Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay

A new family of Mac malware that spreads through pirated versions of Final Cut Pro, Photoshop, and other key creative apps has been identified by the Threat Labs team at Jamf.

The new XMRig threat is a subtle cryptocurrency mining attack that has evaded detection for months.

Piracy is bad karma, but good crypto

XMRig proliferates by attaching itself to pirated copies of creative applications, including versions of Final Cut Pro, Logic Pro X, and Adobe Photoshop. That’s the kind of “knock-off” Mac application you frequently find being distributed across peer to peer networks.

To read this article in full, please click here

Read more

EU parliamentary committee says 'no' to EU-US data privacy framework

The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended that the European Commission reject the proposed EU-US Data Privacy Framework, which would govern the way in which the personal information of EU citizens is handled by US companies.

The committee’s decision — formally, a draft motion for a resolution— represents a rejection of the European Commission’s recommendation, announced in December, that the data privacy framework should be adopted. The recommendation stated that US law now offers an “adequate” level of protection for the personal data of EU users of US companies’ services.

To read this article in full, please click here

Read more

Three zero-days require urgent attention for Windows, Exchange

Read more

Security tool adoption jumps, Okta report shows

Identity and access management (IAM) vendor Okta today released a report detailing app use and security trends among its broad user base. Among other trends it identified, the report found that zero trust security policies have become more common, and uptake of a wide range of security tools has been sharply on the rise.

Okta survyed 17,000 customers globally, and found that zero trust usage among its  clients has increased from 10% two years ago to 22% today, indicating both that the philosophy is more popular than ever, and that a wide swathe of the market is still there to be captured, according to the report.

To read this article in full, please click here

Read more

Download: UEM vendor comparison chart 2023

Credit to Author: ,| Date: Wed, 15 Feb 2023 03:00:00 -0800

Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.

As remote and hybrid work models have become the norm over the past two years, “mobility management” has come to mean management of not just mobile devices, but all devices used by mobile employees wherever they are. UEM tools incorporate existing enterprise mobility management (EMM) technologies, such as mobile device management (MDM) and mobile application management (MAM), with tools used to manage desktop PCs and laptops.

To read this article in full, please click here

Read more

Enterprise mobility 2023: UEM meets DEX

If there was ever any doubt about the future of unified endpoint management (UEM) as a key component of enterprise mobility strategies, the now-permanent shift to hybrid and remote work models has sealed the deal. UEM has become a critical part of enterprise efforts to manage this complex environment.

Forrester Research’s 2022 Business Technographics Infrastructure Hardware Survey shows that 28% of infrastructure hardware technology decision makers will be investing in UEM over the next 12 months. “This is in line with previous years, so we continue to see stable growth in the UEM market,” says Andrew Hewitt, senior analyst at Forrester.

To read this article in full, please click here

Read more

How to use Apple’s advanced iCloud security tools

Apple recently rolled out new iCloud security features that could help protect mobile professionals when they’re on the road. The features include better iCloud data security, improved iMessage security, and more.

Here is how to use these new iCloud protections.

Secure your digital assets

No one should doubt that protecting personal or enterprise data has become more important than ever. Apple introduced Lockdown Mode for iCloud in 2022, following this up with even more protections in December and, most recently, introducing free privacy and security sessions in Apple retail stores in 2023.

To read this article in full, please click here

Read more

The best Android password managers

Protecting your online accounts is more important now than ever — and in spite of some recent high-profile hacks, relying on a third-party password manager is still the easiest and most effective way to ensure your most important credentials remain secure.

Why? It’s simple: Reusing passwords puts you at a heightened risk for hacking. If someone discovers your password at just one website — via any sort of breach, be it large-scale or targeted — they can then use that same password to crack into your accounts at countless other places. It happens all the time.

To read this article in full, please click here

Read more

Qualys now supports macOS in its cloud security tools

Qualys, sometimes described as one of the pioneering SaaS vendors, has bent with the times to begin offering Mac support within its cloud security offering.

A pioneer in SaaS goes Mac

Since it launched in 1999, Qualys has traditionally offered its services to PCs, mobile devices, and cloud-native applications. The company’s original 2000 product, QualysGuard, was distinguished as one of the first to market vulnerability management tools.

To read this article in full, please click here

Read more

How to protect your privacy in Windows 11

From the moment Microsoft released Windows 10 in 2015, the new OS came under fire for the amount of private information it gathered from users by default. Over the years, the vendor gradually introduced changes to Windows 10 that alleviated some of those privacy concerns, but some remain — and most of those apply to Windows 11 as well.

Whether you think Windows 11 crosses the privacy line or just want to safeguard as much of your personal life as possible, we’re here to help. Here’s how to protect your privacy in just a few minutes.

To read this article in full, please click here

Read more