Kibbles & Bytes Blog
Apple news, tech tips, and more…
Apple news, tech tips, and more…
We have not run into too many cases of ransomeware on Macs but not only is it common on PCs, it has made it into plot lines of shows like Homeland on Showtime. Once your files are held hostage it is too late so it is best to be informed.
Malware makes headlines regularly these days, and although Macs are targeted far less than Windows PCs, Mac users still need to remain vigilant. A particularly serious type of malware is called “ransomware” because once it infects your computer, it encrypts all your files and holds them for ransom.
Luckily, despite the virulence of ransomware in the Windows world, where there have been major infections of CryptoWall and WannaCry, only a few pieces of ransomware have been directed at Mac users:
*The first, called FileCoder, was discovered in 2014. When security researchers looked into its code, they discovered that it was incomplete, and posed no threat at the time.
*The first fully functional ransomware for the Mac appeared in 2016, a bit of nastiness called KeRanger. It hid inside an infected version of the open source Transmission BitTorrent client and was properly signed so it could circumvent Apple’s Gatekeeper protections. As many as 6500 people may have been infected by KeRanger before Apple revoked the relevant certificate and updated macOS’s XProtect anti-malware technology to block it.
*In 2017, researchers discovered another piece of ransomware, called Patcher, which purported to help users download pirated copies of Adobe Premiere and Microsoft Office 2016. According to its Bitcoin wallet, no one had paid the ransom, which was good, since it had no way of decrypting the files it had encrypted.
Realistically, don’t worry too much. But it’s likely that malware authors will unleash additional Mac ransomware packages in the future, so we encourage you to be aware, informed, and prepared.
First, let’s explain a few key terms and technologies. Apple’s Gatekeeper technology protects your Mac from malware by letting you launch only apps downloaded from the Mac App Store, or those that are signed by developers who have a Developer ID from Apple. Since malware won’t come from legitimate developers (and Apple can revoke stolen signatures), Gatekeeper protects you from most malware. However, you can override Gatekeeper’s protections to run an unsigned app. Do this only for apps from trusted developers. Even if you never override Gatekeeper, be careful what you download.
Apple’s XProtect technology takes a more focused approach, checking every new app against a relatively short list of known malware and preventing apps on that list from launching. Make sure to leave the “Install system data files and security updates” checkbox selected in System Preferences > App Store. That ensures that you’ll get XProtect updates. Similarly, install macOS updates and security updates soon after they’re released to make sure you’re protected against newly discovered vulnerabilities that malware could exploit.
Although regular backups with Time Machine are usually helpful, KeRanger tried to encrypt Time Machine backup files to prevent users from recovering their data that way. Similarly, a bootable duplicate updated automatically by SuperDuper or Carbon Copy Cloner could end up replacing good files with encrypted ones from a ransomware-infected Mac, or a future piece of ransomware could try to encrypt other mounted backup disks as well.
The best protection against ransomware is a versioned backup made to a destination that can be accessed only through the backup app, such as an Internet backup service like Backblaze (home and business) or CrashPlan (business only). The beauty of such backups is that you can restore files from before the ransomware encrypted them. Of course, that assumes you’ve been backing up all along.
If you ever are infected with ransomware, don’t panic, and don’t pay the ransom right away. Contact us so we can help you work through your options, which might entail restoring from a backup or bringing files back from older cloud storage versions. There are even decryptors for some Windows ransomware packages, and such utilities might appear for hypothetical Mac ransomware as well.
To reiterate, there’s no reason to worry too much about ransomware on the Mac, but letting Apple’s XProtect keep itself up to date, staying current with macOS updates, and using an Internet backup service will likely protect you from what may come.
In the wake of the holiday season, as the folks out there enjoy their brand new Mac products, one question I am frequently asked is, “can I upgrade or add more memory?”.
Let’s take a look at the MacBook Pro. The short answer is no. If you have already purchased a MacBook Pro, (Mid-2012 Retina and beyond) you will be unable to alter the memory or RAM configuration post-purchase. However, with that said there are some current-gen models that do allow pre-purchase RAM configuration. These models include the 13” MacBook Pro (Non-Touch Bar) and the 13” MacBook Pro (w/ Touch Bar), both upgradeable to 16GB of RAM pre-purchase. But, in this circumstance, it should be noted that the current-gen 15” MacBook Pro’s come stock with 16GB RAM, no more and no less!
In the case of upgrading an older generation model MacBook Pro, the Mid-2012 non-Retina models are the only Apple-supported MacBook Pro that offer an end-user RAM upgrade option up to 16GB.
