Tighten Pro C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation
  Tighten Pro - in the Mac App Store
Tighten Pro is now available in the Mac App Store.
Simply click on the icon to the left to purchase directly from Apple.
Or choose PKCS#7Viewer.app by clicking the image to the right.
|
Mac Developer: Wisconsin court orders Apple pay $506M for infringing on WARF patent
Wisconsin court orders Apple pay $506M for infringing on WARF patent: "WARF first sued Apple in 2014 over alleged infringement of U.S. Patent No. U.S. 5,781,752 for a "Table based data speculation circuit for parallel processing computer." According to WARF and original patent claims, the IP provides a novel method of improving power efficiency and performance in modern computer processor designs using "predictor circuit" technology. The university leveraged the same patent to force Intel into a settlement in 2008."
If you had any questions as to why college education is barely affordable, here's your answer. How far have we come since Steve Jobs got excited about Mach at Carnegie-Mellon? Labels: microprocessor patents, software engineering, software patents
|
|
|
Mac Developer: “Perverse” malware infecting hundreds of Macs remained undetected for years | Ars Technica
“Perverse” malware infecting hundreds of Macs remained undetected for years | Ars Technica: "One of the interesting aspects of the latest Fruitfly variant is that it flew under the radar for so long. The malware relies on functions that were retired long ago and uses a crude method to remain installed once a Mac is infected. Compared to newer, more sophisticated malware, Fruitfly is much easier to detect. And yet, for whatever reason, no one caught it until recently. Two pieces of Mac software developed by Wardle would have given victims a strong indication they were infected. One, called BlockBlock, would have warned of the suspicious launch agent used by the malware. "
BlockBlock, like I said, good things. Labels: security research
|
|
|
Mac Developer: Google drops the boom on WoSign, StartCom certs for good | Ars Technica
Google drops the boom on WoSign, StartCom certs for good | Ars Technica: "The investigation uncovered a pattern of bad practices at WoSign and its subsidiary StartCom dating back to the spring of 2015. As a result, Google moved last October to begin distrusting new certificates issued by the two companies, stating "Google has determined that two CAs, WoSign and StartCom, have not maintained the high standards expected of CAs and will no longer be trusted by Google Chrome."
Now for the root CAs in lala land. Labels: security policy
|
|
|
Mac Developer: Objective-See
Objective-SeeBlockBlock has the ability query VirusTotal to see if either the process or startup item that was persisted, is known malware. Clicking on the 'virus total' button will generate a network request, which contains the path, name, and hash of both the process and startup item. This looks very promising. Labels: security tools mac
|
|
|
Mac Developer: Apple no longer accepting VPN-based ad blockers to App Store, report says
|
|
|
Mac Developer: Amazon supercharges GPU power, spits out Nvidia-backed G3 • The Register
|
|
|
Mac Developer: An AI can replace what a world leader said in his video-taped speech. This will end well. Not • The Register
|
|
|
Mac Developer: Global Web standard for integrating DRM into browsers hits a snag | Ars Technica
|
|
|
Mac Developer: Bloke takes over every .io domain by snapping up crucial name servers • The Register
|
|
|
Mac Developer: Google Chrome's HTTPS ban-hammer drops on WoSign, StartCom in two months • The Register
|
|
|
Mac Developer: Spanish media claims iPhone 6 with Secure Enclave unlocked by Cellebrite in course of investigation
|
|
|
| |
|