Protect your data as you learn cybersecurity best practices

By

Use this VPN while you learn about cyber security.
Learn cyber security as you protect your data with this VPN.
Photo: Cult of Mac Deals

Within these past few years, we’ve spent more time online than ever. If you’re looking for an exciting and stable new career, the demand for cybersecurity has exploded over the past year as well — and in order to meet the increasing demand, the cybersecurity workforce needs to grow by a whopping 62%. This VPN Unlimited and Infosec4TC Platinum Cybersecurity Course Membership is a way for you to learn the ins and outs of cybersecurity, all while protecting your data and encrypting your internet connection.

Get all the cybersecurity training you can imagine with a platinum membership to Infosec4TC

By

Get hundreds of hours of cybersecurity training, practice exams with this platinum membership
Infosec4TC will boost your career possibilities with lifetime access to cybersecurity training.
Photo: Cult of Mac Deals

A rewarding career in the cybersecurity field is within reach if you have the right knowledge and training to get your foot in the door. And once it’s there, the possibilities are endless. One of the best ways to get that knowledge is with a platinum membership to Infosec4TC, an online training program that puts you in control of how much and how fast you learn.

Train for your future IT career with this 169-hour bundle

By

This is the perfect time of year to consider a new career.
This is the perfect time of year to consider a new career.
Photo: Cult of Mac Deals

The end of the year is a natural time to reevaluate your current role. And whether you’re looking to stay at your current job and improve your productivity and time management, or do a complete 180 and make your photography side hustle into a full-time career, it’s a good opportunity to pause and reflect on what you actually want.

If you’re looking to go into a field that offers lots of job security, check out The Ultimate Cybersecurity & IT Career Certification Pathway Training Bundle. With this affordable course, you can get a head start on a bulletproof career path.

T2 chip vulnerability could let local attackers hack Macs

By

The Apple T2 chip could be the source of mysterious crashes afflicting two of Apple's newest computers.
Apple introduced its T2 chips to Mac a couple of years ago.
Photo: IFIXIT

Security researcher Niels Hofmans of ironPeak has confirmed a T2 chip security flaw. These chips have been found in all new Macs made since 2018.

At its worst, the vulnerability — which is reportedly “unpatchable” — could allow an attacker to interfere with Macs in “classic evil maid” attacks involving an unintended computer. This might open the door for new ways for law enforcement to access suspects’ Macs to retrieve information, for example.

Apple could face new encryption fight in Australia

By

encryption
A bill in Australia could force tech companies to give law enforcement a "backdoor" to encrypted data that is part of a suspected crime.
Photo: orangesparrow/Flickr CC

Apple executives could face jail time and multi-million dollar fines if they refuse to hand over private encrypted data linked to suspected crime under a law proposed today in Australia.

The proposed change in telecommunication intercept law will be presented to parliament by Australia’s Ministry for Law Enforcement and Cybersecurity. The law would require all technology companies, from Apple and Google to Microsoft and Facebook, to essentially create a so-called “backdoor” to access encrypted data.

Google makes iPhones extremely secure

By

Apple requests DMCA removal of iPhone security tweet. Then changes its mind
Apple requests DMCA removal of iPhone security tweet. Then changes its mind
Photo: Ed Hardy/Cult of Mac

Google’s service making its accounts uncommonly secure has been extended to iOS native apps. This is only for people who carry around really sensitive information and who therefore expect their iPhone or iPad to come under sophisticated attack.

Starting today, the Advanced Protection Program supports Apple Mail, Calendar, and Contacts. Naturally, this is only for those who connect these iOS apps to Google accounts.

Hackers can use this tiny $5 device to attack your locked Mac

By

PoisonTap is tiny but deadly.
PoisonTap is tiny but deadly.
Photo: Samy Kamkar

The next time you leave your Mac unattended, make sure to turn it off.

A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.

Obama shuns Apple when talking about tech companies who put privacy first

By

Having not one but two U.S. presidents in your fan base is pretty good going. Sadly, President Barack Obama is not allowed an iPhone as part of his official wardrobe and is stuck on BlackBerry. That hasn’t stopped him from openly lusting after the iPhone 6 in recent pics, though. He’s also admitted to spending hours each day on his iPad.Photo:
Hey, it's easy to forget bit-part players like Apple.
Photo: Pete Souza/Wikipedia CC

President Obama threw some shade Apple’s way yesterday, failing to mention it as one of the tech companies putting user privacy and security first, while describing his new Cybersecurity National Action Plan.

Obama talked about businesses which “empower Americans” by keeping them safe with extra layers of security like fingerprints scanners — only to then namecheck “companies like Google, Facebook, Microsoft… and Visa.”

No mention of the company which actually popularized Touch ID then? No, just checking!

Attorney general wants Silicon Valley to help catch terrorists who’ve ‘gone dark’

By

Apple Security Jacket
Loretta Lynch wants tech companies to work with the government.
Photo: Jim Merithew/Cult of Mac

Attorney General Loretta Lynch will argue that the U.S. government and the tech industry must work together to take down criminals and terrorists when she speaks at a San Francisco cybersecurity conference today.

While Lynch won’t directly refer to Apple’s current FBI standoff in her speech to tech leaders at the RSA Conference, she will describe the dangers of criminals “going dark” by using technologies such as encrypted smartphones. As such, she wants a “frank dialogue and fruitful partnership” between Washington and Silicon Valley.

Poor security leaves popular Mac apps open to attack

By

MacBook Pro
Protect your Mac.
Photo: Apple

When it comes to your Mac apps, there’s reason to fear a so-called man in the middle.

A security engineer is reporting several apps vulnerable to malicious coding through Sparkle, the third-party software framework apps use to receive updates. Some of the apps identified include versions of Camtasia, VLC, uTorrent, Sketch and DuetDisplay.