Researcher reveals Mac privacy bug, blasts Apple for ‘security theater’

Venture Beast

A major security exploit in current versions of macOS allows malicious actors to clone Safari and use it to share private files, breaking Apple's security. Business Security Apple bypass category-/Computers & Electronics/Computer Security category-/Computers & Electronics/Software/Operating Systems Exploit Jeff Johnson MacOS privacy privacy protections Safari

Apple 55

Apple’s latest App Store and notarization problems reveal a giant seeking agility

Venture Beast

Are Apple's app approval systems evil or dumb? Business Dev Mobile Security App Store Apple approval category-/Computers & Electronics/Software category-/News category-/Science/Engineering & Technology malware Notarization Patrick Wardle

Agile 84

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

EvilQuest Mac ransomware impersonates Google, Apple OS processes

Venture Beast

A rare piece of Mac ransomware looks like extra CrashReporter or Google Software Update OS processes, but is actually locking up files for a paid ransom. Business Dev Enterprise Mobile Security category-/Computers & Electronics/Computer Security crashreporter digesh Devadoss evilquest google software update mac MacOS malware Malwarebytes Patrick Wardle ransom ransomware virus

Apple releases final iOS 13.5 with coronavirus exposure alert support

Venture Beast

Apple's latest iPhone OS release is now available to the general public with COVID-19-inspired features, along with Apple Watch, TV, iPad, and Mac updates. Mobile Security category-/Computers & Electronics/Consumer Electronics category-/Computers & Electronics/Software category-/Internet & Telecom/Mobile & Wireless/Mobile Phones contact tracing coronavirus exposure alerts exposure tracking iOS 13.5

Apple 82

Developments and Device Divergence at Apple’s WWDC

CTOvision

On June 2 nd , Mac nerds swarmed the keynote “ special event ” at Apple’s Worldwide Developers Conference in San Francisco – the annual trade show for Apple developers. While the event did not disappoint most Apple fans, the keynote demonstrated a new desktop operating system, OSX (nicknamed Yosemite), and an updated mobile operating system, iOS 8, without dropping any bombshells. Cyber Security Gadgets Mobile Apple iCloud iOS IPhone Macintosh OS X San Francisco

Apple 226

How To Free Recover Deleted Files On Mac Without Software

TechnoBezz

How To Free Recover Deleted Files On Mac Without Software. If you cannot find the icon there, click the Apple menu > System Preferences > Time Machine. Visit iCloud.com on your browser and sign in using your Apple ID. How To Recover Deleted Files On Mac With A Free Software. Using free Mac data recovery software can be your ultimate weapon to retrieve deleted files on. The software is completely free for up to 1 GB data for one system and it is secure.

Install Software without Jailbreaking

Galido

Jailbreaking is the act of changing iPhone (or iPad) software to remove the restrictions and limitations imposed by Apple. The limitation is that software can only be installed from the Apple Store. But what if you want to go around the Apple Store, or what if you want to install software without voiding iOS security and stability? While we know thank jailbreaking can get us around Apple limitations, there are cons you need to be aware of.

Multiple vulnerabilities patched by Apple

IT Manager Daily

Memory corruption presents a problem in Apple’s browsers and software. Threat: A security bug in Safari and a flaw in macOS High Sierra led to memory corruption issues. Fixes/Workarounds: Apple released an updated version of Safari (11.1) The post Multiple vulnerabilities patched by Apple appeared first on IT Manager Daily. Applications & Software In this week's e-newsletter IT Security Apple flaw software

Apple 40

Apple Issues Emergency Fix for iOS Zero-Days: What You Need to Know

Doctor Chaos

Apple has released an emergency security update for iOS devices to resolve three zero-day vulnerabilities leveraged in targeted attacks against human rights activists, journalists, and other persons of interest. Named Trident, the vulnerabilities were exploited by a piece of high-end surveillance software dubbed Pegasus, which researchers classify as “the most sophisticated attack seen on any […]. InfoSec Apple

Apple 100

Good Technology Acquires Fixmo Security Business

CTOvision

They have a great portfolio of technologies needed by enterprises today and are helping make mobile workforces more secure, agile and productive. I believe this acquisition by Good Technologies will result in a very significant enhancement in the ability of enterprises to secure their mobile users. Good Technology Acquires Fixmo Security Business. Good Technology ™, the leader in secure mobility, today announced it has completed the acquisition of certain assets of Fixmo Inc.,

Top 5 Software Development Trends in 2018

Galido

Information Technology Blog - - Top 5 Software Development Trends in 2018 - Information Technology Blog. So, let’s take a look at the software development trends in 2018. Even cybersecurity solutions will use machine learning and state-of-the-art security technologies. There will be a greater demand for managed and hosted security services as well as an increase in the response to incidents and the adoption of automated processes to detect threats.

