Macnn reports: Prosoft Engineering has released Data Rescue 3, an upgrade to its data recovery software. The app is designed to help users retrieve files from a corrupt hard drive, as well as restore files that have been previously deleted. Version 3 delivers several new features including a re-designed interface, an “intelligent” FileIQ function, and […]
Continue reading...Wednesday, August 26, 2009
Comments Off on Is there built-in Antivirus software in Snow Leopard?
The Intego blog is reportingthat Snow Leopard appears to contain some sort of built-in antivirus protection. Check out the screenshot below which popped up when a user tried to open up a .dmg file infected with a DNS changer trojan horse. ZDNet speculates on the matter: It is not yet clear how Apple is handling […]
Continue reading...Tuesday, August 25, 2009
Comments Off on Report: Malware of the future will be OS independant
The Washington Post reports: Security researchers increasingly are finding that sites designed to trick the visitor into installing malicious software will serve different malware depending on whether the visitor arrives at the page using a Microsoft Windows PC or a Mac. Trend Micro researcher Ivan Macalintal recently found a new variant of the dreaded DNS […]
Continue reading...Tuesday, August 4, 2009
Comments Off on Charlie Miller on how he uncovered the iPhone SMS exploit [Video]
At the Black Hat computer security conference in Las Vegas a couple of weeks ago, security researchers Collin Mulliner and Charlie Miller revealed that they could remotely take over any iPhone with a simple text message comprised of a single character. Here, Charlie Miller discusses how he went about uncovering the SMS exploit. Interestingly, Miller […]
Continue reading...Friday, July 31, 2009
Comments Off on Apple issues iTunes update to address iPhone SMS security flaw
At the Black Hat computer security conference in Las Vegas this past week, researchers Collin Mulliner and Charlie Miller revealed that they could remotely take over any iPhone with a simple text message comprised of a single character. Rebooting the phone would in most cases solve the problem, but it wouldn’t take a hacker long […]
Continue reading...Tuesday, July 21, 2009
Last week, it came to light that a large number of sensitive and internal Twitter documents had been compromised and sent to the tech news site TechCrunch. Over the course of a few days, TechCrunch selectively published a decent amount of moderately interesting information. But even more interesting than the content of the stolen information […]
Continue reading...Wednesday, June 17, 2009
Comments Off on Keeping your Mac running in tip-top shape
When it comes to Apple blogs, Smoking Apples flies somewhat under the radar, but they consistently churn out in-depth and quality articles. Yesterday I came across an interesting post on their site which detailed 7 Mac apps which you can use to keep your Mac running as smoothly as possible. You can check that out […]
Continue reading...Thursday, June 11, 2009
Here’s a quick rundown of the more intriguing features users can look forward to in the upcoming iPhone OS 3.0 update, which is scheduled to drop on June 17. Cut, Copy, and Paste The next iPhone software will bring with it over 100 new features, chief among them the long awaited arrival of cut, copy, […]
Continue reading...Thursday, May 14, 2009
Cult of Mac is reporting that a hacker was able to gain access to Steve Jobs Amazon account through a carefully crafted, yet fake, email from Amazon that installed a keylogger on his system. The hacker is trying to sell details of Jobs’ Amazon.com account to journalists, including Jobs’ purchase history for several years and his […]
Continue reading...Wednesday, May 13, 2009
Apple recently hired noted security expert Ivan Krstic, who had previously worked as the director of security architecture for the One Laptop per Child (OLPC) initiative. While working at OLPC, Krstic was tasked with making computers easy to use while simultaneously keeping them safe from malicious software. As part of his work, he developed the […]
Continue reading...Saturday, April 25, 2009
Apple found guilty of willful patent infrignement – ArsTechnica Interview with Tweetie creator Loren Brichter – MacWorld Snow Leopard to offer screen recording via QuickTime X Player – AppleInsider Darth Vader’s iPhone – YouTube How to Ensure You’re not part of the Mac Botnet – TheAppleBlog Why AT&T Wants to Keep the iPhone Away from […]
Continue reading...Thursday, April 16, 2009
Remember a while ago when pre-release copies of iWork ’09 showed up on P2P networks? And remember how those copies were later found to contain a pesky little trojan? Well, researchers at Symantec are reporting that infected P2P copies of both iWork ’09 and Adobe CS4 contained a malicious trojan designed to create the first […]
Continue reading...
Monday, October 12, 2009
Comments Off on Data Rescue 3 drops with numerous upgrades