Lets shift focus over to the iMac. Virtually all across the board, the 27” iMac can be upgraded to a higher RAM configuration pre & post-purchase. The 21.5” iMac is a different story, however. Unfortunately, these models that are still supported by Apple are not end-user RAM configurable. These, along with the lineup of Macbook Pro’s, Macbooks, and MacBook Air’s have onboard RAM, meaning the RAM is built directly onto the Logic Board, making it impossible for end-user upgrades.
So your Mac is acting wonky and you have tried rebooting. And you’ve even tried reseting the PRAM (Note: Before resetting PRAM or the SMC, back up your whole system on an external drive with Time Machine Backup App. To do this, first turn off your Mac. Next turn on your Mac and hold down the Command+Option+P+R keys, at the same time.)
You’ve seemingly done it all, but your Mac is still acting wonky! Now what? In some cases, resetting the System Management Controller (SMC) can be a resolution. This is sometimes the last simple option to restore basic level system functions to your Mac, particularly for power and hardware related issues.
Process of elimination it is a form of diagnostics. If a PRAM or SMC reset doesn’t fix your issues, you might want to see a ACMT (Apple Certified Macintosh Technician) because your Mac could have a hardware failure.
So what does the SMC do? The SMC controls most power functions on newer-model Macs. Resetting the SMC can resolve some computer issues such as no start up, no display video, sleep issues, fan issues, battery and so on. Resetting the SMC is not a cure-all, but it’s a good last-resort before bringing your machine in for service.
Greetings Tech Tails readers!
Looks like Mother Nature cannot seem to make up her mind here in beautiful Vermont. This weekend I took a stroll to our co-op in Burlington bundled up in the heavy winter layers to brave the frigid temperatures, and this morning I walked to my car in a flannel and a light jacket and felt the warmth of that looming spring sun on my face. It’s been a chilly one this year, but spring is right around the corner and it will certainly be fun getting in some turns on the mountain in a t-shirt. Soon!
And speaking of that winter chill, I had the unfortunate experience of leaving my (new!) iPhone 6s Plus in my vehicle on one of the colder evenings last week for longer than I’d like to admit. Once I remembered and rescued it from its icy prison, I recalled the words of our friend and technician here at Small Dog Electronics, Nate Persing, who once said in a previous issue of Tech Tails regarding cold temperatures and devices, “Let the device sit for at least 30 minutes before powering back on.” After waiting thirty minutes to ensure the device was properly adjusted to the room temperature, I held my breath, held that power button, and voila! That Apple logo boot screen was a welcomed sight to behold.
Just a few more months until that idyllic Vermont summer weather here in Waitsfield. Countdown those days!
We have some good articles for you this week, and just to remind you readers out there, we technicians are always happy to answer any questions and accept any feedback you might have about these Tech Tails articles. Don’t hesitate to reach out.
As always, thanks for reading. Stay groovy!
Connor McGinnis
connormcginnis@smalldog.com
I think I will be eating some seafood this weekend. Living here next to the ocean on a little island has some significant seafood advantages. It is hard for me to order seafood when I return to Vermont because I am so used to eating fish that had been in the ocean earlier in the day.
I am still on BMW tune-up for our spring ride to New Orleans this weekend.
Hey, catchers and pitchers have reported and spring trading is coming up! I already bought some tickets to see the Cubs play at the end of March in Miami!
Thank you for reading this issue of Kibbles and Bytes!
Your Kibbles & Bytes Team,
_Don, Emily & Mike
We haven’t really written about AirPods that much here in Kibbles & Bytes because as soon as we get a few in stock they sell out. I expect a good quantity of them next week so I thought I would pass along a few AirPod tips. You probably have seen the AirPods sticking out of peoples ears, and, if you are like me, you wonder what the big deal is. Why have these been selling so fast, why can’t Apple make enough of them and why do those they use them love them?
AirPods are breakthrough wireless headphones that finally make wireless listening effortless and magical. Automatically on and always connected, AirPods are ready to go whenever you are. They’re powered by the custom Apple W1 chip and packed with technologies that bring power and simplicity to an amazingly small and light device. Industry-leading battery life and an always-ready charging case means you get more than 24 hours of listening in your pocket. And high-quality, efficient wireless combined with beam-forming, voice detecting microphones means AirPods sound fantastic whether you’re listening to music or doing the talking.
This instant automatic pairing with your devices is one of the coolest features. They sense when they are in your ear and pair instantly. Music pauses when you take one or both out of your ears and resumes when you put them back. You can listen to one or both or share with a friend.
