How to Steal and Repurpose Mac Malware

A former NSA hacker argued that stealing and then repurposing Mac malware can be more powerful than creating it from scratch. Patrick Wardle demonstrated one example of how he went about it at RSA Conference, ArsTechnica reported.

Patrick Wardle, who is now a security researcher at the macOS and iOS enterprise management firm Jamf, showed how reusing old Mac malware can be a smarter and less resource-intensive approach for deploying ransomware, remote access spy tools, and other types of malicious code. Where the approach really pays dividends, he said, is with the repurposing of advanced code written by government-sponsored hackers. “There are incredibly well-funded, well-resourced, very motivated hacker groups in three-letter agencies that are creating amazing malware that’s fully featured and also fully tested,” Wardle said during a talk titled “Repurposed Malware: A Dark Side of Recycling.” “The idea is: why not let these groups in these agencies create malware and if you’re a hacker just repurpose it for your own mission?” he said.

What's Different About Mexican Power? – Mac Geek Gab 804

Dave’s back from Mexico where the power is definitely the same. Yep, certianly. Or is it? He and John talk that through. Mostly, though, the show focuses on you: your questions, your tips, your thoughts, and your answers! Learn how to “right-size” Finder columns, use the keyboard to navigate System Preferences, re-enable your Mac’s startup chime, manage Photos backups, boot a new Mac from an old one, and more! Press play to learn at least five new things!

Programmers Create Every Possible Melody to Stop Lawsuits

Two programmers have created every possible melody in MIDI to help creators stifled by lawsuits.

Two programmer-musicians wrote every possible MIDI melody in existence to a hard drive, copyrighted the whole thing, and then released it all to the public in an attempt to stop musicians from getting sued.

Often in copyright cases for song melodies, if the artist being sued for infringement could have possibly had access to the music they’re accused of copying—even if it was something they listened to once—they can be accused of “subconsciously” infringing on the original content.

Sounds like a clever attempt to hack the system. I’m not sure if that will actually hold up in court but it’s creative.

RIOT HiFi Over-Ear Headphones: $59.99

We have a deal on a pair of RIOT HiFi Over-Ear Headphones. RIOT connects to your portable devices via Bluetooth, or with a headphone jack using a mini-plug wired connection. they also come with a carrying case, and they’re priced at $59.99 through our deal.

How to Create a Honeypot URL With URL Canary

A service I recently discovered is URL Canary. It creates a honeypot URL that you can then put in a location such as your cloud storage. It alerts you if that URL has been accessed.

URL Canary will catch automated robots and crawlers, as well as manual human attackers. The only time it won’t catch an attacker is if they don’t see the canary, or they don’t find it sufficiently-compelling and opt not to visit it. Since you have control of the URL and the domain name, you can make your canaries as compelling as possible for your specific use case.

There’s a similar service I know of called CanaryTokens.

MI5 Chief Wants ‘Exceptional Access’ to Encrypted Messages

Sir Andrew Parker is the head of MI5, the UK’s domestic security service. He wants tech firms to provide “exceptional access” to encrypted messages.

In an ITV interview to be broadcast on Thursday, Sir Andrew Parker says he has found it “increasingly mystifying” that intelligence agencies like his are not able to easily read secret messages of terror suspects they are monitoring.

Bah, this is smoke and mirrors. As the head of a security agency he knows that restricting backdoors to the good guys is impossible.

Tim Cook Thinks China is Getting Coronavirus 'Under Control'

Tim Cook appears to be more optimistic than most about China’s response to the coronavirus outbreak. In an interview with Fox Business, the Apple CEO said he felt China was getting the illness “under control.”

Apple CEO Tim Cook told FOX Business’ Susan Li Thursday that he is “optimistic” about China managing the coronavirus outbreak, which has slowed production at the tech giant’s suppliers. “It feels to me that China is getting the coronavirus under control,” Cook said. “You look at the numbers, they’re coming down day by day by day. And so I’m very optimistic there.” He stressed that iPhone gets parts from “everywhere in the world,” including China, which has seen 2,744 deaths among 78,497 cases, mostly in the central province of Hubei.

What Impact Does Watching Netflix Have Climate Change?

Despite what mainstream media wants you to think, the outcome is mostly still unclear when it comes to Netflix binging.

On one hand, the paper reports, strides in data center efficiency have mostly kept pace with growing demand for data, meaning that in the last decade the total amount of energy consumed by the centers has not changed much—around 1% of global energy use. That’s about the same as 18 million US homes.

On the other hand, it’s clear that we’re approaching a limit to squeezing out more efficiency—especially given the rise of data-ravenous artificial intelligence.

What I find annoying about the debates around climate change is how a lot of mainstream media are trying to blame people. Like blaming their Netflix binging instead of reporting the facts like 100 corporations are responsible for 71% of emissions. Sure, Netflix wouldn’t exist without its users, but I think it’s important to focus on how much more damage a corporation does than an individual.