The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Saturday, November 8, 2014

Senior Correspondent Arnold Woodworth's Weekend Roundup for November 7,8,9, 2014

Here's What Some iPhone 6 Plus Owners Are Saying About The Phone's Unwieldy Size

Despite their complaints, most of them say they wouldn't trade it in for a smaller iPhone 6.

RANKED: The Best Smartphones In The World

iPhone 6 and iPhone 6 plus are first and second, respectively

The Apple iPad Air 2 Review

An iPad best for work, not play

My Apple iPad has quickly become an indispensable tool for work. For the last two years I’ve worked from an iPad on a daily basis.

I spent two weeks testing the iPad Air 2, and at the end of my time with the device, I found myself equally impressed and disappointed.

Instead of picking up my iPad to read an article or watch a video on YouTube, I would find myself remaining with the iPhone, the experience just as pleasant.

I’ve spent countless hours and dollars researching apps and accessories in order to make the iPad work for me. I have forced the iPad to fit into my life. The average person is less likely to invest that kind of time. For those people, that burden lies at Apple’s feet.

Apple wants you to update to iOS 8 even though you probably still can’t

the main reason for slower iOS 8 adoption is the simple fact that millions of iPhone users are simply not able to install the update because of the amount free storage required to install the new software over the air.

CNN Anchors Propped Up Their iPads With Surface Pro 3 Tablets During Election-Night Coverage

the single best way to invest in the Smartphone and App Revolutions is by simply buying Google and Apple.

I'm convinced that each remain must-own stocks for any tech investor and here's why - the App Revolution is just getting started.

The Wearables Revolution is coming and total sales of wearables will be bigger than the total sales of smartphones and tablets combined five years from now.

stick with Apple AAPL and Google GOOG. They're still by far the best ways to play the Wearables Revolution phase of the still burgeoning App Revolution which is now well on its way to becoming the single largest market in the history of the planet.

I know that there's a lot of focus today on Apple's malware problem, but here's a "Flip-It" take on it for you - the reason it's so shocking is because it's finally happened to Apple on a big scale. If and when the stock were to take a serious hit on this news, I'd probably buy some more.

The Steve Jobs Guide To Manipulating People And Getting What You Want

How Steve Jobs Broke All Of Richard Branson's Rules

Richard Branson's leadership style is the opposite of Steve Jobs'. But they both work.

What do the management styles of Virgin founder Richard Branson and Apple's Steve Jobs have in common? If you said, "absolutely nothing," then you're on the right track.

3 reasons the PC is still alive

Apple's market share of PC market highest since 1995

Despite Apple's record Mac sales, the category was just 8% of the much more colossal market for iOS devices, which saw an all-time high of 243 million units sold last quarter.

New Apple-focused malware uses Macs to infect iPhones

Palo Alto Networks called the malicious software "WireLurker" because it waits for a device running Apple's iOS mobile operating system to connect via USB to a Mac laptop or desktop.

It's called WireLurker because of the malware's ability to sense when you plug an iPhone or iPad into your computer running OS X.

Luckily the malware seems to be targeting users in China right now.

Apple-Pestering WireLurker Banished for Now

Palo Alto Networks on Wednesday reported that more than 400 apps infected with a malicious program it calls "WireLurker" have been downloaded 356,104 times by Chinese Mac owners from Maiyadi, an online app store unaffiliated with Apple.

The malware does no harm to the Macs it infects but when the computer connects via USB to an iOS device -- an iPhone or iPad -- it delivers its malicious payload.

The malware does no harm to the Macs it infects but when the computer connects via USB to an iOS device -- an iPhone or iPad -- it delivers its malicious payload.

Although potentially thousands of Chinese iPhones are infected with WireLurker, chances are low that it could spread to the United States.

"It looks like they were really targeting Chinese users exclusively," Olson said.

"We expect these tactics to be used in future pieces of malware," Olson said, "but for now, this version of WireLurker looks like it has been shut down."

WireLurker Mac OS X Malware Shut Down

Researchers at Palo Alto Networks confirmed that the command and control infrastructure supporting WireLurker has been shut down and Apple has revoked a legitimate digital certificate used to sign WireLurker code and allow it to infect non-jailbroken iOS devices.

The ultimate goal of the WireLurker attacks, which were limited to China, is unknown but the malware was capable of stealing system information and data stored on mobile devices. Other personal information such as credentials or banking transactions was spared.

WireLurker iPhone Malware Tried to Hit Windows First

Apparently, WireLurker initially targeted Windows computers in a failed attempt to infect iOS devices that connected to those PCs. Later, its creators retooled WireLurker to run on Macs and successfully infect non-jailbroken iPhones. Apple has blocked a crucial part of the process WireLurker uses to spread to iOS devices, but that doesn't mean the WireLurker menace is contained just yet.,news-19888.html

How one determined mom got kids in her small community to code

hope came after watching an inspiring video from make the rounds in social media. has done an excellent job de-mystifying computer science, and creating programs that can be easily adapted into the classroom.

Easy deal, right?  Wrong.  Teachers don't have the time or resources to manage another program.

So I posted a message on Facebook.  Within 24 hours, we had nearly 100 kids sign up.

Armed with the knowledge that entrepreneurs can make quick decisions, I took what was perceived as an education problem and re-framed it as a community problem.

How Homeless People Use Technology: A Photo Essay On Street Poverty And Consumer Gadgets

many homeless people use gadgets to stay connected, search for jobs, and pursue their own creative interests.

Why do so many people still text and drive, even though it's been shown to be more dangerous than drunken driving? 

If you track the history of drinking and driving, and the drinking and driving movement, there are some very strong analogies. Thirty or 40 years ago, the attitude toward drinking and driving was very much where texting and driving is now. Drinking and driving is unacceptable, not just from a legal perspective but from a social perspective.  But we're not there yet with texting.

People completely distort the neurological data that clearly show that it's impossible to drive safely while you're texting.

Facebook has created the ability for users to connect directly to the social network via anonymising "dark web" service Tor.
Facebook claims that users can access the site without losing the cryptographic protections of Tor.

That's a lie.
The moment you sign into your account, Facebook knows who you are.  Tor can't change that.
Facebook, which then can (and will!) comply with any government demand for that data.

It's all a way to trick you into defeating the purpose of Tor.

18 Ancient Websites You Won't Believe Still Exist

Now it's your new television that's spying on you.

Hundreds Of 'Dark' Web Sites Seized In Massive Global Government Takedown

Both Of The Men Accused Of Running The Silk Road Made The Exact Same Mistake

it was the simple mistake of using their personal email accounts for activities related to the Silk Road that made the FBI's job easy, and likely led directly to their capture.

No comments:

Post a Comment



Blog Archive