="tearoffbox_wide_p">
<p class="tearoffbox_wide_top_p"> </p>
<h5>Author Biography</h5>
<p class="tearoffbox_text">Rich Mogull has been working in the security world for 17 or so years, and breaking computers (usually by accident) even longer. After about 10 years in physical security (mostly running large events/concerts), he made the mistake of getting drunk in Silicon Valley and telling someone he "worked in security." Next morning he woke up with a job as an IT security consultant. That's not totally true, but it's far more amusing than his full biography. He currently works as an independent security consultant and writer through <a href="http://www.securosis.com/">Securosis.com</a> and previously spent seven years as an analyst with Gartner. Rich has also worked as a paramedic, done stints as a firefighter and with Rocky Mountain Rescue, and recently retired from ski patrol when he moved to sunny Arizona. He still dabbles in disaster medicine, when nature cooperates.</p><p class="tearoffbox_text_email"><span class="shift_down"><img src="/images/gettb_button_email.gif" height="12" width="12" border="0" alt="Send Email to Author"></span> <a href="javascript:void(0)" onClick="document.check_human_355.submit_type.value='email'; document.check_human_355.author_id.value='355'; ShowTipBox('hc_355', 'hc_recaptcha_355', 'cb_item_add')">Email the author</a></p>
<div class="tbf_wide_80" id="hc_rc_355">To help us avoid automated posts and misuse of our site, please enter the words below.</div><div class="x_close_row" id="hc_upper_right4_355"><a href="javascript:void(0)" onmousedown="HidePopupContent('hc_355', 'hc', '355'); return true;">Close</a></div>
</div><!-- end tearoffbox_wide_container for watchlist items -->
<!-- begin tearoff box wide -->
<div class="tearoffbox_wide_container">
<div class="tearoffbox_wide_tips">
<div class="tip_display">
<div class="tips_sponsor_logo">
</div>
<h6>How to Make an iPhone Screenshot</h6>
<p><p>Want to take a screenshot of something on your iPhone or iPod touch? Press the Home button and Power button briefly at the same time, and an image of your screen will be saved to the Photos app (and will sync with iPhoto when you next connect). Don't hold the buttons too long or your device will either power down or reboot.</p></p>
</div>
<div class="tearoffbox_wide_bottom_tips">
<div style="padding-bottom:35px"><div class="tip_display" style="float:left"><p><br><a href="/tipbits/100">Link to this tip</a></p></div><div class="tip_display" style="float:right; width:150px">
<a href="/article/11505"onMouseOver="blurb_slide('11505', 'show')">Apple's iOS Security Challenges and Advantages</a></h4>
<div class="article_preview" id="blurb_11505" style="display:none"><div id="popup_inner_11505">The iPad, iPhone, and iPod touch are completely disrupting the mobile device landscape, and while Apple faces some security challenges with the iOS devices, the company also enjoys a number of advantages over other systems.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=17" class="category">iPhone iPad iPod</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 09 Aug 2010 | <a href="/article/11505#comments">5 comments</a></div></div>
<a href="/article/11435"onMouseOver="blurb_slide('11435', 'show')">Why Using an iPhone 4 Case May Improve Signal Strength</a></h4>
<div class="article_preview" id="blurb_11435" style="display:none"><div id="popup_inner_11435">Although Apple is now giving out iPhone 4 cases to help resolve the antenna issues, few sources explain how a simple piece of tape or a case can make a difference. Rich Mogull digs into his radio geek past for an explanation.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="article_preview" id="blurb_11324" style="display:none"><div id="popup_inner_11324">With a zero-day vulnerability in Adobe Flash, a new way of extracted data from an encrypted iPhone, and a malicious bit of spyware making the rounds, it has been a rough few weeks in the security world. Read on for our suggestions on how to protect yourself, and be careful out there.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=6" class="category">Tech News</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 07 Jun 2010 | <a href="/article/11324#comments">8 comments</a></div></div>
<a href="/article/11282"onMouseOver="blurb_slide('11282', 'show')">How to Protect Your Privacy from Facebook</a></h4>
