10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

How to use Apple’s new Passwords app on iOS and macOS


Among the plethora of new features ushered in with iOS 18 and macOS Sequoia, you might have spotted a brand-new app called Passwords. This is Apple’s new password manager for your iPhone, iPad, Mac, Vision Pro, and Windows PC, and it takes over from the more rudimentary password saving and syncing that was previously available via Safari and iCloud Keychain.

Before these software updates rolled out, you could find your stored passwords for apps and the web in a variety of places, depending on how you synched them. Most recently, there were Passwords entries in iOS Settings and macOS System Settings. Now, there’s a dedicated app and one that offers more than password storage.

It’s all simple to use and comprehensive, but it might not offer quite enough to replace your password manager — you don’t get the integrated ability to store documents, IDs, credit cards, and some of the other information that third-party password managers can save for you. Still, it’s a comprehensive option if you spend all your time on Apple devices. Here’s how it works.

Finding and editing passwords

The new Passwords app will have all the passwords you’ve previously saved in iOS and macOS.
Screenshot: Apple

The new Passwords app should seamlessly sweep up all the passwords you already had stored in various places during the upgrade to iOS 18 and macOS Sequoia. Just launch Passwords on your iPhone or Mac — you’ll need to verify your identity (with a password or using Face ID, for example). 

The app looks very similar on both platforms, albeit with some of the usual adjustments to fit screens of different sizes. You’ve got your passwords as before, but there are also entries for verification codes, passkeys, and Wi-Fi passwords. These were previously saved in iOS and macOS, but now they’re much more accessible.

Click or tap on any of the entries to see the full details of what’s stored, and select Edit if you want to update something manually. You can’t add tags or create private groups for passwords, but you can add notes and then run searches using the text in those notes. So, for example, you could add “important” to all the passwords you use most often.

The layout is similar on iOS and macOS.
Screenshot: Apple

You can give the Passwords app permission to autofill login details.
Screenshot: Apple

As in earlier versions of iOS and macOS, you’ll get warnings if your passwords have been used more than once or have appeared in a data breach. To find these warnings:

  • On the main page, click or tap Security.
  • If a password has been compromised, you’ll find a message in red telling you that. You’ll also see listed any sites for which you’ve used passwords that could be easily guessed.
  • Long-press on an entry. You can either hide the commendation or select Change Password to set a new password.
  • This takes you to the website for the app or service, where you can log in and find the password settings page.

If a password has been compromised, you’ll find a message in red.
Screenshot: Apple

You are encouraged to change compromised passwords.
Screenshot: Apple

When viewing your main password list, click or tap the icon showing an up arrow or a down arrow — it’s at the top on macOS and at the bottom on iOS — to order the entries based on when they were first created or when they were last edited as well as by website or app name.

Whenever you’re logging in to an app on your iPhone or Mac or a website in Safari, you’ll get suggestions from the Passwords app as long as you have autofill turned on. To check this, head to Settings (iOS) or System Settings (macOS):

  • Choose General > AutoFill & Passwords.
  • Enable the AutoFill Passwords and Passkeys toggle switch.
  • Turn on the Passwords toggle switch.

Adding and sharing passwords

You’ll get offers to save passwords in the future.
Screenshot: Apple

Passkeys can be synced between devices, too.
Screenshot: Apple

Once you’ve checked up on your existing passwords and made sure they’re all safe and sound, you can add new ones manually by tapping on the + button in the lower-right corner (iOS) or in the toolbar at the top (macOS). Enter your login credentials, hit Done or Save, and it’s stored.

Going forward, when you try signing in to apps or websites (in Safari), you should see the Passwords app spring into action and offer to save your login credentials for you, and you can either accept or decline the offer using the dialog box that pops up.

You’ll get the same offer for passkeys, the relatively new login method being pushed by Google, Microsoft, Amazon, eBay, and many others. Essentially, you use your device’s unlock method — typically Face ID or Touch ID — to log in, instead of a password, which should be an easier and more secure method. The Passwords app won’t actually store your fingerprint or face, but it’ll keep tabs on the accounts you’ve set up with a passkey and sync this list between devices, so you’ll be met with a passkey prompt rather than a password prompt when you log in. If you need to revoke passkey access for whatever reason, you can do this by clicking or tapping Edit on the stored entry.

You can share passwords with trusted contacts, too.
Screenshot: Apple

Finally, there’s password sharing here, too. To share a password with someone else via AirDrop, select any password stored in the app, then click the share button (the square with an arrow). To share with a group of people:

  • Click the + button next to Shared Groups (macOS) or + New Group (iOS).
  • Select Continue in the dialog box that explains the feature.
  • Give the group a name, then choose Add People to select your contacts.
  • Choose Create.
  • Pick any passwords you want to share with the group.

You can add additional passwords to a group by dragging their entries on top of the group (macOS) or going to individual password pages and setting the group there (macOS and iOS). Only do this with people you absolutely trust, though. It effectively lets them use these login credentials as if they were their own.

Of course, the people you share passwords with also need Apple devices with the Passwords app on them — perhaps another reason you might want to opt for a third-party password manager instead. 



Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …