admin

Bootable Mac Startup Drive Backups, and Another Ode to SuperDuper

Bootable backups for Macs faced issues with macOS 15.2, but the recent 15.3 update fixed the replicator bug in SuperDuper. While bootable clones were once crucial, the rise of cloud storage and macOS's recovery features has diminished their necessity for many users. Current backup strategies, like using SuperDuper’s “Erase, then copy” or “Smart Update,” still serve backups effectively, but the need for rapid booting from a backup drive is less prevalent today. Users now rely on Recovery mode for issues, reducing the reliance on bootable clones, especially for those who aren't in high-pressure environments.

https://daringfireball.net/2025/02/bootable_mac_startup_drive_backups_and_another_ode_to_superduper

The Urgent Need to Replace SMS-based MFA

FBI and CISA urged against SMS-based MFA due to interception risks, especially after cyberattacks like Salt Typhoon. Security experts have long advised moving to stronger alternatives. SMS can be compromised through SIM swapping, smishing, and MitM attacks. Despite its vulnerabilities, it's still widely used. Companies need layered approaches to replace SMS with secure options like FIDO, non-SMS authenticator codes, and password managers. Strong authentication should be enforced across all organizational levels, as weaker accounts are often less secured.

https://blog.1password.com/sms-based-mfa-risks/

One Year With the Vision Pro

Vision Pro's First Year: Nearly no impact on users; complex, costly, yet impressive. Improvements made, like better VisionOS and spatial personas. Strong solo entertainment device but lacks immersive content. Productivity remains limited. Needs more compelling apps and experiences to drive regular use. Apple should encourage developer engagement and reduce prices for success. Represents a start towards future “spatial computing.”

https://sixcolors.com/post/2025/02/one-year-with-the-vision-pro/

Malware With Screen Reading Code Found in iOS Apps for the First Time

Malware featuring screen reading code, called “SparkCat,” has been discovered in iOS Apps, enabling the extraction of sensitive data from screenshots. Identified by Kaspersky, this malware uses OCR technology to target crypto wallet recovery phrases, posing a risk of cryptocurrency theft. Apps like ComeCome, WeTink, and AnyGPT have been linked to this issue. The malware has been active since March 2024 and although similar threats were previously found on Android and PC, this marks the first instance on iOS. Recommendations include avoiding saving sensitive screenshots in photo libraries.

https://www.macrumors.com/2025/02/05/ocr-malware-app-store/

Scroll to Top