According to an article published by PC Magazine, “Last week, Apple was left red-faced after it was discovered a bug in macOS High Sierra allowed anyone to gain root access to the system without a password. The company quickly released a security patch to fix the problem, but it also needed updating with an advisory because it could prevent file-sharing on the Mac. Now another problem has been identified, and it allows the root bug to be reactivated.”
When Apple released the security patch to solve the problem, they did not account for the lack of user participation in running the patch. Users who did engage in running the patch were not currently running macOS 10.13.1. It was reported that some users were running 10.13.0. Everything appeared fine afterwards, however, the 10.13.1 update gets installed and the root bug is reintroduced. Both Apple and the users did not realize this until after the update. Another assumption was that the users would reboot after running the patch, and the majority did not. Thus, causing the patch to be applied incorrectly, leaving your Mac vulnerable.
To avoid this issue, please be sure to upgrade to macOS 10.13.1 prior to running the security patch, followed by a proper reboot of your machine. If you have already gone through the update process and now are not sure if it worked, there is an easy way to check. Simply visit the Apple support page for the update and follow the steps using the Terminal app to confirm.
For the original content, please visit: macos-high-sierra-root-bug-can-reactivate
Have you been getting random calendar invitations from unfamiliar sources about events you have never heard of before? It seems we are not the only ones. Most of the calendar invitations seem to be coming from email accounts from other countries, promising deals on brand name products such as Ray-Bans.
This is just another type of phishing scam. Do not accept or decline calendar invitations from unknown senders. If possible, try not to open the invitation at all, and if you do open the invitation, do not click any links that may be attached. From what we know about email phishing and malware, this is most likely an attempt at retrieving personal information from your device.
Apple is in the process of blocking the suspicious email addresses and hopefully putting a quick end to the unknown invitations. In the meantime, you can do a few things to protect yourself. Firstly, do not decline the invitations, this only alerts the sender of an active email account, and will most likely lead to even more invitations. Go into your calendar settings and change invitations to be sent via email rather than device iPhone notifications. Finally you can create a junk calendar, purely for these spam invitations. These are temporary alternatives while we wait for Apple to block the email addresses and secure the problem. If you would like to create an alternative calendar for these invitations, which is the best way to protect yourself at the moment, click here.
If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.mashable.com
Sitting just above the keys, the Touch Bar displays an array of color changing functionalities. Check out just a few of the cool things the Touch Bar can do!
Just like texting on an iPhone, the Touch Bar allows for predictive text. For even faster email responses.
You can Preview and Edit your photos with it too, all of the edit features appear just by double clicking a picture in the Photo Application.
I think by far my favorite of the Touch Bar capabilities is switching between tabs visually in Safari. But it can also help coordinate your calendar and contacts by showing open times and days for you to choose from. It can also help you save documents and access keys no longer on the keyboard. Rather than lifting your hand and moving it to the track pad to save your document, just hit Command + S and watch Don’t Save, Cancel, and Save, appear. You may also notice that the F1 – F12 keys are missing from the new Pro. Not to worry, simply bring them up by holding the Fn key at the bottom of the keyboard and watch 1-12 appear on your Touch Bar.
You can even choose Emojis with the Touch Bar!
It can account for Touch ID as well. The first time you power up you will have to manually enter your password, but every time after that Touch ID is fair game. Just place your finger on the Touch Bar when you wake your machine from sleeping. Touch ID also means Apple Pay!
Answer calls just like you would on your iPhone or iPad!
Soon we will be asking ourselves how we ever lived without it!
If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.pcmag.com
The Satechi Slim Aluminum Type-C Multi-Port Adapter (that is one heck of a name) allows you charge or attach two USB devices to your Mac while also supporting a 4K display. This dock is part of a new wave of docks that finally do more than just drain your battery. Affordable at $60 on Amazon, this dock is attractive in both appearance and functionality. It has a higher level finish, with rounded edges and aluminum case that is available in four colors that perfectly match your Mac.
The built in cable has reinforcement at the dock connection and the head for durability. The USB-C jack is in an aluminum case for durability as well, and fits perfectly into a MacBook. The dock also has an HDMI port that supports 4K video at up to 30Hz.
At $60 this dock is $20 less than the Apple USB-C Digital AV Multiport adapter alternative which is less capable, awkward in design, and has one fewer USB 3 Type-A port. Satechi is a great competitor device is you just want to charge and connect to a 4k display.
