This week, both Apple and Microsoft issued patches to fix serious zero-day vulnerabilities that should be applied as soon as possible. That means that if you have an iPhone or iPad, you may want to plug your phone or iPad in and apply the newest iOS 15.0.2, which is what I just did as I
iPhone
Privacy Tip #283 – Apple Users: It’s Important to Update to iOS 14.5.1 ASAP
If you are on top of updating your iPhone patches when a new operating system is released by Apple, you probably updated your iOS to version 14.5 when Apple released it last week. However, even if you did update last week, it is important to update again this week to iOS 14.5.1, which Apple released…
Privacy Tip #282 – Apple’s New iPhone Privacy Controls
Once again, Apple is leading the pack on privacy and implementing new privacy controls, starting next week. What does this mean for you?
If you are an iPhone user, you will start seeing more pop-ups from apps asking you for permission to collect your data. Apple is requiring apps that it believes are collecting our…
iPhone Users Targeted by New Malware Campaign
Cisco Talos has discovered a new menace to iPhone users—a sophisticated malware campaign targeting iPhones to trick users into downloading an open-source Mobile Device Management (MDM) solution that gives the hackers control of the phone. It is reported that Cisco and Apple are working together to combat the threat.
According to reports, once the MDM…
Recent Supreme Judicial Court Decisions Highlight How Courts Must Embrace Technological Change
Courts are often faced with the dilemma of applying centuries, or even decades, old law to constantly evolving technological advancements. See, e.g., Transcript of Oral Argument, United States v. Microsoft, No. 17-2 (U.S. Feb. 27, 2018) (attempting to ascertain the relationship between the Stored Communications Act, a 1986 law, and modern cloud computing…
Third Circuit Holds Criminal Defendant in Contempt for Refusing to Decrypt Hard Drives
In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child pornography investigation.
During the investigation, the government seized the defendants’ property, including two iPhones, a MacBook Pro and…
The Truth in Mac Security
For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion.
Consumers pay a high premium for the slick and glossy Apple devices. Their superior brand has continued to sell and grow throughout the years. With each new release or upgrade, their developers have patched up security holes and weaknesses while managing to stay under the radar.
Apple products in the business world take up less than 4 percent, therefore they are less of a target for hackers to attack. Why develop a code for malware or a virus for a product that has such a small market share? Creating a Trojan virus that thrives in Windows code and spreads around a network of similar devices, is much more effective than attacking a lone device.
Continue Reading The Truth in Mac Security
iPhones Vulnerable to Pegasus—Update Your iPhone Now
Apple has issued an urgent warning to iPhone users about a crucial iOS update that is the only way to protect iPhones from “the extremely malicious Pegasus software.”
According to Apple, Pegasus can completely take over an iPhone and only 86 percent of iPhone users have updated their phones by installing the iOS version 9.3.5.…
Privacy Tip #44 – The flashlight app’s collection of your data
When you start needing longer arms to read restaurant menus in the candlelight, you might consider downloading a flashlight app to use with your reading glasses.
But before you download it, first be aware that your iPhone or Android have flashlights automatically installed. If you download a flashlight app, just be aware of what data…