<div class="article_preview" id="blurb_11282" style="display:none"><div id="popup_inner_11282">Facebook may be the single most popular social media service on the Internet, but its policies and practices demonstrate little concern for your privacy. Security expert Rich Mogull explains how to protect your privacy on - and from - Facebook.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=5" class="category">Networking</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 14 May 2010 | <a href="/article/11282#comments">27 comments</a></div></div>
<a href="/article/11135"onMouseOver="blurb_slide('11135', 'show')">Apple Unveils big iPod touch</a></h4>
<div class="article_preview" id="blurb_11135" style="display:none"><div id="popup_inner_11135">Apple has announced plans to release a larger iPod touch to complete their portable product line, silence critics, and better differentiate the iPad.</div><!-- blurb inner --></div><!-- blurb outer -->
<a href="/article/10972"onMouseOver="blurb_slide('10972', 'show')">Prepare Your Enterprise for the iPad</a></h4>
<div class="article_preview" id="blurb_10972" style="display:none"><div id="popup_inner_10972">As with the iPhone, the iPad's undeniable consumer appeal means that IT departments shouldn't be surprised when users start bringing them to work.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=17" class="category">iPhone iPad iPod</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 02 Feb 2010 | <a href="/article/10972#comments">13 comments</a></div></div>
<a href="/article/10817"onMouseOver="blurb_slide('10817', 'show')">Banging My Head Against iCal Server's Limitations</a></h4>
<div class="article_preview" id="blurb_10817" style="display:none"><div id="popup_inner_10817">After putting up with basic calendaring limitations that Apple failed to improve in Snow Leopard, Snow Leopard Server, and iPhone OS 3.0, Rich Mogull worries that his devotion to Apple server technologies may be indication of mental disorder.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=8" class="category">Macs & Mac OS X</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 14 Dec 2009 | <a href="/article/10817#comments">31 comments</a></div></div>
<a href="/article/10832"onMouseOver="blurb_slide('10832', 'show')">The Great TidBITS Malware False Alarm of 2009</a></h4>
<div class="article_preview" id="blurb_10832" style="display:none"><div id="popup_inner_10832">Some TidBITS readers' antivirus filters flagged TidBITS #1006 as being malicious, but a little research quickly exonerated our email issue, showing that the antivirus filter in question was instead badly designed.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=14" class="category">Inside TidBITS</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 10 Dec 2009 | <a href="/article/10832#comments">4 comments</a></div></div>
<a href="/article/10676"onMouseOver="blurb_slide('10676', 'show')">Microsoft Store Mimics - and Enhances - Apple Store Experience</a></h4>
<div class="article_preview" id="blurb_10676" style="display:none"><div id="popup_inner_10676">Rich Mogull shares his experience of attending the grand opening of the first official Microsoft Store in Scottsdale, Arizona.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=6" class="category">Tech News</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 22 Oct 2009 | <a href="/article/10676#comments">18 comments</a></div></div>
<a href="/article/10652"onMouseOver="blurb_slide('10652', 'show')">Protect Yourself from Adobe Acrobat and Reader Vulnerabilities</a></h4>
<div class="article_preview" id="blurb_10652" style="display:none"><div id="popup_inner_10652">All users should immediately patch Adobe Acrobat and Reader and, due to Adobe's ongoing string of major security flaws, should set Apple's Preview as their default PDF reader.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=13" class="category">Safe Computing</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 16 Oct 2009 | <a href="/article/10652#comments">8 comments</a></div></div>
<div class="article_preview" id="blurb_10509" style="display:none"><div id="popup_inner_10509">Snow Leopard includes a bevy of important behind-the-scenes security updates, and one major feature we hope you never see. Rich Mogull details what's changed, how this affects your security, and the one improvement we're still waiting for.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=13" class="category">Safe Computing</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 27 Aug 2009 | <a href="/article/10509#comments">14 comments</a></div></div>
<a href="/article/10468"onMouseOver="blurb_slide('10468', 'show')">iPhone 3GS Hardware Encryption Easy to Circumvent</a></h4>
