Latest Version of macOS Catalina Causing System Crashes For Some Users

Some users are experiencing system crashes having updated to macOS Catalina 10.15.4. MacRumors reported that the issue mostly seems to arise when users are attempting to make large file transfers, although that’s not the only circumstances in which it happens.

The crashing issue appears to be most prominent when users attempt to make large file transfers… Other users on macOS 10.15.4 have experienced crashes after waking their Mac from sleep, with affected systems suffering a kernel panic and rebooting to the Apple logo, according to comments shared on the Apple Support Communities, MacRumors Forums, Reddit, and Twitter.

Answers and Tips for iCloud, iOS 13, iPhone 11, macOS, and More – Mac Geek Gab 781

Lots of new stuff from Apple this week… and lots of technical landmines to navigate. Thankfully, you’ve been sending your questions into John and Dave, and they’ve been doing the research to get you answers. Listen to the answers to your questions – and everyone else’s, too! Press play, and enjoy learning at least five new things… one that might even save your bacon this week!

macOS Catalina Isn't Coming Until October

Apple updated its website today, noting that macOS Catalina won’t arrive until an unknown date in October. From TechCrunch:

After a summer of beta testing, Apple is about to release the next major version of macOS: macOS Catalina. But not so fast; the new version will arrive in October, according to Apple’s updated website. As always, this update will be available as a free download in the Mac App Store.

The software release dates are all over the place this year.

Comscore Firm Distributes Man-In-The-Middle Proxy Spyware to MacOS

Airo Security uncovered Man-in-Middle Software proxy spyware being distributed to macOS. It came via Comscore subsidiary firm VoiceFive.  In a paper released this week, researchers explained the issue, which put sensitive data at risk.

This Comscore spyware installs a proxy on ports 8888, 8443 and 8254, where it captures all machine’s SSL/TLS traffic of the user. The spyware is being installed as a bundled application that is offered along with the installation flow of other software products. It installs a local system certificate which any application then automatically trusts. If that’s not enough, it imposes a severe security breach by not generating a unique certificate for each machine on which it is installed but rather installs the exact same root certificate for all machines. This is a known bad practice, to say the least, and was in the heart of the infamous “Lenovo Superfish” case of 2015 issued at the time by the US Department of Homeland Security.