It also puts Siri right in your ear. Double tab the AirPod and ask Siri to play Bob Marley, to crank up the volume or to get directions to that next meeting on your schedule. You can hear your incoming callers announced and simply double tap to answer or end the call.
Setting up the AirPods could not be simpler. One-tap setup with iPhone—just open the lid to the AirPod Case and hold it next to iPhone. After AirPods are connected to your iPhone, they’re automatically set up for your Apple Watch and for your iPad or Mac signed in to your iCloud account. Your iPhone and Apple Watch are simultaneously connected, and AirPods will automatically switch between them. You can also listen to audio on your Mac or iPad with a single click or tap.
The AirPods are very secure in your ear but should you lose them, you can use Find My iPhone to locate your AirPods, too.
Here are a few tips:
*Pairing your AirPods to your Apple TV*
At the main Apple TV screen, hold down on the Play/Pause button on the Siri Remote to bring up an interface that lets you select an audio source. Swipe down to your AirPods, click the main button on the remote, and a connection is established. If you’re using the Apple Remote app or the Control Center Apple TV Remote, you can long press on the Play/Pause button to bring up the audio menu.
*Checking your battery*
Information about the battery life of each earbud, as well as how much juice you have left in the charging case, can be immediately displayed by opening the case within a few inches of your phone. Once opened, a battery status menu indicates how much power you’ve got to work with. Or, let’s say you want to check it out on your Apple Watch. When using AirPods, open Control Center on your Apple Watch and tap the battery icon. In addition to displaying battery stats for your watch, you will also find stats for your AirPods.
*Pairing AirPods with a New iPhone*
Okay, so you bought that set of AirPods off of Craigslist and they are paired to some other person’s iPhone. How do you set them up for your iPhone. It is easy. Hold your iPhone near the AirPod case, open the case and you will be presented with a screen that tells you that these AirPods are not paired to your iPhone. You can click the “connect” button and it will tell you to press the button on the back of the AirPod case to pair them and just like that you are connected.
*Use Siri to Play Music*
To use Siri, double tap the AirPod. This wakes up Siri on the phone and the phone listens for your commands or questions through the AirPod mic. Users can also change the settings to make it play or pause music instead.
Here’s a list of some useful commands that you might want to use while listening to music.
Play “song name” or “podcast name”
Play “playlist names”
Lower or Raise volume 10% (or any percent you like)
Skip back/forward/to the next song
Skip back/forward 10 seconds or any number of seconds you want
*Make a phone call*
Sure Siri will announce your calls but what if you just want to call someone without taking your iPhone out of your pocket and dialing. AirPods have you covered. Simply double tap the AirPod and, just like with Apple CarPlay, you can ask Siri to “call the office” and you will be connected.
I really like the AirPods but they are not so practical for me since I wear hearing aids. On the other hand, if I want to watch TV while Grace is sleeping, the AirPods make that a cinch. Now, if Apple would just combine that hearing aid function….
This week we honor Robert Smalls. Robert Smalls was born in Beaufort, South Carolina, on April 5, 1839 and worked as a house slave until the age of 12. In an arrangement typical of American slavery, Robert was sent by his owner to work as a deck hand in Charleston. All his wages went back to the owner.
In 1861 Smalls was hired as a deckhand on the Confederate transport steamer, Planter, captained by General Roswell Ripley, the commander of the Second Military District of South Carolina. The Planter was assigned the job of delivering armaments to the Confederate forts. On May 13, 1862, the crew of the Planter went ashore for the evening, leaving Smalls to guard the ship and its contents. Around midnight, Robert slipped the skipper’s jacket over his shoulders and ordered the other enslaved crewmembers to light the boilers. At 2 a.m., the CSS Planter eased into Charleston Harbor.
Smalls quietly directed the boat to a rendezvous point where he picked up his wife, Hannah, his children, and eight other enslaved people. The crew intended to fight to the death. The boat was loaded with 200 rounds of ammunition and five large guns, including a howitzer and a giant pivot gun. If cornered, they planned to dynamite the boiler.
Moonlight glinted off the water. Smalls raised the Confederate and Palmetto flags and pointed the boat at the open ocean. As the Planter approached the first checkpoint, Fort Johnson, Smalls began to pray, “Oh Lord, we entrust ourselves into thy hands.” He sounded a signal on the steam whistle and was waved through. The boat slipped deeper into the harbor.
As the boat approached Fort Sumter, Smalls adjusted the captain’s straw hat and leaned out the pilot-house window. He had watched Captain Relyea pass the fort dozens of times before. He had studied his body language. So Smalls stood on the deck, arms crossed, his face obscured by the hat’s brim and the night’s darkness.