<div class="article_preview" id="blurb_10468" style="display:none"><div id="popup_inner_10468">Although the iPhone 3GS automatically encrypts all data on the device using special hardware, the implementation is deeply flawed, allowing access to your information if someone has access to your iPhone.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=17" class="category">iPhone iPad iPod</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 07 Aug 2009 | <a href="/article/10468#comments">2 comments</a></div></div>
<a href="/article/10416"onMouseOver="blurb_slide('10416', 'show')">iPhone 3GS Offers Enterprise-Class Security for Everyone</a></h4>
<div class="article_preview" id="blurb_10416" style="display:none"><div id="popup_inner_10416">Rich Mogull explains how to configure your iPhone securely, and how to take advantage of the new hardware encryption in the iPhone 3GS.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="article_preview" id="blurb_10401" style="display:none"><div id="popup_inner_10401">When TidBITS editor Rich Mogull convinced his old college professor, now a sustainability researcher, to switch to the iPhone he never realized he was helping save the environment. Learn how to "reduce and reuse" the iPhone way.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="article_preview" id="blurb_10396" style="display:none"><div id="popup_inner_10396">Security researcher Charlie Miller has discovered a way to attack and control an iPhone using only SMS messages. Don't worry, the details aren't public yet, and Apple should have a patch soon.</div><!-- blurb inner --></div><!-- blurb outer -->
<a href="/article/10350"onMouseOver="blurb_slide('10350', 'show')">Call AT&T for the Best iPhone Upgrade Price</a></h4>
<div class="article_preview" id="blurb_10350" style="display:none"><div id="popup_inner_10350">AT&T's iPhone pricing isn't tied simply to how long you've had your current phone. Come learn the different factors that affect your upgrade pricing and strategies for getting the best deal.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=17" class="category">iPhone iPad iPod</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 15 Jun 2009</div></div>
<a href="/article/10321"onMouseOver="blurb_slide('10321', 'show')">Five Ways Apple Can Improve Mac and iPhone Security</a></h4>
<div class="article_preview" id="blurb_10321" style="display:none"><div id="popup_inner_10321">By following these five recommendations, Apple can ensure that its products will remain safe in an increasingly dangerous computing world.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=13" class="category">Safe Computing</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 03 Jun 2009</div></div>
<div class="link_hover" id="link_box_full_10319" onMouseOver="blurb_slide('10319', 'show'); link_hover_swap('10319', 'in')" onMouseOut="link_hover_swap('10319', 'out')"><div class="link_hover_title"><a href="http://www.macworld.com/article/140873/2009/06/apple_java_security.html" id="link_hover_title_10319">The Truth About Apple, Mac Security, and Responsibility</a></div><div class="link_box_right" id="link_box_right_10319" style="visibility:hidden"><img src="/images/external_link_arrow.gif" height="15" width="15" border="0" alt="arrow"> <img src="/images/favicons/macworld.png" border="0" alt="favicon"> </div></div><div class="spacer"></div>
</h4>
<div class="article_preview" id="blurb_10319" style="display:none"><div id="popup_inner_10319">Over at Macworld, TidBITS editor Rich Mogull uses the unpatched Java vulnerability and a recent ComputerWorld troll bait article as an excuse to talk about who is really responsible for Mac security.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=21" class="category">External Links</a> | 02 Jun 2009</div></div></div>
<a href="/article/10292"onMouseOver="blurb_slide('10292', 'show')">Protect Yourself from the Mac OS X Java Vulnerability</a></h4>
<div class="article_preview" id="blurb_10292" style="display:none"><div id="popup_inner_10292">Macs are vulnerable to a five-month-old vulnerability in Java that is being actively exploited on the Internet. Here's how to protect yourself.</div><!-- blurb inner --></div><!-- blurb outer -->
<div class="featured_meta"><a href="/index.cgi?tbcat=13" class="category">Safe Computing</a> | by <a href="/author/Rich%20Mogull">Rich Mogull</a> | 20 May 2009</div></div>
<a href="/article/10218"onMouseOver="blurb_slide('10218', 'show')">Five Tips for Reading Mac Security Stories</a></h4>
<div class="article_preview" id="blurb_10218" style="display:none"><div id="popup_inner_10218">Worried about the latest Apple security story? Follow these five tips to find out if you're really at risk.</div><!-- blurb inner --></div><!-- blurb outer -->