Apple
Apple accuses UK gov't of ‘unprecedented overreach’ on privacy
In the name of security, the UK government may well have put a cybersecurity target on the nation’s back, with Apple once again warning that proposed changes to the Investigatory Powers Act 2016 are a “serious and direct threat to data security and information privacy.
“We are deeply concerned about the amendments to the Investigatory Powers Bill currently before Parliament, which will put the privacy and security of users at risk,” Apple said in a statement. “This is an unprecedented overreach by the government and, if implemented, the UK new user protections could be secretly vetoed globally, preventing us from ever delivering them to customers.”
Apple warns of “privacy and security threats” after EU requires it to allow sideloading
To comply with the EU’s Digital Markets Act, Apple will allow European iPhone owners to install apps obtained from outside the official App store.
Read moreUpdate now! Apple releases patch for zero-day vulnerability
Apple has released new security updates for several products including a patch for a zero-day vulnerability which may have been exploited.
Read moreSecurity tips for Apple-using workers in co-working spaces
For Apple-using workers on the go, especially if you frequent shared co-working spaces or public places, don’t assume you’re as secure as you think you are.
Co-working spaces are particularly under threat, in part because criminals have already figured out that the people using them are good targets for data theft, ransomware, and more.
They’ve also realized that at least some of those working from such spaces might well be part of, or connected with, larger corporate entities — meaning a successful data heist could unlock the gates to greater and more profitable kingdoms. There are useful resources from government and industry aimed at helping workers lock down their devices and data. In the US, for instance, the National Institute of Standards and Technology has published a useful guide to explain some of the risks, while the US Office of Personnel Management offered up even more useful advice.
Atomic Stealer rings in the new year with updated version
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.
Read moreApple to introduce new feature that makes life harder for iPhone thieves
Apple has plans to make it harder for iPhone thieves to steal your personal information even if they have your device’s passcode.
Read moreApple now requires a judge’s order to hand over your push notification data
Apple has changed its legal process guidelines so it now requires a judge’s order to hand over information about its customers’ push notifications.
Read moreApple now requires a judges order to hand over your push notification data
Apple has changed its legal process guidelines to reflect it now requires a judge’s order to hand over information about its customers’ push notifications.
Read moreWhat is Stolen Device Protection for iPhone and how does it work?
Take that, iPhone thieves — Apple is about to make it even more difficult to use its smartphones when you have no right to do so. In the upcoming iOS 17.3, it is testing out a new security system called “Stolen Device Protection.”
Here’s a look at what this is, and what it does.
Stolen Device Protection explained
Apple’s beta notes explain: “Stolen Device Protection adds an additional layer of security in the unlikely case that someone has stolen your iPhone and also obtained your passcode.”
The company explains the features this way:
- Accessing your saved passwords requires Face/Touch ID to be sure it’s you.
- Changing sensitive settings like your Apple ID password is protected by a security delay.
- No delay is required when iPhone is at familiar locations such as home and work.
The idea is that Stolen Device Protection introduces another obstacle that makes it difficult for thieves to gain access to your data, erase it, or delete the device to factory fresh status for resale.