Podcasts about mac security

  • 32PODCASTS
  • 55EPISODES
  • 35mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jan 14, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about mac security

Latest podcast episodes about mac security

Autonomous IT
Patch [FIX] Tuesday – January 2025 [Experts Analyze New Hyper-V, Active Directory, and macOS Vulnerabilities], E15

Autonomous IT

Play Episode Listen Later Jan 14, 2025 14:09


Join Automox's cybersecurity experts as they discuss the latest Patch Tuesday updates, focusing on vulnerabilities in Active Directory, Hyper-V, and macOS 15.2. They highlight the importance of staying updated and the evolving threat landscape, particularly with the rise of phishing attacks and the need for robust security measures in enterprise environments.

Mac Admins Podcast
Episode 390: Patrick Wardle on Objective for the We, DoubleYou, & More

Mac Admins Podcast

Play Episode Listen Later Dec 2, 2024 75:28


Patrick Wardle from DoubleYou and the Objective See Foundation joins us to talk about their recent event in Kyiv, as well as everything Mac Security, along with Mikhail, his collaborator at DoubleYou. Hosts: Tom Bridge - @tbridge@theinternet.social Marcus Ransom - @marcusransom Guests: Patrick Wardle - LinkedIn Mikhail Sosonkin - LinkedIn Links: Art of Mac Malware, Volume 2: https://nostarch.com/art-mac-malware-v2 OBTS v7.0: https://objectivebythesea.org/v7/index.html https://x.com/patrickwardle/status/1851026703683813771 https://x.com/lorenzofb/status/1836820420747563260 https://www.trellix.com/blogs/research/macos-malware-surges-as-corporate-usage-grows/ Sponsors: Kandji 1Password Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson  

We Got Your Mac
Trick or Treat: Unmasking Mac Security Myths for Business Users

We Got Your Mac

Play Episode Listen Later Oct 31, 2023 23:22


With organizations facing an ever-evolving threat landscape, how safe is it to equip your knowledge workers with Macs?This week, Victoria and Kevin put Field CISO, Brad Bowers, in the hot seat. The trio meticulously dissects the impact of Apple's growing market share on its vulnerability to cyber threats and explore the nuanced reasons why organizations opt for Macs not just for status but for enhanced security. Brad provides helpful insights on Mac's operating system and hardware security, and a comprehensive overview of the distinct elements in the Mac security ecosystem.Discussed in this episode:The implications of Apple's rising market share on its susceptibility to cyber threatsDebunking misconceptions about Mac's impervious security and revealing the driving factors behind organizations' adoption of Mac systemsAnalyzing the nuanced differences between Mac and Windows vulnerabilities, and exploring the unique security measures integrated into Mac's operating system and hardware.

Cybercrime Magazine Podcast
Cybersecurity Elevator Pitch: Mac Security & Antivirus Software. Provided By Intego.

Cybercrime Magazine Podcast

Play Episode Listen Later May 16, 2023 1:09


Touted as the leading provider of Mac security software, Intego offers advanced protection against malware, viruses, phishing scams, and other online threats that can compromise valuable assets and data. Its advanced features include real-time scanning, proactive defense mechanisms, and customizable settings that allow users to tailor security measures to meet their specific needs. Moreover, with automatic updates and constant monitoring of the latest threats, Intego ensures that you'll be protected no matter what you do or where you go online. Visit https://intego.com for more.

