Mac OS X

OS X Yosemite 10.10.3 public beta arrives with Photos

OS X Yosemite 10.10.3 public beta arrives with Photos

Those who are signed up to be part of Apple's OS X Beta Program have scored the first public beta for OS X Yosemite 10.10.3 today, perhaps most notable for its inclusion of the new Photos app with which we have previously gone hands-on. That alone is enough to drum up excitement, but the pre-release comes with some other goodies, as well, including those new more diverse emojis and new support for Google's two-factor authentication account security feature.

Continue Reading

Star Wars Humble Bundle summons the Dark Forces

Star Wars Humble Bundle summons the Dark Forces

Today Humble Bundle brings heat with a number of Star Wars-themed games for PC, Linux, and Mac. The team behind Humble Bundle have successfully high-fived the folks who own the rights to these games - previously called LucasArts - and are pushing cash to charity. Users are asked to pay $1 or more - hopefully a lot more - to gain access to a number of rad games from Star Wars history. And what's that - at least one super classic title - Dark Forces, the original 3rd-party Dash Rendar-like character first person shooter back from the dead.

Continue Reading

North Korea’s Red Star Linux goes for a Mac OS X look

North Korea’s Red Star Linux goes for a Mac OS X look

It seems that even the somewhat "traditional" North Korean tech aesthetics is getting an update. Thanks to a former lecturer at Pyongyang, we are getting a glimpse of what the officially sanctioned operating system of North Korea, Red Star Linux, now looks like, almost half a decade since the OS was first leaked outside the secretive regime. Apparently, like the rest of the tech world, the Linux-based OS has moved away from a Windows 7, nay Window XP even, look towards a more stylish OS X.

Continue Reading

Suspects behind “WireLurker” malware arrested in China

Suspects behind “WireLurker” malware arrested in China

Apple users in China can perhaps sleep a bit easier, provided that the three suspects in Beijing police custody are really the masterminds behind the WireLurker malware that has targeted Chinese users of Macs and iPhones. The malware, which harvested user data from infected computers and connected mobile devices, was branded as "unprecedented" due to its way of spreading and the amount of personal data it could gain through it. Apple has already taken steps to block infected programs but the rest of the work rests on users.

Continue Reading

Mylio pro photo-handling software launches tomorrow for iOS, OS X

Mylio pro photo-handling software launches tomorrow for iOS, OS X

Thanks to smartphones, most of us have a lot of pictures floating around -- they're usually scattered all over the place, maybe being saved to a central cloud account for those who took the time to set one up. Sorting through and otherwise keeping track of all these images can be difficult, but for the photographers among us who have thousands or hundreds of thousands of images, organization becomes an entirely different kind of beast. That's where professional-level photo handling software comes in, not the least of which is Mylio, which will be arriving for Apple users tomorrow.

Continue Reading

Apple App Store outage – you’re not alone

Apple App Store outage – you’re not alone

Yes, the App Store has been down and out for a bit this morning and you’re not the only one to experience this oddity. Starting in the evening of October 2nd, 2014, the App Store for both of Apple’s main platforms, iOS and OS X, were sporadically out to dinner - then breakfast.

Continue Reading

BASH bug leaves many web servers open to attack

BASH bug leaves many web servers open to attack

No, it's not the name of the bug itself nor is it a description of what you may do if you happen to be deeply affected by this security exploit. BASH, for Bourne Again SHell, is the most common command line (think, command prompt in Windows) shell in Linux and UNIX-like operating systems, which means that a bug like this leaves many computers connected to the Internet, like servers and even Macs, vulnerable to hijacking.

Continue Reading

1 2 3 4 5 6 7 8 9