Intego Mac Podcast, Episode 67: FaceTime, Facebook, Google, Shortcuts, Steganography, and More

Apple had a mean FaceTime bug; then they slapped down Facebook, and Google, for some underhanded app distribution. There are security risks using iOS Shortcuts, and there’s new malware using steganography.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

It’s the Ecosystem, Stupid*

(*Note: the title of this article is a riff on a statement made by Bill Clinton’s campaign manager during the 1992 presidential race: “It’s the economy, stupid.”)

We saw recently how Apple’s profit warning caused the company’s stock to tank. This is because the iPhone, whose sales are down, represents about 60% of the company’s revenue, and any disruption to that leading product has a strong effect on the bottom line. But at the same time, Apple’s services revenue is increasing, as Apple is morphing from a hardware company to a services company.

Apple is a lot more than just the iPhone; its products represent an ecosystem. In a recent interview with Jim Cramer on CNBC, Tim Cook said that the “virtuous ecosystem is probably under-appreciated,” and that “the ecosystem has never been stronger.”

Read the rest of the article on The Mac Security Blog.

The iPad Pro Needs a Pro Version of iOS

Apple’s new iPad Pro is an amazing tablet, but as our review points out, it comes at a price. Apple has priced this device at close to the cost of a laptop–aka a “real computer”–which means that for most people, buying an iPad Pro means making a commitment to using it as their main computing device.

But the iPad Pro runs iOS, the same operating system that runs on the iPhone. While Apple says, “And it works like your iPhone, so it’s familiar to use,” this isn’t really a good thing. Some people may be able to replace their laptop with an iPad Pro, but for the iPad Pro to really serve as a computer, it needs a pro version of iOS.

Read the rest of the article on The Mac Security Blog.

New Year’s Resolutions to Check that Your Mac and iOS Devices Are Secure

Everyone knows that New Year’s resolutions don’t always stick. You may decide to join a gym or start a diet, and by February, you’ve slipped from your goal. But there are some New Year’s resolutions that you can use to check the security and your Mac and iOS devices. Here’s a selection of simple things you can do to make sure your devices are as secure as possible. (Listen to episode 64 of the Intego Mac Podcast where I discuss these and other tips with my co-host Josh Long.)

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode 64: New Year’s Resolutions to Secure Your Mac and iOS Devices

As the new year rolls in, we look at some New Year’s resolutions to secure your Mac and iOS devices. These are simple tips that you can apply immediately to make your devices more secure.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Protect Your Kids on iOS Devices with Parental Controls

The Internet can be dangerous for children. You may not want your kids to be able to view every website or use any app. While it may not be easy to monitor their activity on a mobile device like an iPad, iPhone, or iPod touch, Apple includes some powerful tools in iOS to help you protect your kids.

Previously called “parental controls” or “restrictions,” these settings offer a number of ways to prevent your kids from accessing inappropriate content. Now located within the Screen Time settings (in iOS 12 or later), there are lots of options you can adjust. In this article, I’ll walk you through the Screen Time settings and help you make your children’s iOS devices safer.

Read the rest of the article on The Mac Security Blog.

Are iOS Apps Spying On Your Location?

The New York Times published an article this week about how apps are recording your location and selling the data to companies that “sell, use or analyze the data to cater to advertisers, retail outlets and even hedge funds seeking insights into consumer behavior.” This $21 billion market depends on the fact that most users allow apps to access their location, even if they don’t need to do this.

While this is more common on Android than on iOS, you may have apps on your iPhone or iPad that are accessing and selling your location data without you being aware. In this article, I’m going to show you how to adjust which apps can access your location.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode 58: New Security Features in iOS 12 and macOS Mojave

We take a close look at the great new security features in iOS 12 and macOS Mojave. We also answer a few reader questions, about the Activity Monitor app, about when to upgrade hardware, and whether “free” media sites are safe.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

New Security and Privacy Features in iOS 12

iOS 12 has brought many new features to your iPhone and iPad as we discussed here. But beyond the more obvious changes – new notifications, Screen Time, Shortcuts and others – iOS 12 has delivered a bushel of new security features. Most of these features revolve around passwords and iCloud Keychain, but there are a few other features that make your devices more secure. Here’s an overview of what’s new in iOS 12 security.

Read the rest of the article on the Mac Security Blog.

Use iOS Shortcuts to Automate Tasks on Your iPhone or iPad

One of the new features of iOS 12 that hasn’t gotten much attention is shortcuts. Shortcuts are automation routines that you can run on your iPhone or iPad, making complex tasks as easy as tapping a button or giving a command to Siri. Shortcuts aren’t that simple to create, but you can find many pre-made shortcuts and use them as is or adapt them to your needs. Here’s a primer on using shortcuts for iOS.

Read the rest of the article on the Mac Security Blog.