If you want to learn more about the information presented in this blog post please visit: www.macworld.com
If your iPhone software is up to date, meaning iOS 9 and the most recent iOS 10, then you have “WiFi Assist”. WiFi Assist is a feature that allows you to stay connected to the internet even when the WiFi connection is poor. Meaning that if a webpage is having trouble loading or your Instagram won’t refresh due to poor internet connection, the cellular data on your smartphone will step in to bridge the gap. When this feature is turned on you will see the cellular data icon in the status bar on your device. Apple’s website warns that because of the obvious (the feature is using cellular data here) you might use more cellular data than usual, but should only be a “small percentage higher than previous usage”. Despite what Apple recommends, I read a decent amount of hoopla from consumers outraged by the increase in data usage when their phone bill arrived at the end of the month.
I turned my WiFi Assist feature off, and I have noticed no difference in my performance. However, I have a strong WiFi connection both at my house and my office – hey I do work for an MSP after all !
I will be interested to see how it holds up in other environments. Regardless I can always turn the feature back on.
Want to turn off WiFi Assist and maybe save a little cash? Watch my video!
Settings > Cellular > Scroll alllllll the way down till the end of your apps > WiFi Assist toggle
If you would like to learn more about the information presented in this blog post please visit: https://support.apple.com
The three best practices to avoid mobile malware is to use an official app store, resist temptation to jailbreak your device, and keep updates current. Apple and Google app stores remain the most vigilant about mobile malware concerns. Google uses Verify Apps that runs in the background of modern Android systems to scan for spyware, ransomware, and fraudulent apps. The company also checks mobile apps that are submitted to the Google Play Store. Less than one out of every 10,000 devices that only downloads from the Google Play Store has a program in the malicious category.
Jailbreaking your device undermines much of the already pre-installed security on the phone. In addition to this, the ability to restrict applications from accessing personal data on the phone as well as validate applications is disabled. Basically, if you jailbreak your device you better have a pretty good understanding of technology, because you just became the sole provider of security for that device.
This may be a surprise to most, but vulnerabilities actually do not increase the likelihood on malware on mobile devices. Symantec’s Internet Security Threat Report released Apple iOS had nearly 8 times as many vulnerabilities as Android in 2014, but near all malware for that year were targeted at Android devices.
The reliance and increased functionality of mobile devices leads developers to push out updates and bug fixes as fast as possible. Users should pay attention to this and keep their applications and software updates current. Android users often wait to update because of the lengthy process involved, but the benefits usually out whey this inconvenience, especially considering Android devices are most susceptible for malware.
If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.pcworld.com
You’ll find the new bedtime feature offered in iOS 10 in the Clock application. The first time you use the feature you will be walked through the functions. You may notice the application is now in dark mode, finally realizing most of us set alarms when we are already in bed or near sleep.
Begin by setting your wake up time, and tap “Next”. Hit the days of the week you would like the alarm to function. Set the number of hours you need to get each night (don’t worry this can be changed). After you have decided how many hours of precious beauty rest you would like, the application would like to know when you would prefer your nightly bedtime reminders, which can range from the bedtime itself to 15 minutes before or 1 hour before. The new bedtime feature comes with new sounds as well to jazz up bedtime and wake time alarms. Once you have saved your preferences, you will be able to see a short seven day history of your sleep. If you tap “More History” you will be brought into the Health app where you can explore your sleep history by day, week, month or even year.
For those users that use iOS as an alarm clock, consider this to be a major upgrade. It isn’t a full blown sleep tracker as many fitness trackers offer, but it is an easy way to track sleep hours and set up bedtime reminders. How great would this be for kid bedtimes??
If you would like to learn more about the information presented in this blog post please visit: www.howtogeek.com
Apple has always had a productive approach to voicemail, first with the visual listing of voicemails with the contact name, date and time attached, making it easy to browse past or go directly to the voicemail you would like to hear. The upgrade to iOS 10 takes this a little further, allowing for voicemail transcription, that can be shared or saved. When you have a voicemail you would like transcribed, open voicemail and select the voicemail you wish to be written. The voicemail should automatically start playing. If the person has just left the message, iOS will start the process automatically, showing a “Transcribing” message, to tell you what is taking place. Once the voicemail is transcribed, the written message will be displayed within the original voicemail, in other words in the visual list of voicemail. This could be helpful in those instances when raising a phone to your ear is not allowed, perhaps during a presentation, work meeting, event, important dinner, etc. The transcription of the voicemail might be a little off, but at least this gives a general idea as to why the person is calling, aka emergency or non emergency. This feature is currently considered a beta feature, therefore after transcription has taken place you will see a tiny typed question asking “Was this helpful?”, which Apple will use to decide if the feature will be a permanent one.
