Intego Mac Podcast, Episode 119: iPhones Hacked and Cracked

The world’s richest man’s iPhone was hacked when he clicked on a video in WhatsApp. Police and the FBI are cracking iPhones to get evidence. Should we worry? Tom Cruise would know what to do.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 118: Your Photos Can Tell People Where You Live

Photos you shoot with your iPhone, and with some cameras, store location data. Sharing these photos on social media may pinpoint your location: where you live, or where you work. It’s easy to remove this data. In the news, we talk about listening in on Skype audio, another Apple – FBI spat about accessing data on an iPhone, Google getting rid of cookies, and more.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 117: The Year in Apple Security 2019

We look back at the eventful year 2019 in Apple security. In the news, Apple is switching to randomized serial numbers for its products, Apple sues a company over jailbreaking, Firefox has critical vulnerabilities, and more.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 116: 9 Security and Privacy Settings to Activate on Your New iPhone or iPad

We cover some security news, such as a password breach at Zynga, a user database breach at Waze, and a new Apple patent for under-display biometric sensors. Then we discuss essential settings to keep your iPhone, iPad, and iPod touch secure.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 115: 8 Steps to Ensure the Security and Privacy of Your New Mac

If you got a new Mac for the holidays, there are a number of settings you can adjust to enhance its security and privacy. We discuss eight tips to make your Mac stronger. We also look at some news, with Ring’s reaction to the claims that they were compromised, Apple pulling an app from the App Store for spying on users, and Apple’s new bug bounty program.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

8 Mac security and privacy features to set up right away

Congratulations on getting a new Mac. You’ll be able to use your new computer for work and for play, to listen to music, to shop, and to view the world. But it’s important to protect yourself, and the best time is right at the beginning, as soon as you can. There are myriad threats to your data, your identity, and your privacy, and there are a number of features that you can use on your Mac to protect you. Here are eight features you should set up on your new Mac.

Read the rest of the article on The Mac Security Blog.

Intego Mac Podcast, Episode 114: Apple HomeKit and the Smart Home

We take a close look at smart home technology and Apple’s HomeKit, and also discuss why Vladimir Putin is still using Windows XP, another Ring camera issue, some password problems, and a new Intel vulnerability called Plundervolt.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 113: Mac Pro costs the same as Tesla Cybertruck

Apple has released the new Mac Pro, along with updates for all its operating systems this week. Google Chrome gets a serious update, Google Maps gets incognito mode, and the Ring doorbell leaks some location data allowing journalists to create heat maps of Ring-protected homes. Plus an AirDrop vulnerability, a tweet with an iPhone decryption key, and more.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

Intego Mac Podcast, Episode 112: Twitter Trickery, Charging Insecurity, Cryptocurrency Malware, and More

We follow up on our Black Friday purchases, then talk about some Twitter trickery, some Russian rigidity, some charging insecurity, some location confusion, and some new Mac cryptocurrency malware.

Check out the latest episode of The Intego Mac Podcast, which I co-host with Josh Long. We talk about Macs and iOS devices, and how to keep them secure.

The chain of trust in Appleā€™s devices

A lot of computer security is based on trust. Your devices verify that you are, indeed, an authorized user, through the use of user names and passwords. And your devices trust services and servers, through a series of certificates and “trusted third parties” who work through a cascading system of verification and authentication.

If you use Apple devices, the company has its own chain of trust that allows you to use multiple devices in concert. Each link of this chain is carefully designed to ensure its reliability, and each link also enhances other links in the chain. This can seem complex, but when you break it down into its component parts, it’s a lot easier to understand.

In most cases, you don’t need to know how all these elements work together, but it can be good to be aware of how Apple ensures the security of your devices, your accounts, and even your payment methods.

Read the rest of the article on The Mac Security Blog.