Apple releases iOS 13.5.1, patching out the Unc0ver jailbreak

The Verge

Apple has released iOS 13.5.1 today, which the company says “provides important security updates and is recommended for all users,” albeit without much detail in the change log. But as noted by Twitter account Apple Software Updates , the update is meant to patch out the kernel vulnerability used by the recent Unc0ver jailbreak. allowing users of the latest Apple devices to install new software features outside of Apple’s gated App Store.

Microsoft hits out at Apple with its new Windows app store policies

The Verge

The software giant has published 10 principles it’s adopting as promises to app developers, including that it won’t block competing stores on the platform or block specific business models an app may use to make money. These new principles are a clear response to app store issues surrounding both Apple and Google — in particular, Epic Games’ ongoing legal battle with Apple. Microsoft makes clear its new app store policies are directed at Apple.

Apple’s AI plan: a thousand small conveniences

The Verge

Among the new AI features Apple announced at WWDC is hand washing detection for the Apple Watch. Image: Apple. But judging by its recent WWDC performance, Apple has adopted a smarter and quieter approach. Sprinkled throughout Apple’s announcements about iOS, iPadOS, and macOS were a number of features and updates that have machine learning at their heart. Native sleep tracking for the Apple Watch. Image: Apple.

Apple 85

Apple releases iOS 13.7 with support for new automatic COVID-19 notification system

The Verge

Apple on Tuesday released iOS 13.7, News of the new software framework was first announced earlier today in a joint statement from Apple and Google. Image: Apple. “As Illustration by Alex Castro / The Verge.

Google 101

7 Software Defined Networking Considerations » Data Center.

Data Center Knowledge

7 Software Defined Networking Considerations. 7 Software Defined Networking Considerations. The move toward software defined networks (SDN) in the data center is no longer a question of “if” or “when,” but “how.” Controllers will be a new line item in the IT budget, and it’s expected that VM vendors would want to control the vSwitch, rack, and core as a single unit with their software. Apple. About DCK. Advertise. Subscribe. Events. Industry Perspectives.

Apple says App Store appeals process is now live, so developers can start challenging decisions

The Verge

Apple on Monday announced that its new App Store appeals process, first revealed at WWDC in June , is now live, meaning developers can challenge Apple over whether their app is in fact violating one of its guidelines. Illustration by Alex Castro / The Verge.

10 essential elements of low-code software

mrc's Cup of Joe Blog

Potential low-code users find that comparing options is like comparing apples and oranges. Low-code development software has a problem. Since “low-code” is such a vague term, low-code software is all over the map. To make matters worse, software vendors slap the term on anything remotely related to low-code. Low-code software buyers must wade through a jumbled mess of options. They find that comparing options is like comparing apples and oranges.

#AppleVsFBI – #FBIVsApple – The Basics, Explained, With Links To Original Documents

CTOvision

This post provides an update on the ongoing battle between Apple and the U.S. On February 9, 2016, FBI Director James Comey announced that the FBI was unable to unlock the iPhone and requests Apple to help. Apple concluded it could not help to the extend required to access the phone data. After attempting to resolve the matter out of court, Apple was ordered by U.S. 25 th , Apple filed a motion to have the court vacate the order. Bob Gourley.

eSentire Secures $19.5 Million to Expand its Elite Cybersecurity Services

CTOvision

a proven industry leader in managed cybersecurity services, today announced that it had secured a total investment of $19.5 The equity investment will enable the company to scale and strengthen its presence in key markets, launch security operations in new geographies as well as verticals, and expand its early success in cloud-based threat intelligence harvesting, sharing and automated protection. What's Apple Want With an Old Maxim Fab? Katie Kennedy.

Photograph Leak Demonstrates Importance of Good Hygiene

CTOvision

The Washington Post , The New York Times , and The Wall Street Journal have dedicated front-page links to the story, in a press wave that will contribute to the public’s increasing exposure to cybersecurity concepts and the growing importance of information security. Several news sources have reported that the photos were stolen from iCloud, Apple’s cloud service for storing media and documents. By Shannon Perry.

