Apple publishes in-depth M1, Mac, and iOS security guide

Credit to Author: Jonny Evans| Date: Thu, 18 Feb 2021 13:00:00 -0800

Apple has published its annual Apple Platform Security Guide, which includes updated details concerning the security of all its platforms, including the new M1 and A14 chips inside Apple Silicon Macs and current iPhones, respectively.

The first look inside M1 Mac security

The extensive 196-page report explains how Apple continues to develop its core security models along the premise of mutually distrusting security domains. The idea here is that each element in the security chain is independent, gathers little user information, and is built with a zero-trust model that helps boost security resilience.

To read this article in full, please click here

Read more

Apple makes welcome change to 'Big Sur' security for Macs

Credit to Author: Jonny Evans| Date: Thu, 14 Jan 2021 07:41:00 -0800

When Apple shipped macOS Big Sur in November, researchers quickly spotted a strange anomaly in the system’s security protection that could have left Macs insecure. Apple now seems to be dealing with this problem, introducing a fix in the latest public beta release.

What was wrong?

For some strange reason, Big Sur introduced a controversial and potentially insecure change that meant Apple’s own apps could still access the internet even when a user blocked all access from that Mac using a firewall. This wasn’t in tune with Apple’s traditional security stance. What made this worse is that when those apps (and there were 56 in all) did access the ‘Net, user and network traffic monitoring applications were unable to monitor this use.

To read this article in full, please click here

Read more

The strangest cybersecurity events of 2020: a look back

Credit to Author: David Ruiz| Date: Thu, 31 Dec 2020 16:00:14 +0000

In a year of unbridled strangeness, these are the strangest cybersecurity events that made us collectively say: “Wait… seriously?”

Categories: Security world

Tags:

(Read more…)

The post The strangest cybersecurity events of 2020: a look back appeared first on Malwarebytes Labs.

Read more

How to stay as private as possible on the Mac

Credit to Author: Jonny Evans| Date: Mon, 23 Nov 2020 09:29:00 -0800

Apple believes in your right to privacy. Here is some advice on how to use the privacy tools it provides on your Mac. We have a guide for iPhones and iPads here.

Use a strong passcode

To secure your Mac, all your data, and your privacy it is essential to create a strong alphanumeric login password.

The temptation to use something short or easy to remember is completely understandable, but if your Mac goes missing your life is on show, so visit Security & Privacy>General and tap Change Password to pick something more challenging.

To read this article in full, please click here

Read more

HP printer issue on Mac: What happened?

Credit to Author: Thomas Reed| Date: Thu, 29 Oct 2020 17:30:24 +0000

Last week, many Mac users received a ‘malware’ warning on their screens when trying to access their HP printer. Here’s what happened.

Categories:

Tags:

(Read more…)

The post HP printer issue on Mac: What happened? appeared first on Malwarebytes Labs.

Read more

Apple's T2 Mac security chip may be vulnerable, researcher claims

Credit to Author: Jonny Evans| Date: Tue, 06 Oct 2020 06:49:00 -0700

A security researcher claims to have figured out how to break the T2 security chip on modern Intel-based Macs using a pair of exploits developed to jailbreak older phones. Apple has not commented on these claims.

What the research claims

The claim seems to be that because the T2 chip is based on the older A10 series Apple processor, it is possible to use two jailbreak tools (Checkm8 and Blackbird) to modify the behavior of T2, or even install malware to the chip.

It’s not an easy hack: Not only must an attacker have local access to the Mac, but they must connect to the target Mac using a non-standard “debugging” USB-C cable and run a version of a jailbreaking software package during startup.

To read this article in full, please click here

Read more