Apple has long been setting the bar extremely high when it comes to new tech – with their sleek look, innovative features and previously high level of security.
So what has changed?
The last few months have seen the tech giants make the headlines for all the wrong reasons.
In November a huge password flaw was discovered, which meant both Mac computers and iPhones, which were running the latest operating system, could be accessed without the need for a password.
Eventually, updates were released to solve the problem, but not before panic set in amongst some users.
There was also the irritating issue around the letter I which was, on some devices, autocorrected into a random character.
Earlier this month they also revealed that all iPhones, iPads and Mac computers were also affected by the Meltdown and Spectre bugs, which could allow hackers to steal data.
They released some patches to mitigate the flaw, despite finding no evidence that either vulnerability had been exploited yet. They also advised users to only but download software from trusted sources to avoid “malicious” apps.
The latest issue is the discovery of a new “text bomb” which is affecting both the iPhone and Mac computers.
A software developer, who found the flaw, revealed that it causes an iPhone to crash and on some occasions restart, while on some Mac computers the flaw causes the safari browser to crash and slow down other apps and software.
The problem, although described as “very annoying” is not anything users should be worried about.
“Something about the so-called ChaiOS bug’s code gives your Apple device a brainstorm,” said Security expert Graham Cluley, on his blog.
He added: “Ashamed about the mess it gets itself in, Messages decides the least embarrassing thing to do is to crash.
“Nasty. But, thankfully, more of a nuisance than something that will lead to data being stolen from your computer or a malicious hacker being able to access your files.”
All of that coupled with the revelation by Apple themselves, that they deliberately slow down old iPhone models means they face a battle to restore the faith and confidence of customers.
They admitting to slowing down some devices by using aging batteries, but claim it was to prolong the life of the phone.
To make up for the admission they reduced the price of out of warranty replacement batteries for customers with models of the iPhone 6 or later, from £79 to £25.
The Apple situation is further proof of just how damaging a cybersecurity flaw can be so what are you waiting for? Let us undertake a Vulnerability Assessment, to identify and quantify the risks to your systems.
Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.
Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims. GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.
In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.
WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.
The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.
With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets
In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.
A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.
On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.
A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.