The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog
Editor: Tom Briant
Sunday, August 28, 2016
The attack on the dissident, Ahmed Mansoor, used a text message that invited him to click on a web link. Instead of clicking, he forwarded the message to researchers at the University of Toronto's Citizen Lab.
Experts there worked with security company Lookout and determined that the link would have installed a program taking advantage of a flaw that Apple and others were not aware of.
Hackers Target Smartphones: Tips to Protect Yourself
Popular messaging service WhatsApp said it would start sharing users' phone numbers with parent Facebook Inc (FB.O), marking a notable shift in its stance on privacy.
WhatsApp Betrays Privacy Stance, Will Share Data With Facebook
Facebook wants to collect as much data as possible about you, so that it can use it to sell more expensive ads and make more money. That’s the company’s stated business model. It’s not like the folks at WhatsApp didn’t see this coming, either.
WhatsApp is still a great app to use for secure messaging, but it is not longer the best option for privacy. Try using Signal instead.
This top-rated class for anyone who wants to learn to code is now cheaper than ever
But where to start? You can give Udemy’s The Complete Web Developer Course a shot. It has 235 mostly video lectures spread out across 29 hours, all of which are designed to teach anyone how to go about building apps and websites.
This particular class has proven immensely popular on Udemy, with nearly 230,000 students enrolled, alongside a 4.5/5 user rating after more than 25,600 reviews.
The class normally goes for $200, but from today until September 1 you can grab it for just $10.
Sunday, August 21, 2016
People, it’s a simple fix, passed down from one group of computer support techs to the next. Restart the damn thing!
Tom Briant, who learned from Dave and Terry and Ron at Eylar a long time ago.
It's been five years since Cook took over from the late Steve Jobs, and Apple co-founder Steve Wozniak couldn't be happier about the new CEO's performance.
He was wrong.
It's been over nine years and no one has made a better phone than the iPhone. But after all these years, the iPhone's lead has never been smaller. In fact, it's razor thin.
It's because of the one thing Samsung or anyone else can't replicate: iOS. iOS makes it possible for Apple to provide prompt updates and better security.
One problem is that generally you don’t actually own the digital music and books you buy on your computer and mobile devices — you’ve only bought licenses to listen and view those products.
Bob Messerschmidt sold his company to Steve Jobs and went to work building the Apple Watch in 2010. He saw a lot during his three years at Apple
Thursday, August 18, 2016
Folks, when your main mousing arm is out of action, you’ll need one of these options. I use Launcher, but for the most part, Alfred or Quicksilver will let you do app launching from the keyboard.
Editor, MacValley Blog
Sunday, August 14, 2016
Sisters and brothers, take care of your hardware!
Apple's most controversial decisions that made the iPhone better
How to make your old MacBook Pro run like new again
Don't go for the cheapest option when you're buying a computer – here's why
For your long-term satisfaction, it's worth spending the extra bucks if your budget allows for it. You'll thank yourself if you do.
You'll notice my powerful laptop is a MacBook Pro, but I'm not saying that Apple computers are better than Windows laptops here. A Windows laptop with an i7 would also scream past any task you throw its way.
I shopped at Amazon's first real-life bookstore ever and it was freaking awesome
Amazon Books is the best of both worlds. I get that experience of browsing the shelves, which, as a card-carrying nerd, I love a lot. But I also know I'm getting what is almost definitely the best price possible, thanks to Amazon.
The Dangers of the Deep Web
The new documentary Down the Deep, Dark Web explores the promise and perils of the deep web—the part of the internet that isn’t indexed through search engines.
An interviewee said:
“For years, anyone who wanted to do things in secret, to buy drugs or stolen goods, found it very difficult to do in the real world. Because in the real world, you needed to meet the seller, and then you need to pay him somehow. When we’re speaking of the Darknet, we’re talking about a new commercial arena. A new marketplace where the identities of the buyer, the seller and even the money itself is hidden from law enforcement.”
“I want it to be very clear what the Darknet is. You install software that essentially hides your activity. Such as TOR."
Here's what happens when 20,000 hackers invade Las Vegas for a week of hacking, booze, and debauchery
The Internet of Things will always be vulnerable
Lots of devices are being connected to the internet: Cars, household appliances, medical devices, etc. And all of them can be hacked — with potentially deadly consequences.
As worrying as these scenarios may be, they all boil down to one cause really: whatever their form, all of these devices and technologies are, put simply, computers that connect to a network. And therein lies their almost absolute nature to remain vulnerable to attacks, as well as a target of such. The moment computers stopped being hulking cabinets that required physical presence and access in order to use, the moment it was possible for computers to communicate with one another even if far apart, they have become vulnerable.
Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.
And while this means that enterprising users will be able to install any operating system—Linux, for instance—on their Windows tablet, it also allows bad actors with physical access to a machine to install bootkits and rootkits at deep levels. Worse, according to the security researchers who found the keys, this is a decision Microsoft may be unable to reverse.
Comment: Microsoft just demonstrated why Apple was right to stand up to the FBI
My main argument was that something as powerful as a master key to unlock an iPhone would eventually fall into the wrong hands.
And Microsoft has just proven my point, even with code that was never intended to leave the company’s possession …
ArsTechnica reported that Microsoft accidentally leaked a universal backdoor to Windows.
Code that would inevitably be handed over to law enforcement agencies would be a million times more vulnerable. And that is why Apple was absolutely right to resist pressure to create a master key to unlock the iPhone.
Wednesday, August 10, 2016
Tuesday, August 9, 2016
Just have Apple buy ATT and be done with it
“This is Miss Tomlin with AppleT&T. We don’t do computers any more.”
Gotta hope my old Mac Mini keeps plugging along…
Editor, MacValley Blog
Sunday, August 7, 2016
However, Apple won’t turn away new researchers if they provide useful disclosures, and plans to slowly expand the program.
A comprehensive, up to date list of bug bounty and disclosure programs from across the web curated by the Bugcrowd researcher community.
In a change to its news feed algorithm on Thursday, Facebook said certain types of headlines would be classified as clickbait, those that “withhold or distort information.” Those stories will then appear less frequently in users’ feeds, the company said.
Social Security Web Site Now Requires Cellphone to Access Your SSA Account On-Line
For your protection, we now require multifactor authentication for all users of the "my Social Security" web site. To register and sign in, you must now enter a security code that we will send to your cell phone. Your cell phone provider’s text message and data rates may apply.
Because of technical and resource constraints, we are not currently able to offer alternative methods of satisfying this security requirement. However, we may consider adding more options in the future. We appreciate your patience as we work continuously to secure your online information.