Security News
We and our store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning.
The second-ever Apple Rapid Security Response just came out. The last point above is surprisingly important, given that Apple absolutely will not allow you to uninstall full-on system updates to your iPhones or iPads, even if you find that they cause genuine trouble and you wish you hadn't applied them in the first place.
As a consequence, this is the last version of Firefox that users on those operating systems will receive. From next month, if you're stuck with computers that can only run older, unsupported versions of Windows and macOS, you'll automatically be switched over to the Firefox ESR version.
There are best practices you can follow to secure your Mac and protect yourself against hack attempts. In this article, we'll cover some of the ways to protect yourself and show you how to make your Mac as secure as possible against hackers and those who would try to collect your data.
In a previous TechRepublic article, I wrote about how you can customize and maintain Apple IDs on multiple devices; but, what about using multiple Apple IDs on the same Mac within the same user account? This comes in handy when using two Apple IDs: one for personal use and another for business purposes. There are several reasons why you might want to use two Apple IDs on the same Mac.
Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. Apple addressed the three zero-days in macOS Ventura 13.4, iOS and iPadOS 16.5, tvOS 16.5, watchOS 9.5, and Safari 16.5 with improved bounds checks, input validation, and memory management.
Determining the applications that can access data on your Mac is easier thanks to Apple including the Full Disk Access menu within its Privacy & Security System Settings. Not all of those programs necessarily require full disk access - that is, permissions to read, write and execute files stored throughout your Mac's hard disk - all the time.
The malware peddlers' focus on Apple fans was clearly reflected in the name they gave their "Product": Atomic macOS Stealer, or AMOS for short. Well-informed Mac users should spot that the popup produced clearly belongs to the malware app itself, which is imaginatively called Setup.
Finally, we learned about some ransomware attacks, with an NCR outage confirmed to be ransomware and Capita confirming that data was stolen in a cyberattack. The LockBit ransomware gang has created encryptors targeting Macs for the first time, likely becoming the first major ransomware operation to ever specifically target macOS. The LockBit ransomware comes for macOS A technical analysis of the LockBit macOS encryptor April 17th 2023 Ex-Conti members and FIN7 devs team up to push new Domino malware.
LockBit has developed ransomware that can encrypt files on Arm-powered Macs, said to be a first for the prolific cybercrime crew. "As much as I can tell, this is the first Apple's Mac devices targeting build of LockBit ransomware sample seen," MHT tweeted over the weekend.