Subscribe to this page now.

Apple details FileVault 2 best practices, management methods

08/31, 4:30pm

New 'white paper' added to growing list of educational docs

Apple has published a new white paper on FileVault 2, the whole-disk encryption and security tool first introduced in OS X 10.7 Lion. The document describes deployment methods for the technology and provides extensive information about the utility's architecture and implementation in OS X.

more

Apple seeds Mountain Lion Server Developer Preview 4

05/17, 4:42pm

Known issues include problems with FileVault, Time Machine

Apple has released a fourth preview of Mountain Lion Server to developers. The code is also listed as build 12S219n, and follows just a day after a third update of the main Mountain Lion preview. A number of known issues are listed in the Server preview; among others, there are several problems each in the use of FileVault, Time Machine, and Game Center.

more

VMWare updates Fusion to 4.1, returns auto-power on

11/18, 7:00pm

Native Lion full-screen mode now available

Virtualization specialists VMWare have updated VMWare Fusion to version 4.1, which resolves a number of issues from v4.0 as well as bringing in new features including native full-screen support in Lion, "smart" full screen that is aware of multiple monitors, the return of a feature where favorite virtual machines are automatically loaded when Fusion starts up, support for FileVault 2 and significant graphics performance.

more

Crack breaks WPA-encrypted Wi-Fi in 1 minute

08/27, 10:45pm

WPA 1 Minute Hack

Japanese researchers today revealed that they have developed a crack that can break WPA (Wireless Protected Access) encryption on a Wi-Fi network within a minute. Kobe University's Masakatu Morii and Hiroshima University's Toshihiro Ohigashi together developed a practical attack that exploits a vulnerability in the Temporal Key Integrity Protocol, or TKIP, that underlines WPA. While not providing full details of the attack for security reasons, the new approach is much faster than a previous technique that took between 12 and 15 minutes to expose the network.

more

Study: Apple gaining corporate traction

08/05, 11:30am

Apple gains corp. traction

Apple is beginning to pave significant paths into the corporate world, says the research firm Yankee Group. Following a recent web survey of 750 global IT administrators and C-level executives, the firm says it has discovered that approximately four out of every five businesses have Macs running on their network. In general, says Yankee analyst Laura DiDio, adoption of Apple computers is said to be growing at a "steady and sustained pace not seen since the late 1980s."

more

Talk on Apple's FileVault security canceled

08/01, 3:55pm

Black Hat speech canned

A Georgia-born author, researcher and speaker who was due to deliver a speech about a new flaw in Apple's FileVault encryption system at the annual Black Hat hacker convention next week in Las Vegas will no longer be speaking at the event, according to a recent report. The encryption system is used in the Mac OS X v10.3 and newer operating systems. Charles Edge's scheduled presentation was pulled from the scheduled talks last week. Edge claims to have signed confidentiality agreements with Apple prevented him from delivering the address.

more

10 tips on securing a MacBook against data theft

07/14, 4:35pm

10 MacBook data theft tips

Security firm Sophos has published a new list of 10 recommendations, specifically on the topic of safeguarding MacBook data. The company notes that while Windows systems are more prone to attack as the more popular format, Macs are still vulnerable, particularly when mobile ones are brought out in public. In this regard the company notes that the best protection is to simply leave data or a computer at home, unless it is absolutely necessary. When browsing at a cafe, for instance, data can be stolen simply by reading over someone's shoulder.

more

FileVault vulnerable to RAM hack

02/22, 10:10am

FileVault RAM hack

Apple's FileVault is among the encryption technologies that may expose its secrets in RAM, suggests a paper produced at Princeton University. Through several experiments, computer scientists with Princeton discovered that many computers leave encryption data in RAM during two vulnerable states: powering down, and rebooting. While accessing data after power-down requires super-cooling the RAM and transferring it to another machine for examination, the reboot phase may be more easily exploitable.

more

Electronista Sponsor

Electronista Newsletter

Free Technology and Gadgets Newsletter

  • We will not share your email address with anyone.

    toggle

    Most Popular

    Sponsor

    Recent Reviews

    Plantronics Rig Surround 7.1 headset

    Trying to capture the true soundscape of video games can be a daunting task. Looking to surround-sound home theater options, users hav ...

    Kenu Airframe +

    Simple, stylish and effective, the Kenu Aiframe + portable car mount is the latest addition to Kenu's lineup. Released earlier this ye ...

    Adesso Compagno X Bluetooth keyboard

    The shift from typing on physical keyboards to digital versions on smartphones and tablets hasn't been an easy for many consumers. Fro ...

    Sponsor

    toggle

    Most Commented

     
    toggle

    Popular News