Scanners
- Tuesday November 12
- 04:03 pmRode just made the AirPods of lav mics for your iPhone
We’re living in the future, folks. Rode just announced its new Wireless Micro hardware, and it’s basically the AirPods of lav mics for your iPhone. The product consists of two wireless lavaliere microphones, a USB-C wireless receiver that connects to your iPhone or iPad, and a compact charging case that recharges over USB-C. I’ve been trying out the Rode Wireless Micro for a few weeks now, and I’m honestly blown away by the state-of-the-art technology here… more…04:01 pmMessi’s early exit from MLS playoffs a blow to Apple TV
In a blow to Apple TV and Major League Soccer, Lionel Messi's inaugural MLS playoff campaign came to a disappointing end, as Inter Miami… The post appeared first on MacDailyNews.03:56 pmApple Music Classical is now available in CarPlay
Apple Music Classical users will now find it easier to listen to their choice of music while driving, with it now being added to CarPlay.Apple Music ClassicalClassical music listeners can use both Apple Music and Apple Music Classical to discover and listen to compositions. However, only Apple Music has been enabled in CarPlay, so users have been forced to use the main app to access classical music behind the wheel.In a Tuesday update, Apple has made Apple Music Classical available to use in CarPlay. The integration means users can access their library, playlists, and other recommendations from the Apple Music Classical app itself in the CarPlay interface. Continue Reading on AppleInsider | Discuss on our Forums03:23 pmiPhone SE 4 production timeline hints at March release date
Apple’s next iPhone might just be the best option for most buyers, and it should be here soon. A new report on iPhone SE 4 production points to a likely March debut. Here are the details. more…03:21 pmiOS 18.2 beta feature helps you remember songs based on where you heard them
Macworld Ever since Apple acquired Shazam in 2018, the company has been actively developing the music recognition service and baking its features into its operating systems. At this point, users can identify songs on iOS, iPadOS, macOS, and watchOS without installing the Shazam app—thanks to Siri and the dedicated Control Center toggle. With iOS 18.2 beta, Apple is further elevating the built-in Music Recognition utility. As discovered by Macworld, iOS 18.2 lets the Music Recognition applet geotag songs based on where users discover them. When a user taps and holds on the dedicated Music Recognition Control Center toggle, and then clicks History for the first time, a new splash screen appears. The page highlights existing features, such as song history and support for iCloud sync, and adds a new feature called Musical Memories. Once you allow location access, it will automatically enable a geotagging feature that will tag songs with location data. So, going forward, when you discover songs through the Music Recognition tool, it’ll attach your location to the song history so you’ll be able to place the song in a specific place to remember where you were when you heard it. For the time being, the feature is limited to individual songs, and there’s seemingly no way to access a universal map with pins highlighting all of the songs you’ve Shazamed. So, you can only view the location of each song separately by tapping on it in the history log. Tapping the place’s name in the discovered song’s details redirects users to the respective street in the Apple Maps app. It’s worth noting that this feature, like Music Recognition, works without having the Shazam app installed. In fact, at the time of writing, Shazam still doesn’t offer the same geotagging perk. Apple, however, could bring the option to the full app once iOS 18.2 launches to the public later this year.03:20 pmApple Music turns its 100 Best Albums list into $450 book
In a truly Apple move, Apple Music offers a limited-edition book version of its 100 Best Albums list for an eye-watering $450. (via Cult of Mac - Apple news, rumors, reviews and how-tos)03:05 pmOWC Thunderbolt 5 hub offers 120Gbps transfers
Unleash the power of Thunderbolt 5 with OWC's new hub. It brings fast data transfers, high-speed charging and expanded connectivity. (via Cult of Mac - Apple news, rumors, reviews and how-tos)03:04 pmThose bellyaching about Mac mini’s power button location don’t use Macs, so they don’t get it | Mac Daily NewsThose bellyaching about Mac mini’s power button location don’t use Macs, so they don’t get it
The designers of Apple's new, diminutive Mac mini have relocated the power button to the underside of the device. While Apple executives… The post appeared first on MacDailyNews.02:49 pmApple Music Classical adds dedicated CarPlay app and Siri support
After a false start back in January, the Apple Music Classical app has officially launched on CarPlay. The app also now integrates with Siri, allowing you to ask Siri to play your favorite content using Apple Music Classical. more…02:43 pmReport: Upcoming AirPods models will prioritize new health features
