Apple Exec supports Mac Malware levels under oath

[ad_1]
Ransomware problem it does not improve. In fact, it is poised to get worse as cybercriminals have begun to experiment double encryption ransomware attacks. This works pretty well; victims pay a ransom to decrypt their files to find out that they have been encrypted by another type of malware at the same time. It’s a dirty trick, but if they’ve shown anything in recent weeks, it’s there these groups will not bend.
In more encouraging news, Google held its annual I / O Developers Conference this week. In between holograms and Wear operating system reviews the company has identified some important changes to how Android treats your privacy. The next version of Android 12 host of security and privacy featuressuch as a whiteboard, a microphone, and a dashboard that monitors which apps check which location data they check and when. Google is still an advertising company, but advances are advances.
Microsoft finally announced this week Internet Explorer end-of-life plan, yes, he is still kicking. We’ve looked at the security issues that the browser has created everywhere over the years and why it will continue for a while longer. And be Captcha brought you down? We’ve seen why they’ve hardened in recent years and how you can blur them out of these wonderful blurry blocks. We also cover you removal of these annoying pop-up cookies that you are across the network.
Lastly, make sure you save some time to read our in-depth feature 2011 RSA hack, the main moment of cybersecurity. The main participants — well, except for the Chinese spies behind the attack — are finally free from the agreements they don’t reveal, and they told their stories in full for the first time.
And there is more! We collect weekly news that WIRED did not cover in depth. Click on the titles to read the full story and stay safe.
The Apple-Epic lawsuit has not been without fireworks this week, especially this week Tim Cook’s testimony on Friday. But Craig Federighi, Apple’s vice president of software engineering — who has big hair — also caused a stir as to why the iOS App Store couldn’t afford a more open distribution model found on MacOS. “Currently, there is a level of malware on the Mac that we don’t find acceptable,” Federighi said, adding that 130 types of malware have been found on the Mac in the past year. some of which were quite successful.
The security issue has been central to Apple’s argument that it can’t open iOS to third-party app stores. But the answer is more complicated than it seems. Apple is in the process of reviewing the App Store, but external security experts have said it’s not enough to frustrate sophisticated malware and entry-level scams in general. Court documents showed that an Apple executive said the security of the App Store was like “taking a plastic butter knife to a shooting”. Apple’s best protections come from the iPhone itself, which is designed to minimize the damage that malware can do.
But it’s also true that the Mac’s malware problem is worse than it seems in the popular imagination, and while the App Store store review process is perfect, switching to a macOS model would put the user at greater risk. (It’s not an unlimited risk, though; Apple has many ways to control bad apps on desktops that would work the same on your phone or tablet.) As is often the case, the story is one of the trades, with many more nuances than many of them. storm and stress Apple and Epic’s PR machines have come out on top since this mess started.
Did we remember these new minimums of ransomware we were talking about? Here’s one. Just over a week ago, the Conti ransomware team hit the Irish national health service, known as the HSE. The result has been chaos, hospitals across the country have been disrupted and patient data hanging as extortion bait. This week, Contik said he will hand over the decryption key so health care providers can return to the business, but still demanded a $ 20 million ransom, threatening to sell or release patient data if the HSE fails to pay. (Emsisoft has also provided a more reliable tool for decrypting antivirus companies.)
[ad_2]
Source link