Intego Mac Podcast

Episode Archive

Episode Archive

143 episodes of Intego Mac Podcast since the first episode, which aired on October 5th, 2017.

  • How to Adapt to Working From Home

    March 20th, 2020  |  31 mins 38 secs

    Many people are required to work from home for the foreseeable future, so Josh and Kirk have decided to give some tips about working from home, something they both do.

  • The History of Apple Malware, with Guest John McAfee

    March 13th, 2020  |  33 mins 11 secs

    Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild affected the Apple II. We discus the history of Apple malware, and we talk with John McAfee, creator of the first commercial antivirus, about how he created the software.

  • RSA Conference 2020 Highlights

    March 6th, 2020  |  34 mins 50 secs

    Josh attended this year's RSA Conference, one of the big meet-ups about computer security, and discusses what he learned there. We also cover news about smart speakers listening to your conversations (again), a copy/paste issue that Apple says isn't a big deal, and a new limitation by Safari for HTTPS certificates, that will affect some websites.

  • 10 Things You Shouldn’t Do on Your Work Computer or Phone

    February 28th, 2020  |  34 mins 5 secs

    Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your activity, and record what you do, and even, perhaps, what you type.

  • Switching Default Apps on the iPhone and iPad

    February 21st, 2020  |  26 mins 45 secs

    Your iPhone or iPad comes with 36 default apps, including Mail, Safari, and Messages. You may want to use other apps for email, for browsing, and for messaging, in part to enhance your security and privacy. While you can't set other apps to replace the defaults, as you can on macOS, you can switch. We explain how.

  • Understanding Blockchain and Cryptocurrency

    February 14th, 2020  |  32 mins 21 secs

    A child spends a fortune on in-app purchases, the CIA has been running a fake company providing encryption services, and beware of public lockers. We then take a deep dive into blockchain technology and cryptocurrency; if you've been wondering what Bitcoin is, we explain (almost) everything.

  • How Security Analysts Work

    February 7th, 2020  |  34 mins 1 sec

    We explain how to delete "off-Facebook activity," discuss a Google Photos data leak, a Twitter phone number issue, and a man who created a traffic jam with a wagon full of smartphones. We then explain how security analysts work, discussing a developer who wanted to know why his Wacom drawing tablet had a privacy policy, and worked out what data the device was sending to a server.

  • If It’s Free, You’re the Product

    January 31st, 2020  |  31 mins 28 secs

    Apple updates everything, the Ring doorbell has trackers in its app, and the Shlayer malware has infected lots of Macs. We then discussed a number of issues where free services you use monetize data collected about you and your activities.

  • iPhones Hacked and Cracked

    January 24th, 2020  |  29 mins 48 secs

    The world's richest man's iPhone was hacked when he clicked on a video in WhatsApp. Police and the FBI are cracking iPhones to get evidence. Should we worry? Tom Cruise would know what to do.

  • Your Photos Can Tell People Where You Live

    January 17th, 2020  |  32 mins

    Photos you shoot with your iPhone, and with some cameras, store location data. Sharing these photos on social media may pinpoint your location: where you live, or where you work. It's easy to remove this data. In the news, we talk about listening in on Skype audio, another Apple - FBI spat about accessing data on an iPhone, Google getting rid of cookies, and more.

  • The Year in Apple Security 2019

    January 10th, 2020  |  34 mins 52 secs

    We look back at the eventful year 2019 in Apple security. In the news, Apple is switching to randomized serial numbers for its products, Apple sues a company over jailbreaking, Firefox has critical vulnerabilities, and more.

  • 9 Security and Privacy Settings to Activate on Your New iPhone or iPad

    January 3rd, 2020  |  30 mins 22 secs

    We cover some security news, such as a password breach at Zynga, a user database breach at Waze, and a new Apple patent for under-display biometric sensors. Then we discuss essential settings to keep your iPhone, iPad, and iPod touch secure.

  • 8 Steps to Ensure the Security and Privacy of Your New Mac

    December 27th, 2019  |  30 mins 44 secs

    If you got a new Mac for the holidays, there are a number of settings you can adjust to enhance its security and privacy. We discuss eight tips to make your Mac stronger. We also look at some news, with Ring's reaction to the claims that they were compromised, Apple pulling an app from the App Store for spying on users, and Apple's new bug bounty program.

  • Apple HomeKit and the Smart Home

    December 20th, 2019  |  36 mins 8 secs

    We take a close look at smart home technology and Apple's HomeKit, and also discuss why Vladimir Putin is still using Windows XP, another Ring camera issue, some password problems, and a new Intel vulnerability called Plundervolt.

  • Mac Pro costs the same as Tesla Cybertruck

    December 13th, 2019  |  29 mins 1 sec

    Apple has released the new Mac Pro, along with updates for all its operating systems this week. Google Chrome gets a serious update, Google Maps gets incognito mode, and the Ring doorbell leaks some location data allowing journalists to create heat maps of Ring-protected homes. Plus an AirDrop vulnerability, a tweet with an iPhone decryption key, and more.

  • Twitter Trickery, Charging Insecurity, Cryptocurrency Malware, and More

    December 6th, 2019  |  36 mins 41 secs

    We follow up on our Black Friday purchases, then talk about some Twitter trickery, some Russian rigidity, some charging insecurity, some location confusion, and some new Mac cryptocurrency malware.