Intego Mac Podcast-logo

Intego Mac Podcast

Technology Podcasts

Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.

Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.


United States


Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.




Medical ID, Apple Updates, Intel Vulnerabilities, and More

Josh and Kirk discuss how to set up a medical ID on an iPhone and Apple Watch, we cover this week's Apple updates, we look at a new Intel CPU bug, and more. Show Notes: How to Set Up Medical ID on Your iPhone and Apple WatchCybercriminals are preying on coronavirus fearsSafari will now block third-party cookies by default, delete a site's local storage after seven daysHow to Manage and Remove Browser Cookies on Mac and iOSLegacy System Extension MessageDeprecated Kernel Extensions and System...


How to Adapt to Working From Home

Many people are required to work from home for the foreseeable future, so Josh and Kirk have decided to give some tips about working from home, something they both do. Show Notes: Objective by the SeaTake Control of Working from Home TemporarilyDyson air purifierNetatmo weather stationIs Conference Room Air Making You Dumber?Pomodoro Technique (Wikipedia)MultiTimer (iOS and Apple Watch)Episode 92: Zoom Zero-Day, and Unmasking Mac Malware MakersEpisode 15: What's a VPN, and Why Should You Use...


The History of Apple Malware, with Guest John McAfee

Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild affected the Apple II. We discus the history of Apple malware, and we talk with John McAfee, creator of the first commercial antivirus, about how he created the software. Show Notes: Key Moments in the History of Mac MalwareJohn McAfeeElk ClonerApple DOS (Wikipedia)nVIR (Wikipedia)John McAfee (Wikipedia)HyperCardA Silly Noisy...


RSA Conference 2020 Highlights

Josh attended this year's RSA Conference, one of the big meet-ups about computer security, and discusses what he learned there. We also cover news about smart speakers listening to your conversations (again), a copy/paste issue that Apple says isn't a big deal, and a new limitation by Safari for HTTPS certificates, that will affect some websites. Show Notes: Your smart speaker could be listening in on your conversations by accidentMister Mxyzptlk (Wikipedia)Apple drops a bomb on long-life...


10 Things You Shouldn’t Do on Your Work Computer or Phone

Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your activity, and record what you do, and even, perhaps, what you type. Show Notes: RSA Conference 202010 Things You Shouldn’t Do on Your Work Computer (or Phone)O.MG Cable Get 40% off Mac Premium Bundle X9, fully compatible with macOS Mojave, with the code PODCAST19. Download Intego Mac Premium Bundle X9 now at


Switching Default Apps on the iPhone and iPad

Your iPhone or iPad comes with 36 default apps, including Mail, Safari, and Messages. You may want to use other apps for email, for browsing, and for messaging, in part to enhance your security and privacy. While you can't set other apps to replace the defaults, as you can on macOS, you can switch. We explain how. Show Notes: Apple Weighs Letting Users Switch Default iPhone Apps to RivalsSwitch Some Default Apps on Your iPhone or iPad for Increased Security and PrivacyApple’s Default iPhone...


Understanding Blockchain and Cryptocurrency

A child spends a fortune on in-app purchases, the CIA has been running a fake company providing encryption services, and beware of public lockers. We then take a deep dive into blockchain technology and cryptocurrency; if you've been wondering what Bitcoin is, we explain (almost) everything. Show Notes: 8-year-old spends $1,875 on Roblox in-app purchases by adding her fingerprint to TouchIDBeware of public lockersThe intelligence coup of the centuryCryptocurrency 101 – Part 1: Blockchain and...


How Security Analysts Work

We explain how to delete "off-Facebook activity," discuss a Google Photos data leak, a Twitter phone number issue, and a man who created a traffic jam with a wagon full of smartphones. We then explain how security analysts work, discussing a developer who wanted to know why his Wacom drawing tablet had a privacy policy, and worked out what data the device was sending to a server. Show Notes: How to View and Edit Your Off-Facebook ActivityEpisode 31: Delete Your Social Media History...


If It’s Free, You’re the Product

Apple updates everything, the Ring doorbell has trackers in its app, and the Shlayer malware has infected lots of Macs. We then discussed a number of issues where free services you use monetize data collected about you and your activities. Show Notes: Apple releases macOS Catalina 10.15.3, iOS 13.3.1, and moreApple Security UpdatesRing Doorbell App Packed with Third-Party TrackersLeaked Documents Expose the Secretive Market for Your Web Browsing DataVirusBarrier ScannerFacebook agrees to pay...


iPhones Hacked and Cracked

The world's richest man's iPhone was hacked when he clicked on a video in WhatsApp. Police and the FBI are cracking iPhones to get evidence. Should we worry? Tom Cruise would know what to do. Show Notes: Apple Reportedly Dropped Plans for End-to-End Encrypted iCloud Backups After FBI ObjectediCloud security overview2016 WSJ Story on Apple's Plans for E2E Encryption for iCloud that SMS 2FA is better than no 2FA at allApple Likely to Drop Adobe Flash Support in...


