PMUG Blog

  • Apple details iOS security at Black Hat conference

    August 9, 2016
    Khürt Williams
    Apple engineer Ivan Krstić spoke on far more than Apple’s new bug bounty program at the Black Hat security conference, and delved into the inner workings of iOS hardware and software security features both in iOS 9 and the forthcoming iOS 10. Security is such an important issue these days. It’s a great move for Apple to speak publicly about what they are doing to ...
    >> Read more
  • Inside Tim Cook’s Apple

    August 8, 2016
    Khürt Williams
    Rick Tetzeli has published a wide-ranging interview with Tim Cook, Craig Federighi and Eddy Cue. At the heart of the article is the concern that Apple is stretching too thin, moving far beyond it’s old scope of projects and products: Steve Jobs had been the company’s editor, proud of saying no to features, products, business ideas, and new hires far more often than he ...
    >> Read more
  • The world’s first website went online 25 years ago today

    August 6, 2016
    Khürt Williams
    Wow. I’ve been doing a podcast for more than 22 years. I didn’t realize I had started so soon after the web went online. ∞ Read this on The Loop
    >> Read more
  • Apple Announces Security Bounty Program

    August 4, 2016
    Khürt Williams
    Russell Brandon, reporting for The Verge: The new program will begin as invite-only, including only a few dozen researchers. Still, Apple says the program will become more open as it grows, and if a non-member approaches Apple with a significant bug, they’ll be invited into the program to work it through. The invite system is unusual for a bounty program, but Apple explained it as necessary to weed out spurious ...
    >> Read more
  • Samsung caught stealing… again

    August 4, 2016
    Khürt Williams
    This company is just unbelievable. ∞ Read this on The Loop
    >> Read more
  • Wireless Keyboard Security Vulnerabilities

    August 3, 2016
    Khürt Williams
    Featured articles from around the web. Bastille Networks ran an experiment where they tried to intercept transmissions of some wireless keyboards. This would let the bad guys capture a user’s keystrokes from a remote computer and even inject their own keystrokes on your device. It all comes down to poor encryption. They’ve got a list of keyboards they were able to intercept and it’s pretty spooky. ...
    >> Read more
  • Apple’s employee number one

    August 3, 2016
    Khürt Williams
    Featured articles from around the web. Craig Cannon, interviewing Apples’ first employee (beyond Steve Jobs and Woz), Bill Fernandez: Craig: So at what point do Woz and Jobs come together and decide that they want to start working on Apple? Bill: Okay, well during this Hewlett-Packard period when Woz and I were both there, Woz in the after hours designed his own Pong game. Pong was the ...
    >> Read more
  • Your wireless keyboard could be giving your secrets away

    August 3, 2016
    Khürt Williams
    Featured articles from around the web. Every keystroke you make on some wireless keyboards can be spied on by hackers lurking nearby, according to research released by a cybersecurity firm. Read more at In Homeland Security
    >> Read more
  • Collecting Siri’s Supported Commands

    August 3, 2016
    Khürt Williams
    Featured articles from around the web. Useful site by Sandro Roth (via Six Colors) to browse every command supported by Siri in Apple’s apps. I almost wish iOS had a similar interface to explore commands. I wonder if we’ll start seeing more sites like this pop up after iOS 10 and SiriKit. → Source: hey-siri.io Read more at MacStories
    >> Read more
  • ∞ Apple’s new ad: iPad Pro — What’s a Computer?

    August 3, 2016
    Khürt Williams
    Featured articles from around the web. I like it. Read more at The LoopThe Loop
    >> Read more