POPULARITY
Join Automox's cybersecurity experts as they discuss the latest Patch Tuesday updates, focusing on vulnerabilities in Active Directory, Hyper-V, and macOS 15.2. They highlight the importance of staying updated and the evolving threat landscape, particularly with the rise of phishing attacks and the need for robust security measures in enterprise environments.
Patrick Wardle from DoubleYou and the Objective See Foundation joins us to talk about their recent event in Kyiv, as well as everything Mac Security, along with Mikhail, his collaborator at DoubleYou. Hosts: Tom Bridge - @tbridge@theinternet.social Marcus Ransom - @marcusransom Guests: Patrick Wardle - LinkedIn Mikhail Sosonkin - LinkedIn Links: Art of Mac Malware, Volume 2: https://nostarch.com/art-mac-malware-v2 OBTS v7.0: https://objectivebythesea.org/v7/index.html https://x.com/patrickwardle/status/1851026703683813771 https://x.com/lorenzofb/status/1836820420747563260 https://www.trellix.com/blogs/research/macos-malware-surges-as-corporate-usage-grows/ Sponsors: Kandji 1Password Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson
With organizations facing an ever-evolving threat landscape, how safe is it to equip your knowledge workers with Macs?This week, Victoria and Kevin put Field CISO, Brad Bowers, in the hot seat. The trio meticulously dissects the impact of Apple's growing market share on its vulnerability to cyber threats and explore the nuanced reasons why organizations opt for Macs not just for status but for enhanced security. Brad provides helpful insights on Mac's operating system and hardware security, and a comprehensive overview of the distinct elements in the Mac security ecosystem.Discussed in this episode:The implications of Apple's rising market share on its susceptibility to cyber threatsDebunking misconceptions about Mac's impervious security and revealing the driving factors behind organizations' adoption of Mac systemsAnalyzing the nuanced differences between Mac and Windows vulnerabilities, and exploring the unique security measures integrated into Mac's operating system and hardware.
Touted as the leading provider of Mac security software, Intego offers advanced protection against malware, viruses, phishing scams, and other online threats that can compromise valuable assets and data. Its advanced features include real-time scanning, proactive defense mechanisms, and customizable settings that allow users to tailor security measures to meet their specific needs. Moreover, with automatic updates and constant monitoring of the latest threats, Intego ensures that you'll be protected no matter what you do or where you go online. Visit https://intego.com for more.
North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
View in HD at . If you are going to sell, give away, recycle or pass on your Mac to someone else, you want to make sure you sign out of all of your accounts and completely erase the drive on the Mac.
View in HD at . Touch ID makes it more convenient to log on to your Mac and perform other tasks. By making it easier it encourages more people to use stronger account passwords.
View in HD at . While private browser windows are a good privacy feature, they don't protect you from malware, account break-ins, or other security issues.
View in HD at . Find My Mac will allow you to locate your Mac if it is lost or stolen, and also to lock it or erase it if you can't get it back.
View in HD at . Use an Uninterruptible Power Supply (UPS) to prevent problems during power outages when using an iMac, Mac mini or Mac Pro.
View in HD at . FileVault encrypts your drive in a way that is seamless to you, but would make it impossible for someone else to access the data on your drive without your password.
View in HD at . Using iCloud Drive can make your Mac more secure by providing an easy way to get your files back if your Mac is lost or damaged.
View in HD at . In addition to a Time Machine backup, you may want to consider a second backup that is also Time Machine, or a clone of your drive, or an online backup.
View in HD at . Every computer user should back up their data. Time Machine is the Mac's built-in backup software and can be used by just getting a simple external drive.
View in HD at . Each individual using a Mac should have their own user account. Keeping separate user accounts is critical for data security.
View in HD at . To protect your Mac from malware, follow these three simple rules.
View in HD at . You don't need third-party anti-virus software on your Mac. In fact, your Mac already comes with anti-malware software as part of macOS.
View in HD at . If one of your online accounts has been compromised, you need to take action immediately. Those accounts, and all of your others, need to be checked carefully and you will need to contact banks and other services to protect yourself.
