How 'Bout Them Apples?

A lot of people ask us if Apple devices are immune to hackers. Unfortunately not—all apples can spoil, including Apple iPhone’s, iPads, and Macs. We’ll give credit where credit is due, Apple has invested a great deal in security and their track record shows it. However, it’s not perfect and we’re seeing more and more instances creep up.

Case in point, last week Apple released a software update for iPhones (iOS) and Mac computers (macOS) which fixed a flaw in their WiFi chips. This security flaw gave hackers the ability to take over an Apple device if in wireless range.

If you haven’t updated your Apple device software, do it now!

Apple does work hard to keep security strong. One way is by reviewing and approving every single application before it is put on the App Store. This process helps avoid a 3rd party app developer releasing a malicious game or application. A great concept in theory, but Symantec reported cyber criminals were been able to sneak fake shopping apps into the App Store right before the holiday season. Shortly after, they were able to update the apps with malware—after the application was already approved.

Hackers figured out a process to bypass Apple's stringent approvals and we’re sure they’ll keep trying—after all, they’re known to always be one step ahead!

Ransomware made the spotlight with the huge releases of WannaCry and Petya affecting millions of computers worldwide.  If you missed it, check out our cover article. The truth is, Apple devices are not protected from all ransomware. In a recent UK report, cyber criminals touted ransomware that targeted Apple owners available on the dark web. Cybersecurity researchers were able to obtain a copy and confirmed that it was in fact ransomware for Apple devices that successfully encrypted files and locked out users. 

In today’s world, we shouldn’t expect that any device is secure or perfecteven an Apple device.

As an organization it's important to build a program of framework, culture, and technology:

  • Ensure you are prepared with an incident response plan, just in case you do experience a breach.
  • Develop a cybersecurity culture and train your team on how to avoid phishing emails and other cyberattacks.
  • Protect all devices—including your Apple devices—with state of the art antivirus and advanced malware protection.

Also, if you are storing sensitive data on your iPhone, consider introducing a mobile management solution. One that allows you to lock and wipe remotely in case of loss or theft—yours and your employees, from one central location.

One thing we know for sure... an apple a day won’t keep the hackers away!

Stay Safe,
Your Friends @ Launch Security

 

Subscribe to the Launch Security Blog: Cybersecurity in 60 Seconds