Jason D. O'Grady

Contributing Editor

Jason D. O'Grady developed an affinity for Apple computers after using the original Lisa, and this affinity turned into a bona-fide obsession when he got the original 128 KB Macintosh in 1984. He started writing one of the first Web sites about Apple (O'Grady's PowerPage) in 1995 and is considered to be one of the fathers of blogging. He has been a frequent speaker at the Macworld Expo conference and a member of the conference faculty. He also co-founded the first dedicated PowerBook User Group (PPUG) in the United States. After winning a major legal battle with Apple in 2006, he set the precedent that independent journalists are entitled to the same protections under the First Amendment as members of the mainstream media. O'Grady is the author of The Nexus One Pocket Guide, The Droid Pocket Guide, The Google Phone Pocket Guide, and The Garmin nuvi Pocket Guide (Peachpit Press), the author of Corporations That Changed the World: Apple Inc. (Greenwood Press), and a contributor to The Mac Bible (Peachpit Press). In addition, he has contributed to numerous Mac publications over the years, including MacWEEK, Macworld, and MacPower (Japan).When he's not writing about Apple for ZDNet at The Apple Core, he enjoys spending time with his family in New Jersey.

Jason D. O'Grady is the creator and editor of O'Grady's PowerPage, which has been publishing mobile technology news since 1995. He maintains an advertising relationship with the following legacy advertisers on the PowerPage: Amazon Associates and Google Adsense. Advertising on the PowerPage is brokered by a third-party agency (BackBeat Media) and he recuses himself from these negotiations.

Latest from Jason D. O'Grady

Show search filters
Apple dashboard widget vulnerability published

Apple dashboard widget vulnerability published

An article (republished by the author here) in the Autumn 2008 issue of 2600 Magazine details a pretty serious vulnerability with Apple's dashboard widgets that could allow access to data on the user's hard drive.Since we may access the system with user privileges, we may edit/remove/create files within the user's home directory (this includes such sensitive data as ~/.

December 23, 2008 by in Security

NSA issues Mac security guide

NSA issues Mac security guide

The National Security Administration (NSA) has published an internal guide for System Administrators to keep their Macs secure within their organization. The 171 page document, titled "Mac OS X - Security Configuration For Version 10.4 or Later Second Edition" (PDF) is a free download from the government agency.

March 21, 2007 by in Security

'Mac hack' also affects Windows

'Mac hack' also affects Windows

On Monday I reported on a Safari vulnerability that was exposed at a security conference - as it turns out, the vulnerability also affects PCs running Windows as well. Hackers Dino Dai Zovi and Shane Macaulay were able to hijack a MacBook Pro as part of the "PWN to OWN" contest at the CanSecWest security conference in Vancouver, British Columbia.

April 24, 2007 by in Security

iPhone root vulnerability or bogus MSM hysteria?

iPhone root vulnerability or bogus MSM hysteria?

A lot of hay has been made about a purported "vulnerability" in iPhone that allows a malicious Web site to extract personal information and take control of the device from the a WiFi connection. I put "vulnerability" in quotes because it hasn't been publicly demonstrated yet.

July 23, 2007 by in Security

iPhone hacking for mere mortals

iPhone hacking for mere mortals

If you're like me you've been sitting on the sidelines while more daring souls hack away at their iPhones. Personally, I'm not a big fan of tinkering with my iPhone's firmware when I need it to make phone calls.

July 30, 2007 by in Security

MOAB comes to an end

MOAB comes to an end

ZDNet security blogger Ryan Naraine has the story on the end of the controversial Month Of Apple Bugs (MOAB) project that finished yesterday with the last day of January. The shadowy L.M.H. signed off saying "My time disclosing exploits is over" and promised to release an exploit for a remote kernel vulnerability.

February 1, 2007 by in Security