View in HD at . Using a VPN will protect your data from malicious Wi0Fi networks and ISPs. But thanks to HTTPS, it is mostly unnecessary for typical Mac users.
View in HD at . Even if you have a strong password and use two-factor authentication, your Mac and accounts can still be vulnerable to social engineering when you fall victim to simple scams.
View in HD at . Some sites and services still use security questions. If you are forced to provide answers to these, you should never use real answers.
View in HD at . Use two-factor authentication to make your iCloud account and most other online accounts much more secure than using just a password.
View in HD at . Learn how to use Safari's Password Manager to general strong passwords, store them and use them later.
View in HD at . Learn how to use strong passwords to protect your online accounts and your Mac.
View in HD at . An introduction to the 2021 edition of the Mac security course.
Craig Federighi blasts Mac security to prop up iOS App Store; Apple greatly expanding accessibility services & features in new updates; AirPods to gain lossless streaming capabilities via software update, says leaker
We discuss our checklist of the 10 security and privacy features that you should set up right away on your new Mac. Show Notes: 10 Mac security and privacy features to set up right away Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.
From the beginning, Mac OS X was designed with security and privacy in mind, but over the years Apple has worked to make both the Mac's software and hardware more even more so. This week, Stephen and David cover what's what when it comes to Mac security.
From the beginning, Mac OS X was designed with security and privacy in mind, but over the years Apple has worked to make both the Mac's software and hardware more even more so. This week, Stephen and David cover what's what when it comes to Mac security.
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit
We face an existential threat of permanent damage to critical physical components in our national infrastructure as a result of their poor resilience against cybersecurity attack. A Programmable Logic Controller (PLC) commonly provides the control system for such components, e.g., bulk power generators. Our proof-of-concept implementation dramatically mitigates threats to such cyber-physical systems (CPS) by specifically leveraging what NIST 800-160 calls “highly assured, kernel-based operating systems in Programmable Logic Controllers”. We dramatically reduce the attack surface visible to potential attackers to be ~1% of the total compared to competing approaches. Our demonstration refactors the common CPS architectural approach to data and cooperating processes into hierarchically ordered security domains using the widely available OpenPLC project code base. The GEMSOS security kernel verifiably enforces traditional integrity mandatory access control (MAC) policy on all cross-domain flows. GEMSOS is designed for wide-spread delivery as a Reusable Trusted Device, providing the reference monitor for secure single-board, multi-board, and System-on-a-Chip systems. Only a processing component in the highest integrity domain can directly send/receive control signals, enforcing “safe region” operating constraints to prevent physical damage. This very small attack surface protects the critical physical components, making the overall CPS resilient to skilled adversaries’ attacks, even though much larger lower integrity software running in other domains on the same Trusted Device hardware and network infrastructure may be thoroughly compromised. We make available our restructured OpenPLC source to encourage control system manufacturers to deliver verifiable PLC products to, as NIST puts it, “achieve a high degree of system integrity and availability” for control systems. UC Davis is using our demonstration on GEMSOS in their Computer Security Lab, today.
