Intego Mac Podcast, Episode #164: A Week with the New MacBook Air

We discuss how new security features in macOS Big Sur can make it difficult to install certain apps. We talk about Amazon Sidewalk, a feature that will share your bandwidth from Amazon devices. We look at an astounding remote wi-fi exploit that could have let hackers access your iPhone. And Kirk discusses his first week with the new MacBook Air, which has surprised him.

Subscribe to The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Manage and Secure Notifications on Your iPhone, iPad, and Mac

In general, our computing devices are passive. They perform tasks for us when we click buttons or enter some text, but otherwise they just wait for our commands. With the rise of mobile devices, “push” notifications became a way for our devices to alert us when certain things happen. We can get notified when we get text messages, phone calls, or emails, and we can have our favorite apps display notifications of the latest news, stock prices, and sports scores.

But it’s very easy for these notifications to overwhelm us. If you allow notifications on your iPhone from every app you use, you may spend more time checking your notifications than getting things done. While some notifications can be very important – phone calls and text messages, for example – too many notifications is bad for our sanity.

One problem is that you can get notification overload: you get so many notifications that it’s hard to keep up, and you eventually ignore them because you’re just too busy. Another issue is that if your notifications display sensitive information on your device when it is locked, anyone can see them. And finally, website notifications, the browser on your Mac, can be a security risk, as they can be hijacked to try to scam you.

In this article, I’m going to explain how you can control notifications on iOS, iPadOS, and macOS. I’ll show you how to do this so you only get the most important notifications, and I’ll also explain the settings to apply to keep your notifications secure.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #163: Black Friday; Securely Dispose of Your Old Mac; The HomePod mini

With Black Friday coming up, we give some tips on buying older devices that may be insecure. We discuss how to audit your subscriptions with Apple, so you don’t pay for what you’re no longer using. We look at how to securely dispose of a Mac when you’re selling or giving it away. And we talk about the new HomePod mini: is it the right smart speaker for you?

Subscribe to The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

How to Use Apple’s Built-in Features to Encrypt Files and Folders

The best way to protect your data is to encrypt your files, ensuring that, even if they get into the hands of hackers or cybercriminals, your personal data is safe. macOS provides a suite of tools to protect you, and, in this article, I’ll discuss the many ways you can use built-in macOS features to provide unbreakable encryption. (Unbreakable with current computing power; it’s possible that future quantum computers will be able to break the robust encryption algorithms that macOS uses.)

In this article, I’ll explain how to encrypt your startup disk with FileVault; how to encrypt other disks; and how to create encrypted disk images to store files securely in the cloud or send by email; and how to encrypt PDF files.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #162: How To Prepare Your Mac for macOS Big Sur

Apple released macOS Big Sur last week. On release day, there were a number of issues, including problems launching apps on Macs. We discuss what happened, and how Apple is changing its Gatekeeper security check. We also talk about when you should upgrade to Big Sur and how you should prepare your Mac for the big upgrade.

Subscribe to The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Mac and iOS Keychain Tutorial: How Apple’s iCloud Keychain Works

You use passwords to log into websites and services, and since there are so many of them, it’s hard to remember them. It’s a bad idea to use the same password for different websites, because if one site is compromised, hackers will have an email address and password that they can try on other sites. Because of this, you need to ensure that your passwords are different for every website and app, and that they are hard to crack. (An episode of the Intego Mac Podcast talks about password strategies.)

Your Macs and iOS devices have a “keychain,” which is an encrypted file that stores your logins, passwords, and some other information. This file syncs via iCloud, so you can use the same passwords on all your devices. Here’s how Apple’s iCloud keychain works.

Read the rest of the article on The Mac Security Blog.

How to switch search engines on macOS and iOS (and why you should)

If you’re like most people, you search the web a lot. Google handles nearly 85,000 searches per second, or 7.3 billion per day, or more than two and a half trillion searches every year. Your share of that may be small: if you’re just an average person, you may search the web 3-5 times a day, but some of us, such as writers, may perform several dozen searches in a single day when researching articles and books.

Searching the web is free. But nothing is really free. In exchange for providing you with such a powerful tool, Google collects data about you. It creates a unique profile of you, of your interests, your medical conditions (because everyone searches Google when they have health questions), and your browsing activity, and uses this to provide carefully targeted ads. It also tracks the websites you visit, ensuring not to miss anything you do.

This is why you often see ads related to your web searches. For example, you may have a question about your pet, and use Google to find the answer. You’ll soon see ads for pet food on various web pages. Google is the biggest advertising provider on the web, and millions of websites use Google Ads. So by storing information about you on Google’s servers, the company can know which ads are most likely to interest you. (Of course they don’t know if that search about the cat was really for a friend or neighbor, in which case the ads are incorrectly targeted, but if no one clicks, they don’t make any money.)

In other words, using a search engine is the same as giving away lots of private information about you, your habits, and your life. You may not want to do that.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode #161: Apple Launches New Macs, and Big Sur Arrives

Apple announced three new Macs with its own processors, the first of a transition of the complete line of Macs to Apple silicon that should be complete in about two years. At the same time, macOS Big Sur is released. We discuss the new Macs, Apple’s M1 “system on a chip”, and a two-year old Apple bug that still hasn’t been fixed.

Subscribe to The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode #160: What to do if you think you have malware on your Mac

Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you’ve been infection.

In the introduction, we said we didn’t think there would be much Apple-related news this week, but we learned that Apple will be announcing new Macs, and the release date for macOS Big Sur, on November 10, so we’ll be covering that in the next episode.

Subscribe to The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

How to Use a Security Key to Protect Sensitive Online Accounts

Protecting your online accounts has become more important, as so much of our lives takes place on websites, via email, and through messaging. If someone gets access to some of your accounts – especially your email account – they can get access to others, and potentially usurp your identity.

In order to ensure security, most sensitive services now offer two-factor authentication (sometimes called two-step authentication). This combines something you know – your user name and password – with something you have, which is generally a code that is generated on demand. In many cases, these codes are sent by SMS text messages, and must be used within a few minutes. But SMS is inherently insecure, and other methods are needed to ensure optimal security.

Security keys are another way to add an additional authentication factor. They are portable, like flash drives, and easy to use. In this article, I’m going to explain why you might want to use a security key to protect certain accounts, how to set one up, and how to use it.

Read the rest of the article on The Mac Security Blog.