Spring has finally sprung, which is great news for 12 News photographer Brian Felsenthal. Felsenthal lost his personal iPad in a snowbank while covering a significant winter storm earlier this year.
Stop feeding online businesses your data and prevent both surveillance and tracking with our updated step-by-step guide.
Google's services are powered by data collection. It can be helpful in some cases and too invasive in others. Here's how to check what you're sharing and adjust the privacy settings on your account.
Right now, you can grab the 1st Generation Apple AirTags (4-pack) for $63 at Amazon, down from $99. That works out to just ...
Apple's AirPods Pro 3 wireless earbuds are the who's who of in-ear headphones. They feature live translation, heart-rating ...
Apple's Find My network is incredibly useful for tracking devices with AirTags, but there are actually other accessories that can make sue of the network.
Apple’s iPhone has long included a hidden flight-tracking tool that most users never discover. When someone texts a flight number in Messages or types one into Spotlight Search, iOS can automatically ...
Google has added a feature to its Find Hub app that lets travellers share the location of a lost bag directly with their airline. The "share item location" tool generates a secure, time-limited link ...
MOFT has officially rolled out its new snap-on MagSafe wallet, first unveiled at CES 2026, and it brings Apple Find My tracking into an ultra-slim design. The accessory combines three everyday ...
Thanks to the AirTag (see “Apple’s AirTag Promises to Help You Find Your Keys,” 20 April 2021), those of us who tend to leave our car keys in random locations no longer have to ransack the house to ...
Never lose your wallet again with one of our picks Written By Written by Staff senior editor, Buy Side Nick Guy is a staff senior editor for Buy Side. He's been reviewing personal technology, ...
Protecting your privacy is crucial if you suspect your iPhone is being tracked. Tracking can occur through various methods, including shared Apple IDs, spyware, or third-party apps. Each method poses ...