We face an existential threat of permanent damage to critical physical components in our national infrastructure as a result of their poor resilience against cybersecurity attack. A Programmable Logic Controller (PLC) commonly provides the control system for such components, e.g., bulk power generators. Our proof-of-concept implementation dramatically mitigates threats to such cyber-physical systems (CPS) by specifically leveraging what NIST 800-160 calls "highly assured, kernel-based operating systems in Programmable Logic Controllers".We dramatically reduce the attack surface visible to potential attackers to be ~1% of the total compared to competing approaches. Our demonstration refactors the common CPS architectural approach to data and cooperating processes into hierarchically ordered security domains using the widely available OpenPLC project code base. The GEMSOS security kernel verifiably enforces traditional integrity mandatory access control (MAC) policy on all cross-domain flows. GEMSOS is designed for wide-spread delivery as a Reusable Trusted Device, providing the reference monitor for secure single-board, multi-board, and System-on-a-Chip systems.Only a processing component in the highest integrity domain can directly send/receive control signals, enforcing "safe region" operating constraints to prevent physical damage. This very small attack surface protects the critical physical components, making the overall CPS resilient to skilled adversaries' attacks, even though much larger lower integrity software running in other domains on the same Trusted Device hardware and network infrastructure may be thoroughly compromised. We make available our restructured OpenPLC source to encourage control system manufacturers to deliver verifiable PLC products to, as NIST puts it, "achieve a high degree of system integrity and availability" for control systems. UC Davis is using our demonstration on GEMSOS in their Computer Security Lab, today. About the speaker: Roger R. Schell is internationally recognized for originating several key modern security design and evaluation techniques, and was awarded patents in cryptography, authentication and trusted workstation. His experience includes 20 years in US federal program management (computers), 30 years as a computer industry security product vendor, and 5 years as a graduate cybersecurity engineering faculty member.He is President and a founder of Aesec Corporation, a start-up providing a commercial verifiably secure operating system. Previously Dr. Schell was co-founder and vice president for Gemini Computers, Inc., now an Aesec subsidiary. At Gemini he directed development of their highly secure (what NSA called "Class A1") commercial product, the Gemini Multiprocessing Secure Operating System (GEMSOS). He was also the founding Deputy Director of NSA's National Computer Security Center. He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). Dr. Schell is a retired USAF Colonel. He received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State. The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award. In 2012 he was inducted into the inaugural class of the National Cyber Security Hall of Fame.
Insecure - Cyber Security Podcast With Keith Wilson and John Morton
The return of John Morton... That's right, he's back from Mortoning around and he's talking Mac Security. Keith and John also discuss topics like Next Gen Bio Security, The future of hacking humans, and IoT.Episode Links:Objective by the SeaClosing Music:The Animal In Me's cover of "Your Love" originally by The OutfieldGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.
In last episode, I shared what I understand about article 32 of the General Data Protection Regulation and more importantly, I shared universal security best practices, whether or not your business needs to comply with GDPR. This week, I'll go deeper into the fundamentals of Mac security by guiding you through the audit that I have prepared for entrepreneurs and small business owners here in Luxembourg.
We look at the three different types of hard drives you can use with your Mac: hard disks, fusion drives, and SSDs. We also discuss a cryptocurrency miner in the Mac App store, a new device that can crack any iPhone, and rumors of new Mac laptops. Unwanted Cryptomining Debuts (Briefly) in Mac App Store There’s a currency miner in the Mac App Store, and Apple seems OK with it (https://arstechnica.com/information-technology/2018/03/theres-a-currency-miner-in-the-mac-app-store-and-apple-seems-ok-with-it/) A Surreptitious Cryptocurrency Miner in the Mac App Store? (https://objective-see.com/blog/blog_0x2B.html) Intego video: How to Avoid Cryptojacking on a Mac (Unwanted Cryptocurrency Mining) How to Use Activity Monitor to Troubleshoot Problems on a Mac GrayKey iPhone unlocker poses serious security concerns (https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/) Apple may launch 13-inch MacBook with Retina Display priced like a MacBook Air (https://www.techradar.com/news/apple-may-launch-13-inch-macbook-with-retina-display-priced-like-a-macbook-air) How to Choose the Right Hard Disk for Your Mac Correction: you still can buy a couple of Macs with hard drives. The Mac mini, and the 21.5" iMac come with hard drives in their cheapest version. The Year in Mac Security, and Tips for Backing Up Your Mac Tweet by Lesley Carhart about smart speakers, smartphones, etc. (https://twitter.com/hacks4pancakes/status/972916184457900032) Get 60% off Intego's Mac Premium Bundle X9 with the code INTEGOPODCAST. Download now and try it for free at intego.com.
