The Macintosh II Was Launched Today in 1987

Another great ‘Today in Apple History’ from Cult of Mac today. On this day in 1987, the legendary Macintosh II was launched.

Although four Mac models already have been released, the definitive, full-number name of the Macintosh II makes clear that this is a major upgrade for the product line. With a massive hardware boost, optional color display (!) and a new open architecture, it does not disappoint! By far the biggest change with the Mac II? Its open architecture, which allows users to expand the computer. More than just a tech upgrade, this marked a fundamental shift in the way Apple engineers thought about the Macintosh.

Apple Will Pay up to $500 Million to Settle Slow iPhone Class Action

Apple is set to pay up to $500 million to settle a U.S class action related to iPhone slowing allegations, Reuters reported. Claimants said that Apple slowed down devices to encourage users to upgrade to newer ones.

The preliminary proposed class-action settlement was disclosed on Friday night and requires approval by U.S. District Judge Edward Davila in San Jose, California. It calls for Apple to pay consumers $25 per iPhone, which may be adjusted up or down depending on how many iPhones are eligible, with a minimum total payout of $310 million. Apple denied wrongdoing and settled the nationwide case to avoid the burdens and costs of litigation, court papers show.

How to Steal and Repurpose Mac Malware

A former NSA hacker argued that stealing and then repurposing Mac malware can be more powerful than creating it from scratch. Patrick Wardle demonstrated one example of how he went about it at RSA Conference, ArsTechnica reported.

Patrick Wardle, who is now a security researcher at the macOS and iOS enterprise management firm Jamf, showed how reusing old Mac malware can be a smarter and less resource-intensive approach for deploying ransomware, remote access spy tools, and other types of malicious code. Where the approach really pays dividends, he said, is with the repurposing of advanced code written by government-sponsored hackers. “There are incredibly well-funded, well-resourced, very motivated hacker groups in three-letter agencies that are creating amazing malware that’s fully featured and also fully tested,” Wardle said during a talk titled “Repurposed Malware: A Dark Side of Recycling.” “The idea is: why not let these groups in these agencies create malware and if you’re a hacker just repurpose it for your own mission?” he said.

What's Different About Mexican Power? – Mac Geek Gab 804

Dave’s back from Mexico where the power is definitely the same. Yep, certianly. Or is it? He and John talk that through. Mostly, though, the show focuses on you: your questions, your tips, your thoughts, and your answers! Learn how to “right-size” Finder columns, use the keyboard to navigate System Preferences, re-enable your Mac’s startup chime, manage Photos backups, boot a new Mac from an old one, and more! Press play to learn at least five new things!

Programmers Create Every Possible Melody to Stop Lawsuits

Two programmers have created every possible melody in MIDI to help creators stifled by lawsuits.

Two programmer-musicians wrote every possible MIDI melody in existence to a hard drive, copyrighted the whole thing, and then released it all to the public in an attempt to stop musicians from getting sued.

Often in copyright cases for song melodies, if the artist being sued for infringement could have possibly had access to the music they’re accused of copying—even if it was something they listened to once—they can be accused of “subconsciously” infringing on the original content.

Sounds like a clever attempt to hack the system. I’m not sure if that will actually hold up in court but it’s creative.

RIOT HiFi Over-Ear Headphones: $59.99

We have a deal on a pair of RIOT HiFi Over-Ear Headphones. RIOT connects to your portable devices via Bluetooth, or with a headphone jack using a mini-plug wired connection. they also come with a carrying case, and they’re priced at $59.99 through our deal.

How to Create a Honeypot URL With URL Canary

A service I recently discovered is URL Canary. It creates a honeypot URL that you can then put in a location such as your cloud storage. It alerts you if that URL has been accessed.

URL Canary will catch automated robots and crawlers, as well as manual human attackers. The only time it won’t catch an attacker is if they don’t see the canary, or they don’t find it sufficiently-compelling and opt not to visit it. Since you have control of the URL and the domain name, you can make your canaries as compelling as possible for your specific use case.

There’s a similar service I know of called CanaryTokens.

MI5 Chief Wants ‘Exceptional Access’ to Encrypted Messages

Sir Andrew Parker is the head of MI5, the UK’s domestic security service. He wants tech firms to provide “exceptional access” to encrypted messages.

In an ITV interview to be broadcast on Thursday, Sir Andrew Parker says he has found it “increasingly mystifying” that intelligence agencies like his are not able to easily read secret messages of terror suspects they are monitoring.

Bah, this is smoke and mirrors. As the head of a security agency he knows that restricting backdoors to the good guys is impossible.