No 'slide' images have been detected!
How To Add Images To Your Slider
  1. View your project in edit mode by clicking the edit button.
  2. Import or drag and drop an image into your editor.
  3. Double click the image and in the popup menu change the filename to something that starts with 'slide'.
  4. Add as many images as you want and make sure to also change the filenames to something that starts with 'slide' (e.g. slide-2.jpg, slide-3.jpg).

Apple Mac Repairs

Ανεξάρτητο Service και Τεχνική Υποστήριξη για τα Apple Mac, 7 Ημέρες την Εβδομάδα 10:00-20:00





iMac

Κυκλοφόρησε το πρώτο Κακόβουλο Λογισμικό για τα νέα Macs με επεξεργαστή Μ1!



Macs with Apple's M1 processor have only been around for a few months, but it didn't take long for hackers to start targeting the systems. Security researcher Patrick Wardle says he has found a malicious app that was created specifically for the powerful M1 chip.

He
wrote in a blog post that the Safari adware extension, which is called GoSearch22, was originally designed for Intel x86 processors. It appears to be a variant of the well-known Mac adware Pirrit. Wardle told Motherboard that the malware seems "fairly vanilla" — it collects user data and peppers the screen with illicit ads — but noted that its developers could update GoSearch22 with more harmful functions.

Although new Macs can still run apps designed for Intel x86 chips via emulation, many developers are creating native
M1 versions of their software. The existence of GoSearch22, Wardle wrote, "confirms malware/adware authors are indeed working to ensure their malicious creations are natively compatible with Apple’s latest hardware."

Wardle discovered the malware on
Alphabet-owned antivirus testing platform VirusTotal, where someone uploaded it in December. The researcher found that, although the platform's antivirus scanners flagged the x86 version of the adware as malicious, 15 percent of them didn't suspect the M1 version of GoSearch22 was malware. That suggests not all antivirus software is fully ready to root out malware designed for M1-based systems. Another researcher, Thomas Reed, told Wired that compiling software for "M1 can be as easy as flicking a switch in the project settings," so it seems hackers might not have to do much to adapt their malware for Apple's latest processor.

GoSearch22 was signed with an Apple developer ID in November, according to Wardle. However, Apple has revoked the adware's certificate, which will make it difficult for users to install it.

Πηγή:
https://www.engadget.com/hackers-are-already-targeting-macs-with-apples-m-1-chip-170440569.html

Major Thunderbolt security flaws found, affect Macs shipped in 2011-2020!



No fewer than seven serious Thunderbolt security flaws have been discovered, affecting machines with both standalone Thunderbolt ports and the Thunderbolt-compatible USB-C ports used on modern Macs.

The flaws allow an attacker to access data even when the machine is locked, and even when the drive is encrypted …

The vulnerabilities are present in all machines with Thunderbolt/Thunderbolt-compatible USB-C ports shipped between 2011 and 2020.

Security researcher Björn Ruytenberg found seven vulnerabilities in Intel’s Thunderbolt chips, and nine ways to exploit them.

1. Inadequate firmware verification schemes

2. Weak device authentication scheme

3. Use of unauthenticated device metadata

4. Downgrade attack using backwards compatibility

5. Use of unauthenticated controller configurations

6. SPI flash interface deficiencies

7. No Thunderbolt security on Boot Camp

There is no way to detect that a machine has been compromised.

Thunderspy is stealth, meaning that you cannot find any traces of the attack. It does not require your involvement, i.e., there is no phishing link or malicious piece of hardware that the attacker tricks you into using. Thunderspy works even if you follow best security practices by locking or suspending your computer when leaving briefly, and if your system administrator has set up the device with Secure Boot, strong BIOS and operating system account passwords, and enabled full disk encryption. All the attacker needs is 5 minutes alone with the computer, a screwdriver, and some easily portable hardware.

These vulnerabilities lead to nine practical exploitation scenarios. In an evil maid threat model and varying Security Levels, we demonstrate the ability to create arbitrary Thunderbolt device identities, clone user-authorized Thunderbolt devices, and finally obtain PCIe connectivity to perform DMA attacks. In addition, we show unauthenticated overriding of Security Level configurations, including the ability to disable Thunderbolt security entirely, and restoring Thunderbolt connectivity if the system is restricted to exclusively passing through USB and/or DisplayPort. We conclude with demonstrating the ability to permanently disable Thunderbolt security and block all future firmware updates.

