Mac App Store November 25

AAPL: 118.03

Stock Chart

Mac App Store November 18

AAPL: 117.29

Stock Chart

Mac App Store November 12

AAPL: 115.72

Stock Chart

The Mac App Store noticeably experienced some problems last night / early this morning with downloaded apps. Upon opening affected apps, the system would say that the app is ‘damaged’ and cannot be opened, just like the examples from Graham. It certainly seems scary at first glance.

The error message recommends reinstalling your apps individually. While this will fix the problem, it’s a pain to do and isn’t necessary at all: your apps are fine, but the error message makes the situation sound far worse than it is. To simply fix the problem, just reboot your Mac, running OS X Yosemite or El Capitan, and the problem will ‘magically’ go away.

The more interesting question is, why did this happen at all?

expand full story

Mac App Store November 11

AAPL: 116.11

Stock Chart

A day after releasing the third public beta of OS X 10.11.2 to developers, Apple this evening has released the third public beta of the operating system to public beat testers. Beta 3 of OS X 10.11.2 comes just a week after Apple released beta 2 to testers.

expand full story

Mac App Store September 30

AAPL: 110.30

Stock Chart

A security researcher has found an extremely simple way to bypass Gatekeeper to allow Macs to open any malicious app, even when it is set to open only apps downloaded from the Mac App Store.

Patrick Wardle, director of research at security firm Synack, told arsTechnica that once Gatekeeper okays an approved app, it pays no more attention to what that app does. The approved app can then open malicious apps – which Gatekeeper doesn’t check.

Wardle has found a widely available binary that’s already signed by Apple. Once executed, the file runs a separate app located in the same folder as the first one […] His exploit works by renaming Binary A but otherwise making no other changes to it. [He then] swaps out the legitimate Binary B with a malicious one and bundles it in the same disk image under the same file name. Binary B needs no digital certificate to run, so it can install anything the attacker wants … 

expand full story


Submit a Tip


Submitting a tip constitutes permission to publish and syndicate. Please view our tips policy or see all contact options.

Powered by VIP