If you would like to learn more about the information presented in this blog post please visit : www.howtogeek.com
Alright. Lets break down some of those rumors, here’s a few of the prospects for whats to come with the iPhone 7. First of all we know that the 16 GB model is out and the 32 GB model is in. Rumors suggest that Apple will offer 32 GB, 64 GB and..wait for it… a 256 GB model! Who will use that much space and how much will it cost? No one knows. Another rumor with credible plausibility is the integration of a dual-lens camera. Based on the LinX technology that Apple acquired this past year, the dual-lens feature will allow for wide-angle lens and zoom-in with the telephoto lens. The camera would be able to take two separate pictures at the same time, or in the same accord use one lens to shoot video and the other to take still photos. This technology is already present on the Galaxy S7, which leads many to believe Apple will do the same in order to compete. Also exciting to many, the space gray might be replaced by the space black, as seen with the Apple Watch Sport. Silver has always been one of Apple’s favorite color themes so the odds of doing away with silver are small, but the probability that they will bring back a black iPhone is high. The iPhone 7 might have a flat home button that will send a small vibration rather than a click when pressed. The new home button would use Force Touch with haptic feedback. It is expected that Apple will continue to tweak the home button as a part of making new iPhone models more durable. In this same effect, rumors have circulated that Apple is looking at making this next model waterproof. The iPhone 6s had waterproof features not talked about, and not marketed as a fully waterproof device. It only seems right that Apple would increase this waterproofing effort with the next model. Two rumors that have people upset are the doing away with the headphone jack, and changes to the Lightning port. The headphone jack, I totally understand. Many use that jack to connect an AUX cord to play audio in the car, and although wireless headphones are widely available, not everyone has a spare pair lying around. When you purchase an iPhone from the Apple Store, included is a pair of headphones. I wonder, if Apple does away with the headphone jack, will a complimentary pair of wireless headphones be included? Might lessen the blow. The Lightning port is said to change as well, but this will not actually affect the Lightning cables, so those with lightning cables now will not have to buy connector replacements. The change is said to affect mostly phone case makers who will have to accommodate the new smaller cutout around the port.
September is just around the corner Apple addicts!
If you would like to learn more about the information presented in this blog post please visit : www.macworld.com
In the last week two different types of OS X malware made their debut and it has Mac users biting their nails about the possibility of an unprotected Mac. Backdoor.MAC.Eleanor and OSX/Keydnap, the two newest Mac malware, are both blocked from execution if managed with the appropriate Mac settings.
As MacWorld points out to us, with some malware there is little that can be blamed on the user. The software that leverages vulnerabilities in the operating system to install without verification or that has the ability to mask itself as an application that it is really not, is usually to blame. But how easy is it to really spot this in the act? Most of us can’t, and have to rely on an operating system, or researchers in order to find out about the malware and by that time who knows whats happening on the device.
The Backdoor.MAC.Eleanor is a Trojan horse distributed under the name EasyDoc Converter. Masking itself as a file converter application through reputable websites that offer Mac software, users think they are downloading valuable Mac software when really, they are in for a big surprise. This is the time when I advise you the user, to be careful when downloading software from sites that are not the direct developer. Nowadays many download sites package software inside of installers that also install adware or other unwanted apps. The OSX/Keydnap malware vector distribution is unknown. We do know that it arrives in the form of a ZIP archive that has to be extracted, with the file inside double clicked.
OK the goods. Unsigned apps can only launch by either right-clicking the app after it is downloaded, selecting Open from the contextual menu, and agreeing to launch the app even though it is unsigned. OR If the Security & Privacy system preference pane’s General tab has Allow Apps Downloaded From set to Anywhere. This should be changed to Mac App Store and Identified Developers. In the new macOS Sierra, this won’t be a problem as the Anywhere option has been removed for this very reason. Remember, Backdoor.MAC.Eleanor and OSX/Keydnap will be blocked if these settings are in place, so even if you mess up and don’t take any of my advice to heart, your Mac will still be safe.
If you would like to educate yourself in more detail about the information presented in this post, please visit : macworld.com