Regístrese ahora para una mejor cotización personalizada!

Why quickly patching your iPhones and Macs is more important than ever

Abr, 13, 2022 Hi-network.com

Apple products are secure and don't get malware or hacked.This is a dangerous myth that continues to circulate despite being total garbage.

Recommends

The best security key

While robust passwords help you secure your valuable online accounts,hardware-based two-factor authentication takes that security to the next level.

Read now

In fact,the number of vulnerabilities in Apple's products is rapidly catching up with companies like Google and Microsoft.

A report by Atlas VPN (based on data from Telefonica Tech Cybersecurity) shows how vulnerabilities found in Apple products surged by 467% during the second half of 2021 to 380 exploits, a dramatic rise from the 67 uncovered during the first half of 2021.

In fact, this puts the number of vulnerabilities found in Apple products in the latter six months of 2021 a stone's throw away from the top generators of vulnerabilities -- Google (511 vulnerabilities) and Microsoft (428 vulnerabilities).

Companies with the most vulnerabilities in 2021 H1 and H2

Atlas VPN/Telefonica Tech

According to the report, a good chunk of Apple's vulnerabilities seems to relate to the Safari web browser and its various operating systems, while the majority of Microsoft's vulnerabilities are associated with Windows OS versions, Office tools, and the Microsoft Edge browser, while Google's vulnerabilities are mostly focused around the Android operating system and the Chrome browser.

So, what does this mean for Apple users?

First, let go of the perilous myth that your Apple gadgets are immune to hacking and malware.

They're not invulnerable.

Next, get serious about patching youriPhones , Macs , iPads , and otherApple products .

Do it quickly, and check for any updates you might have missed often.

Finally, be aware of when your Apple products stop being supported by security updates. Once this point is reached, your devices can start to collect vulnerabilities at a rapid pace. As painful as it is, having an eye on replacing obsolete devices is essential to securing your digital information.

Apple

Unlock the best new features in iPhone 15, iOS 17, and Apple Watch with these tipsiOS 17: The most impactful new iPhone features are also the ones you'll notice the leastNew iPhone 15 models compared: iPhone 15 vs. Plus vs. Pro vs. Pro MaxOne subtle (but important) reason to buy the iPhone 15 Pro instead of the iPhone 14 Pro
  • Unlock the best new features in iPhone 15, iOS 17, and Apple Watch with these tips
  • iOS 17: The most impactful new iPhone features are also the ones you'll notice the least
  • New iPhone 15 models compared: iPhone 15 vs. Plus vs. Pro vs. Pro Max
  • One subtle (but important) reason to buy the iPhone 15 Pro instead of the iPhone 14 Pro

tag-icon Etiquetas calientes: tecnología Nuestro proceso seguridad

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.