AirPods have been among Apple’s biggest hits in the last decade, and the company apparently has big plans for their future. Just weeks after launching hearing health features in iOS 18.1 for , a new report indicates health will be a big priority for future AirPods models. more…02:30 pmLearn cloud computing with this $29.99 course bundle
If you’re looking to launch your tech career or expand your skills, this bundle of cloud computing course helps you level up. (via Cult of Mac - Apple news, rumors, reviews and how-tos)02:00 pmWith the M4 iMac, you don’t have to pick between fast or fun [Review]
The 2024 iMac with the M4 chip is a stunning and powerful all-in-one. It speaks to the golden age of the Mac we find ourselves in. (via Cult of Mac - Apple news, rumors, reviews and how-tos)01:59 pmEU threatens fines if Apple doesn’t axe geo-blocking on services such as App Store
The European Union has ordered Apple to cease geo-blocking practices on its services, including the App Store, Apple Arcade… The post appeared first on MacDailyNews.01:54 pmEU's latest demand on Apple about geolocking is unforgivably naive
The European Union has told Apple to stop geo-locking, where apps and services vary in different countries — entirely ignoring decades of laws and practices by other industries that have nothing to do with the App Store.EU wants the impossible with Apple's App StoreGive the EU credit, it has implemented the kind of laws regarding Big Tech that other countries, including the US, are still only talking about. But in this case, its assumption that it can simply mandate how the rest of the entire world works is an excoriating overreach.The new demand is that Apple stop geo-locking, and specifically that EU users must be able to: Continue Reading on AppleInsider | Discuss on our Forums01:31 pmApple gets EU warning for prohibited ‘geo-blocking practices’ on the App Store and other services | 9 to 5 MacApple gets EU warning for prohibited ‘geo-blocking practices’ on the App Store and other services
There’s yet another battle brewing between the European Union and Apple. In a press release today, the European Commission announced that it has “notified Apple” that it may be violating the EU’s anti-geo-blocking rules with Apple Media Services, including the App Store, Apple Music, Apple TV+, and more. more…01:29 pmApple’s controversial list of the top 100 albums of all time is now a $450 book
Macworld If you’re an Apple Music fan, love lists, and like reading short blurbs about all-time great records, your new favorite book has arrived. If you have $450 to burn that is. Apple Music has announced that it has partnered with luxury lifestyle bookmaker Assouline to turn its list of the 100 Best Albums into an ornate coffee table book. Though at a price tag nearly as high as a new iPad mini, you probably want to make sure a cup of coffee never gets anywhere near it. According to Assouline’s description, “Every book comes in a custom-designed translucent acrylic slipcase etched with the Apple Music logo, while the linen hardcover is debossed with the same logo to perfectly line up behind the etching. The back of the case is engraved with the edition number, and inside the book there is a hand-numbered ex libris to further highlight the limited nature of this release. The edges of the book’s pages are gilded with a sparkling gold that mirrors the title on the spine.” Bad Bunny’s album, Un Verano Sin Ti, is ranked 76 on Apple’s list.Assouline/Apple Inside all that is Apple Music’s controversial list of the top 100 albums, which was released earlier this year. The top 10, which was heavily debated at the top of its release, includes the following records: 1. Lauryn Hill — The Miseducation of Lauryn Hill 2. Michael Jackson — Thriller 3. The Beatles — Abbey Road 4. Prince & The Revolution — Purple Rain 5. Frank Ocean — Blonde 6. Stevie Wonder — Songs in the Key of Life 7. Kendrick Lamar — good kid, m.A.A.d city 8. Amy Winehouse — Back to Black 9. Nirvana — Nevermind 10. Beyoncé — Lemonade Apple says the list was “assembled with the help of artists and experts, it’s a modern love letter to the records that have shaped the world we live and listen in today.” Each entry includes a photo of the album cover as well as “Apple Music’s beloved liner notes, in-depth analysis that brilliantly captures the significance of the album, both to the artists and to the art of music itself.” There is also a foreword by DJ and Apple Music 1 Creative Director Zane Lowe. You can preorder the 208-page book on Assouline’s website for delivery on or around November 25. All orders receive free shipping and a complimentary Assouline signature tote bag and white handling gloves.01:26 pmOWC Thunderbolt 5 Hub offers high-speed port expansion for Apple's newest Macs
OWC's new Thunderbolt 5 Hub aims to provide even more access to the fastest ports, by splitting one off into three more.OWC Thunderbolt 5 Hub - Image credit: OWCIn 2021, OWC introduced the Thunderbolt Hub, a dock that provided three additional Thunderbolt 4 ports when it was plugged into a Mac's Thunderbolt 4 connections. Three years later, it's doing it again, but for the newest Mac models.The OWC Thunderbolt 5 Hub is the same concept as before, with one Thunderbolt 5 cable connecting to the host Mac while providing three more Thunderbolt 5 ports to plug devices into. The hub also adds a single USB-A port to the equation too. Continue Reading on AppleInsider | Discuss on our Forums01:17 pmHow to know if your Mac has been hacked
