Cyber Defense News
Maybe one day every platform will be as secure as Apple
A look at the Biden Administration’s recently updated National Cybersecurity Strategy document seems to reflect some of the approaches to cybercrime Apple already employs. Take privacy, for example. The proposal suggests that privacy protection will no longer be something big tech can argue against – companies will be required to prioritize privacy. That’s fine if you run a business that does not require wholesale collection and analysis of user information, which has always been Apple’s approach. The best way to keep information private, the company argues, is not to collect it at all.To read this article in full, please click here
Read more...
For Apple’s enterprise success, endpoint management is the new black
Yet more data shows the acceleration of Mac adoption in the business world.Okta’s recent Businesses at Work 2023 report shared numerous insights into the state of enterprise IT. One in particular grabbed my attention: endpoint management and security tools have become the most popular category of security product across the enterprise, with some players achieving really significant growth, partly on the back of their Mac support.The data: Jamf Pro has seen 428% customer growth across the last four years, while smaller vendor Kandji experienced a 172% increase in its customer base in just the last year.To read this article in full, please click here
Read more...
Microsoft Intune Suite consolidates endpoint management and protection
Microsoft has launched the general availability of Microsoft Intune Suite, a consolidation of its endpoint management and security solutions to streamline protection for cloud-connected and on-premises endpoints. The consolidation is aimed to serve as a single vendor for all endpoint security needs for the customers to have single analytics, rather than multiple disparate datasets, with a consistent visibility to potential vulnerabilities and anomalies, according to a company blog post.To read this article in full, please click here
Read more...
Apple’s MFi scheme for USB-C is a good thing
Apple appears poised to make it more difficult to use cheap USB-C cables with its devices, and while it may well make a few dollars more from the purported plan, there are also good reasons to put the system in place.Apple got to make a dollar or two
The claim is that Apple plans to replace Lightning ports and cables with USB-C in the iPhone 15, and when it does it will introduce a Made For iPhone (MFi) scheme for such products. The idea is that consumers will be able to purchase cables and other devices in full confidence that they will be compatible with their iPhone.To read this article in full, please click here
Read more...
Software bugs that bug me – and how to swat them down
Nearly every day, software updates of some kind roll out for our systems. From operating systems to antivirus software, to cloud services, to hardware devices, virtually none of the technology we use is static. And with these updates come side effects and problems that sometimes take a while to get fixed.I recently found an interesting bug that hasn’t gotten a lot of attention when I purchased a Lexmark multi-function printer. As part of the installation process, I went online to download the latest printer driver. (I always recommend going to a vendor website to grab the latest drivers because, after all, the latest software should have the latest fixes, right?) I was able to set up the printer to print, scan, and electronically fax and figured I was done for the day.To read this article in full, please click here
Read more...
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
A new family of Mac malware that spreads through pirated versions of Final Cut Pro, Photoshop, and other key creative apps has been identified by the Threat Labs team at Jamf.The new XMRig threat is a subtle cryptocurrency mining attack that has evaded detection for months. Piracy is bad karma, but good crypto
XMRig proliferates by attaching itself to pirated copies of creative applications, including versions of Final Cut Pro, Logic Pro X, and Adobe Photoshop. That’s the kind of "knock-off" Mac application you frequently find being distributed across peer to peer networks.To read this article in full, please click here
Read more...
EU parliamentary committee says 'no' to EU-US data privacy framework
The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended that the European Commission reject the proposed EU-US Data Privacy Framework, which would govern the way in which the personal information of EU citizens is handled by US companies.The committee's decision — formally, a draft motion for a resolution— represents a rejection of the European Commission’s recommendation, announced in December, that the data privacy framework should be adopted. The recommendation stated that US law now offers an “adequate” level of protection for the personal data of EU users of US companies’ services.To read this article in full, please click here
Read more...
Three zero-days require urgent attention for Windows, Exchange
Microsoft's February Patch Tuesday update deals with 76 vulnerabilities that affect Windows, Exchange, Office, and Microsoft development tools — and three Windows vulnerabilities (CVE-2023-21823, CVE-2023-21715 and CVE-2023-23376) have been reported as exploited in the wild and require immediate attention.To read this article in full, please click here
Read more...
Security tool adoption jumps, Okta report shows
Identity and access management (IAM) vendor Okta today released a report detailing app use and security trends among its broad user base. Among other trends it identified, the report found that zero trust security policies have become more common, and uptake of a wide range of security tools has been sharply on the rise.Okta survyed 17,000 customers globally, and found that zero trust usage among its clients has increased from 10% two years ago to 22% today, indicating both that the philosophy is more popular than ever and that a wide swathe of the market is still there to be captured, according to the report.To read this article in full, please click here
Read more...
Download: UEM vendor comparison chart 2023
Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.As remote and hybrid work models have become the norm over the past two years, “mobility management” has come to mean management of not just mobile devices, but all devices used by mobile employees wherever they are. UEM tools incorporate existing enterprise mobility management (EMM) technologies, such as mobile device management (MDM) and mobile application management (MAM), with tools used to manage desktop PCs and laptops.To read this article in full, please click here
Read more...