The MacValley blog

 

Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.

 

Tom Briant

The MacValley blog

Editor: Tom Briant

 

Click here to email Tom

Click here for Tom's profile

 

 

To search the blog posts please use the box below

Sunday, September 7, 2014

Senior Correspondent Arnold Woodworth's Weekly roundup

If This Is The Best Apple's Competitors Can Do, Then The iWatch Is Poised To Be A Massive Hit

The latest crop of "smart watches" doesn't look good.

They're too ugly. They do too much. They're unfocused, noisy, and complicated.

Just like smartphones were before the iPhone.

http://www.businessinsider.com/iwatch-is-ready-for-launch-2014-9



Everything You Need to Know About Apple’s HealthKit and How It Might Work with the iWatch

https://www.yahoo.com/tech/everything-you-need-to-know-about-apples-healthkit-and-96578817919.html



Why Apple's HealthKit and HomeKit privacy rules are a huge advantage

http://www.citeworld.com/article/2601907/mobile-byod/why-apples-healthkit-and-homekit-privacy-rules-are-a-huge-advantage.html



A Drone Flew Above Apple's New Spaceship Headquarters To Capture Some Amazing Views
Neat picture

http://www.businessinsider.com/drone-films-apples-new-campus-2014-8



Apple Just Recruited 'One Of The Most Influential Designers Of This Generation'

http://www.businessinsider.com/afp-apple-recruits-renowned-designer-marc-newson-2014-9



If Someone Handed Steve Jobs A Pen, This Is How He Would've Sold It

http://www.businessinsider.com/if-someone-handed-steve-jobs-a-pen-this-is-how-he-wouldve-sold-it-2014-8



Check Out The Ways Apple.com Got Much More Elegant Over Time

A very interesting evolution of Apple's web site

http://www.businessinsider.com/apple-website-changes-through-history-2014-9



The danger of putting your personal information on the cloud

You may have heard about the nude celebrity photos that were released after Apple's cloud service was hacked.

It gets worse.

Google, Amazon and Apple will NEVER accept responsibility for the security of data you place on their "cloud" services.

http://www.market-ticker.org/akcs-www?post=229365



Apple fixes iCloud security flaw that may have allowed nude-photo leaks

A vulnerability in Apple's "Find My iPhone" feature was exposed on the code-sharing site GitHub a day before a collection of nude photos depicting celebrities was leaked.

It isn't known whether this is the same security flaw that was exploited by the hackers who stole the nude photos, which were leaked.

http://blogs.marketwatch.com/themargin/2014/09/01/apple-fixes-icloud-security-flaw-that-may-have-allowed-nude-photo-leaks/



Apple fixes iCloud security flaw that may have allowed nude-photo leaks

A vulnerability in Apple's "Find My iPhone" feature was exposed on the code-sharing site GitHub a day before a collection of nude photos depicting celebrities was leaked.

It isn't known whether this is the same security flaw that was exploited by the hackers who stole the nude photos, which were leaked.

http://blogs.marketwatch.com/themargin/2014/09/01/apple-fixes-icloud-security-flaw-that-may-have-allowed-nude-photo-leaks/



We Still Don't Have Assurance From Apple That iCloud Is Safe

Apple said the hack that caused nude photos of celebrities to leak was not the result of a widespread attack on its iCloud system. Instead, the hackers targeted the accounts of individual celebrities.

several journalists and tech pundits pointed out that Apple appeared to be placing the blame on the user, not the fact that Apple IDs seem to be easy to crack if you have the right tools.

http://www.businessinsider.com/apple-statement-on-icloud-hack-2014-9



After nude celebrity hacking, Apple’s Tim Cook says company will improve security

http://www.washingtonpost.com/news/morning-mix/wp/2014/09/05/after-nude-celebrity-hacking-apples-tim-cook-says-company-will-improve-security/



Five reasons why celebrities and civilians should never trust Apple with nude photos, or any data at all.

http://www.slate.com/articles/technology/bitwise/2014/09/celebrity_photo_hack_blame_apple_for_its_disregard_for_user_security.html



Inside The iCloud-Hacking Ring That Leaked Those Naked Celebrity Photos

http://www.businessinsider.com/the-underground-icloud-hacking-ring-that-leaked-naked-celebrity-photos-2014-9



10 Things You Didn't Know You Could Do With Your iPhone

Very good video.

http://www.businessinsider.com/iphone-hacks-tricks-ios-apple-2014-6



12 Visions of Apple Products That Were Fantastically Wrong

With only days to go before Apple unveils a handful of brand-new products, the rumor mill is churning at full speed. Now seems like a good time to recall the various dream concepts, predictions, and leaks we've seen over the years—all of which were more artful than accurate.

http://gizmodo.com/12-visions-of-apple-products-that-were-fantastically-wr-1630752848



When Steve Jobs Refused To Give Early Apple Employees Stock, Steve Wozniak Offered Them $10 Million Of His

http://www.businessinsider.com/steve-wozniak-gave-early-apple-employees-10-million-in-stock-2014-9



Google Offers A Very Important Security Feature:  Two-Step Verification

Some apps don't work with 2-factor authentication, such as Mail on your iPhone or iPad.

http://www.businessinsider.com/how-to-turn-on-2-factor-authentication-in-gmail-2014-9



Google's driverless car is nowhere near road-ready

Construction zones, heavy rains, police officers stopping traffic, potholes are all obstacles that Google's driverless cars remain unable to navigate.

http://blogs.marketwatch.com/themargin/2014/09/01/googles-driverless-car-is-nowhere-near-road-ready/



Google's entire business model relies on tracking everything you do with your computer -- and especially with your Android phone.

Google, in short, as with Apple for IOS, sells you to various vendors.

YOU ARE THE PRODUCT.

http://www.market-ticker.org/akcs-www?post=229362



This author says that iCloud (and other cloud services) are like the "Hotel California" (or like a roach motel):
You can check in, but you can never really leave.

Do you remember those files you deleted from the cloud?  They're NOT really deleted.

http://www.market-ticker.org/akcs-www?post=229363



Americans Mad as Hell Over Proposed Net Neutrality Rules

"If you can create public protest of a certain volume and scale, you can make it so prominent that even the bureaucrats at the FCC can't argue with it," the Free Press's Karr told the E-Commerce Times.

"Our aim has always been to show overwhelming public support for Net neutrality," he said, "to the extent that no elected official or federal bureaucrat in Washington can rule against you without shaming the democratic process."

http://www.technewsworld.com/story/80984.html



Bypassing hardware firewalls in 20 seconds

http://www.networkworld.com/article/2601300/microsoft-subnet/bypassing-hardware-firewalls-in-20-seconds.html



An interesting post by a MarketWatch reader:

It's just a matter of time before everyone is hacked. Unless your service locks your account after X number of consecutive bad logins you are at risk of some sort of brute force attack.

It's a cyber war out there and most people are clueless. I recently installed my own personal linux cloud server with a floating IP address and it's crazy how often it gets attacked.

I got hundreds of IP addresses on a permanent ban list.

http://www.gearlogger.com/fail2ban.html

http://www.lancope.com/slic/#scanmap_stats-tab

No comments:

Post a Comment

 

 

Blog Archive