We look at the year in Mac security 2017, and discuss the rise in malware. And we discuss the best strategies for backing up your Mac. But first, Kirk tells about how his website was (sort of) hacked. NameCheap Name Server Vulnerability Allows Unauthorized Users to Create Sub-Domains Subdomain (Wikipedia) (https://en.wikipedia.org/wiki/Subdomain) DNS - Domain Name System (Wikipedia) (https://en.wikipedia.org/wiki/Domain_Name_System) Registrar Namecheap let miscreants slap spam, malware on unlucky customers' web domains (https://www.theregister.co.uk/2018/02/07/namecheap_subdomain_security_hole/) A Look Back at the Top Mac Security Stories of 2017 Smashing Security podcast, episode 64: So just a "teeny tiny" security issue then? (https://www.smashingsecurity.com/64) Macro virus (Wikipedia) (https://en.wikipedia.org/wiki/Macro_virus) Intego Mac Podcast, episode 16: Malware and Security Lingo: What Do Those Words Mean? All the articles on the Intego Mac Security Blog about Adobe Flash vulnerabilities. (There's lots.) Intego Personal Backup How to Set up Your Own Time Machine Server 4 Types of Backup Hard Drives for Mac Get 60% off Intego's Mac Premium Bundle X9 with the code INTEGOPODCAST. Download now and try it for free at intego.com.
Chris and Ian discuss Mac Security, Android N and PC Gaming http://www.digitaloutbox.com/podcasts/episode274/DigitalOutbox-274-160310.mp3 Download iTunes MP3 Shownotes Facebook restructures to pay 'millions' more in UK tax Apple OS X hit by first ever ransomware attack Apple has shut down the first fully-functional Mac OS X ransomware Opera adds built-in adblocker to its browser Google surprises with early preview of Android N Ray Tomlinson, email inventor and selector of @ symbol, dies aged 74 Gears of War developer tells games industry: we must fight Microsoft Microsoft closes Fable developer Lionhead Nintendo's SNES classics finally come to 3DS Wired called Trump 'Someone With Tiny Hands' because of a rogue Chrome extension
Finally today, Spotify became available to Aussies, launching here 4 years after their first launch in Sweden. Stephen was at the launch of the new larger Nokia Windows phone the Lumia 900, APIA tells us not to believe that Older Aussies aren't online, they have stats to prove it, Quickflix launches on the iPhone and iPad, Facebook shares launch - go up, go down and down again, BOSE have launched a new range of sound systems - this time including DAB+, Aaron Sorkin to pen the screenplay for another Steve Jobs movie and AVAST makes free mac security software available.
Finally today, Spotify became available to Aussies, launching here 4 years after their first launch in Sweden. Stephen was at the launch of the new larger Nokia Windows phone the Lumia 900, APIA tells us not to believe that Older Aussies aren't online, they have stats to prove it, Quickflix launches on the iPhone and iPad, Facebook shares launch - go up, go down and down again, BOSE have launched a new range of sound systems - this time including DAB+, Aaron Sorkin to pen the screenplay for another Steve Jobs movie and AVAST makes free mac security software available.
In Episode 9, The MacDudes talk about hardening your Mac using native security applications and processes. Following in the security theme, the Plist of the Week (PLoW) covers com.apple.loginwindow.plist and com.apple.loginitems.plist.We have a great interview with Joe Duke of AccessData. Joe will discuss the use of FTK in analyzing Macintosh and the new FTK Mac Forensics course. The following are some of the websites we talk about concerning Mac Security & anti-virus Mac Shadows Secure Mac Mac Hacking Security Social Intego BlogThe show note to follow, honest!Be Safe,The MacDudes
Overview: Our seventh installment of the Black Hat Webcast Series arrives next week with an in-depth and fascinating look into the world of Mac Security. As the Mac platform grows in popularity both with the general public and the enterprise, we've seen an increase both in attacks and reasearcher interest in the topic of OS X Security. Black Hat Speaker Jesse D'Aguanno will be presenting on the topic of "Crafting OS X Kernel Rootkits – Fundamentals." We'll also have a presentation by Tiller Beauchamp of IOActive will be making a presentation called "OS X Security - A year in Review". Please join me and our guests for what is sure to be a fascinat
Josh and Big-O discuss the Google Android phone platform announcement and the new Mac OS X Trojan spreading through porn sites, and talk at length about the pros and cons of Mac OS X vs. Windows security
Die letzten Sendungen haben eine Menge Feedback angehäuft, das in dieser Ausgabe von Chaosradio Express ausführlich zur Sprache kommt. Der zweite Teil des Podcasts ist ein Gespräch mit Angelo Laub, Michael Feiri und Leonhard Becker zum Thema Macintosh Security.