Macs are fully vulnerable to all of the Thunderbolt security flaws when running Bootcamp, and ‘partly affected’ when running macOS.

MacOS employs (i) an Apple-curated whitelist in place of Security Levels, and (ii) IOMMU virtualization when hardware and driver support is available. Vulnerabilities 2–3 enable bypassing the first protection measure, and fully compromising authenticity of Thunderbolt device metadata in MacOS “System Information”. However, the second protection measure remains functioning and hence prevents any further impact on victim system security via DMA. The system becomes vulnerable to attacks similar to BadUSB. Therefore, MacOS is partially affected.

Further details of the Mac vulnerabilities can be found below.

Ruytenberg informed both Intel and Apple of his discoveries, but says that as the Thunderbolt security flaws are present in the controller chips, there is no way to fix the vulnerabilities via a software update.

Below is a description of how the vulnerabilities can be exploited on a Mac running macOS. This is essentially performed by fooling the Mac into thinking the attack kit is an Apple-approved Thunderbolt accessory.



3.4 Exploitation scenarios for vulnerabilities 2-3, 7 on Apple Mac systems

3.4.1 Cloning an Apple-whitelisted device identity to an attacker device (MacOS) 4

Threat model

We assume an “evil maid” threat model, in which the attacker exclusively has physical access to a victim system. The system is in a locked (S0) or sleep (S3) state, while running MacOS.

Preparation

1. Acquire a MacOS-certified Thunderbolt device.

2. Disassemble the MacOS-certified device enclosure. Obtain the firmware image from the Thunderbolt controller’s SPI flash of the MacOS-certified device.

3. Disassemble the attacker device enclosure. Obtain the firmware image from the Thunderbolt controller’s SPI flash of the attacker device.

4. Connect the MacOS-certified device to the attacker system. On the attacker system, using e.g. tbtadm on Linux, obtain the UUID of the MacOS-certified device.

5. Locate the DROM section by searching for the string DROM in the attacker device firmware image. Figure 6 depicts the DROM data structure. Using the figure as a reference, locate the appropriate offsets and replicate the MacOS-certified device UUID.

6. Compute uid crc8 and replicate the value at the appropriate offset.

7. Write the image to the attacker device SPI flash.

Procedure

1. Connect the attacker device to the victim system.

Verification

1. Observe that the victim system identifies the attacker device as being a MacOS-certified device. Figure 2 demonstrates an example scenario, showing a forged Thunderbolt device identity in the MacOS “System Information” application.



Intel commented:

In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later). The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled. Please check with your system manufacturer to determine if your system has these mitigations incorporated. For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers.

Κυκλοφόρησε το iMac Air!

Φωτιστικό iMac G4!

Κυκλοφόρησε το νέο iMac με Retina Display!




http://www.apple.com/imac-with-retina/

Apple Software Update: Boot Camp Support Software 5.1.5621



DOWNLOAD

System Requirements for 5.1.5621 (non LynxPoint):
MacBook Air (11-inch & 13-inch, Mid 2011)
MacBook Air (11-inch & 13-inch, Mid 2012)
MacBook Pro (15-inch & 17-inch, Mid 2010)
MacBook Pro (13-inch, & 15-inch, Early 2011)
MacBook Pro (17-inch, Early 2011)
MacBook Pro (13-inch,15-inch & 17-inch  Late 2011)
MacBook Pro (13-inch & 15-inch, Mid 2012)
MacBook Pro (Retina, Mid 2012)
MacBook Pro (Retina, 13-inch, Late 2012)
MacBook Pro (Retina, Early 2013)
MacBook Pro (Retina, 13-inch, Early 2013)
Mac Pro (Early 2009)
Mac Pro (Mid 2010)
Mac Pro (Mid 2012)
Mac Pro (Late 2013)
Mac mini (Mid 2011)
Mac mini (Late 2012)
iMac (27-inch, Quad Core, Late 2009)
iMac (21.5-inch & 27-inch, Mid 2010)
iMac (21.5-inch & 27-inch, Mid 2011)
iMac (21.5-inch, Late 2011)
iMac (21.5-inch & 27-inch, Late 2012)

This download contains the Windows Support Software (Windows Drivers) you need to support 64 bit versions of Windows 7 and Windows 8 on your Mac.

