Author: wouter

Apple releases macOS 10.13.2 supplemental security update following Spectre and Meltdown flaw discovery

Apple releases macOS 10.13.2 supplemental security update following Spectre and Meltdown flaw discovery Zac Hall Apple has released an update to macOS High Sierra for all Macs running macOS 10.13.2. The supplemental security update likely addresses the Spectre flaw that affected Safari and may contain further mitigations for Meltdown. Apple released the original version of macOS 10.13.2 back in early December, but acknowledged last week that Safari would require further updates to help lessen potential issues related to recently disclosed vulnerabilities. All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time. Since exploiting many of these issues requires a malicious app to be loaded on your Mac or iOS device, we recommend downloading software only from trusted sources such as the App Store. Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown. Read the full article →

Apple releases iOS 11.2.2 security update for iPhone and iPad

Apple has released iOS 11.2.2 for iPhone and iPad. The software update highlights security improvements and Apple “recommends for all users.” Apple hasn’t disclosed exactly what security issues are addressed by iOS 11.2.2, but we can expect to see details on Apple’s security page shortly. We’ll update when we learn more about the new version. For now, non-beta users can find iOS 11.2.2 for iPhone and iPad as a software update over-the-air through the Software Update section of the Settings app. The update could relate to the recently disclosed Spectre and Meltdown flaws discovered in most computer processors including ones used in iPhones and iPads. Apple acknowledged both issues last week and said it already addressed issues that could affect iOS and macOS while risks to Safari would be addressed soon. Update: Apple says the update is for Safari to address the Spectre vulnerability. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Description: Read the full article →

Remember to Back Up

I have a client that did remember to Back-up, but unfortunately had both computer and back-up drive in his car, when both were stolen. Always keep Back-up and computer apart except when backing up!! So, when you're working on a computer, what are the two, most important words you should think about most often? The answer, 'Back up'! You probably already use some form of back up, either Time Machine, or iCloud or another cloud service. You might even have your computer connected to a firewire drive, or you save to DVD, although this has become increasingly hard to do these days because of space limitations. If you've ever had a computer crash - and I have - uggghhh! - you'll know the panic feeling! One of the first thoughts which went through my mind was "Oh, no! Have I lost all my contacts, photos and my calendar data?". I certainly don't keep copies of my data. Nightmare! However, there's a really simple way to back up all your Data. Here's how. First, Read the full article →

HOW TO Improve Battery Life on Your iPhone in iOS 11

The new iOS 11 was just released by Apple, and you can install it right now. Overall, it's got some great features, but how does it fare battery-wise on your iPhone? And how can you increase daily battery life for more juice and less charging every day?No matter the iOS version, if there's one thing I'm constantly thinking about during the day, it's my iPhone's battery. And I'm sure it's a big concern for you, too. You never want to see it get too low, especially when you know you're nowhere near a charging port. (Stuck on the subway, anyone?) The internet is congested with conflicting tips and tricks to maximize daily battery life, so it's a little messy trying to figure out what's what, especially now that there's iOS 11 with the possibility of new battery-draining features to fix. To help you sort through the chaos, we've compiled the best of the best to make it as easy as possible to boost your iPhone's everyday battery life. While we're focusing on improving how long your iPhone Read the full article →

Should you preorder Apple’s iPhone 8, or wait for the iPhone X?

By Roger Fingas Wednesday, September 13, 2017, 01:06 pm PT (04:06 pm ET) With pre-orders starting this Friday, and the first deliveries hitting Sept. 22, it may be tempting to buy an iPhone 8 instead of waiting for the iPhone X, coming Nov. 3. There are a few factors to consider before going either route. Cost, naturally, will be the overarching concern for most people. At $699 — $50 more than the iPhone 7 was a week ago — even a 64-gigabyte iPhone 8 may be too expensive. The $999 price tag on the iPhone X could be a non-starter unless your phone is your primary computing device, or you're simply affluent enough that it doesn't matter. When you consider that you could buy a MacBook Air or a complete Windows PC for the same amount, that should give pause. Either device may be more affordable under Apple's iPhone Upgrade Program, which guarantees a new iPhone and AppleCare+ every year in exchange for monthly payments and trading in your old iPhone. Remember though that in Read the full article →

