When Oracle updated Java a week ago, Apple also pushed out it’s own update and made it available through Software Update. Apparently something was wrong with Apple’s version of the update and it caused some Java applets to not work as they should. Apple addressed the issue and made a new version available however your ...
This is the fourth post in the series. You should be well on your way to a properly secured Mac after configuring Security & Privacy, Users & Groups and Sharing settings. Now it’s time to explore Disk Utility. As the name implies this tool allows you to perform all kinds of disk related tasks and ...
Not directly related to security but i wanted to make the readers of this blog aware that Apple has a support forum on their website where you can ask any Apple related question you want. The support community has some incredibly smart and skilled folks amongst their users that take time out of their day ...
This is the third post in a series covering OS X’s built-in security settings. You can read the first post here and the second one here. The Sharing settings are important as wrong configuration can punch a serious hole in the security of your data and privacy. Open up the settings by going to System ...
This is a follow-up on “OS X Security & Privacy – Step by Step” (later renamed to “OS X Built-in Security – Security & privacy” same URL though). With the basic security and privacy settings out of the way you can start fine tuning. In this post i’ll explain all options and available settings in ...
I have referred to OS X’s built-in security tools before and while OS X is a robust and secure system out of the box, it can get 300% better with a few simple tweaks of these settings. So here it is, OS X’s built-in Security & Privacy step by step. [Updated on December 22nd, 2013 to ...
Java has released an update, get it by going to System Preferences > Java > Update (if you have Java installed). Apple has also made updates available that can be downloaded through Software Update. This Critical Patch Update provides 40 new security fixes. 37 of these vulnerabilities are remotely exploitable without authentication. 34 of the ...
With two factor authentication being offered now pretty much everywhere you’d be wise to use it. After all if someone offers you added security at no cost why wouldn’t you use it? Usually this means adding a trusted device to your account that can be used as an extra piece of the puzzle to unlock ...
These days we share more photos than ever before. On websites, blogs and social media. What a lot of people don’t realize is that a photo has a lot of hidden information in it (metadata or EXIF data) or underestimate just how much information can be extracted. While this information is not always accessible by ...