Variable Refresh Rates On Monitors Seem To Be Broken On macOS Sequoia 15.1

Posted in Commentary with tags on November 5, 2024 by itnerd

I am beginning to think that I should have stayed on macOS Sonoma. I say that because that hot off posting this issue with Sequoia comes a new issue. If you have a monitor that has the ability to do variable refresh rates, this may not work on Sonoma. For example my new BenQ MOBIUZ EX321UX Monitor which had no issues doing variable refresh rates when I was running Sonoma can no longer do variable refresh rates in Sequoia. Instead, I found it to be locked to 144Hz in my case.

Now I know that it’s not the monitor because I grabbed a PC laptop that I had in my office and tested variable refresh rate support, and it worked fine. I also tested the same scenario on my wife’s Mac which runs Sonoma, and that worked fine as well. And while researching this, I found a single post that sounds similar to what I am experiencing.

And:

Reading through this, it seems like this is some sort of regression as this apparently worked in Sequoia 15 and 15.0.1 which implies that this might be a regression. But it could also be Apple deliberately limiting support for variable refresh rates and HDR along with it as described here and here. At this point, it’s not clear which it is. But as more people discover this, more people will not be happy. Especially if they have a MacBook Pro and are used to ProMotion which is Apple’s implementation of variable refresh rates. To work around this, I have set my refresh rate to 100 Hz at 2560×1440 resolution which gives me the added advantage of being able to use the option of having my MacBook Pro render slightly sharper text while using HDR. And I will be retesting this when Sequoia 15.2 comes out as I am hoping that it will address this issue.

Have you experienced this issue? If so, post a comment below and share your experience.

Cybercriminals Exploit DocuSign’s APIs to Send Authentic-Looking Invoices

Posted in Commentary with tags on November 4, 2024 by itnerd

Wallarm has unveiled a report where hackers are exploiting DocuSign APIs to send authentically appearing invoices in a new breed of cyber threat. Exploiting trusted platforms like DocuSign through their APIs marks a concerning evolution in cybercriminal strategies. By embedding fraudulent activities within legitimate services, attackers increase their chances of success while making detection more challenging. 

While beneficial for businesses, DocuSign’s API-friendly environment inadvertently provides a fertile ground for malicious actors to exploit. With paid accounts and access to official templates, attackers can customize invoices to match the branding of target companies, including unauthorized use of trademarks like Norton’s.

You can read the report here.

Backing Up Via Time Machine Is Broken In macOS Sequoia

Posted in Commentary with tags on November 3, 2024 by itnerd

Immediately after updating to macOS Sequoia, specifically the 15.1 version I noticed two problems with Apple’s Time Machine utility:

  1. Scheduled backups would fail to back up with the error message “Time Machine couldn’t complete the back up to <INSERT THE NAME OF MY NAS HERE>”. What made this interesting is that my wife’s Mac which is still on Sonoma backs via Time Machine up without an issue. It’s only the Macs that I have that are running Sequoia that have this issue. Basically implying that Apple broke Time Machine on Sequoia rather than the NAS being the issue.
  2. Adding insult to injury is the fact that the “preparing to back up” phase of backing up on one of my Sequoia Macs can take over 30 minutes. Again, my wife’s Mac doesn’t seem to have this issue which implies that this is a Sequoia issue.

I seem not to be alone in having problems with Time Machine on Sequoia. I have found post after post after post after post after post on this. Implying that issues with Time Machine is a widespread problem that Apple has yet to address. Now after looking through all of these posts, along with others that I have not linked to, I noted some common themes among them:

  • For some, disabling the macOS firewall seems to fix these issues. Especially if you are on Sequoia 15.0 or 15.0.1. I say that because whatever this firewall issue is appears to have been fixed in Sequoia 15.1 for some but not for all. My take on this is that the firewall is on for a reason and you should not mess with it. Thus a better course of action is to try updating to Sequoia 15.1 and see if your issues go away.
  • For some who back up over WiFi to something like a NAS, Apple has a feature that obfuscates the MAC (Media Access Control) address of your WiFi adapter to stop third parties from tracking you if you are using public WiFi. Turning this feature off has resolved these issues for some. The way you do that is as follows:
    • Go to System Settings
    • Go to WiFi
    • Choose the WiFi network that is used to back up to the NAS and click on the three dots on the right hand side and choose network settings.
    • Under “Private WiFi Address” set it to Off and click okay.
  • For some, deleting the backup volume from Time Machine and re-adding it fixes this issue. If you want to test that, here’s what you do (Note: This will NOT delete your backup data in case you are worried about that):
    • Go to System Settings
    • Go to General
    • Go to Time Machine
    • Highlight the backup volume and click on the “-“
    • Click on the “+” and add the backup volume back. It will ask you if you want to retain the existing backup history or delete it. Choose the option to retain the backup history.

Now I am testing removing and re-adding the Time Machine volume now on both my Sequoia Macs along with trying the WiFi suggestion as well. It will take me a few days to get a sense if either of those resolves the issue. But what I have tested and can give you feedback on is the slow speed in terms of “preparing to back up”. I dug out an old trick from my memory banks to test a theory (more on that theory in a moment) and found that it does validate my theory. But there’s a catch to doing what I am about to tell you that I will get to in a minute. First, this is what I did:

  1. I went to the Applications folder.
  2. Then I went to the Utilities folder.
  3. I started the Terminal application.
  4. I then typed this command: sudo sysctl debug.lowpri_throttle_enabled=0
  5. I pressed enter and then it prompted me for the password for user account on my Mac. I entered that and hit Return.
  6. I then closed the Terminal.

What this command does is disable throttling for Time Machine because Apple’s use case for Time Machine is that you’re backing up every hour by default. As a result of that your Mac by default will throttle how fast it backs up so that it doesn’t negatively affect anything else that you might be doing. However by disabling throttling, your Mac will back up as fast as it can. When I tested this by turning off throttling, it would take about 10 minutes to start backing up my Mac. When I turned throttling back on, it would take 30 minutes or so as I mentioned above. Beyond that, the back up was faster overall with throttling turned off.

Now turning throttling off has the side effect of making your Mac slower because it’s going as fast as it can to back up data and affecting everything else you might be doing as a side effect of that. You may not want that, especially if you’re still on an Intel Mac. But in my case, I use a third party utility called TimeMachineEditor which I wrote about here to schedule my backups to happen when I am asleep. Thus throttling has no negative effect for me and my use case. And it really doesn’t seem to affect anything on my M1 Pro MacBook Pro. Though I will also admit that may put it back to the default setting once everything is sorted and Time Machine works as expected as I try to run my Macs in as close to a default state as possible. Having said all of that, this test validates the theory that I had which was that Apple for reasons that I do not understand has changed the behaviour of Time Machine in Sequoia to more aggressively throttle backup speed. Because on a Mac with an earlier versions of macOS, this process of “preparing to back up” happens much faster.

Like I said earlier, I will report back in terms of how this works, or doesn’t work as I suspect that it may take a week or so before I get an idea on that front. But if you rely on Time Machine and you’re thinking of updating to macOS Sequoia, you may want to hold off until Apple officially fixes whatever they broke. And if you have any insight on these issues, feel free to leave a comment below and share your thoughts.