Apple surprise: iOS 10 preview's kernel unencrypted

Network World

While new iOS 10 features like improved Maps, Siri integration and Photos were expected during Apple's Worldwide Developers Conference last week, the company stunned developers by leaving the kernel unencrypted in the preview edition of its new iPhone and iPad software. MIT Technology Review first reported on this revelation, discovered by security researchers and iOS developers, who were left wondering whether Apple did this on purpose or goofed up big time.

Apple 79

Smart Watches: Stylish Data Storage or Big Security Risk?

CTOvision

The latest trends are watches, like the Apple Watch , which lets you listen to music, talk to your friends, and read your mail, or the ReVault , which lets you carry up to 128 GB of data on your wrist, and access it from your laptop, phone, or even a server. While these devices look great, and provide cool technical features, they also represent considerable security risk. Apple Watch dominates competition in Consumer Reports test (cultofmac.com). Photo from Revault.io

Apple update fixes iOS 14 issue with default mail and browser apps

The Verge

Today, Apple has taken care of that with its first updates for the iPhone and iPad, bringing them up to 14.0.1. The Apple Watch will also update to 7.0.1. If your phone hasn’t notified you about the update yet, you can find it by going to Settings > General > Software Update. You can find listings of Apple’s security updates on its support site Photo by Jon Porter / The Verge.

New security features coming to macOS and iOS

IT Manager Daily

Apple recently announced a variety of security and privacy features it’ll be bringing to macOS Mojave and iOS 12 in the near future. The post New security features coming to macOS and iOS appeared first on IT Manager Daily. Applications & Software In this week's e-newsletter Latest News & Views Apple iOS IT Security Mac

The Software Defined Data Center Meets Disaster Recovery » Data.

Data Center Knowledge

The Software Defined Data Center Meets Disaster Recovery. The Software Defined Data Center Meets Disaster Recovery. The concept of the software-defined data center (SDDC) rose to prominence during VMworld 2012, with VMware touting it as the next big leap forward in information technology management. The term refers to an IT facility where the networking, storage, CPU and security are virtualized and delivered as a service. Apple. About DCK. Advertise. Subscribe.

How the CEOs of Apple, Google, Amazon, and Facebook plan to defend Big Tech today

The Verge

Ahead of the antitrust hearing that’s due to take place later today , the opening statements from the CEOs of Apple, Google, Amazon, and Facebook have been published on the House Judiciary Committee’s website. Apple does not have a dominant market share in any market where we do business.

The Big Tech antitrust report has one big conclusion: Amazon, Apple, Facebook, and Google are anti-competitive

Vox

A long-awaited report from top Democratic Congressional lawmakers about the dominance of the four biggest tech giants had a clear message on Tuesday: Amazon, Apple, Facebook, and Google engage in a range of anti-competitive behavior, and US antitrust laws need an overhaul to allow for more competition in the US internet economy. “To Apple. Epic wanted to avoid the 30 percent fee Apple charges for such in-app purchases.

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Hear from one of our Security Training Architects, Bob Salmans, below and see why he loves working at Linux Academy. Security Training Architect. I create training courses related to information security. Prior to coming to Linux Academy, I was a security engineer at an MSP/MSSP. There, I worked with clients to perform penetration testing, risk assessments, incident response, and to increase the security of their infrastructures.

Apple opens up its network of iPhones to help you find Tile-like lost gadget trackers

The Verge

Apple plans to extend its Find My network for locating real-world devices to third-party companies, the iPhone maker announced this afternoon during its State of the Union developer address following today’s WWDC keynote. Soon, Apple says compatible devices — including those without internet connectivity — will be able to sync to the network and become locatable when you open the Find My app. Photo by Vjeran Pavic / The Verge.

Apple’s App Store fees are ‘highway robbery,’ says House antitrust committee chair

The Verge

30 percent is unconscionable,” says Congressman David Cicilline Apple is acting like a monopolist and a bully, according to the chairman of the House antitrust subcommittee. Earlier this week, Heinemeier Hansson revealed that Apple had rejected the Hey iPhone app from the App Store because it didn’t offer any way to sign up and pay in the app itself — which would require giving Apple a 30 percent cut of the fee. The timing of all this couldn’t be worse for Apple.

