dcsimg

How to Distribute macOS Updates in a Targeted Way | Managing Mac with SCCM

Keeping control of system updates performed on corporate client computers is a major issue for IT teams. This isn’t always an easy task, particularly if PCs and Mac® computers are present in a mixed environment. The PCs are managed—this often isn’t the case for the Mac computers. This means that Mac clients are capable of loading macOS® updates as soon as Apple® has released them. The … [Read more...]

Learn How to Run 32-Bit apps on macOS Catalina with Parallels Desktop

Apple® claims Mac® users will not have support for 32-bit applications or programs on macOS® Catalina. This is incorrect. Mac users will be able to continue to run 32-bit applications or programs—even if they are using macOS Catalina—with the help of Parallels Desktop® for Mac.  The Parallels Desktop Installation Assistant makes it easy for macOS users to create a macOS virtual machine … [Read more...]

The MacBook Pro Flight Ban – What Your Employees Should Know Before Boarding a Flight

Like a lot of companies these days, you probably have a growing number of Mac® users in your organization. If those employees go on business trips, you’ll want to inform them of the recent MacBook Pro® flight bans that are being implemented in several airports around the world, as well as provide them with tips on how to address the issue. After all, you wouldn’t want them held up while boarding a … [Read more...]

What is New in Parallels Desktop 15.1 for Mac?

We’re proud to announce that today we released the first update of Parallels Desktop® 15 for Mac. Now Parallels Desktop 15 fully supports macOS® Catalina 10.15 as both a host and guest operating system (OS). To download the latest version, go to the Parallels Desktop menu > Check for Updates, or download the installation image directly. We always want to offer our customers … [Read more...]

Sidecar and Parallels Desktop 15 for Mac

I’ve been using macOS® Catalina since the day it was publicly announced on June 4, 2019. That evening I had the first developer preview of Catalina running in a virtual machine (VM) in Parallels Desktop® 15 for Mac. While Catalina has many interesting features, the one I find most useful is Sidecar. Sidecar enables you to use an iPad® as a secondary screen on your Mac®. Figure 1 shows a midway … [Read more...]

New iOS exploit checkm8 allows permanent compromise of iPhones

This morning, an iOS researcher with the Twitter handle @axi0mX announced the release of a new iOS exploit named checkm8 that promises to have serious consequences for iPhone and iPad hardware. According to the Tweet, this exploit is a “permanent unpatchable bootrom exploit,” capable of affecting devices from 4S up to the iPhone X. But what, exactly, does this mean? First, … [Read more...]

Unprecedented new iPhone malware discovered

A post by Ian Beer of Google Project Zero released late yesterday evening sent the security community reeling. According to Beer, a small set of websites had been hacked in February and were being used to attack iPhones, infecting them with malware. These sites, which see thousands of visitors per day, were used to distribute iOS malware over a two-year period. History of iOS … [Read more...]

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Those who are familiar with Bluetooth BR/EDR technology (aka Bluetooth Classic, from 1.0 to 5.1) can attest that it is not perfect. Like any other piece of hardware or software technology already on market, its usefulness comes with flaws. Early last week, academics at Singapore University of Technology, the CISPA Helmholtz Center for Information Security, and University of Oxford released … [Read more...]

Backdoors are a security vulnerability

Last month, US Attorney General William Barr resurrected a government appeal to technology companies: Provide law enforcement with an infallible, “secure” method to access, unscramble, and read encrypted data stored on devices and sent across secure messaging services. Barr asked, in more accurate, yet unspoken terms, for technology companies to develop encryption backdoors to their own … [Read more...]