Hot Take: Expect Apple To Stop Supporting Intel Macs In 2026

Posted in Commentary with tags on November 2, 2024 by itnerd

One thing that I have been asked a lot since Apple Silicon became a thing is how long can someone hold onto their Intel based Mac. Now I don’t have a crystal ball or anything, but based on the fact that the transition from Intel to Apple Silicon isn’t Apple’s first rodeo when it comes to changing chip technology, you can make some intelligent guesses based on Apple’s prior history:

First, though Apple doesn’t say it, the company typically supports its products with five or more years of software updates. Specifically security updates. So one can reasonably expect that once the Intel Macs that are supported by Apple reach that five year mark, it’s game over for those Macs. Let’s put that into practice. This is the list of Macs that are supported by macOS Sequoia:

The oldest Mac on this list is the iMac Pro which is way beyond the 5 years of software support that Apple typically provides. The MacBook Pro’s, Mac mini, from 2018-2020 are the next oldest. Followed by the Mac Pro and iMac from 2019. All those Macs are within the 5+ year window that I spoke of earlier in terms of software support. MacBook Air owners who have Intel processors are already out of luck as the 2020 model was the first Apple Silicon model. So based on that, I anticipate that the 2026 version of macOS will be the first one with only Apple Silicon support.

If we look at history, my theory holds water. Consider the following sequence of events from the last time Apple changed processor technology. When they went from IBM’s PowerPC to Intel, this happened:

  • Apple announced the move from PowerPC to Intel in June of 2005.
  • January 2006 had the first release of an Intel Mac. Specifically the iMac and the PowerBook Pro.
  • By August of that year, every computer in Apple’s lineup transitioned to Intel.
  • In August of 2009, macOS Snow Leopard was the first version of macOS that only worked on Intel. Though this version still supported PowerPC applications via the “Rosetta” translation layer that was built into the operating system.
  • Rosetta was yanked in July 2011 when macOS Lion came out

All of that was a roughly 5 year timespan. That makes 2026 as a date for the demise of Intel Macs plausible. More so if you consider that Apple Silicon was announced in June of 2020 and the first Macs to have Apple Silicon showed up in November of that year.

So what should you do if you have an Intel Mac? Well, now is the time to plan your transition to Apple Silicon. This is especially true if you have a Mac that isn’t getting software updates of any sort from Apple right now. Because with no software updates from Apple, and software companies to likely not support these computers, the usefulness of these computers will nosedive pretty dramatically. Thus planning out your move to Apple Silicon in a calm manner is the way to go. That way you don’t hit 2026 and wonder what your options are.

Uncovering the Evolving Functionality of FakeCall Malware 

Posted in Commentary with tags on November 1, 2024 by itnerd

According to a report from mobile security platform Zimperium, threat actors are using a modified version of Android malware, dubbed “FakeCall,” taking control of phone dialers and intercepting calls made to banks.

  • “FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming and outgoing calls. Victims are tricked into calling fraudulent phone numbers controlled by the attacker and mimicking the normal user experience on the device.”

First reported by Kaspersky in 2022, the attack mimicked banking apps and let users make calls through them. Attackers would overlay the bank’s actual number on victims’ screens and then impersonate bank employees when the victim called the number, thereby obtaining users personal banking information.

Ted Miracco, CEO, Approov had this to say: 

  “Google’s isolated approach to Android security has proven insufficient, as exemplified by recurring threats like ‘FakeCall.’ Dismantling Google’s monopolistic Play Store and fostering competitive app stores with open standards for security—including attestation and a transparent rating system—would empower consumers with clearer insight into app risks and access to safer, rigorously vetted applications.”

The fact that this was first discovered in 2022 and is still around today shows that there needs to be a new approach to keep this sort of malware from being a problem. Hopefully Google who is in all sorts of trouble when it comes to the Play Store can come to the table with something that addresses this once and for all.

If You Are A Home User Who Wants To Stay On Windows 10 And Get Support, You Can Pay Microsoft $30 To Do So

Posted in Commentary with tags on November 1, 2024 by itnerd

If you’re on Windows 10, you’re being pushed hard to move to Windows 11 as Windows 10 is going end of life roughly a year from now. Now there are people who can’t or won’t move to Windows 11. Maybe it’s because they like Windows 10 more than they like Windows 11. Or it’s due to the fact that Windows 11 may require them to buy a new computer because they can’t upgrade from Windows 10 on their current hardware. Either way, Microsoft has a solution for that.

