Gizmologi.com
TRENDING
  • Buying Guides
  • Pixel 3 Review
  • Honor 8X Review
  • Android 9 Pie
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
  • News
  • Reviews
  • How To
  • Apps
  • Devices
  • Compares
  • Games
  • Photography
  • Security
SUBSCRIBE
  • Home
    • Home – Layout 1
    • Home – Layout 2
  • News
  • Reviews
  • How To
  • Apps
  • Devices
  • Compares
  • Games
  • Photography
  • Security
No Result
View All Result
Gizmologi.com
No Result
View All Result
Home News

Malware Attacks Found, Apple Mac No Longer Secure?

by Tim Editor
June 30, 2017
in News
0
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter

Apple devices that have been known more secure than Windows was vulnerable as well. Not long ago, the data security agency Fortinet reported that Apple Mac devices have become an attractive target for cyber-world attackers. That’s because of their growing popularity and demographics of their users.

C-suite executives and marketing teams are more likely to use Apple Mac devices. These individuals not only share valuable information but are often technically incomprehensible. Therefore, it is less likely to support their device, encrypt the stored data, or perform the best security measures.

New attack opportunities and threat vectors also make targeting Apple Mac devices easier and more attractive. For example, Fortinet FortiGuard Labs’ threat research team started looking at the development of hacking tools that targeted cross-compatible software.

In addition, it’s getting easier for cyber criminals to improve their operations on the Mac. Because of the emergence of cybercrime-as-a-service, cyber criminals have begun to build “franchises”. Instead of targeting the Mac one by one as in the past, these cyber-world cyber criminals can now leverage pre-built technology to attack large numbers of potential victims in return for profit sharing.

When ransom for one device may not be too profitable professional criminals, but having hundreds of franchises targeting thousands of devices every day is sure to bring you plenty of benefits. At the same time, such an opportunity attracts many small-scale players, such as lone-wolf hackers from their parents’ homes.

Aamir Lakhani, the Senior Security Strategist at Fortinet, says when it comes to security, the only thing constant is change, whether it’s how networks evolve or how these changes create new opportunities for criminals. “It’s important for companies to achieve security from a holistic perspective. This includes ensuring that every device is protected from all threat vectors, including Apple Mac devices that were once considered safe, “Aamir said.

 

Apple Mac devices lineup

How To Prevent Malware Attacks On Apple Mac Devices

In response to this wave of attacks, Fortinet recommends users of Apple Mac devices to take the following preventative measures:

  1. Apply patches and updates. Apple provides regular security updates. Users should make sure they take the time to implement it.
  2. Backup your device. Apple’s Time Machine service will automatically create a full system backup, which means that if a system gets a ransomware attack, one can easily clean up the device and perform an overall system recovery from backup. Regularly scan backups for vulnerabilities and keep these backups offline. Offline storage is very important because Time Machine backup systems are often constantly connected with supported devices, and are at risk of being compromised during attacks.
  3. Encrypt data stored in the device. While this may not be effective against the many variants of the ransomware it is still good because it can protect an organization if a device is infected with malware designed to steal files and data.
  4. Install an endpoint security partner. Look for an endpoint solution that not only protects your device but connects this security back to your network security strategy, enabling you to increase and share your threats intelligence to better protect your device and its assets.
  5. Spread security systems that protect against other threat vectors. Since email is still a major source of malware and infections, make sure the implementation of a strong email security solution. The same applies to network security devices, wired and wireless access control, cloud-based security, and network segmentation strategies that help detect, isolate, and respond to threats found in all distributed environments.



Source link

ShareTweetPin

Related Posts

ColorOS 15 Officially Debuts, Here Are Some Highlighted New Features
News

ColorOS 15 Officially Debuts, Here Are Some Highlighted New Features

November 27, 2024
First look at the new Android 9 “Pie” on the Samsung Galaxy S9
How To

First look at the new Android 9 “Pie” on the Samsung Galaxy S9

October 26, 2024
Google Pixel 3 camera bug brings back Nexus 5 nightmares
News

Google Pixel 3 camera bug brings back Nexus 5 nightmares

October 23, 2024
‘Fortnite’ named Ultimate Game of the Year at the Golden Joystick awards
Games

‘Fortnite’ named Ultimate Game of the Year at the Golden Joystick awards

October 22, 2024
News

Apple’s AI development is “two years late”, ready to take off next year

October 21, 2024
How to take a screenshot, edit, and share on the Galaxy S9 CAPTURE
How To

How to take a screenshot, edit, and share on the Galaxy S9 CAPTURE

October 18, 2024
Next Post

Lebaran 2017, Mobile Operator Harvesting Data Traffic Spike Up To 200%

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • 308 Followers

Recommended

Advan G9, Affordable Smartphone Brings Setup 4 Cameras & 4GB RAM

August 16, 2021

Targeting Premium Segment in Indonesia, Tech21 Release the Protective Case of the iPhone 7

February 17, 2017

GoTo announces IPO, expected to raise USD1.1 billion from investor

March 15, 2022

Tik Tok, Social Media Application for Music Video Enter Indonesia Market

September 20, 2017

Revealing Cinematographic Features on the “Video-centric” LG V30 Smartphone

September 9, 2017

UC News Record 100 Million Monthly Active Users in Indonesia and India

April 14, 2017
  • About
  • Advertise
  • Privacy & Policy
  • Contact

DISCLAIMER

This demo site is only for demonstration purposes to JNews WordPress theme.

© 2018 JNews. All right go to their respective owners.

No Result
View All Result
  • Homepages
    • Home – Layout 1
    • Home – Layout 2
  • Reviews
  • How To
  • Apps
  • Devices
  • Games

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Malcare WordPress Security