Tighten Pro C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation
Tighten Pro - in the Mac App Store
Tighten Pro is now available in the Mac App Store.
Simply click on the icon to the left to purchase directly from Apple.
Or choose PKCS#7Viewer.app by clicking the image to the right.
|
Mac Developer: How Police Get Your Private Facebook Data | The Daily Dot
How Police Get Your Private Facebook Data | The Daily Dot: "It should come as no surprise, then, that the latest summary report by the social media network indicated another increase in requests for Facebook user account information by the U.S government and law enforcement agencies."
That's a TMI! Labels: TMI
|
|
|
Mac Developer: Death to Apple's Mac Mini: I made a Hackintosh
Death to Apple's Mac Mini: I made a Hackintosh: "There's an option known as Hackintosh. It's a process of getting MacOS to run on PCs, and it's possible thanks to a group of way-nerdier-than-I-am people who are always finding new ways to make it work."
Maybe one day Mac OS will be like Linux simply because Apple cares more about the iPhone. Could be good thing. Could be a bad thing. Could be nothing. Labels: hacking osx, hackintosh, hardware, hardware hacking
|
|
|
Mac Developer: Apple drops requirement for apps to use HTTPS by 2017 • The Register
Apple drops requirement for apps to use HTTPS by 2017 • The Register: "App Transport Security (ATS) arrived in 2015 iOS and OS X in 2015, in Apple's own words, “improves privacy and data integrity by ensuring your app’s network connections employ only industry-standard protocols and ciphers without known weaknesses.” Which in practical terms means apps have to use HTTPS.
Pushing you to push the envelope. Labels: app security
|
|
|
Mac Developer: Leaked documents show breadth of iPhone data accessible by Cellebrite forensic tool
Leaked documents show breadth of iPhone data accessible by Cellebrite forensic tool: "Cellebrite is one of a number of firms specializing in cellphone cracking technology, or more specifically mobile device intrusion and data retrieval software and hardware. The company claims its UFED tool can bypass passcode locks, extract and decode almost all data from hundreds of smartphone and tablet models, including Apple hardware. "
More things that go hmmmm in the night. Labels: security flaw
|
|
|
Mac Developer: Top tech company's IP was looted by China, so it plans to hack back • The Register
Top tech company's IP was looted by China, so it plans to hack back • The Register: "The poster child for the green energy revolution is in ruins: its executives say they have hard evidence that China's People's Liberation Army stole its breakthrough technology before it could commercialise it. So now the company plans to hack back."
It's not your mother's internet security.
Labels: security policy
|
|
|
Mac Developer: Slack adds group & individual video calls to workplace chat platform
Slack adds group & individual video calls to workplace chat platform: "Slack on Tuesday announced the launch of video calling for its popular workplace collaboration platform, which is rolling out to Mac, Windows, and Chrome users over the next few days."
Is it WebRTC or the revenge of the plug-in. Eventually JavaScript is not enough and then the browser (Web App) exposes a new attack surface with a huge user base. Maybe the browser should run in it's own VM. Now where have I heard that before? Labels: security flaw
|
|
|
Mac Developer: P0wnographer finds remote code exec bug in McAfee enterprise • The Register
P0wnographer finds remote code exec bug in McAfee enterprise • The Register: ""At a first glance, Intel's McAfee VirusScan Enterprise for Linux has all the best characteristics that vulnerability researchers love: it runs as root, it claims to make your machine more secure, it's not particularly popular, and it looks like it hasn't been updated in a long time," Fasano writes."
The problem with a protection tool like this is that exposes another attack surface. Labels: security flaw, security policy, security research
|
|
|
Mac Developer: Inside the Cybercrime World of Russia's Hackers | VICE | Canada
Inside the Cybercrime World of Russia's Hackers | VICE | Canada: "On an all new episode of CYBERWAR, we investigate the big business of Russian cybercrime and talk with hackers who say some get a pass when they work double duty for Putin and his geopolitical ambitions."
Let's cyber. Labels: 1984
|
|
|
Mac Developer: Apple AI researchers gagged no more, now allowed to publish and confer with colleagues
Apple AI researchers gagged no more, now allowed to publish and confer with colleagues: "After years of silence from Apple's researchers over fear of losing commercial intellectual property, the company is now allowing employees in artificial intelligence to not only publish their research, but also interface with other academics in the field to further the overall development of the technology."
Either the end of the beginning or the beginning of The End. Labels: Apple vs. Apple
|
|
|
Mac Developer: Hackintosh monster Macs and iPhone 8's marquee feature
Hackintosh monster Macs and iPhone 8's marquee feature: "This week on The CultCast: Why building a Hackintosh can get you the monster Mac you’ve always wanted. Plus: Apple analyst Ming-Chi Kuo reveals iPhone 8’s marquee feature; AirPods ship date is finally revealed; and stick around for our top Apple AirPort router replacement picks!"
Things that go hmmmm in the night... Labels: hackintosh
|
|
|
Mac Developer: Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica
Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica: "In 2010, an Anti-Phishing Working Group report called out Avalanche as "the world’s most prolific phishing gang," noting that the Avalanche botnet was responsible for two-thirds of all phishing attacks recorded in the second half of 2009 (84,250 out of 126,697). "During that time, it targeted more than 40 major financial institutions, online services, and job search providers," APWG reported. In December of 2009, the network used 959 distinct domains for its phishing campaigns. Avalanche also actively spread the Zeus financial fraud botnet at the time."
Hmmm. Labels: security fix, security policy, security research
|
|
|
| |
|