Migrating Photos to a new Mac, managing and syncing your family’s photos, speeding up iOS Spotlight searches, fixing an unresponsive Digital Crown on your Apple Watch and resolving website loading delays are just some of the things you’ll learn from your two favorite geeks in this week’s show! Listen as Dave Hamilton and John F. Braun answer your questions and solve your problems.
The video sharing social network Vine shut down today, and is being reborn as a Twitter feature. Bryan Chaffin and the Maccast’s Adam Christianson join Jeff Gamet to look at the state of social networks, plus they dive into the importance of strong passwords.
Hey, guess what? Your passwords probably suck. Most of our passwords suck, as shown in an analysis of 10 million passwords released in security breaches from 2016. Bryan Chaffin has some basic tips for improving your password security, and stern words for those who slack on this!
Apple periodically comes out with The Next Big Thing. Along the way, however, the company makes incremental changes that also make our lives better. How those many advancements accumulate to positively affect our lives depends on how often we upgrade. Meanwhile, the punctuation of big product events keeps us coming back for more. It’s all in a delicate balance, perceived in our flow of time.
LAS VEGAS – Jeff Gamet learns about Blink’s new XT Outdoor security camera, door and window sensors, and more at CES Unveiled 2017 with Don Shulsinger.
The Congressional Encryption Working Group (EWG) released a year-end report this week stating specifically that, “strong encryption is essential to both individual privacy and national security.” This leaves Bryan Chaffin with hope, even though the report contained a few mixed messages.
At its World Wide Developers Conference (WWDC) this year, Apple announced that all apps on its platform must support App Transport Security (ATS). The company told developers on Friday, however, that it is extending that deadline.
The Congressional Encryption Working Group has issued a year-end report on encryption that finds weakening encryption would harm the national security interests of the United States. Bryan and Jeff discuss the implications, as well as a new request from the Turkish government asking Apple to unlock an iPhone 4s owned by an assassin. They cap the show with a preview of CES expectations.
AgileBits announced Tuesday the release of 1Password 6.5 for iOS. This release offers device syncing through 1Password.com and gets the iOS version up to date with 1Password 6.5 for Mac. The company also made the Apple Watch app native, which should mean it will be much faster (you can read more about that in the AgileBits blog). In addition to being faster, the native app allows you to access entries to any vault, including vaults stored in 1Password.com—previously, you could only access items in your primary vault. You can download the update through the App Store.
Yahoo! lost over a billion user’s account information in a data breach. Bryan Chaffin and Dave Hamilton join Jeff Gamet to talk about what happened, and share some tips for protecting your accounts and data from hackers. They also look at some apps for showing the battery time remaining estimate on your Mac laptop.
If you have a Yahoo! login, it’s time to go change your password again. The company says personal information for more than a billion users was stolen, including names and passwords. The security breach happened in August 2013, and is likely the largest ever.
The end of the year is a good time to think through your security practices and especially what types of passwords you use (and how you store them). In today’s Quick Tip, Melissa Holt will walk us through a few of her favorite ways you can stay safe, both online and at home.
If you need to send a PDF with sensitive information on it through email, then encrypt it first! Please? OK, so calling someone to give him a password isn’t the most convenient thing on earth, but it’s better than having your data compromised. Especially if said data is your social security number. Come on in to read Melissa Holt’s Quick Tip on how to protect your PDFs!
Apple released iOS 10.2 on Monday, and the company was much quicker than normal in releasing the security patch notes for the release. According to those notes, there are 11 security holes fixed in the release. Most of those holes are serious, and some allowed access to various aspects of a device when it should be locked.
macOS Sierra wants to keep you safe from apps that might not have your best interests at heart, say like, ransomware that locks you out of your files until you pay out a couple bitcoin. But what about the apps Sierra won’t let you launch that you know are safe? There’s a fix for that once you know where to look.
Vanity Fair has a great piece about zero day exploits, the black market for selling them (to mostly governments, including repressive regimes), how they’re used to spy, and how the whole thing came to be. The story, which is quite long, is built around a particular piece of sophisticated spyware discovered by a couple of researchers, and Apple’s “engineering feat” that patched against the exploits in just ten days.
Your Mac is pretty safe on your private home network, but what about when you’re surfing the Web in coffee shops? Anyone with a computer and rudimentary hacking skills could target you, which is why it’s important to make sure your Mac’s built-in firewall is enabled—and that Stealth Mode is turned on, too. Read on to learn how.
From time to time, we get really excited about some new gadget from Google. But then we discover later that there’s long way to go to make it a successful consumer product. On the other hand, Apple is the kind of company that can productize a great new technology. Perhaps the Apple Watch has given Apple new confidence that it can do the same for AR.
Parts of the internet ground to a halt on Friday, October 21, when a group of hackers targeted Dyn with a distributed Denial of Service attack. The attack temporarily broke the path to many websites, including Twitter, and blocking similar attacks in the future will be a monumental task because the hackers used the internet-connected devices already in our homes.