TWiT Bits (MP3)
TWiET Clip: Apple M1 Malware

TWiT Bits (MP3)

Play Episode Listen Later Aug 20, 2022 2:25


North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (Video HD)
TWiET Clip: Apple M1 Malware

TWiT Bits (Video HD)

Play Episode Listen Later Aug 20, 2022 2:26


North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (Video HI)
TWiET Clip: Apple M1 Malware

TWiT Bits (Video HI)

Play Episode Listen Later Aug 20, 2022 2:26


North Korea's hacker group Lazarus APT targets Apple's M1 chip. Subscribe and watch the full 'This Week in Enterprise Tech' podcast: https://twit.tv/twiet/507 Host: Curt Franklin You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 20, Erasing Your Mac (MacMost #2507)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 19, 2021


View in HD at . If you are going to sell, give away, recycle or pass on your Mac to someone else, you want to make sure you sign out of all of your accounts and completely erase the drive on the Mac.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 19, Touch ID (MacMost #2506)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 18, 2021


View in HD at . Touch ID makes it more convenient to log on to your Mac and perform other tasks. By making it easier it encourages more people to use stronger account passwords.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 18, Private Browsing (MacMost #2505)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 17, 2021


View in HD at . While private browser windows are a good privacy feature, they don't protect you from malware, account break-ins, or other security issues.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 17, Find My Mac (MacMost #2504)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 16, 2021


View in HD at . Find My Mac will allow you to locate your Mac if it is lost or stolen, and also to lock it or erase it if you can't get it back.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 16, Uninterruptible Power Supply (MacMost #2503)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 13, 2021


View in HD at . Use an Uninterruptible Power Supply (UPS) to prevent problems during power outages when using an iMac, Mac mini or Mac Pro.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 15, FileVault (MacMost #2502)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 12, 2021


View in HD at . FileVault encrypts your drive in a way that is seamless to you, but would make it impossible for someone else to access the data on your drive without your password.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 14, iCloud Drive (MacMost #2501)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 11, 2021


View in HD at . Using iCloud Drive can make your Mac more secure by providing an easy way to get your files back if your Mac is lost or damaged.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 13, Alternative Backups (MacMost #2500)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 10, 2021


View in HD at . In addition to a Time Machine backup, you may want to consider a second backup that is also Time Machine, or a clone of your drive, or an online backup.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 12, Back Up With Time Machine (MacMost #2499)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 9, 2021


View in HD at . Every computer user should back up their data. Time Machine is the Mac's built-in backup software and can be used by just getting a simple external drive.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 11, Mac User Accounts (MacMost #2498)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 6, 2021


View in HD at . Each individual using a Mac should have their own user account. Keeping separate user accounts is critical for data security.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 10, Three Rules To Protect Your Mac (MacMost #2497)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 5, 2021


View in HD at . To protect your Mac from malware, follow these three simple rules.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 9, Do You Need Anti-Virus Software? (MacMost #2496)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 4, 2021


View in HD at . You don't need third-party anti-virus software on your Mac. In fact, your Mac already comes with anti-malware software as part of macOS.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 8, Handling Account Break-Ins (MacMost #2495)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 3, 2021


View in HD at . If one of your online accounts has been compromised, you need to take action immediately. Those accounts, and all of your others, need to be checked carefully and you will need to contact banks and other services to protect yourself.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 7, VPN (MacMost #2494)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 2, 2021


View in HD at . Using a VPN will protect your data from malicious Wi0Fi networks and ISPs. But thanks to HTTPS, it is mostly unnecessary for typical Mac users.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 6, Social Engineering (MacMost #2493)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 30, 2021


View in HD at . Even if you have a strong password and use two-factor authentication, your Mac and accounts can still be vulnerable to social engineering when you fall victim to simple scams.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 5, Security Questions (MacMost #2492)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 29, 2021


View in HD at . Some sites and services still use security questions. If you are forced to provide answers to these, you should never use real answers.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 4, Two-Factor Authentication (MacMost #2491)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 28, 2021


View in HD at . Use two-factor authentication to make your iCloud account and most other online accounts much more secure than using just a password.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 3, Password Managers (MacMost #2490)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 27, 2021


View in HD at . Learn how to use Safari's Password Manager to general strong passwords, store them and use them later.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 2, Passwords (MacMost #2489)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 26, 2021


View in HD at . Learn how to use strong passwords to protect your online accounts and your Mac.

