Apple security hampers detection of unwanted programs

Credit to Author: Thomas Reed| Date: Tue, 24 Nov 2020 16:59:39 +0000

Recent moves by Apple signal a potentially difficult future on macOS, where antivirus developers will have to play by increasingly limiting rules.

Categories: Mac

Tags:

(Read more…)

The post Apple security hampers detection of unwanted programs appeared first on Malwarebytes Labs.

Read more

How to stay as private as possible on the Mac

Credit to Author: Jonny Evans| Date: Mon, 23 Nov 2020 09:29:00 -0800

Apple believes in your right to privacy. Here is some advice on how to use the privacy tools it provides on your Mac. We have a guide for iPhones and iPads here.

Use a strong passcode

To secure your Mac, all your data, and your privacy it is essential to create a strong alphanumeric login password.

The temptation to use something short or easy to remember is completely understandable, but if your Mac goes missing your life is on show, so visit Security & Privacy>General and tap Change Password to pick something more challenging.

To read this article in full, please click here

Read more

HP printer issue on Mac: What happened?

Credit to Author: Thomas Reed| Date: Thu, 29 Oct 2020 17:30:24 +0000

Last week, many Mac users received a ‘malware’ warning on their screens when trying to access their HP printer. Here’s what happened.

Categories:

Tags:

(Read more…)

The post HP printer issue on Mac: What happened? appeared first on Malwarebytes Labs.

Read more

Apple's T2 Mac security chip may be vulnerable, researcher claims

Credit to Author: Jonny Evans| Date: Tue, 06 Oct 2020 06:49:00 -0700

A security researcher claims to have figured out how to break the T2 security chip on modern Intel-based Macs using a pair of exploits developed to jailbreak older phones. Apple has not commented on these claims.

What the research claims

The claim seems to be that because the T2 chip is based on the older A10 series Apple processor, it is possible to use two jailbreak tools (Checkm8 and Blackbird) to modify the behavior of T2, or even install malware to the chip.

It’s not an easy hack: Not only must an attacker have local access to the Mac, but they must connect to the target Mac using a non-standard “debugging” USB-C cable and run a version of a jailbreaking software package during startup.

To read this article in full, please click here

Read more

Current trends in Mac security threats

Credit to Author: Jonny Evans| Date: Mon, 05 Oct 2020 06:24:00 -0700

Current trends involving Mac threats indicate that while attempts are on the rise, users remain the first line of defense — particularly as “show up when you want to” (SUWYWT) becomes the future of work.

The security risk remains

In the first few weeks of the pandemic, we saw multiple businesses invest in VPN software and new hardware as they equipped employees to work from home. In the UK, for example, Starling Bank claimed it purchased every available MacBook as the pandemic struck.

Now that working from home (WFH) is normalized, there’s a need to take stock of security concerns and remind employees of good security procedure on all platforms, including Macs. Apple’s platform seems to have enjoyed incredibly strong sales as companies upgraded for WFH, but even with better inherent security those Macs must also be protected.

To read this article in full, please click here

Read more

Apple’s notarization process fails to protect

Credit to Author: Thomas Reed| Date: Mon, 31 Aug 2020 16:54:31 +0000

Apple introduced the concept of notarization to ensure any new software submitted to the App Store is malware-free. But is it all for show?

Categories:

Tags:

(Read more…)

The post Apple’s notarization process fails to protect appeared first on Malwarebytes Labs.

Read more