At 4:15 a.m., the Planter sounded the steam whistle again. According to a report filed by the Committee on Naval Affairs, “The signal … was blown as coolly as if General Ripley [the commander of Charleston’s defense] was on board.”
The guards at Fort Sumter sounded their signal in return: “All right.”
The Planter successfully passed five Confederate gun batteries. Once outside of Fort Sumter’s cannon range, Smalls lowered the rebel flag and raised a white bed sheet. The Planter aimed for the Union blockade.
Smalls quickly became a folk hero. “If each one of the Generals in our army had displayed as much coolness and courage as [Smalls] did when he saluted the Rebel flag and steamed past the Rebel fort, by this time the Rebellion would have been among the things that were [past],” The New York Daily Tribune wrote. Navy Admiral S.F. Dupont would call Smalls “superior to any who have come into our lives.”
Meanwhile, in South Carolina, a $4000 bounty was placed on Smalls’s head. Smalls didn’t care. He was too busy enjoying the freedom and money that he had long been denied. A few weeks after surrendering the ship, the U.S. Congress awarded Smalls and his crew half of the Planter’s value. Smalls received $1500 and an audience with President Lincoln.
At one meeting with Lincoln, Smalls was joined by Frederick Douglass. The famed abolitionist implored the president to allow African-Americans to join the military—and convinced him that Smalls should lead the cause.
When he wasn’t fighting battles at sea, Smalls was fighting civil rights battles on land. In December 1864, Smalls was tossed out of an all-white streetcar in Philadelphia. Enraged, he used his budding fame to protest the segregation of public transit. Three years later, the streetcars of Philadelphia were integrated.
After the war, Smalls returned to South Carolina with the money he earned and bought his former owner’s house.
Not one to rest on his laurels, Smalls helped establish a local school board in Beaufort County and one of the first schools for black children in the region. Then he opened a store. In 1868, he ran for—and won—a seat in the South Carolina House of Representatives, then two years later in the state Senate. In 1872, he started a newspaper called The Southern Standard. And in 1874, he ran to become a representative in the U.S. Congress.
He won 80 percent of the vote.
During five nonconsecutive terms, Congressman Smalls pushed for legislation to desegregate the military and restaurants in Washington D.C. His work successfully led to the opening of the famous South Carolina marine base at Parris Island.
Robert Smalls, a true American hero!
It seems like Apple releases updates to iOS, macOS, watchOS, and tvOS nearly every week these days. It has been only a few months since iOS 11 and macOS 10.13 High Sierra launched, and we’ve already seen ten updates to iOS and seven updates to macOS. Some of these have been to fix bugs, which is great, but quite a few have been prompted by the need for Apple to address security vulnerabilities.
Have you installed all these updates, or have you been procrastinating, tapping that Later link on the iPhone and rejecting your Mac’s notifications? Often those prompts come at inconvenient times, although iOS has gotten better about installing during the night while you sleep, as long as you have your device plugged in.
I know, security is dull. Or rather, security is dull as long as it’s present. Things get exciting—and not in a good way—when serious vulnerabilities come to light. That’s what happened in November 2017, when it was reported that anyone could gain admin access to any Mac running High Sierra by typing root for the username and leaving the password field blank. This news was quite serious, and Apple pushed Security Update 2017-001 to every affected Mac and rolled the fix into macOS 10.13.2.
Part of the problem with security vulnerabilities is that they can be astonishingly complex. You may have heard about the Meltdown and Spectre hardware vulnerabilities discovered in January 2018. They can affect nearly all modern computers, regardless of operating system, because they take advantage of a design flaw in the microprocessors. Unfortunately, the bad guys—organized crime, government intelligence agencies, and the like—have the resources to understand and exploit these flaws.
But here’s the thing. Security is an arms race, with attackers trying to take advantage of vulnerabilities and the operating system companies like Apple, Microsoft, and Google proactively working to block them with updates. If enough people install those updates quickly enough, the attackers will move on to the next vulnerability.
The moral of the story? Always install those minor updates. It’s not so much because you will definitely be targeted if you fail to stay up to date, but because if the Apple community as a whole ceases to be vigilant about upgrading, the dark forces on the Internet will start to see macOS and iOS as low-hanging fruit. As long as most people update relatively quickly, it’s not worthwhile for attackers to put a lot of resources into messing with Macs, iPhones, and iPads.
That said, before you install those updates, make sure to update your backups. It’s unusual for anything significant to go wrong during this sort of system upgrade, but having a fresh backup ensures that if anything does go amiss, you can easily get back to where you were before.