Your Photos Can Tell People Where You Live

Photos you shoot with your iPhone, and with some cameras, store location data. Sharing these photos on social media may pinpoint your location: where you live, or where you work. It's easy to remove this data. In the news, we talk about listening in on Skype audio, another Apple - FBI spat about accessing data on an iPhone, Google getting rid of cookies, and more. Show Notes: New rack-mounted Mac Pro availableFBI asks Apple for help cracking Pensacola gunman’s iPhonesIPhone Hacking Firm...


The Year in Apple Security 2019

We look back at the eventful year 2019 in Apple security. In the news, Apple is switching to randomized serial numbers for its products, Apple sues a company over jailbreaking, Firefox has critical vulnerabilities, and more. Show Notes: Apple Plans to Switch to Randomized Serial Numbers for Future Products Starting in Late 2020Corellium Accuses Apple of Using Lawsuit to 'Crack Down on Jailbreaking'Apple Is Bullying a Security Company with a Dangerous DMCA LawsuitCritical Security...


9 Security and Privacy Settings to Activate on Your New iPhone or iPad

We cover some security news, such as a password breach at Zynga, a user database breach at Waze, and a new Apple patent for under-display biometric sensors. Then we discuss essential settings to keep your iPhone, iPad, and iPod touch secure. Show Notes: 170m passwords stolen in Zynga hack, monitor saysZynga (Wikipedia)have i been pwned?Wyze security camera user DB was breachedApple Wins Patent for Optical Imaging Sensors that could be used for Under-the-Display Biometrics in Future iPhones...


8 Steps to Ensure the Security and Privacy of Your New Mac

If you got a new Mac for the holidays, there are a number of settings you can adjust to enhance its security and privacy. We discuss eight tips to make your Mac stronger. We also look at some news, with Ring's reaction to the claims that they were compromised, Apple pulling an app from the App Store for spying on users, and Apple's new bug bounty program. Show Notes: Boxing Day (Wikipedia)Ring’s Services Have Not Been Compromised – Here’s What You Need to Knowhaveibeenpwned.comTop websites...


Apple HomeKit and the Smart Home

We take a close look at smart home technology and Apple's HomeKit, and also discuss why Vladimir Putin is still using Windows XP, another Ring camera issue, some password problems, and a new Intel vulnerability called Plundervolt. Show Notes: Vladimir Putin 'still uses obsolete Windows XP' despite hacking riskShe installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter.Thousands of students in Germany queue for email...


Mac Pro costs the same as Tesla Cybertruck

Apple has released the new Mac Pro, along with updates for all its operating systems this week. Google Chrome gets a serious update, Google Maps gets incognito mode, and the Ring doorbell leaks some location data allowing journalists to create heat maps of Ring-protected homes. Plus an AirDrop vulnerability, a tweet with an iPhone decryption key, and more. Show Notes: Here are all the big new features & changes in iOS 13.3 & iPadOS 13.3Apple Fixes ‘AirDoS’ Bug That Cripples Nearby iPhones,...


Twitter Trickery, Charging Insecurity, Cryptocurrency Malware, and More

We follow up on our Black Friday purchases, then talk about some Twitter trickery, some Russian rigidity, some charging insecurity, some location confusion, and some new Mac cryptocurrency malware. Show Notes: Tories pretend to be factchecking service during leaders' debateThe iPhone 11 Pro’s Location Data Puzzler — Krebs on SecurityApple issued an explanation as to why this is happeningIt’s Apple Vs Putin, As Russia’s New Smartphone Ban ApproachesLos Angeles authorities warn travelers of...


The Chain of Trust

Apple's two-factor authentication system sets up a chain of trust from one device to another. By ensuring your identity on one device, that device can then authenticate you on another device, and provide you with enhanced features, such as an Apple Watch unlocking a Mac, or an iPhone authorizing Apple Pay on a Mac. Understanding this chain of trust helps you better understand how Apple protects you. Show Notes: The Chain of Trust in Apple Devices (The Mac Security Blog)Chain of trust...


Black Friday Safe Shopping Advice

It's Black Friday again, either the day we release this episode if you're in Europe, or next week, if you're in the US. It's the day when you can get some good deals on things you need, discounts on things you don't need, and, if you're not careful, you could get scammed. We discuss some best practices for buying new and used on Black Friday, and warn you about buying a used iPhone. Show Notes: WirecutterCaution! These Black Friday “deals” may be bad for your security6 Cyber Security Tips...


Vice President of Integrity

We discuss Apple's new 16" MacBook Pro with a redesigned keyboard; two new entrants in the video streaming market, Apple TV+ and Disney+; a bug in Facebook's app; Google's Pixel 4's face unlock; and more. Show Notes: Apple's new 16" MacBook ProApple TV+Bug in Facebook App Accesses the Camera in the BackgroundFacebook fixes bug that caused iOS app to use the camera in the backgroundNo one should buy the Facebook Portal TVAmazon Ring doorbells exposed home Wi-Fi passwords to hackersHow did...