Macworld It’s a long-held belief of Mac users that their computers are immune to the kind of malware and viruses that plague Windows PCs. While there is some credibility in this idea, we shouldn’t get over-confident when it comes to Mac security, as there are exploits that criminals can use to hack your Mac and leave it like a wide-open door through which they can steal your data or worse. In this article, we take a look at whether Macs can be hacked, how to tell if your Mac has been hacked or if someone is spying on your Mac, and what you can do if your Mac is being remotely accessed. Here’s what you need to know – and what you need to do. Can Macs get hacked? Apple has gone to great lengths to make it difficult for hackers to gain access to Macs. With the protections offered by Gatekeeper, the Secure Enclave features of the M1, M2, M3 and M4-series of chips, and the T1 or T2 chip in some Intel-powered Macs, plus Apple’s built-in antivirus XProtect, targeting Macs may well be considered too much effort by hackers. We discuss this in more detail here: How secure is a Mac? and in Do Macs need antivirus software? PROMOTIONAntivirus Deal: Intego Mac Premium Bundle Get Intego’s Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. Get Deal However, from time to time security vulnerabilities are detected that could be used by hackers to exploit Macs. These vulnerabilities are sometimes referred to as back doors or as a zero-day vulnerability. When these are identified by security researchers (or friendly hackers) they usually alert Apple to them in the hope that the company will quickly close the vulnerability, quickly – or within zero days – before it is exploited. Such vulnerabilities, though rare, could allow an attacker root access to your Mac. Apple is usually quick to fix, but there have been cases where Apple has been criticized for being slow to respond to the threat once it’s been identified. For example, in August 2023 a software developer released details about a flaw in App Management, a security feature introduced in macOS Ventura designed to prevent malicious software modifications and alerting the user in such an instance. The developer had discovered the issue before the release of Ventura in October 2022, but a fix was not immediately issued, so, in August 2023, the developer went public with details of the flaw which meant that apps could bypass the check by App Management. More here. In another example, researcher Filippo Cavallarin found a Gatekeeper vulnerability in 2019 that he alerted Apple to. Having had no response from Apple within 90 days he went public with details of the vulnerability. In December 2023, a group of university researchers alerted Apple to a vulnerability in Apple’s M-series chips that can be exploited to gain access to cryptographic keys. Dubbed “GoFetch,” the vulnerability could be used by an attacker to access a user’s encrypted files. As of June 2024, Apple is yet to issue a fix, perhaps because of its effect on performance. Those pointing out vulnerabilities aren’t always ignored by Apple. In 2021, Apple paid a student $100,000 after he discovered a dangerous vulnerability relating to Macs and reported it to Apple. The vulnerability, which could enable a hacker to gain control of a Mac user’s camera, was identified by Ryan Pickren in July 2021 and fixed by Apple in macOS Monterey 12.0.1 on October 25, 2021. More information here: Hacker ‘could take over any Apple webcam’. It’s not always a flaw in Apple’s software that can leave Macs vulnerable. In August 2023 a serious vulnerability that affected Intel processors was highlighted. Affected devices included Intel-powered Macs from 2015 onwards (M-series Macs were all ok). According to researcher Daniel Moghimi: “Downfall attacks target a critical weakness found in billions of modern processors used in personal and cloud computers.” Intel released a patch, but it’s not the first time this has happened. Back in 2018, in a similar case, Meltdown and Spectre attacked vulnerabilities in Intel and ARM processors. That risk was mitigated by updates to the operating system which closed off the areas that were exposed. Do Macs get hacked? It may be rare when compared to Windows, but yes, there have been cases where Macs have been accessed by hackers. This can take various forms and there are various types of Mac malware that have been discovered ‘in the wild’ on Macs as you can see from our run-through of the various threats affecting macOS: List of Mac viruses, malware and security flaws. Soon after launch, Malware targeted the M1 Mac – read about Silver Sparrow and the first cases of malware for M1 Macs. And in April 2024 Apple alerted some users via an email, suggesting that they may have been the target of