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 1, Introduction (MacMost #2488)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Jul 26, 2021


View in HD at . An introduction to the 2021 edition of the Mac security course.

AppleInsider Daily
5/20/21: Craig Federighi blasts Mac security to prop up iOS App Store … and more news

AppleInsider Daily

Play Episode Listen Later May 20, 2021 2:11


Craig Federighi blasts Mac security to prop up iOS App Store; Apple greatly expanding accessibility services & features in new updates; AirPods to gain lossless streaming capabilities via software update, says leaker

Intego Mac Podcast
10 Mac security and privacy features to set up right away

Intego Mac Podcast

Play Episode Listen Later Mar 25, 2021 27:22


We discuss our checklist of the 10 security and privacy features that you should set up right away on your new Mac. Show Notes: 10 Mac security and privacy features to set up right away Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

Relay FM Master Feed
Mac Power Users 570: Mac Security

Relay FM Master Feed

Play Episode Listen Later Jan 10, 2021 96:38


From the beginning, Mac OS X was designed with security and privacy in mind, but over the years Apple has worked to make both the Mac's software and hardware more even more so. This week, Stephen and David cover what's what when it comes to Mac security.

Mac Power Users
570: Mac Security

Mac Power Users

Play Episode Listen Later Jan 10, 2021 96:38


From the beginning, Mac OS X was designed with security and privacy in mind, but over the years Apple has worked to make both the Mac's software and hardware more even more so. This week, Stephen and David cover what's what when it comes to Mac security.

Radio Leo (Video HD)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video HD)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (MP3)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video HD)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video LO)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video HI)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video HI)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video HI)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Audio)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Audio)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Hands-On Mac (Audio)
HOM 35: Securing macOS Big Sur - Secure and Protect your Mac with macOS Big Sur

Hands-On Mac (Audio)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple protect mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac pro how-to mac how-to macbook how-to imac help imac how-to mac pro help
Hands-On Mac (Video)
HOM 35: Securing macOS Big Sur - Secure and Protect your Mac with macOS Big Sur

Hands-On Mac (Video)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple protect mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac pro how-to mac how-to macbook how-to imac help imac how-to mac pro help
Radio Leo (Video LO)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video LO)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
CERIAS Security Seminar Podcast
Roger Schell, "Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel"

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 3, 2020


We face an existential threat of permanent damage to critical physical components in our national infrastructure as a result of their poor resilience against cybersecurity attack. A Programmable Logic Controller (PLC) commonly provides the control system for such components, e.g., bulk power generators. Our proof-of-concept implementation dramatically mitigates threats to such cyber-physical systems (CPS) by specifically leveraging what NIST 800-160 calls “highly assured, kernel-based operating systems in Programmable Logic Controllers”. We dramatically reduce the attack surface visible to potential attackers to be ~1% of the total compared to competing approaches. Our demonstration refactors the common CPS architectural approach to data and cooperating processes into hierarchically ordered security domains using the widely available OpenPLC project code base. The GEMSOS security kernel verifiably enforces traditional integrity mandatory access control (MAC) policy on all cross-domain flows. GEMSOS is designed for wide-spread delivery as a Reusable Trusted Device, providing the reference monitor for secure single-board, multi-board, and System-on-a-Chip systems. Only a processing component in the highest integrity domain can directly send/receive control signals, enforcing “safe region” operating constraints to prevent physical damage. This very small attack surface protects the critical physical components, making the overall CPS resilient to skilled adversaries’ attacks, even though much larger lower integrity software running in other domains on the same Trusted Device hardware and network infrastructure may be thoroughly compromised. We make available our restructured OpenPLC source to encourage control system manufacturers to deliver verifiable PLC products to, as NIST puts it, “achieve a high degree of system integrity and availability” for control systems. UC Davis is using our demonstration on GEMSOS in their Computer Security Lab, today.