Apple 82

FORALLSECURE LAUNCHES THE HACKER MIND PODCAST

ForAllSecure

ForAllSecure has launched an original podcast focused on hackers that’s available on Apple and Google (with more options to come). Autonomous Security Continuous Fuzzing Software Security Podcast

Apple 52

Apple and Google look like problematic heroes in the pandemic

Vox

Apple and Google’s contact-tracing tool has better privacy, but it isn’t perfect. Apple and Google are a month away from launching a series of updates to their smartphone operating systems that will use Bluetooth signals to track potential coronavirus cases. Will Apple and Google’s joint effort to fight the virus have unintended consequences? When the contact-tracing tool was announced, there was no indication that the software required to make it work would be temporary.

Tools 52

Applying the Laws of Science to the Internet of Things and Healthcare IT

CTOvision

Accountable Care Organizations); Apple HealthKit’s Role in mHealth. Taking into account all the recent hype about Apple’s products, it’s appropriate to analyze Apple’s impact on mHealth. Cyber Security Health IT The Future Apple Big Data HealthKit Internet of Things mHealth Morgan Stanley SoftServe Today, “Internet of Things” (IoT) is shouted at every corner, both in the business and private spheres.

With iOS 14, Apple is finally letting the iPhone home screen get complicated

The Verge

Apple is finally allowing the home screen on iOS 14 to become complicated. Apple waited until literally the 14th version of iOS to change the paradigm for the home screen, so it must think these options are worthwhile. (By Offering complexity as an option is a tricky thing, but I think Apple has landed upon a good balance. There are four main ways that Apple is adding complication. But Apple added something new and unexpected here: checkboxes.

Apple patches iOS against potent zero-day spyware attack

Network World

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others. The attack, called Pegasus, is flexible, letting attackers steal a broad range of data from iPhones and iPads, according to the firms that discovered it. “In

7 Disruptions You Might Not See Coming

CEB IT

For example, Google bought Android to compete with Apple’s iPhone and iOS. For example, Apple created the iPhone, which cannibalized, to a large degree, its iPod market, but paved the way for better, more wide-ranging market opportunities like photography, personal navigation and even augmented reality. CIOs should consider potential security issues as well as new data ownership policies.

How to secure Google Drive

TechnoBezz

Google Drive is like cloud storage and is similar to One Drive (Microsoft) and iCloud (Apple). Data stored in the Drive may be corrupted or deleted if the app’s security is messed up with. This article will show you two ways in which you can secure Google Drive. As the debate on data security has been ensuing, the two-step authentication has been popularized over the years. Tap on the ‘Security’ tab. The other options are: Using a security key.

WWDC: Apple Continues to Up the Ante on Experience with Privacy Leading

Forrester's Customer Insights

Apple continues to leverage its engineering chops to deliver better experiences. Experiences are faster, more nimble, private, secure, personal and more. Apple is: Leveraging privacy as a differentiator across devices, software and services. This includes Apple’s foray into Identity. It is doing more processing locally, storing more data locally and giving consumers not only more […]. customer experience mobile moments privacy

Cybersecurity Protocols to Implement in an Always-Connected Workforce

CTOvision

The problem with being able to access your data from anywhere, though, is that other people can find ways to access that data, too—people you don’t want going through customer information, company financial records, and other secure data. Security provider Blue Coat reports that the average data breach costs an organization $10,000, with some breaches being more commonly reported in the tens of millions. Install malware protection software. Carol M. Evenson.

A new $500,000 iOS bug bounty beats Apple's offer

Network World

A security firm is offering up to US$500,000 for information on zero-day vulnerabilities in iOS, surpassing Apple's bug bounty just days after it was announced. These zero-days are software flaws that have gone undetected by Apple, making them potentially very valuable, especially for cyber criminals who can use them to hack iPhones.

Apple 60

Apple and Google want to turn your phone into a Covid-tracking machine

Vox

Just when you were wondering why the world’s biggest tech companies weren’t doing more to fight the coronavirus pandemic, Apple and Google made a big announcement: They are joining forces to build an opt-in contact-tracing tool using Bluetooth technology that could help public health officials track the spread of Covid-19, the disease caused by the novel coronavirus. Apple and Google say that the new contact-tracing tool will work between iPhones and Android phones.)

Tools 63

iOS 14 has been circulating among security researchers and hackers since at least February

TechSpot

Apple has historically kept a tight lid on hardware and software during development. Such secrecy is needed to protect its IP from the competition and makes the eventual unveiling all the more special for the audience