News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Apple malware on the rise
Apple malware on the rise

In its annual Security 360 report for 2023, Jamf shows that malware threats to Apple systems continue to increase. The study examined 15 million desktop computers, tablets and smartphones in 90 countries and with different operating systems (macOS, iOS/iPad, Android and Windows). The results are concerning: companies overall are very poorly positioned to respond to today's often sophisticated cybersecurity threats. The analysis in the report is based on real Jamf customer data, advanced threat research and relevant industry insights. Sample with…

Read more

Critical vulnerability in Apple devices
B2B Cyber ​​Security ShortNews

Apple recently released a software update for iOS and iPadOS 15.6.1 to fix a zero-day kernel vulnerability identified as CVE-2022-32917. This critical vulnerability in Apple devices allows code execution with kernel privileges. Lookout explains how. Apple is aware of a report mentioning active exploitation of the vulnerability in the wild. This vulnerability could allow a maliciously crafted application to execute arbitrary code with kernel privileges. This CVE could affect Apple iPhone, iPad and iPod Touch models, meaning anyone using one of these devices will have their device immediately…

Read more

Malware in business apps spies on Facebook accounts
B2B Cyber ​​Security ShortNews

According to Facebook, or rather its parent company Meta, it has found over 400 malware-infected Android and iOS apps in the Google and Apple stores. The apps should tap and forward Facebook access data. Interesting: Meta also found many malicious business or ad management apps. This year, Meta security researchers found more than 400 malicious Android and iOS apps designed to steal Facebook credentials and compromise people's accounts. These apps were listed in the Google Play Store and Apple's App Store and classified as games, VPN services, business apps...

Read more

Apple iOS16 Feature: Passwordless Access with Passkeys
B2B Cyber ​​Security ShortNews

Apple introduced the new iOS16 and announced an exciting new feature: Passwordless Access with Passkeys. This is the first time that public keys have been introduced for security. An explanation of the technique with commentary from Okta. The industry has always known that public key encryption is a more secure alternative to passwords. However, no one has managed to make their use easy enough to achieve widespread adoption - until now. Passkeys use public-key cryptography and FIDO2 authentication, making them essentially phishing-proof while maintaining the same level of...

Read more

New Apple security feature: lockdown mode 

Apple has announced a new protection mechanism for particularly exposed users. Lockdown Mode promises a high level of security for specific users who, because of their person or work, may be personally targeted by sophisticated digital threats. The NSO Group (Pegasus Spyware) and other private companies involved in the development of government-sponsored spyware often undetected threaten a small target group of important or high-level users. Therefore, Apple offers a new security mode: Enabling lockdown mode in iOS 16, iPadOS 16 and macOS Ventura further strengthens device defenses and restricts…

Read more

Lookout: Turned off iPhones remain vulnerable
B2B Cyber ​​Security ShortNews

iPhones can be vulnerable to threats even when they're turned off, researchers at the Technical University of Darmstadt have found. iPhone function FindMy remains active even when the smartphone is switched off and the processor can be addressed. A comment from Lookout. “Modern mobile devices are extremely complicated and consist of many different computer processors. In general, smartphone users interact the most with the Application Processor (AP) and the Baseband Processor (BP). These processors run most of the operating system and calling functions. However, there are numerous additional processors in the phones, such as B. the Secure Enclave processor…

Read more

Jamf invests in new security features
Jamf invests in new security features

Apple device management software provider Jamf is investing in new security features. These help organizations protect sensitive data, comply with company guidelines and give employees seamless access to information. To this end, Jamf publishes a passwordless authentication workflow, brings a simplified compliance solution to the market and continues to research security threats for Apple devices. Secure access to workplace applications Stolen or compromised passwords are a serious security threat. IT administrators try to combat this with strict password guidelines. However, strong passwords have the disadvantage that they are difficult for users to remember. Not least because of this, employees often use passwords ...

Read more

Update against security vulnerabilities in iOS
G Data News

Two critical security gaps in iOS devices threaten users - Apple even warns of attacks and offers an update to 14.4. Tim Berghoff from G DATA classifies the incident. Apple is currently warning of an actively exploited security gap in its iOS operating system - this means that attacks are already taking place against users. The security holes can be found in the kernel and in Apple's own “Webkit” technology, which is used to display Internet pages. The Webkit vulnerability can also be exploited remotely. All iPhone devices from version 6 are affected. Apple recommends ...

Read more

Apple wrongly classified Shlayer
Kaspersky_news

Apple accidentally notarized the adware malware Shlayer so that it was not blocked for macOS users. Last year, the Shlayer Trojan attacked one in ten macOS users, as Kaspersky's annual analysis for 2019 shows. At 14 percent, German users were the second most affected by the Shlayer family of trojans internationally. Comment by Kaspersky's expert Anton V. Ivanov “According to our telemetry, Shlayer is the most widespread macOS threat in 2019; Over the past year, our solutions have prevented Shlayer Mac attacks on at least one in ten devices. It is important to emphasize ...

Read more