• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Why Apple products are more vulnerable than ever to security threats
Security

Why Apple products are more vulnerable than ever to security threats

August 23, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Why Apple products are more vulnerable than ever to security threats
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


As the biggest technology company in the world, hitting a market value of $2.6 trillion, you’d be forgiven for thinking that Apple’s position was unassailable. However, the discovery of two-new zero-day vulnerabilities suggests that the provider might be more vulnerable to threat actors than previously thought.  

Last week, on August 17, Apple announced that it had discovered two zero-day vulnerabilities for iOS 15.6.1 and iPadOS 15.6.1. The first would enable an application to execute arbitrary code with kernel privileges, the second would mean that processing maliciously crafted web content may lead to arbitrary code execution. 

With adoption of macOS devices in enterprise environments steadily increasing, and reaching 23% last year, Apple’s products are becoming a bigger target for enterprises. 

Traditionally, the wider adoption of Windows devices has made them the number one target for attackers, but as enterprise usage of Apple devices increases due to the pandemic-accelerated remote-working movement, threat actors are going to spend more time targeting Apple devices to gain initial access to environments, and enterprises need to be prepared. 

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

So how bad is it really? 

These newly discovered vulnerabilities, which Apple reports are being “actively exploited,” allow an attacker to remotely deploy malicious code, which would allow an attacker to break into an enterprise network. 

See also  Open source security gets a boost with new scorecard and best practices

“A compromised personal device could result in initial access to the corporate environment. Defenders should push patches out immediately and send notifications that employees should be patching any personal iPhones, iPads, or Macs,” said Rick Holland, CISO at digital risk protection provider Digital Shadows. 

The problem is that security teams can’t update employees’ devices the way they could on-site resources, and with the line between work and personal devices becoming increasingly blurred, it’s becoming more difficult to guarantee that all infrastructure is adequately maintained.  

“Even if you can patch the corporate devices, you can’t update all the personal devices employees might use,” said Holland. 

When considering that the lines between work and personal devices have become increasingly blurred in this era of hybrid working, with 39% of workers using personal devices to access corporate data, any employees using Apple devices to access key resources could be putting regulated data at risk. 

As a result, even organizations that don’t use Apple devices on-site can’t guarantee they’re protected against these vulnerabilities. 

The answer: Patching 

In response to the new Apple vulnerabilities, CISOs and security leaders need to verify that all on-site and remote, personal devices have the necessary patches. Failure to do so could leave an entry point open for an attacker to exploit. 

The most effective way to remediate the risk of these new vulnerabilities is not only by using mobile device management solutions to help push updates to connected devices remotely, but to focus more on educating employees on the risks of failing to patch personal devices. 

See also  Report: 55% of apps available on Google Play share user data

“These updates present a security awareness opportunity to discuss the risks to employees’ lives and provide patching instructions, including how to enable automatic updates,” Holland said.

Source link

Apple products security threats vulnerable
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Xiaomi’s Smart Band 8 Pro is a cheap and easy way to track health, control media and get notifications in an Apple Watch-style design

March 26, 2024

Bitdefender Total Security review

March 6, 2024

Avast Premium Security review

March 6, 2024

Apple Vision Pro review

February 17, 2024
Add A Comment

Comments are closed.

Editors Picks

PomaBrush review

February 8, 2023

Ubisoft is pulling online support for more older titles on PC and consoles

July 10, 2022

Avoid These 10 Common Writing Mistakes To Build Your Twitter Audience

June 19, 2023

Twitter shares essentially the most tweeted about video games throughout 2022 to this point

July 13, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.