Files deleted from Apple’s Notes app shouldn’t be recoverable after 30 days, but the security and data forensics company Elcomsoft found they could access records that were deleted months—or even more than a year—ago. That sounds pretty bad, but recovering those files requires some pretty specific elements, including knowing your iCloud login and password.
As artificial intelligence systems improve, voice assistants like Siri make take a more active role in protecting our computers and our online activity. John Martellaro and Kelly Guimont join Jeff Gamet to look at how Siri may play a bigger part in our personal cyber security, and whether or not that’s something we want.
Starting on June 15, Apple will require third-party apps that use iCloud to use app specific passwords that the user sets up. This also means that you must be using two-factor authentication for your Apple ID. Andrew Orr tells us what this means for you.
Apple squashed 30 security holes in macOS Sierra with the release of macOS 10.12.5 on Monday. The company’s security notes indicate the update addressed a wide variety of issues in its Mac operating system, many of which are serious. Apple included the same fixes in separate security updates for El Capitan and Yosemite.
Apple released iOS 10.3.2 Monday. The patch notes for the updates indicate it is entirely a maintenance update, noting that it “includes bug fixes and improves the security of your iPhone and iPad.”
Modzero, a security firm in Switzerland, has discovered a Conexant keylogger pre-installed on certain laptop models. It’s an audio driver located in the Windows system folder. This driver automatically loads every time a user logs in. Andrew Orr shares which HP models are affected.
The FBI refused to ever share how much it paid for the hack into San Bernardino shooter Syed Farook’s iPhone, but thanks to Senator Diane Feinstein we now know the price was US$900,000. The Senator accidentally spilled the beans during a Judiciary Committee meeting on accessing encrypted data on smartphones and personal computers.
A new piece of malware, called OSX/Dok, has been discovered by the Check Point malware research team. It affects all versions of macOS and is signed with a valid developer certificate authenticated by Apple. Dok malware is also the first to spread in a widespread email phishing campaign. Andrew Orr gives us the technical details.
Quick Tips, Cool Stuff Found and LOTS of questions. Sleeping Mac? No problem. VIP Mail help? No problem. Building a home? No problem. Want to know about VPNs? Well, now… just kidding. No problem! Mac Geek Gab answers your questions and shares your tips so everyone can learn at least four new things each week!
Apple says an iMac with pro features is coming later this year, but didn’t elaborate on exactly what that entails. Jeff Butts and Dave Hamilton join Jeff Gamet to talk about what they’d like to see in the new model. Spoiler: they were able to distill that down to two words.
SMC Resets, Migration Assistant tricks, Auto-Upgrade solutions and Renting vs. Owning your Cable Modem are just the beginning for your two favorite geeks today. S/MIME is taken to a whole other level with guest Jeff Butts who helps us all understand how to make this work on both macOS and iOS! Then it’s time to dive into your system certificates – and which ones you can touch vs. those that you can’t. Security is always on the mind and a quick VPN discussion rounds that out. Then John and Dave move on to something more pleasing to the ear: sound, and how best to manage it on your Mac!
Along with the promise of new a new Mac Pro yesterday, Apple also said it’s going to get back into the pro display business, too. John Martellaro and Kelly Guimont join Jeff Gamet to talk about Apple’s plans, plus they look at Broadcom’s WiFi chip security flaw.
If you haven’t installed Apple’s iOS 10.3.1 update yet, now would be a good time because it fixes a big security flaw in the Broadcom WiFi chips in your iPhone. The security flaw could let attackers who are in WiFi range inject and run code on your smartphone.
Thanks to a new law green lighting ISPs selling our personal web browsing data, along with restrictions prohibiting the FCC from stopping the activity, there’s a lot of talk about VPNs, or Virtual Private Networks. With so many VPN services to choose from it’s hard to decide which is best for you, so I asked the TMO staff what they rely on.
There are many things Bryan Chaffin wishes Apple would release. Streaming TV, a smarthome hub, new freaking Macs, the list goes on. But something new on his mind is an Apple owned and operated virtual private network (VPN). He explains why this would be a welcome port in the storm of surveillance capitalism.
Yesterday we explained what a VPN is and covered the benefits of using one. Today we’re examining how to figure out if you have a trustworthy VPN provider. In place of your ISP, your VPN provider receives your browsing data, and it’s good to shop around and compare privacy policies. Andrew Orr tells us what to look out for.
Now that Congress have chosen to allow ISPs to sell your data, many people are turning to VPNs to help. But you may not know how VPNs work, or how a VPN can help you browse the web safely. In this article Andrew Orr explores the technical details and gives you our VPN recommendations.
Apple quietly added a new privacy control tool in macOS Sierra 10.12.4 that allows you to opt out of sharing iCloud Analytics data. Bryan Chaffin shows you how to control what you send so you can decide.
When you first enable two-factor authentication in iCloud, you might notice some of your apps appear broken. This is because those apps don’t support 2FA, and require app-specific passwords. Follow along with Jeff Butts as he demonstrates how to generate and manage your app-specific passwords.