Security
Primary tabs

Shonky = dubious, unreliable
Right now the public is more skeptical about the privacy claims of businesses than ever before. However, that could change if more tech providers engineer their systems to adequately protect the data, security and privacy of their customers.
Apple is taking what may appear to its user base as an important step in this regard (good timing given the recent negative PR from its iCloud hack of celebrity photos). The tech giant says its new encryption will no longer allow it to bypass a customer's passcode to access data. This data includes that contained in text messages, emails, photographs and more.
Interestingly, CNN reported this encryption not only prevents creeps and crooks from accessing the data from iOS-powered devices; it also makes it difficult for anyone else, including law enforcement, to do the same.
However, there is at least one way police will work around this roadblock. Just as the celebrity-photo hacker gained his entry to sensitive photos through the iCloud, detectives and other government officials are likely to emulate this method. Apple has said it will comply with warrants to turn over information hosted on its servers, which is essentially what iCloud is - an collection of Apple-owned and operated servers.
In another move, Apple has said it is now working with two-step verification to ensure proper authentication of its users' identity. Two-step verification is good, and long over-due. Anyone with information security expertise can tell you that such verification has been recommended for decades. My own personal thoughts? Welcome to the cybersecurity club, Apple, we've been waiting on you for a VERY long time.
All mobile (and now wearable) device users should check to see if their devices are automatically backing up information to a cloud-based server. Often consumers have no idea this is even happening. You may be surprised of the private information about you floating around out there.
If you're looking for tips on how to secure your iCloud specifically, check out this article by Jordon Golson.