Microsoft has published guide on preparing for Windows 10’s end of support. The guide notes the possibility of purchasing an Extended Security Updates (ESU) subscription that will keep Windows 10 PCs secure for a fee of $30 per year. For the first time, this service will be accessible to both individual consumers and business clients.

Now I know that there will be people who won’t be thrilled with this. And this adds to the perception that Windows 11 is simply being shoved down their throats. Microsoft will have to navigate that to avoid having people flee Windows and heading to the nearest Apple Store instead of upgrading.

Nikon is Developing the NIKKOR Z 28-135mm F/4 PZ

Posted in Commentary with tags on November 1, 2024 by itnerd

Nikon Canada Inc. is pleased to announce the ongoing development of the NIKKOR Z 28-135mm f/4 PZ, a standard zoom lens that is compatible with full-frame/FX-format mirrorless cameras for which the Nikon Z mount has been adopted.

The NIKKOR Z 28-135mm f/4 PZ is a standard zoom lens with power zoom that covers the focal range from 28mm to 135mm. It is designed to provide ease of use and superior optical performance for video recording, supporting efficient recording for documentaries and location work by a solo videographer or small crew.

Nikon will continue to pursue a new dimension in optical performance while meeting users’ needs, contributing to the development of imaging culture, with the hope of expanding possibilities for imaging expression.

OWC Helps Power the Future for Apple Users with Thunderbolt 5 Solutions for New Mac Mini and MacBook Pro with M4

Posted in Commentary with tags on October 31, 2024 by itnerd

Other World Computing today announced the full compatibility of its OWC Thunderbolt 5 innovations – including its OWC Envoy Ultra SSD and OWC Thunderbolt 5 (USB-C) Cables – with the latest Mac mini powered by the new M4 Pro chip and MacBook Pro powered by the M4 Pro and M4 Max family of chips. With these cutting-edge OWC solutions, Apple users are empowered to unlock the full potential of Thunderbolt 5, and enjoy a new era of speed, reliability, and connectivity.

The OWC Envoy Ultra is the first and fastest Thunderbolt 5 Portable SSD. Built for those who refuse to slow down, it is:

  • Faster than Fast – Revolutionary speed over 6000MB/s – up to 2x faster than Thunderbolt 4 and USB4
  • A Machine Maximizer – Gets the most speed possible from Thunderbolt 3, Thunderbolt 4, and USB4 machines
  • Ready for Anything – Easily handle daily data needs to pro-level creative projects while matching internal storage performance
  • Versatile – Works with Macs, PCs, iPad Pros, Chromebooks, and Surface devices
  • Weatherproof – Protects data from dust, drops, and downpours
  • Convenient – Bus-powered with built-in Thunderbolt cable
  • Silent – Fanless, heat-dissipating aluminum design

The OWC Thunderbolt 5 (USB-C) Cable is the only cable you’ll ever need. Built for speed, power, and compatibility with every device, past, present, and future, it is:

  • 100% USB-C Compatible – Connect to today’s, tomorrow’s, and yesterday’s Macs, PCs, iPads, Chromebooks, Surface, and other devices with a Thunderbolt 5, Thunderbolt 4, Thunderbolt 3, USB4, or USB-C port
  • Lightning Quick – Work and play faster with up to 80Gb/s of bi-directional data speed and up to 120Gb/s for higher display bandwidth needs
  • Versatile – Connect to millions of docks, displays, eGPUs, PCIe expansion, external SSDs, RAID storage, and accessories
  • Powerful – Lab certified to safely deliver up to 240 watts to charge the most power-hungry device
  • All About Stunning Visuals – Connect to the latest and future Thunderbolt, USB-C, and DisplayPort displays for incredible 4K, 5K, 6K, and up to three 8K displays

Pre-order your OWC Envoy Ultra today (2TB to 4TB from $399.99) here: https://www.owc.com/solutions/envoy-ultra (ships early November).