For more information on which operating systems are supported on different Mac systems, click here: http://support.apple.com/kb/HT5634

• The download file is a .zip file. Double click it to uncompress it,  if it is not automatically uncompressed.
• Double-click the Boot Camp5 folder.
• Copy the entire contents of the .zip file to the root level of a USB flash drive or hard drive that is formatted with the FAT file system
• When running Windows, locate the Boot Camp folder on the USB media you created in Step 3 and double click to open it.
• Double click on setup to start installing the Boot Camp Support Software.
• When prompted to allow changes, click on Yes and follow the onscreen instructions.
• Installation can take a few minutes. Don't interrupt the installation process. When installation is complete, click Finish in the dialog that appears.
• A system restart dialog box appears.  Click Yes to complete the installation. 

For more information on Boot Camp, click here: www.apple.com/support/bootcamp
Note: If you are using one of the Macs listed below, you should download Boot Camp Support Software 5.1.5640 instead.
MacBook Air (11-inch, Mid 2013)
MacBook Air (13-inch, Mid 2013)
MacBook Pro (Retina, 13-inch, Late 2013)
MacBook Pro (Retina, 15-inch, Late 2013)
iMac (21.5-inch, Late 2013)
iMac (27-inch, Late 2013)
iMac (21.5-inch, Late 2013)

Apple Software Update: Boot Camp Support Software 5.1.5640



DOWNLOAD

System Requirements for 5.1.5640 (LynxPoint):
MacBook Air (11-inch & 13-inch, Mid 2013)
MacBook Pro (Retina, 13-inch & 15-inch, Late 2013)
iMac (21.5-inch & 27-inch, Late 2013)

This download contains the Windows Support Software (Windows Drivers) you need to support 64 bit versions of Windows 7 and Windows 8 on your Mac.

For more information on which operating systems are supported on different Mac systems, click here: http://support.apple.com/kb/HT5634

• The download file is a .zip file. Double click it to uncompress it,  if it is not automatically uncompressed.
• Double-click the Boot Camp5 folder.
• Copy the entire contents of the .zip file to the root level of a USB flash drive or hard drive that is formatted with the FAT file system
• When running Windows, locate the Boot Camp folder on the USB media you created in Step 3 and double click to open it.
• Double click on setup to start installing the Boot Camp Support Software.
• When prompted to allow changes, click on Yes and follow the onscreen instructions.
• Installation can take a few minutes. Don't interrupt the installation process. When installation is complete, click Finish in the dialog that appears.
• A system restart dialog box appears.  Click Yes to complete the installation. 

For more information on Boot Camp, click here: www.apple.com/support/bootcamp
 
Note: If you are using one of the Macs listed below, you should download Boot Camp Support Software 5.1.5621 instead
MacBook Air (11-inch & 13-inch, Mid 2011)
MacBook Air (11-inch & 13-inch, Mid 2012)
MacBook Pro (15-inch & 17-inch, Mid 2010)
MacBook Pro (13-inch, & 15-inch, Early 2011)
MacBook Pro (17-inch, Early 2011)
MacBook Pro (13-inch,15-inch & 17-inch  Late 2011)
MacBook Pro (13-inch & 15-inch, Mid 2012)
MacBook Pro (Retina, Mid 2012)
MacBook Pro (Retina, 13-inch, Late 2012)
MacBook Pro (Retina, Early 2013)
MacBook Pro (Retina, 13-inch, Early 2013)
Mac Pro (Early 2009)
Mac Pro (Mid 2010)
Mac Pro (Mid 2012)
Mac Pro (Late 2013)
Mac mini (Mid 2011)
Mac mini (Late 2012)
iMac (27-inch, Quad Core, Late 2009)
iMac (21.5-inch & 27-inch, Mid 2010)
iMac (21.5-inch & 27-inch, Mid 2011)
iMac (21.5-inch, Late 2011)
iMac (21.5-inch & 27-inch, Late 2012)

Apple Software Update: iMac 10.8.5 Supplemental Update 1.0



DOWNLOAD

File Size: 17.11 MB
System Requirements
OS X Lion 10.8.5

The iMac OS X v10.8.5 Supplemental Update 1.0 is recommended for iMacs (Late 2013) using NVIDIA GeForce GT 750M graphics and running OS X Mountain Lion v10.8.5.
This update:
Fixes an issue that may cause external drives to be ejected after the computer goes to sleep
Fixes an issue that may prevent certain USB Bluetooth adapters from working

Apple Software Update: iMac SMC Firmware Update 1.1



DOWNLOAD

File Size: 921 KB
System Requirements
OS X 10.8.2

This update is recommended for iMac (late 2013) with flash-only storage.

