Apple wins praise for adding 'USB Restricted Mode' to secure iPhones

Credit to Author: Lucas Mearian| Date: Thu, 14 Jun 2018 12:43:00 -0700

Apple confirmed today it will close a security hole that has allowed law enforcement officials, working with forensic companies, to break into iPhones to retrieve data related to criminal investigations.

In the upcoming release of iOS 12, Apple will change default settings on iPhones to shutter access to the USB port when the phone has not been unlocked for one hour. In its beta release of iOS 11.3, Apple introduced the feature – known as USB Restricted Mode – but cut it from iOS 11.3 before that version was released publicly.

To read this article in full, please click here

Read more

Apple bans cryptocurrency mining apps on iOS to protect mobile users

Credit to Author: Lucas Mearian| Date: Tue, 12 Jun 2018 12:36:00 -0700

Using an iPad or iPhone to mine bitcoin or other cryptocurrencies would be hard to do, as the CPU power available to complete the task would be a drop in the bucket compared to what’s needed.

But using a portion of the CPU power from thousands of iPads or iPhones to mine cryptocurrency makes more sense – and that’s exactly what some malware has been doing.

Apple is now moving to stop the practice.

[ Further reading: The way blockchain-based cryptocurrencies are governed could soon change ]

To read this article in full, please click here

Read more

Apple's Health Record API released to third-party developers; is it safe?

Credit to Author: Lucas Mearian| Date: Thu, 07 Jun 2018 03:11:00 -0700

Apple at its Worldwide Developers Conference this week released an API that allows  developers and researchers to create applications that connect to Health Records, a feature released with iOS 11.3 that allows patients to port their electronic health info to mobile devices and share data between care providers.

While the move promises to streamline the sharing of healthcare data, it also could open the door to that highly sensitive data falling into the wrong hands.

To read this article in full, please click here

Read more

What is Apple hiding with iOS 11.4?

Credit to Author: Jonny Evans| Date: Thu, 31 May 2018 06:48:00 -0700

Have you installed iOS 11.4? Once you’d looked at AirPlay 2and Messages in iCloud, did you happen to take a look at the contents of the security updates?

‘Details available soon’

If you did you’ll have been disappointed.

Apple hasn’t disclosed details concerning the security content of the new software. It hasn’t revealed anything concerning USB Restricted Mode, which apparently makes it harder for people to hack into your device.

To read this article in full, please click here

Read more

How to see everything Apple knows about you (u)

Credit to Author: Jonny Evans| Date: Mon, 30 Apr 2018 04:41:00 -0700

Apple has at last introduced a new tool that lets you request and download everything the company knows about you, including all the data it gathers and retains when using the company’s retail outlets, iCloud, apps, products, and services.

Why is this tool available?

In part, Apple has made this information available to bring it into line with Europe’s GDPR (General Data Protection Regulation) legislation, laws designed to better protect individual privacy in an online age.

Google, Facebook, Twitter, and almost every other company has also had to introduce these tools, making it far easier for users to compare the quantity and depth of information these unconstrained corporations hold about them.

To read this article in full, please click here

Read more

How to see everything Apple knows about you

Credit to Author: Jonny Evans| Date: Mon, 30 Apr 2018 04:41:00 -0700

Apple has at last introduced a new tool that lets you request and download everything the company knows about you, including all the data it gathers and retains when using the company’s retail outlets, iCloud, apps, products and services.

Why is this available?

In part, Apple has made this information available to bring it into line with Europe’s GDPR (General Data Protection Regulation) legislation, laws designed to better protect individual privacy in an online age.

To read this article in full, please click here

Read more

Warning as Mac malware exploits climb 270%

Credit to Author: Jonny Evans| Date: Mon, 12 Mar 2018 05:56:00 -0700

Reputable anti-malware security vendor, Malwarebytes, is warning Mac users that malware attacks against the platform climbed 270 percent last year.

Be careful out there

The security experts also warn that four new malware exploits targeting Macs have been identified in the first two months of 2018, noting that many of these exploits were identified by users, rather than security firms.

In one instance, a Mac user discovered that their DNS settings had been changed and found themselves unable to change them back.

This particular item of malware (OSX.MaMi) also installed a trusted root certificate on their Mac. The threat left the user vulnerable to fraudulent phishing websites posing as the real deal and man-in-the-middle attacks.

To read this article in full, please click here

Read more

Criminals pay just $15 for Apple iCloud account IDs, report claims

Credit to Author: Jonny Evans| Date: Wed, 07 Mar 2018 03:59:00 -0800

One of the biggest reasons Apple users need to beware of phishing attacks is that compromised iCloud accounts are among the most valuable of those traded on the dark web at $15 per account.

All your data are belongs to us

Think about the value of your Apple ID data: Not only is your account the golden portal into all your personal data, but it unlocks all manner of other valuable items: credit card details, online purchasing, passwords for your websites and more.

That’s why every Apple ID user really should think about the value of the data they are trying to protect and create tough alphanumeric passcodes, even if they do need to spend significant time memorising those codes.

To read this article in full, please click here

Read more

Mac: What does 'System Scan is Recommended' mean?

Credit to Author: Jonny Evans| Date: Wed, 14 Feb 2018 09:03:00 -0800

Many Mac users may have come across a small window that appears on top of their browser when surfing the Web that warns them, ‘System Scan is Recommended’. So, what is this message, and what should you do if you see it?

TL;DR: Don’t panic

The first thing to learn is that this is not a Mac system message. If you ever come across this message you can be utterly certain that it is a scam. Whoever is behind the message (and it may not be the website owner, but some poorly policed ads network) wants you to agree to something that will probably cost you money, leave your data at risk, or otherwise cause you unwanted problems. While scams like these are nowhere near as widespread on Macs as they are on other platforms, they do appear sometimes.

To read this article in full, please click here

Read more

How Apple users can protect themselves against Spectre and Meltdown

Credit to Author: Jonny Evans| Date: Fri, 05 Jan 2018 06:26:00 -0800

Apple has confirmed that all Macs, iPhones, iPads and other devices (bar Apple Watch) are vulnerable to the newly-revealed Spectre and Meltdown Intel, ARM and AMD processor vulnerabilities.

What’s the problem?

Taking advantage of a vulnerability that has been around for 20-years, Meltdown and Spectre exploit a CPU performance feature called “speculative execution”. Speculative execution exists to improve computer speed by enabling the processor to work on multiple instructions at once, sometimes in non-sequential order.

To read this article in full, please click here

Read more

Apple acts as digital transformation hits panic mode

Credit to Author: Jonny Evans| Date: Thu, 04 Jan 2018 08:03:00 -0800

Apple is updating its systems against newly revealed Spectre and Meltdown vulnerabilities, but it’s not enough to update personal devices – what about older PCs and the millions of servers that may also be vulnerable to the bug?

The bigger picture

The Spectre and Meltdown bugs are causing lots of distress. Meltdown impacts Intel processors, while Spectre appears to threaten chips from AMD and ARM as well. A good explanation of these vulnerabilities is here.

To read this article in full, please click here

Read more