WWDC22: Apple brings declarative device management to the Mac?

Credit to Author: Jonny Evans| Date: Mon, 06 Jun 2022 08:11:00 -0700

More opportunities for engineers and developers to implement declarative device management solutions are likely to emerge at WWDC 2022, at least, according to MacAdmins.

Speaking during the pre-event podcast, speakers argue that Apple will eventually require that all mobile device management (MDM)  providers introduce support for declarative management. Might this include bringing declarative device management to the Mac?

What is declarative device management?

Apple first introduced declarative device management last year, largely for two reasons: to make devices more proactive, and to reduce the impact on MDM servers that handle large fleets of devices. This should boost performance and scalability.

To read this article in full, please click here

Read more

Apple confirms the scale of App Store fraud

Credit to Author: Jonny Evans| Date: Thu, 02 Jun 2022 08:30:00 -0700

Apple says millions of fraudulent attempts are made against the App Store and its users each year. The company prevented $1.5 billion in fraudulent transactions in 2021, it said, in line with similar levels of fraud in 2020.

How people attempt to commit App Store fraud

The company explains how fraudsters attempt to commit fraud via the store.

To read this article in full, please click here

Read more

Why Industry 4.0 must think more like Apple

Credit to Author: Jonny Evans| Date: Tue, 31 May 2022 12:16:00 -0700

For industrial applications, the Internet of Things risks becoming the Internet of Thieves. Perhaps industries making use of connected solutions should take a leaf out the Apple book and lock down their infrastructure.

What the ethical hackers say

As digital processes become deeply embedded across every industry, it makes sense that industrial control systems were tested at this year’s Pwn2Own contest. Hackers were asked to seek out vulnerabilities in industrial software and systems.

Contest winners Daan Keuper and Thijs Alkemade found that once they managed to break into the IT networks used at these companies, it was “relatively easy” to then cause havoc with systems and equipment.

To read this article in full, please click here

Read more

AirTag stalking: What is it, and how can I avoid it?

Credit to Author: Christopher Boyd| Date: Tue, 17 May 2022 14:12:25 +0000

AirTag stalking is in the news as bills look to close loopholes used by stalkers. What are AirTags, and how can they be used to track people?

The post AirTag stalking: What is it, and how can I avoid it? appeared first on Malwarebytes Labs.

Read more

Europe puts Apple’s CSAM plans back in the spotlight

Credit to Author: Jonny Evans| Date: Thu, 12 May 2022 08:38:00 -0700

Apple may have put some of its plans to scan devices for CSAM material on hold, but the European Commission has put them right back in the spotlight with a move to force messaging services to begin monitoring for such material.

CSAM is emerging as a privacy test

In terms of child protection, it’s a good thing. Child Sexual Abuse Material (CSAM) is a far bigger problem than many people realize; victims of this appalling trade end up with shattered lives.

To read this article in full, please click here

Read more