This update improves the Power Nap feature in Mavericks on your flash based iMac by allowing it to perform silently, without spinning up the fan.

Power Nap periodically updates apps, such as Mail, Contacts, and Calendar, and will download software updates while your iMac is sleeping.

Apple Software Update: iMac EFI Update 2.0



DOWNLOAD

Version: 2.0
Post Date: Dec 17, 2012
Download ID: DL1618
License: Update
File Size: 4.32 MB
System Requirements
Mac OS X 10.8.1 and greater, EFI version 010A
iMac (21.5-inch, Late 2012)

About iMac EFI Update 2.0
This update is recommended for the iMac (21.5-inch, Late 2012).
This update contains general performance fixes pertaining to sleep and Thunderbolt, and improves compatibility when using the 5GHz band in Wi-Fi.
Boot ROM or SMC Version Information: After Update is complete:

Build version: 010A.05
ROM version: IM131.88Z.010A.B05.1211151146

Apple Software Update: OS X Mountain Lion 10.8.2 Update for 13" Macbook Pro with Retina Display, 21.5" iMac (Late 2012), Mac mini (Late 2012)



DOWNLOAD

Version: 10.8.2
Post Date: Oct 24, 2012
Download ID: DL1603
License: Update
File Size: 654.49 MB
System Requirements:
OS X Mountain Lion v10.8.1

About OS X Mountain Lion 10.8.2 Update for 13" Macbook Pro with Retina Display, 21.5" iMac (Late 2012), Mac mini (Late 2012)

This update is recommended for all 13” MacBook Pro with Retina Display, 21.5" iMac (Late 2012) and Mac mini (Late 2012) systems.

It includes all features and updates from OS X Mountain Lion v10.8.2 plus system-specific enhancements and fixes for Late 2012 systems.
 
New features include:
Facebook
Single sign on for Facebook
Facebook as an option when sharing links and photos
Facebook friends' contact information and profile pictures in Contacts
Facebook notifications in Notification Center
 
Game Center
Share scores to Facebook, Twitter, Mail, or Messages
Facebook friends are included in Game Center friend recommendations
Facebook Like button for games
Challenge friends to beat your score or achievement
Other new features
Power Nap support for MacBook Air (Late 2010)
iMessages sent to your phone number now appear in Messages on your Mac
From Safari and Mail on your Mac you can add passes to Passbook on your iPhone or iPod touch running iOS 6
New shared Reminders lists
FaceTime now receives calls sent to your phone number
New sort options allow you to sort notes by title, the date you edited them, and when you created them
Dictation now supports Mandarin, Cantonese, Spanish, Korean, Canadian English, Canadian French, and Italian
The Dictionary application now includes a French definition dictionary
Sina Weibo profile photos can now be added to Contacts
 
This update also includes general operating system fixes that improve the stability, compatibility and security of your Mac, including the following fixes:
An option to discard the changes in the original document when choosing Save As
Unsent drafts are opened automatically when launching Mail
Receive Twitter notifications for mentions and replies from anyone
URLs are shortened when sending tweets from Notification Center
Notifications are disabled when AirPlay Mirroring is being used
SSL support for Google searches from the Smart Search Field in Safari
New preference to have Safari launch with previously open webpages
Graphics performance and reliability enhancements
USB 3 reliability enhancements

Έρχονται τα νέα υπερλεπτά iMac!




http://www.apple.com/imac/

Apple throws a wedge into Target Display mode on new Thunderbolt Macs!

Turn Your Old Lamp-Style iMac Into A Glowing Robot Helmet!

Η Apple κυκλοφόρησε νέους iMac με Quad Core επεξεργαστές, νέες κάρτες γραφικών AMD, θύρα Thunderbolt και FaceTime HD Camera!



http://www.apple.com/imac/

The Faulty iMac Saga: We Have Your Internal Memo, Apple!






The Faulty iMac Saga, Chapter 1: The Beginning

The Faulty iMac Saga: Chapter 2, Even Steve Jobs Can't Fix 'Em

The Faulty iMac Saga, Chapter 3: We Have Your Internal Memo, Apple

The Faulty iMac Saga, Chapter 4: Apple Buying Out Customers

The Faulty iMac Saga, Chapter 5: The Moment of Truth

The Conclusion to the Faulty iMac Saga: The Beginning of the Fix