Apple’s Underappreciated Technical Evolution

· · Particle Debris

TextExpander 6.1.3 with MacBook Pro Touch Bar support

Apple periodically comes out with The Next Big Thing. Along the way, however, the company makes incremental changes that also make our lives better. How those many advancements accumulate to positively affect our lives depends on how often we upgrade. Meanwhile, the punctuation of big product events keeps us coming back for more. It’s all in a delicate balance, perceived in our flow of time.

Congressional Encryption Working Group Backs Encryption, Thoughts on CES – ACM 390

· · Apple Context Machine Podcast

Apple Context Machine Logo

The Congressional Encryption Working Group has issued a year-end report on encryption that finds weakening encryption would harm the national security interests of the United States. Bryan and Jeff discuss the implications, as well as a new request from the Turkish government asking Apple to unlock an iPhone 4s owned by an assassin. They cap the show with a preview of CES expectations.

1Password 6.5 for iOS Adds Native Apple Watch App

· · Cool Stuff Found

AgileBits announced Tuesday the release of 1Password 6.5 for iOS. This release offers device syncing through 1Password.com and gets the iOS version up to date with 1Password 6.5 for Mac. The company also made the Apple Watch app native, which should mean it will be much faster (you can read more about that in the AgileBits blog). In addition to being faster, the native app allows you to access entries to any vault, including vaults stored in 1Password.com—previously, you could only access items in your primary vault. You can download the update through the App Store.

1Password 6.5 for iOS Adds Native Apple Watch App

Yahoo’s Data Breach, Mac Laptop Battery Time Estimates – TMO Daily Observations 2016-12-15

· · The Mac Observer's Daily Observations Podcast

TMO Daily Observations

Yahoo! lost over a billion user’s account information in a data breach. Bryan Chaffin and Dave Hamilton join Jeff Gamet to talk about what happened, and share some tips for protecting your accounts and data from hackers. They also look at some apps for showing the battery time remaining estimate on your Mac laptop.

1B User Accounts Compromised in Massive Yahoo! Data Breach

· · News

Over a billion Yahoo user accounts compromised in single largest data breach ever

If you have a Yahoo! login, it’s time to go change your password again. The company says personal information for more than a billion users was stolen, including names and passwords. The security breach happened in August 2013, and is likely the largest ever.

Time for a Mac Security Checkup!

· · Quick Tip

The end of the year is a good time to think through your security practices and especially what types of passwords you use (and how you store them). In today’s Quick Tip, Melissa Holt will walk us through a few of her favorite ways you can stay safe, both online and at home.

Preview: How to Create Encrypted PDFs

· · Quick Tip

If you need to send a PDF with sensitive information on it through email, then encrypt it first! Please? OK, so calling someone to give him a password isn’t the most convenient thing on earth, but it’s better than having your data compromised. Especially if said data is your social security number. Come on in to read Melissa Holt’s Quick Tip on how to protect your PDFs!

Apple Squashes 11 Security Holes in iOS 10.2

· · Product News

iOS 10 with lock and chain

Apple released iOS 10.2 on Monday, and the company was much quicker than normal in releasing the security patch notes for the release. According to those notes, there are 11 security holes fixed in the release. Most of those holes are serious, and some allowed access to various aspects of a device when it should be locked.

macOS Sierra: Launching Apps from Unidentified Developers

· · Quick Tip

macOS Sierra blocks apps it doesn't trust from launching

macOS Sierra wants to keep you safe from apps that might not have your best interests at heart, say like, ransomware that locks you out of your files until you pay out a couple bitcoin. But what about the apps Sierra won’t let you launch that you know are safe? There’s a fix for that once you know where to look.

That Time Apple Patched 3 Zero Day Exploits in Just 10 Days [Update]

· · Editorial

The Spying Eye Waiting in Every Device

Vanity Fair has a great piece about zero day exploits, the black market for selling them (to mostly governments, including repressive regimes), how they’re used to spy, and how the whole thing came to be. The story, which is quite long, is built around a particular piece of sophisticated spyware discovered by a couple of researchers, and Apple’s “engineering feat” that patched against the exploits in just ten days.

macOS Sierra: Enabling Your Mac’s Firewall and Stealth Mode

· · How-To

macOS Sierra firewall and Stealth mode protect your Mac from local network hackers

Your Mac is pretty safe on your private home network, but what about when you’re surfing the Web in coffee shops? Anyone with a computer and rudimentary hacking skills could target you, which is why it’s important to make sure your Mac’s built-in firewall is enabled—and that Stealth Mode is turned on, too. Read on to learn how.

Apple Has the Experience to Make an AR Bombshell Come True

· · Particle Debris

Augmented Reality (AR)

From time to time, we get really excited about some new gadget from Google. But then we discover later that there’s long way to go to make it a successful consumer product. On the other hand, Apple is the kind of company that can productize a great new technology. Perhaps the Apple Watch has given Apple new confidence that it can do the same for AR.

Dyn DDoS Attack Shows IoT’s Inherent Security Weakness

· · Analysis

server racks with open padlock for DDoS attack

Parts of the internet ground to a halt on Friday, October 21, when a group of hackers targeted Dyn with a distributed Denial of Service attack. The attack temporarily broke the path to many websites, including Twitter, and blocking similar attacks in the future will be a monumental task because the hackers used the internet-connected devices already in our homes.