CERIAS Security Seminar Podcast
Roger Schell, Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 2, 2020 58:57


We face an existential threat of permanent damage to critical physical components in our national infrastructure as a result of their poor resilience against cybersecurity attack. A Programmable Logic Controller (PLC) commonly provides the control system for such components, e.g., bulk power generators. Our proof-of-concept implementation dramatically mitigates threats to such cyber-physical systems (CPS) by specifically leveraging what NIST 800-160 calls "highly assured, kernel-based operating systems in Programmable Logic Controllers".We dramatically reduce the attack surface visible to potential attackers to be ~1% of the total compared to competing approaches. Our demonstration refactors the common CPS architectural approach to data and cooperating processes into hierarchically ordered security domains using the widely available OpenPLC project code base. The GEMSOS security kernel verifiably enforces traditional integrity mandatory access control (MAC) policy on all cross-domain flows. GEMSOS is designed for wide-spread delivery as a Reusable Trusted Device, providing the reference monitor for secure single-board, multi-board, and System-on-a-Chip systems.Only a processing component in the highest integrity domain can directly send/receive control signals, enforcing "safe region" operating constraints to prevent physical damage. This very small attack surface protects the critical physical components, making the overall CPS resilient to skilled adversaries' attacks, even though much larger lower integrity software running in other domains on the same Trusted Device hardware and network infrastructure may be thoroughly compromised. We make available our restructured OpenPLC source to encourage control system manufacturers to deliver verifiable PLC products to, as NIST puts it, "achieve a high degree of system integrity and availability" for control systems. UC Davis is using our demonstration on GEMSOS in their Computer Security Lab, today. About the speaker: Roger R. Schell is internationally recognized for originating several key modern security design and evaluation techniques, and was awarded patents in cryptography, authentication and trusted workstation. His experience includes 20 years in US federal program management (computers), 30 years as a computer industry security product vendor, and 5 years as a graduate cybersecurity engineering faculty member.He is President and a founder of Aesec Corporation, a start-up providing a commercial verifiably secure operating system. Previously Dr. Schell was co-founder and vice president for Gemini Computers, Inc., now an Aesec subsidiary. At Gemini he directed development of their highly secure (what NSA called "Class A1") commercial product, the Gemini Multiprocessing Secure Operating System (GEMSOS). He was also the founding Deputy Director of NSA's National Computer Security Center. He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). Dr. Schell is a retired USAF Colonel. He received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State. The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award. In 2012 he was inducted into the inaugural class of the National Cyber Security Hall of Fame.

Insecure - Cyber Security Podcast With Keith Wilson and John Morton

The return of John Morton... That's right, he's back from Mortoning around and he's talking Mac Security. Keith and John also discuss topics like Next Gen Bio Security, The future of hacking humans, and IoT.Episode Links:Objective by the SeaClosing Music:The Animal In Me's cover of "Your Love" originally by The OutfieldGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.

Macpreneur
Mac Security Audit for entrepreneurs

Macpreneur

Play Episode Listen Later Oct 18, 2018 24:09


In last episode, I shared what I understand about article 32 of the General Data Protection Regulation and more importantly, I shared universal security best practices, whether or not your business needs to comply with GDPR. This week, I'll go deeper into the fundamentals of Mac security by guiding you through the audit that I have prepared for entrepreneurs and small business owners here in Luxembourg.

Intego Mac Podcast
Which Hard Drive Is Best for Your Mac?