spyware. “Apple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID -xxx-,” read the email, as detailed here: Apple warns users in 92 countries of spyware attack. This kind of attack isn’t likely to affect the general public though, so if you aren’t protecting state secrets or heavily invested in cryptocurrency you are unlikely to fall fowl of such an attack. How Apple protects Macs from hackers Apple is kept busy patching these security flaws as and when they arise, but it used to be reliant on users to install them. Before Apple launched macOS Ventura in 2022 an update to the operating system was required to get the important security component on a Mac. Since some people delay installing operating system updates this was problematic so Apple changed the way security updates are applied to Macs. These important security updates can now be delivered as background updates that can be automatically installed on a Mac without the user having to do anything–although we recommend you check the following to ensure it is set up on your Mac: Open System Settings. Choose General. Click on the i beside Automatic Updates. Make sure that the option to Install Security Responses and system files is selected, even if you choose not to select the others (although we recommend you do). If you aren’t running Ventura or later then when Apple issues a macOS update with a security component it is important to install it as soon as possible. You can still set your Mac to automatically download and update the operating system – just follow these steps: Open System Preferences. Click on Software Update. Click on Advanced. Make sure that the option to Install system data files and security updates is selected. Now your Mac will check for updates, download the update, and install the update without you needing to do anything. Can a Mac camera be hacked? Dominik Tomaszewski / Foundry Once a hacker has access to your Mac there are various ways in which they might try to gain information about you or use the processing power of your Mac for their own purposes. As we mentioned above, in the case of spyware the hacker might attempt to install a keylogger so that it can record what you are typing and look out for your password. The hacker could also attempt to hijack your mic or video camera. Theoretically, this shouldn’t be possible: since macOS Catalina launched in 2019 Apple has protected Mac users from these types of exploits by ensuring that you have to give your permission before the mic or video camera is used, or before a screen recording can take place. And if your video camera is being used you will always see a green light next to it. However, the example we mentioned above, where Ryan Pickren alerted Apple to a vulnerability that could enable a hacker to gain control of a Mac user’s camera, suggests that Apple’s alert wasn’t enough to stop the camera from being accessed. There was also a camera-related vulnerability that affected Mac users of the video conferencing service Zoom. In this case, hackers could add users to video calls without them knowing and then activate their webcams but keep the light turned off. This would enable any potential hackers (or law enforcement bodies) to monitor your activities and you wouldn’t have any idea that the camera was watching you. Zoom patched the vulnerability, but only after it became public knowledge when the person who found it reported that the flaw had been left in place for three months after the company had been privately informed of the risk. For more information read: How to stop your Mac webcam being hacked. Wondering about whether FaceTime is secure? Read Is Apple FaceTime safe? How to tell if your Mac has been hacked If you think your Mac has been hacked there are a few ways to find out. First, look for the signs: Has your Mac slowed down? Is your web connection painfully slow? Do the ads you are seeing look a bit more dodgy than usual? Have you noticed anything strange on your bank statements? If you think an account might have been hacked then check the website haveibeenpwned.com and pop in your email address to see if it’s featured in a data breach. If it has been then change your password! This doesn’t mean you have been hacked, but it’s certainly possible that if this information is out there you could be. Another way to tell if there is some strange activity going on would be to check Activity Monitor and look specifically at network activity. You could also go to System Settings > General > Sharing (or System Preferences > Sharing pre Ventura) and check if anyone suspicious has access to anything such as Screen Sharing or Remote Management. Your best bet is to run a sweep of your system with some kind of security software that can check for any viruses or malware that may have made it onto your system. We have a round-up of the best Mac antivirus apps, where we recommend Intego as our top choice. You may also like to read our guide on how to remove a virus from a Mac. How to protect your Mac from hackers macOS is a very secure system, so there’s no need to panic, but if you want to reduce the chances of being compromised then there