Apple Updates to Patch Security Flaws for iOS and OS X

Apple Updates to Patch Security Flaws for iOS and OS X

Apple’s latest mobile and desktop operating systems, iOS 9 and OS X El Capitan, launched in the second half of September. As of October 22nd, Apple has released updates for both operating systems to patch notable security flaws. The updates, iOS 9.1 and OS X 10.11.1, are essential for users who have updated their Apple devices to the latest operating systems.

According to a report on the updates from eWeek, Apple decided to release quick patches for their latest operating systems after third-party sources—including Google’s Project Zero and Yahoo’s Pentest team—identified …

November 17, 2015 • 3 min read
Creating Password Protected Disk Images on Mac

Creating Password Protected Disk Images on Mac

Creating a disk image is a method often used for system backup, and can essentially clone your hard drive by copying the contents and structure of the disk and saving them exactly as they are on your computer. Using Mac’s Disk Utility, you can create a password-protected and fully encrypted disk image for secure system backup and disk cloning. Use the steps below to create a protected disk image for your Mac’s hard drive.

Open the Disk Utility

To get started with creating a protected disk image, you will need …

November 13, 2015 • 4 min read
8 Tips to Keep your Mac Happy, Healthy, and Safe

8 Tips to Keep your Mac Happy, Healthy, and Safe

Macs are sleek and slick computers that can run well for years after you take them out of the box. Like all other computers, though, your Mac is not immune to slowdowns, bugs, and other problems, and it’s up to you to keep your machine happy, healthy, and safe. Use the eight tips listed below to keep your Mac running like a well-oiled machine for years after first use.

(Once you’re done checking out this page, be sure to see our 2021 macOS Big Sur setup guide for even more …

November 6, 2015 • 7 min read
4 Things You Probably Didn’t Know about Apple’s iCloud Keychain Feature

4 Things You Probably Didn’t Know about Apple’s iCloud Keychain Feature

Note: This page refers to older versions of Keychain. We have an updated (2021) article about iCloud Keychain features.

Even if you don’t use it, you probably already know that the basic purpose of your Mac’s Keychain software is password management. iCloud Keychain is meant to make browsing the web, connecting to Wi-Fi networks, making credit card payments online, and other day-to-day internet tasks easier, by remembering all of your usernames, passwords, credit card numbers, Wi-Fi network …

October 27, 2015 • 5 min read
How to configure Mac OS X Firewall

How to configure Mac OS X Firewall

Unlike the firewall settings in Windows, the built-in firewall for Mac OS X is not enabled by default. If you’ve recently purchased a new Mac computer, then you will have to go in and turn on the firewall manually if you want that protection. The steps to do so are quite simple and user-friendly, but the first question is this: do you need to enable the firewall on your Mac?

The short answer is “yes.” Apple leaves the firewall disabled by default because it can cause issues with certain …

August 15, 2015 • 5 min read
Recovering a Lost or Stolen iPhone

Recovering a Lost or Stolen iPhone

It goes without saying that the sleek, lightweight, and attractive design of the iPhones makes it an ideal smartphone choice for many. Unfortunately, those characteristics also make Apple’s flagship device both easy to lose and a target for theft. The small, light, and slippery design of the iPhone means that it can slip out of your pocket or bag without you immediately realizing it. And since iPhones are expensive, valuable assets, they tend to be the apple of many a potential thief’s eye (pun intended).

The good news is …

August 13, 2015 • 5 min read
Newly Discovered OS X Security Flaw Could Give Hackers an Easy Way to Take Control of Your System

Newly Discovered OS X Security Flaw Could Give Hackers an Easy Way to Take Control of Your System

If you by chance haven’t updated to Mac OS X 10.10 just yet (e.g., the Yosemite operating system update that first became available last October), then you may want to hold off. According to a recent blog post by cyber security researcher Stefan Esser, Apple added a few features to the code of OS X 10.10 that have introduced some pretty serious vulnerabilities into the system. The issues, Esser noted, are present in both the current Yosemite release (OS X 10.10.4), as well as in the beta version of …

August 12, 2015 • 5 min read
Shoring up your Mac’s Security in Yosemite

Shoring up your Mac’s Security in Yosemite

Anyone who’s used a Mac for any length of time knows that comfy, secure feeling you get when logging into OS X. It’s great. And best of all, it’s malware-free. Right?

Well, not exactly…

March 5, 2015 • 1 min read
MacScan 2.9.4 Security & Privacy Adds Mac OS X 10.8 Mountain Lion Support

MacScan 2.9.4 Security & Privacy Adds Mac OS X 10.8 Mountain Lion Support

August 10, 2012 – Las Vegas, Nevada – SecureMac releases MacScan 2.9.4 offering full Apple Mac OS X Mountain Lion (10.8) support as well as interface updates and enhanced support for both Firefox and SeaMonkey web browsers. The latest version also adds the latest definitions to protect against the malware affecting Mac OS X and has been featured in the August 2012 issue of Macworld as “Hot Stuff — What We’re Raving about This Month.”

MacScan 2.9.4 is immediately available for download to try for 30 days or purchase for $39.99. …

August 10, 2012 • 2 min read
20+ Top Security Tips for Safe Computing Mac OS X – Mac OS X Trojan Horse

20+ Top Security Tips for Safe Computing Mac OS X – Mac OS X Trojan Horse

Mac OS X 10.7.3 (Lion) inherently contains many desired security features; however it takes a few moments for the user to enable most of them. It’s the ideology of convenience versus security and as it is well known Macs are quite convenient. This article will discuss how to further harden the Mac OS X environment and raise users up a few notches from the low-hanging fruit category.

General Security

Built-in – Using the operating system’s native toolset available for the user to configure and raise the security posture from its default ‘convenient’ …

May 12, 2012 • 10 min read