Intego Mac Podcast

Play Episode Listen Later Mar 21, 2018 30:11


We look at the three different types of hard drives you can use with your Mac: hard disks, fusion drives, and SSDs. We also discuss a cryptocurrency miner in the Mac App store, a new device that can crack any iPhone, and rumors of new Mac laptops. Unwanted Cryptomining Debuts (Briefly) in Mac App Store There’s a currency miner in the Mac App Store, and Apple seems OK with it (https://arstechnica.com/information-technology/2018/03/theres-a-currency-miner-in-the-mac-app-store-and-apple-seems-ok-with-it/) A Surreptitious Cryptocurrency Miner in the Mac App Store? (https://objective-see.com/blog/blog_0x2B.html) Intego video: How to Avoid Cryptojacking on a Mac (Unwanted Cryptocurrency Mining) How to Use Activity Monitor to Troubleshoot Problems on a Mac GrayKey iPhone unlocker poses serious security concerns (https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/) Apple may launch 13-inch MacBook with Retina Display priced like a MacBook Air (https://www.techradar.com/news/apple-may-launch-13-inch-macbook-with-retina-display-priced-like-a-macbook-air) How to Choose the Right Hard Disk for Your Mac Correction: you still can buy a couple of Macs with hard drives. The Mac mini, and the 21.5" iMac come with hard drives in their cheapest version. The Year in Mac Security, and Tips for Backing Up Your Mac Tweet by Lesley Carhart about smart speakers, smartphones, etc. (https://twitter.com/hacks4pancakes/status/972916184457900032) Get 60% off Intego's Mac Premium Bundle X9 with the code INTEGOPODCAST. Download now and try it for free at intego.com.

Intego Mac Podcast
The Year in Mac Security, and Tips for Backing Up Your Mac

Intego Mac Podcast

Play Episode Listen Later Feb 14, 2018 34:34


We look at the year in Mac security 2017, and discuss the rise in malware. And we discuss the best strategies for backing up your Mac. But first, Kirk tells about how his website was (sort of) hacked. NameCheap Name Server Vulnerability Allows Unauthorized Users to Create Sub-Domains Subdomain (Wikipedia) (https://en.wikipedia.org/wiki/Subdomain) DNS - Domain Name System (Wikipedia) (https://en.wikipedia.org/wiki/Domain_Name_System) Registrar Namecheap let miscreants slap spam, malware on unlucky customers' web domains (https://www.theregister.co.uk/2018/02/07/namecheap_subdomain_security_hole/) A Look Back at the Top Mac Security Stories of 2017 Smashing Security podcast, episode 64: So just a "teeny tiny" security issue then? (https://www.smashingsecurity.com/64) Macro virus (Wikipedia) (https://en.wikipedia.org/wiki/Macro_virus) Intego Mac Podcast, episode 16: Malware and Security Lingo: What Do Those Words Mean? All the articles on the Intego Mac Security Blog about Adobe Flash vulnerabilities. (There's lots.) Intego Personal Backup How to Set up Your Own Time Machine Server 4 Types of Backup Hard Drives for Mac Get 60% off Intego's Mac Premium Bundle X9 with the code INTEGOPODCAST. Download now and try it for free at intego.com.

Documentally
1912: Ransom Trojans and Mac security with @Mikko

Documentally

Play Episode Listen Later May 11, 2016 4:07


DigitalOutbox
DigitalOutbox Episode 274

DigitalOutbox

Play Episode Listen Later Mar 11, 2016


Chris and Ian discuss Mac Security, Android N and PC Gaming http://www.digitaloutbox.com/podcasts/episode274/DigitalOutbox-274-160310.mp3 Download iTunes MP3 Shownotes Facebook restructures to pay 'millions' more in UK tax Apple OS X hit by first ever ransomware attack Apple has shut down the first fully-functional Mac OS X ransomware Opera adds built-in adblocker to its browser Google surprises with early preview of Android N Ray Tomlinson, email inventor and selector of @ symbol, dies aged 74 Gears of War developer tells games industry: we must fight Microsoft Microsoft closes Fable developer Lionhead Nintendo's SNES classics finally come to 3DS Wired called Trump 'Someone With Tiny Hands' because of a rogue Chrome extension

Two Blokes Talking Tech
Two Blokes Talking Tech #065 - Spotify Arrives In Australia, Nokia Grows Up To 900, Don't Think The Older Generation Aren't Online, Quickflix On The IPad, Facebook Tanks, BOSE Audio, Aaron Sorkin On Steve Jobs And Avast Free Mac Security

