Apple Taking Legal Action Against UK Over Backdoor Demands

Apple Taking Legal Action Against UK Over Backdoor Demands

Image: TheClimateGroup/Creative Commons (2014) Apple is taking legal action against the U.K. government over demands to weaken its strongest cloud security measures, arguing that compliance would jeopardize user privacy and set a dangerous precedence. The Cupertino giant has taken the case to the Investigatory Powers Tribunal, the U.K.’s judicial body responsible for handling complaints regarding the use of surveillance powers by public authorities. It is challenging the legality of the Home Office’s order under the…

Read More

Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users

Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users

In response to a U.K. government inquiry about access to data sequestered on Apple devices, Cupertino has removed access to the Advanced Data Protection encryption feature from U.K.-held devices. “We have never built a backdoor or master key to any of our products or services and we never will,” an anonymous Apple representative wrote in a statement emailed to TechRepublic. Must-read Apple coverage UK wants law enforcement to be able to access data on individual…

Read More

New Mac Malware Poses as Browser Updates

New Mac Malware Poses as Browser Updates

A new macOS malware called FrigidStealer is spreading through fake browser update alerts, allowing attackers to steal sensitive data, according to research from Proofpoint. This sophisticated campaign, embedded in legitimate sites, tricks users into bypassing macOS security measures. Once installed, the malware extracts browser cookies, stored passwords, cryptocurrency-related files, and Apple Notes – potentially exposing both personal and enterprise data. Two newly identified threat actors operate parts of these web-inject campaigns: TA2726, which may act…

Read More

UK Government Reportedly Demands Access to Encrypted iCloud Files

UK Government Reportedly Demands Access to Encrypted iCloud Files

The U.K.’s office of the Home Secretary has allegedly asked Apple to provide a backdoor into any material any user has uploaded to iCloud worldwide, The Washington Post reported on Feb. 7. Anonymous sources provided The Washington Post the information and expressed concerns about tech companies being leveraged for government surveillance. Apple has not commented; however, in March, the company provided a statement to Parliament on the occasion of receiving notice of a potential request,…

Read More

iOS 18.3.1 Release Expected Within the Next Few Weeks

iOS 18.3.1 Release Expected Within the Next Few Weeks

The first incremental update to Apple’s iOS 18.3 may drop next week, both 9to5Mac and MacRumors predict. Both sites monitor the devices used by their visitors to track waves of updates. It’s normal for Apple to release minor fixes after the launch of a new version, and iOS 18.3.1 is likely to include the same. However, the new release gained some unlikely buzz because of a TikTok rumor related to an optional satellite connectivity feature….

Read More

How to Lock Apps on iPad

How to Lock Apps on iPad

Does your organization utilize iPad apps for kiosk-style purposes, or have you ever needed to hand a device to someone else to use an app or enter information without giving them full access? Apple’s Guided Access accessibility feature is a solution for such scenarios that is built into iOS and iPadOS. Guided Access allows a user to lock a single app on the screen, preventing users from returning to the Home Screen, opening another app,…

Read More

Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others

Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others

December brought a relatively mild Patch Tuesday, with one vulnerability having been actively exploited. Of all 70 vulnerabilities fixed, 16 were classified as critical. “This year, cybersecurity professionals must be on Santa’s nice list, or, at the very least, Microsoft’s,” Tyler Reguly, associate director of security R&D at cybersecurity software and services company Fortra, told TechRepublic in an email. Microsoft patches leaky CLFS CVE-2024-49138 is an elevation of privilege vulnerability in the Windows Common Log…

Read More

Apple Patches Two Zero-Day Attack Vectors

Apple Patches Two Zero-Day Attack Vectors

Apple’s latest security updates for iOS, macOS, Safari, visionOS, and iPadOS contained brief but critical disclosures of two actively exploited vulnerabilities. The tech giant said Clément Lecigne and Benoît Sevens of Google’s Threat Analysis Group discovered the vulnerabilities. NIST lists the vulnerabilities as CVE-2024-44308 and CVE-2024-44309. What are the vulnerabilities Apple patched? Apple didn’t disclose much information about the exploitation or what attackers might have done using these vulnerabilities. However, the Threat Analysis Group works…

Read More

Patch Tuesday: Internet Explorer Vulnerabilities Patched

Patch Tuesday: Internet Explorer Vulnerabilities Patched

A breach in the engine behind Internet Explorer and a vulnerability in the Remote Desktop Protocol Service top the list of about 117 patches deployed in Microsoft’s monthly update. Around the same time, Apple has released a fix for macOS 15 that restores functionality to some third-party security tools. Patch Tuesday is a useful reminder for admins to ensure applications and security services are up to date. Microsoft Management Console vulnerability exploited Despite previous reports…

Read More

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point’s Harmony Email & Collaboration team detected over 5,000 emails disguised as Microsoft product notifications, which could lead to email extortion, the cybersecurity company said on Oct. 2. The emails stand out for their polished appearance and the inclusion of legitimate links. The announcement comes as part of Cybersecurity Awareness Month, highlighting the ongoing risks posed by phishing attacks. Email scam campaign stands out for polished appearance The emails come from “organizational domains impersonating…

Read More
1 2 3 4