are a few things to do. The first is to only download software from either the Mac App Store or the official websites of manufacturers. You should also avoid clicking on links in emails in case they lead you to spoof websites and malware. Don’t use USB cables, other cables, or memory sticks, that if you can’t be sure that they are safe. When you are browsing the web surf in private or incognito mode. If you ever receive a ransomware request or a phishing email do not respond as all this does is confirm that you exist. Another is to make sure you download updates to macOS as soon as they become available as they usually include security patches. In fact, you can set up your Mac to automatically download such updates. Turn on Automatic Updates in System Settings > Software Update, click on the i beside Automatic Updates and select all the options. Pre-Ventura, go to System Preferences > Software Update and click beside Automatically keep my Mac up to date pre-Ventura. Finally, consider using a dedicated security software package. You’ll find our pick of the current offerings in best Mac antivirus. Right now our top choices are Intego Mac Internet Security X9, but we also like McAfee Total Protection 2021, and Norton 360 Deluxe. You should also consider using a password manager, as this will allow you to have multiple, complicated login details across all your accounts without having to remember them. Here our recommendations are LastPass, 1Password, and NordPass. Take a look at our recommendations of the best Antivirus for Mac and the best Mac Antivirus deals and free options Glossary of terms We’ll run through the types of hacks that are more pertinent to the hacking of Macs below: Cryptojacking: This is where someone uses your Mac’s processor and RAM to mine cryptocurrency. If your Mac has slowed right down this could be the culprit. Spyware: Here hackers attempt to gather sensitive data about you, such as your log in details. They might use key loggers to record what you type and eventually have the information they need to log in to your accounts. In one example, the OSX/OpinionSpy spyware was stealing data from infected Macs and selling it on the dark web. Ransomware: Some criminals use Ransomware to try and extort money from you. In cases like KeRanger hackers could have encrypted files on Macs and then demand money to unencrypt them. Luckily Security researchers identified KeRanger before it started infecting Macs so it was addressed before it became a serious threat. In April 2023 security researchers warned that a collective known as LockBit was working on ransomware encryptors that work on both Macs using Apple M-series chips and Intel processors. Botnet: In this case, your computer becomes a remotely operated spam machine. In the case of the Trojan Horse botnet OSX.FlashBack over 600,000 Mac computers. Proof-of-concept: Sometimes the threat isn’t actually seen in the wild, but is a proof of concept based on a loophole or vulnerability in Apple’s code. While this is less of a threat the concern is that if Apple isn’t quick enough to close the vulnerability it could be utilized by criminals. In one example Google’s Project Zero team designed a proof-of-concept known as Buggy Cos which was able to gain access to parts of macOS thanks to a bug in macOS’ memory manager. Port exploits: It’s not always the case that the hack is made possible by some sort of malware downloaded onto the Mac. In some cases, Macs have been hacked after something is plugged into a port. It is possible that Macs could be hacked via the USB and by the Thunderbolt port – which is a good reason to always be careful about what you plug into your Mac or leave your Mac unattended. For example, in the checkm8 exploit it could have been possible for hackers to gain access to the T2 chip by plugging in a modified USB-C cable. Similarly, in the case of Thunderspy a serious vulnerability with the Thunderbolt port could have granted a hacker access to a Mac. Feeling more secure now? Learn even more by reading the helpful tips in How to keep your Mac secure.01:15 pmOWC announces its first Thunderbolt 5 dock, compatible with latest M4 Macs
The new and new M4 Pro and M4 Max MacBook Pro feature Thunderbolt 5 ports for the first time. Thunderbolt 5 offers bi-directional transfer speeds up to 80Gb/s, or 2x faster than Thunderbolt 4. It can also drive high-resolution displays using a 120Gb/s bandwidth mode. However, the universe of Thunderbolt 5 accessories is still nascent. OWC announced its first Thunderbolt 5 dock today, priced at $189. more…01:06 pmNorth Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat Labs uncovered malware embedded in macOS apps that look harmless on the surface. Using the popular app-building tool Flutter, cybercriminals made apps that slipped through typical security measures.Flutter, developed by Google, has become a favorite tool for creating apps that work seamlessly across macOS, iOS, and Android. Its codebase allows developers to build an app once and have it look consistent across all platforms. Continue Reading on AppleInsider | Discuss on our Forums