Are you having trouble logging into Gmail on an older iOS device like an iPad or iPhone? I had this issue a few minutes ago where I was trying to put in my Gmail password, which I verified was correct, and it kept telling me my username or password were incorrect. After further digging, I found out that Google considers the older iOS mail software used on an iPad or iPhone as “unsecure,” and blocks it.
Here’s the fix to allow Gmail on your older iPad or iPhone.
Secondly, and even more important, visit this website: Allow less secure apps and choose “Allow” to let less secure apps access your Google account. This is a less secure option, but, it may be the only way to get your older iPad or iPhone mail software to allow access to Gmail.
On March 4th 2016, virus researchers discovered a nasty new form of ‘ransomware,’ or software that can take over a Macintosh computer and encrypt and lock the files for monetary payment. This particular strain of ransomware is unique because A.) It’s one of the first public instances of ransomware on the Macintosh platform and B.) It was snuck onto the Mac platform by a popular piece of software commonly used to download torrents, such as movies and television shows called “Transmission.” Security researchers are calling this ransomware “OSX.KeRanger.A”
The delivery mechanism for this ransomware was also unique in that it appeared to sneak in with a very common update to the Transmission software. Most users simply perform these updates without thought, and that’s where the ransomware was hidden–in a seemingly normal text RTF document. Once the malware executes, it silently begins to encrypt the user files in the background–as well as any Time Machine backups–and then alerts the user to pay 1 bitcoin (which is equal to about $400) to unlock the files. By using Bitcoin to pay the ransom, the transactions become virtually untraceable.
Here’s what you need to know about this ransomware if you are using Transmission on a Macintosh:
Immediately perform an upgrade to the Transmission software if you are currently running version 2.90. The currently unaffected version is now 2.92 and can be found at the Transmission website located here.
The malware can take up to 3 days to begin work when installed.
Apple has revoked the security certificate for the malicious software, which should stop it from being installed in the future.
The Transmission authors have removed the malicious installers from their website, however, the malicious software still seems to be under development.
The infected Transmission installers include an extra file (which looks like a text file) named General.rtf in the Transmission.app/Contents/Resources directory.
Upon execution, the ransomware will create 3 files called “.kernel_pid”, “.kernel_time” and “.kernel_complete” in the ~/Library directory. It will then attempt to sleep for about 3 days before continuing.
The user will then receive a text file explaining how to decrypt the files by purchasing a bitcoin and paying it to a particular address.
The malware will encrypt many types of files, including documents, photos, audio and video, archive files, email and database files.
Users should check /Applications/Transmission.app/Contents/Resources/ to see if a file called General.rtf exists. If so, delete your copy of Transmission immediately.
Users can check Activity Monitor for a process called “kernel_service” in the list. If you see this process, select the process and choose “Open Files and Ports” and see if it contains a filename such as “/Users/<user_name>/Library/kernel_service,” which is most probably the main process of this ransomware. You can force quit this process by choosing “Quit –> Force Quit”
Users should check for files with the names “.kernel_pid”, “.kernel_time”, “.kernel_complete” and “kernel_service” located in the ~/Library directory on the Mac. These files can be safely deleted.
Apple will now present a message telling the user that they can no longer install an infected version of Transmission. All that they can do is to eject the disk image.
Please consider a small donation if this post helped you with your issues!
There’s another new scam going around that appears to be from places such as “katzweb.net” and other sites telling you that your AppleID account has been “frozen,” and that you should “verify your account.” This is complete nonsense and a horrible “phishing” attempt. Phishing is when a person or company that is not the real person or company attempts to get private and sensitive information from you, such as credit card numbers or social security numbers. This is NOT real and you should NEVER give your personal data away in these instances. Unless you are directly talking to an Apple employee (via the Apple.com website or 1-800-APL-CARE support line), you will have serious issues when these sites get your personal data.
If you are contacted by anyone or any company requesting data that has anything to do with an AppleID, you should forward that suspicious (although very real looking) email to Apple support located at firstname.lastname@example.org. They will be able to determine if this was a real or fake request and they will contact you directly.
Have you ever been in the shower and the doorbell rings? How about an early alert system that is waterproof and wireless and will alert you to anyone approaching your driveway, or, even the front door.
This cool device can alert you long before anyone hits the front door wirelessly and with different tones and even blinking LED’s. The sensor is waterproof and battery powered and the transmitter is plugged into any wall outlet.
Have you ever seen this message when trying to install Mac OS X software that didn’t come from the Mac App Store? Watch the new Capital Mac YouTube video below to see how to get around this new Macintosh security setting!
Is this message stopping you from installing software on your Mac?