S3 Ep68: Bugs, scams, privacy …and fonts?! [Podcast + Transcript]
Credit to Author: Paul Ducklin| Date: Thu, 03 Feb 2022 16:20:49 +0000
Latest episode – listen now!
Read moreCredit to Author: Paul Ducklin| Date: Thu, 03 Feb 2022 16:20:49 +0000
Latest episode – listen now!
Read moreCredit to Author: Jonny Evans| Date: Tue, 01 Feb 2022 06:01:00 -0800
Apple has introduced a new layer of protection to its existing two-factor authentication (2FA) system, making it a little harder for phishing attacks to successfully steal valuable authentication credentials.
Given that Apple, PayPal, and Amazon were the top three brands used for successful phishing attacks last year, according to a recent Jamf report, this matters.
Phishing is a huge problem. The scale of these attacks shot up during the pandemic. The FBI Internet Crime Report 2020 revealed that phishing attacks affected 241,342 victims in 2020, up from 114,702 in 2019, with adjusted losses of more than $54 billion. Verizon’s 2021 Data Breach Investigations Report confirmed that 36% of data breaches that year involved phishing.
Credit to Author: Jonny Evans| Date: Thu, 27 Jan 2022 08:34:00 -0800
“Apple will become the number one device ecosystem in the enterprise by the end of this decade,” Jamf CEO Dean Hager told me while introducing an in-depth enterprise security trends report that enterprises should look at.
The nature of enterprise IT is rapidly becoming multiplatform. Jamf recently shared some details concerning the rapid growth in Apple device deployments it is seeing in business. For example, it now has 60,000 active customers, up from 36,000 two years before that – and believes new services such as Apple Business Essentials will help maintain this growth.
Credit to Author: Jonny Evans| Date: Wed, 12 Jan 2022 09:43:00 -0800
Every time Apple attempts to inject a little more privacy into the digital world, it faces pushback – but the evidence suggests opponents would be better off going along for the ride.
Take Do Not Track for ads and the move to quash IDFA tracking in iOS 14. When Apple first announced its plan, critics across the ad industry complained it would damage their business.
Apple counter-argued that it would simply inspire advertisers to think more creatively about how to reach customers — while also providing more privacy to those customers.
Credit to Author: Christopher Boyd| Date: Thu, 27 Jan 2022 11:43:49 +0000
![]() | |
A researcher discovered a way to gain control of both webcams and any open session in Safari. How did they do it? Categories: Exploits and vulnerabilities Tags: ApplemacOSpopupsafariURIurlUXSS |
The post Apple fixes Mac bug that could have allowed takeover of webcams and browser tabs appeared first on Malwarebytes Labs.
Read moreCredit to Author: Paul Ducklin| Date: Thu, 27 Jan 2022 21:09:53 +0000
That infamous “supercookie” bug in Safari has now been fixed. Oh, and there was a zero-day kernel hole as well.
Read moreCredit to Author: Evan Schuman| Date: Fri, 07 Jan 2022 03:04:00 -0800
Apple has a rather complicated relationship with privacy, which it always points to as a differentiator with Google. But delivering on it is a different tale.
Much of this involves the definition of privacy. Fortunately for Apple’s marketing people, “privacy” is the ultimate undefinable term because every user views it differently. If you ask a 60-year-old man in Chicago what he considers to be private, you’ll get a very different answer than if you asked a 19-year-old woman in Los Angeles. Outside the US, privacy definitions vary even more. Germans and Canadians truly value privacy, but even they don’t agree on what they personally consider private.
Credit to Author: Jonny Evans| Date: Thu, 06 Jan 2022 07:45:00 -0800
With the latest Microsoft Defender for Endpoint (MDE) preview for iOS, Microsoft has taken another step that should make life easier for IT administrators who need to secure remote iOS devices at the endpoint.
The MDE preview includes a new capability to install Defender for Endpoint remotely and automatically on any devices enrolled in the service. The company first announced its intention to deliver the feature last month.
In practice, this seems relatively friction-free.
Credit to Author: Malwarebytes Labs| Date: Wed, 26 Jan 2022 17:14:15 +0000
![]() | |
A highly criticized new antitrust bill is on its way to the full Senate after a Senate committee approved it. Categories: Security world Tags: AICOAamazonAmerican Innovation and Choice ActAmy Klobucharantitrust billantitrust lawAppleChuck GrassleyDavid CicillineGoogle |
The post Senate Committee passes new antitrust bill aimed at Big Tech companies appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jonny Evans| Date: Fri, 13 Mar 2020 06:26:00 -0700
If you or your employees are working from home while our governments lurch awkwardly through the current crisis, then there are several security considerations that must be explored.
Enterprises must consider the consequences of working from home in terms of systems access, access to internal IT infrastructure, bandwidth costs and data repatriation.
What this means, basically, is that when your worker accesses your data and/or databases remotely, then the risk to that data grows.
While at normal times the risk is only between the server, internal network and end user machine, external working adds public internet, local networks and consumer-grade security systems to the risk mix.