“Invitation to the Great Illuminati” Spam Mail

For a moment, I thought I’d woken up in a Dan Brown novel, but it turns out that spam can be mysterious too: INVITATION TO THE GREAT ILLUMINATI Your email was selected among the ten lucky people giving the opportunity of becoming rich and popular by joining the great Illuminati network for more details please contact email ([email] ) for more details. In keeping with subject matter, the email doesn’t really go into further details. A quick Google of the subject matter confirms this is dropping into a lot of mailboxes right now. But to find out the real deal we have to go back to March on the 419 Eater forum, where spam and scam emails are met with intentionally time-wasting responses to prevent them cheating regular web users out of their cash. Things the scammers ask for in the 419 thread: 1) A photograph and information about where you live, for the eventual “initiation ceremony in Long Beach, California”. 2) They have to contact a second Read the full article →

Now’s a good time to check which of your apps won’t open in iOS 11 as 32-bit support dropped

  Apple was dropping support for 32-bit applications altogether in iOS 11. In iOS 10, Apple displays a warning message and then allows the app to open; in iOS 11, the app won’t open at all. But with some 187,000 32-bit apps still in the App Store – amounting to around 8% of the total – now would be a good time to check your own apps. It takes just a few seconds to do this … The estimate of the total number of 32-bit apps still out there comes from Oliver Yeh, co-founder of app intelligence firm Sensor Tower, via Business Insider. To check whether you currently have any 32-bit apps installed, go to Settings > General > About > Applications. If nothing happens when you tap Applications, you’re good. But if you have any 32-bit apps, they will be shown on the next screen. It makes sense to check before upgrading to iOS 11, so that you have time to find replacements apps. Apple is taking the stricter approach in iOS 11 because supporting 32-bit apps degrades Read the full article →

Phishing campaign alerts DocuSign to customer data breach

shutterstock A bizarre email address or an obvious misspelling are good indicators that the recent email telling you to reset your Apple ID password isn't what it seems. But there are more sophisticated (and believable) phishing attacks you have to watch out for, like the recent Google Docs scam that linked out to a legit-looking web app. Last week, DocuSign spotted an uptick in phishing emails imitating the company's branding. Being in the business of secure document management, it's not uncommon for DocuSign's name to be on the face of a phishing email; but upon further investigation the firm discovered why this particular campaign was so targeted: It'd been hacked. As it turns out, "a malicious third party" had managed to break into a "non-core system" that DocuSign uses to send out service announcement emails. This is why the phishing campaign has been so accurately targeting customers, though the red flag here is that emails ask recipients to download Read the full article →

Comment: The WannaCry attack should be a wake-up call for consumers, businesses and governments

Ben Lovejoy The WannaCry ransomware attack may have been exploiting a vulnerability in Windows, but the lesson it provides – the importance of keeping both computers and mobile devices updated – is one applicable to all of us, Apple users included. WannaCry itself targeted a vulnerability that had existed in Windows all the way through from XP to the latest Windows 10. Microsoft issued a patch to fix the issue for Windows Vista onwards back in March, but many organizations failed to update. The scale of the attack – which caused widespread disruption around the world – should be a wake-up call to consumers, businesses and governments alike … For consumers and businesses, it needs to be a reminder of the importance of keeping operating systems updated – and all data backed-up more than once. Windows may be the primary target, but Mac malware is growing – which includes ransomware. McAfee said recently that Mac malware grew 744% last year. Most of it Read the full article →

How to avoid the Google Docs phishing attack and what to do if you’re a victim

The sophisticated Google Docs scam asked for extensive access to users' accounts Cara McGoogan 4 MAY 2017 • 11:00AM Google customers have been targeted with a scam that gave hackers access to the contents of emails, contact lists and online documents of victims. The scam asked users to click on a link to a Google Doc that appeared to come from someone they knew. On opening the link, Google's login and permissions page asked users to grant the fake Docs app the ability to "read, send, delete and manage your email", as well as "manage your contacts". The sophisticated scam, unlike more common attacks, worked through Google's system. Most phishing scams seek to glean personal information from victims such as usernames, passwords, addresses and financial details by leading them to fake versions of real websites from an email. Google has now shut down the attack. "We have taken action to protect Read the full article →