Tighten Pro C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation
Tighten Pro - in the Mac App Store
Tighten Pro is now available in the Mac App Store.
Simply click on the icon to the left to purchase directly from Apple.
Or choose PKCS#7Viewer.app by clicking the image to the right.
|
Mac Developer: Microsoft announces new tool for effortlessly porting iOS apps to Windows 10 | 9to5Mac
Microsoft announces new tool for effortlessly porting iOS apps to Windows 10 | 9to5Mac: "Microsoft announced today during its Build conference that it will release a tool for developers to port their iOS apps directly to Windows 10 as ‘universal apps’ that run on both phones and desktop computers. Developers will be able to feed their existing Objective-C code into a new software package and have it converted to work on the upcoming PC operating system."
Saved from my inevitable wrangling of Cocotron? Or Xamarin. Or both?
Labels: windows vs. ios vs android
|
|
|
Mac Developer: OS X 10.10.3 update failed to fix Rootpipe vulnerability, says former NSA staffer | 9to5Mac
OS X 10.10.3 update failed to fix Rootpipe vulnerability, says former NSA staffer | 9to5Mac: "A former NSA staffer says that the OS X 10.10.3 update which Apple claims fixed a significant security vulnerability has failed to do so, reports Forbes. Patrick Wardle, who now heads up research at security firm Synack, demonstrated the vulnerability in a video (without revealing exactly how it was done) to allow Apple time to issue a further fix."
Hmmmm…. Labels: security flaw
|
|
|
Mac Developer: iOS apps aren't secure -- what Apple needs to learn from hacking history | VentureBeat | Security | by Minpyo Hong, Seworks
iOS apps aren't secure -- what Apple needs to learn from hacking history | VentureBeat | Security | by Minpyo Hong, Seworks: "This scenario hasn’t actually changed all that much in the mobile era. Hackers still search through binary files to create exploits to gain server access and admin privileges. And all too often, I see iOS developers repeating mistakes we made during the PC and web days, forgetting (or not knowing) to add security measures around every layer of the mobile ecosystem. These developers are under the illusion that the iOS ecosystem is completely safe, or that they don’t need to actively take measures to protect themselves. This is not the case."
One perspective.
Labels: security
|
|
|
Mac Developer: Apple’s iOS 8.3 update blocks access to apps from desktop file managers like iExplorer | 9to5Mac
Apple’s iOS 8.3 update blocks access to apps from desktop file managers like iExplorer | 9to5Mac: "Apple has seemingly moved to block desktop apps that allow users to manage files on their iOS devices in its recent iOS 8.3 update, as noted by MacRumors. Many popular file transfer apps, such as iFunBox, iTools, iExplorer, iBackupBot and PhoneView, have experienced the issue that prevents users from accessing file directories for apps on iOS devices."
Down here, I make the rules! Labels: security
|
|
|
Mac Developer: Update your Mac: Apple fixes major flaw in OS X Yosemite, but won't patch Lion, Mountain Lion or Mavericks
Update your Mac: Apple fixes major flaw in OS X Yosemite, but won't patch Lion, Mountain Lion or Mavericks: "As a result, OS X users are urged to upgrade to Yosemite version 10.10.3 as soon as possible. Apple will not patch versions older than 10.10, reportedly due to the complexity of the fix."
Enterprise strategy: security alert! Please purchase new hardware immediately! Let's continue to torture 3rd party developers with increasingly complicated sandbox rules. While we open the kimono to hackers. Yay!
Labels: security flaw
|
|
|
Mac Developer: Controversial torrent app Popcorn Time comes to non-jailbroken iPhones by skipping App Store | 9to5Mac
Controversial torrent app Popcorn Time comes to non-jailbroken iPhones by skipping App Store | 9to5Mac: "Users will have to download ‘iOS installer’ software to their Windows or Mac desktop (Mac support is arriving in the coming weeks), connect their iOS device using a USB cable and follow onscreen instructions to complete the installation. This means they are evading the normal App Store installation process, although the details are not clear."
Fascinating! I think of all the time I've wasted learning about the sandbox every time a hacker announces a root kit that can be implemented on a webpage.
Labels: security
|
|
|
| |
|