Two Blokes Talking Tech

Play Episode Listen Later May 21, 2012 30:36


Finally today, Spotify became available to Aussies, launching here 4 years after their first launch in Sweden. Stephen was at the launch of the new larger Nokia Windows phone the Lumia 900, APIA tells us not to believe that Older Aussies aren't online, they have stats to prove it, Quickflix launches on the iPhone and iPad, Facebook shares launch - go up, go down and down again, BOSE have launched a new range of sound systems - this time including DAB+, Aaron Sorkin to pen the screenplay for another Steve Jobs movie and AVAST makes free mac security software available.

Two Blokes Talking Tech
Two Blokes Talking Tech #065 - Spotify Arrives In Australia, Nokia Grows Up To 900, Don't Think The Older Generation Aren't Online, Quickflix On The IPad, Facebook Tanks, BOSE Audio, Aaron Sorkin On Steve Jobs And Avast Free Mac Security

Two Blokes Talking Tech

Play Episode Listen Later May 21, 2012 30:35


Finally today, Spotify became available to Aussies, launching here 4 years after their first launch in Sweden. Stephen was at the launch of the new larger Nokia Windows phone the Lumia 900, APIA tells us not to believe that Older Aussies aren't online, they have stats to prove it, Quickflix launches on the iPhone and iPad, Facebook shares launch - go up, go down and down again, BOSE have launched a new range of sound systems - this time including DAB+, Aaron Sorkin to pen the screenplay for another Steve Jobs movie and AVAST makes free mac security software available.

Inside the Core
Inside the Core Episode 9

Inside the Core

Play Episode Listen Later Nov 22, 2009 67:13


In Episode 9, The MacDudes talk about hardening your Mac using native security applications and processes. Following in the security theme, the Plist of the Week (PLoW) covers com.apple.loginwindow.plist and com.apple.loginitems.plist.We have a great interview with Joe Duke of AccessData. Joe will discuss the use of FTK in analyzing Macintosh and the new FTK Mac Forensics course. The following are some of the websites we talk about concerning Mac Security & anti-virus Mac Shadows Secure Mac Mac Hacking Security Social Intego BlogThe show note to follow, honest!Be Safe,The MacDudes

Black Hat Webcasts RSS Feed
Black Hat Webcast 7: Mac OS X Security

Black Hat Webcasts RSS Feed

Play Episode Listen Later Jan 24, 2009 82:11


Overview: Our seventh installment of the Black Hat Webcast Series arrives next week with an in-depth and fascinating look into the world of Mac Security. As the Mac platform grows in popularity both with the general public and the enterprise, we've seen an increase both in attacks and reasearcher interest in the topic of OS X Security. Black Hat Speaker Jesse D'Aguanno will be presenting on the topic of "Crafting OS X Kernel Rootkits – Fundamentals." We'll also have a presentation by Tiller Beauchamp of IOActive will be making a presentation called "OS X Security - A year in Review". Please join me and our guests for what is sure to be a fascinat

Tech Pulse
Tech Pulse 20071108: Does Mac Security Suck?

Tech Pulse

Play Episode Listen Later Nov 8, 2007 86:25


Josh and Big-O discuss the Google Android phone platform announcement and the new Mac OS X Trojan spreading through porn sites, and talk at length about the pros and cons of Mac OS X vs. Windows security

CRE: Technik, Kultur, Gesellschaft
CRE020 Mac Security

CRE: Technik, Kultur, Gesellschaft

Play Episode Listen Later Mar 4, 2006 58:22


Die letzten Sendungen haben eine Menge Feedback angehäuft, das in dieser Ausgabe von Chaosradio Express ausführlich zur Sprache kommt. Der zweite Teil des Podcasts ist ein Gespräch mit Angelo Laub, Michael Feiri und Leonhard Becker zum Thema Macintosh Security.