The OWC Thunderbolt 5 (USB-C) Cable is immediately available (from $19.99) here: https://www.owc.com/solutions/thunderbolt-5-usb-c-cables.

CISA releases International Plan to strengthen global collaboration on cyber threats related to critical infrastructure

Posted in Commentary with tags on October 31, 2024 by itnerd

Earlier this week, CISA released its The 2025-2026 International Strategic Plan aimed at enhancing global collaboration to address cyber threats to critical infrastructure.

The plan recognizes the intricate and geographically dispersed nature of cyber risks, emphasizing the importance of quickly sharing threat information and risk reduction guidance with international partners.

CISA International Strategic Plan Goals sets out three goals for CISA to achieve over the 2025-2026 period:

  1. Bolster the Resilience of Foreign Infrastructure on which the US Depends – CISA will work with interagency and international partners to identify and understand which international systems and assets are critical and assess how they are vulnerable to create strategies to manage shared risks.
  2. Strengthen Integrated Cyber Defense – CISA plans to collaborate with partners, international organizations, and NGOs to shape global cybersecurity practices and standards, promoting widespread cyber safety and security.
  3. Unify Agency Coordination of International Activities – The CISA Stakeholder Engagement Division will create a governance structure to advise on international issues and clearly outline the agency’s international priorities. This will involve enhancing systematic information sharing across CISA to ensure situational awareness of ongoing and future international activities.

CISA will also focus on enhancing the skills of its workforce to better influence the international landscape including developing training programs for employees overseas and providing guidance on international affairs for all traveling staff.

“In following this plan, CISA will improve coordination with our partners and strengthen international relationships to reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly commented.

Emily Phelps, Director, Cyware:

“CISA’s 2025-2026 International Strategic Plan underscores the urgency of an interconnected approach to securing critical infrastructure across borders. As cyber threats grow increasingly complex and far-reaching, swift, collaborative information-sharing becomes essential to mitigate risks that could impact not just a single nation but the global landscape. CISA’s commitment to bolstering the resilience of international assets and systems vital to U.S. security reflects a forward-thinking acknowledgement of interdependencies in today’s cyber ecosystem. The focus on strengthening integrated cyber defenses and establishing clearer governance structures is a strategic leap towards a unified, cohesive response to these shared threats. This approach—fostering resilience, enhancing standards, and emphasizing interagency coordination—can set a precedent for global cybersecurity initiatives, reinforcing that collective defense is the linchpin in navigating future cyber challenges.”

A collective approach to defending critical infrastructure is the way to go. And once again I applaud the CISA in terms of leading the way. Hopefully other countries take this just as seriously as the CISA does.

Rogers Net-Zero Targets Approved by SBTi

Posted in Commentary with tags on October 31, 2024 by itnerd

Rogers today announced its net-zero greenhouse gas (GHG) emissions targets have been approved by the globally recognized Science Based Targets initiative (SBTi).

Rogers is the first national carrier in Canada to have approved science-based net-zero targets published by the SBTi. The global organization for corporate climate goals validates submitted targets and action plans to ensure they are in line with the Paris Agreement.  

The company’s action plan will aim to deliver on environmental commitments in four key areas: 

  • Increasing energy efficiencies across its operations and network   
  • Transitioning its fleet to electric and hybrid vehicles    
  • Expanding its renewable energy strategy    
  • Engaging suppliers to set their own science-based targets 

Rogers efforts have already reduced scope 1 and 2 GHG emissions by 33% since 2019. Rogers long-term net-zero targets are to reduce absolute scope 1, 2 and 3 GHG emissions to net-zero by 2050. Near-term targets are to reduce absolute scope 1 and 2 emissions by 50% by 2030 and ensure 80% of its suppliers set their own science-based targets by 2029.