Tighten Pro C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation
Tighten Pro - in the Mac App Store
Tighten Pro is now available in the Mac App Store.
Simply click on the icon to the left to purchase directly from Apple.
Or choose PKCS#7Viewer.app by clicking the image to the right.
|
Mac Developer: New 'Dok' malware targets Macs using signed Apple developer certificate
New 'Dok' malware targets Macs using signed Apple developer certificate: "The code, dubbed "Dok" by security firm Check Point, is said to affect "all versions" of macOS/OS X, and be the first "major scale" malware directed at Mac owners through a "coordinated email phishing campaign." The emails are aimed mostly at Europeans, one example being a German-language message from a supposed Swiss official, claiming problems with the target's tax return."
Revoke! Revoke! Remote delete! Remote delete? Labels: gatekeeper, quarantine, security policy
|
|
|
Mac Developer: Uber Secretly Tracked Users, Spied On Lyft Prompting Tim Cook To Threaten Apple Store Expulsion | Zero Hedge
Uber Secretly Tracked Users, Spied On Lyft Prompting Tim Cook To Threaten Apple Store Expulsion | Zero Hedge: "
The idea of fooling Apple, the main distributor of Uber’s app, began in 2014. At the time, Uber was dealing with widespread account fraud in places like China, where tricksters bought stolen iPhones that were erased of their memory and resold. Some Uber drivers there would then create dozens of fake email addresses to sign up for new Uber rider accounts attached to each phone, and request rides from those phones, which they would then accept. Since Uber was handing out incentives to drivers to take more rides, the drivers could earn more money this way."
If the rules allow iPhone device holders to perpetrate fraud, I think the rules should be changed. Labels: Apple vs. Apple
|
|
|
| |
|