How Apple users can protect themselves against Spectre and Meltdown

Credit to Author: Jonny Evans| Date: Fri, 05 Jan 2018 06:26:00 -0800

Apple has confirmed that all Macs, iPhones, iPads and other devices (bar Apple Watch) are vulnerable to the newly-revealed Spectre and Meltdown Intel, ARM and AMD processor vulnerabilities.

What’s the problem?

Taking advantage of a vulnerability that has been around for 20-years, Meltdown and Spectre exploit a CPU performance feature called “speculative execution”. Speculative execution exists to improve computer speed by enabling the processor to work on multiple instructions at once, sometimes in non-sequential order.

To read this article in full, please click here

Read more

Apple acts as digital transformation hits panic mode

Credit to Author: Jonny Evans| Date: Thu, 04 Jan 2018 08:03:00 -0800

Apple is updating its systems against newly revealed Spectre and Meltdown vulnerabilities, but it’s not enough to update personal devices – what about older PCs and the millions of servers that may also be vulnerable to the bug?

The bigger picture

The Spectre and Meltdown bugs are causing lots of distress. Meltdown impacts Intel processors, while Spectre appears to threaten chips from AMD and ARM as well. A good explanation of these vulnerabilities is here.

To read this article in full, please click here

Read more

How to securely erase an iPhone in just 3 steps

Credit to Author: Michael deAgonia| Date: Wed, 20 Dec 2017 03:00:00 -0800

There are two main scenarios in which erasing an iPhone is called for: Either you’re getting a new phone, or the one you have is having problems.

The most common reason involves iPhone owners who trade up to newer models, usually in the fall after Apple unveils its latest line-up. Let’s say you buy the new iPhone X and then plan to trade in or sell your older iPhone 7; you’ll need to make sure your data is no longer present once the old phone leaves your possession.

To read this article in full, please click here

Read more

Apple and Cisco just improved security in the iOS enterprise

Credit to Author: Jonny Evans| Date: Fri, 15 Dec 2017 06:47:00 -0800

Apple and Cisco have struck yet another blow for enterprise IT. They know that iOS is the most secure mobile solution, but that’s not everything because mobile threats are incredibly complex these days.

The enigma code

Here’s a scenario: You work in an enterprise with perhaps 1,000 other employees. One morning, perhaps 50 of you woke to find an authentic-seeming email in your in-box that requests you click on a link to update some system related to the work you do. While many employees remembered not to click on that link, a small number did click. No one thought too much of the email — spam is frequent and most just thought the mail was aimed at them.

To read this article in full, please click here

Read more

How Apple’s Safari browser can save your Christmas

Credit to Author: Jonny Evans| Date: Wed, 13 Dec 2017 05:24:00 -0800

While I see online ads as a necessary evil if you want to keep websites in business, I’m so annoyed at the way the latest ads services seem so focused on ruining everybody’s Christmas surprise.

The ads Grinch stole Christmas

This is what happens: Ads sites track where you go online; retailers track you too and all this information is shared. Look at an item online, see an ad for it on the next page you go to. Not only is this behavioural retargeting vastly creepy, but when it comes to Christmas these things make it impossible to keep secrets, particularly on a shared Mac. Been looking at [insert name of hot new obsessive teenage-focused product here] with a view to buying one to gift your child? Don’t be too upset if said child gets onto your computer to check their Bitcoin investment only to find themselves staring at ads for the object of their desire. Kids aren’t stupid – they know how ads work online (even if we don’t). What’s happened? Your Christmas surprise is spoiled and your teenager won’t believe in Santa Claus any more, even if they are looking for a flat Earth shadow during the next eclipse.

To read this article in full, please click here

Read more

Apple’s HomeKit security blunder exposes the risk of smart homes

Credit to Author: Jonny Evans| Date: Fri, 08 Dec 2017 06:42:00 -0800

The expression “safe as houses” will become a thing of the past if tech firms don’t get connected home security right, and the need to be incredibly watchful was visible in Apple’s latest security blunder this week.

Not so ideal home

The latest iOS 11.2 update held a zero-day vulnerability attackers could exploit to control smart home devices, including connected locks, 9to5Mac explains. While the vulnerability was difficult to exploit, and Apple has acted very swiftly to close this security gap, its existence exposes the risk of smart homes.

To read this article in full, please click here

Read more

Strong and stable: The iOS security guide

Credit to Author: Jonny Evans| Date: Fri, 17 Nov 2017 08:36:00 -0800

Apple’s smartphones are highly secure, but if your private or enterprise data matters to you, it’s essential to ensure your iPhone (or iPad) is as secure as possible.

Why security matters

Just because almost all mobile malware targets Android doesn’t mean iPhone users can be complacent.

Quite the reverse:

We need to be even more alert in case attackers use complacency against us. What follows are a few simple tips to help you secure your iPhone (and iPad).

There’s no way to deny that iPhones are in the ascendant, particularly in enterprise IT. Beyond business, you’ll see them used by educators, doctors, police and politicians and in each one of those cases the information on those smartphones is confidential and must not be abused.

To read this article in full, please click here

Read more