<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>permission &#8211; Latest Apple News</title>
	<atom:link href="https://www.latest-apple-news.com/tag/permission/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.latest-apple-news.com</link>
	<description>You can stay up-to-date on all the latest news, trends, and updates from the world of Apple. Our website is dedicated to bringing you the most comprehensive and reliable coverage of everything Apple, from the latest iPhone models to the newest Mac releases.</description>
	<lastBuildDate>Mon, 03 Jun 2024 13:57:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.latest-apple-news.com/wp-content/uploads/2023/05/cropped-pngwing.com_-32x32.png</url>
	<title>permission &#8211; Latest Apple News</title>
	<link>https://www.latest-apple-news.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Apple&#8217;s Ecosystem: A Cornerstone of Apple&#8217;s Success and a Model for the Future</title>
		<link>https://www.latest-apple-news.com/2024/10/14/apples-ecosystem-a-cornerstone-of-apples-success-and-a-model-for-the-future/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Sun, 13 Oct 2024 23:32:40 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[appealing]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[Approachh2]]></category>
		<category><![CDATA[audience]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Bind]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[commitment]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[companys]]></category>
		<category><![CDATA[comprehensive]]></category>
		<category><![CDATA[conclusion]]></category>
		<category><![CDATA[conscious]]></category>
		<category><![CDATA[consistent]]></category>
		<category><![CDATA[consistently]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[Continuity]]></category>
		<category><![CDATA[controls]]></category>
		<category><![CDATA[convenient]]></category>
		<category><![CDATA[cornerstone]]></category>
		<category><![CDATA[deepening]]></category>
		<category><![CDATA[documents]]></category>
		<category><![CDATA[eco-friendly]]></category>
		<category><![CDATA[ecofriendly]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[ecosystems]]></category>
		<category><![CDATA[effortless]]></category>
		<category><![CDATA[effortlessly]]></category>
		<category><![CDATA[encourages]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[end-to-end]]></category>
		<category><![CDATA[energy-efficient]]></category>
		<category><![CDATA[energyefficient]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[environmentally]]></category>
		<category><![CDATA[experience]]></category>
		<category><![CDATA[Experiencestrongh3]]></category>
		<category><![CDATA[facilitates]]></category>
		<category><![CDATA[fast-paced]]></category>
		<category><![CDATA[fastpaced]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[functionalities]]></category>
		<category><![CDATA[future]]></category>
		<category><![CDATA[futuremore]]></category>
		<category><![CDATA[h2Conclusionh2]]></category>
		<category><![CDATA[h2Ecosystem]]></category>
		<category><![CDATA[h2Services]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[Harmony]]></category>
		<category><![CDATA[Harmonystrongh3]]></category>
		<category><![CDATA[Hub]]></category>
		<category><![CDATA[Hubstrongh3]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[individual]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[initiatives]]></category>
		<category><![CDATA[Initiativesstrongh3]]></category>
		<category><![CDATA[innovative]]></category>
		<category><![CDATA[inspiration]]></category>
		<category><![CDATA[integrate]]></category>
		<category><![CDATA[integrating]]></category>
		<category><![CDATA[integration]]></category>
		<category><![CDATA[interconnected]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Interoperability]]></category>
		<category><![CDATA[intuitive]]></category>
		<category><![CDATA[meticulously]]></category>
		<category><![CDATA[More]]></category>
		<category><![CDATA[Morestrongh3]]></category>
		<category><![CDATA[one-stop-shop]]></category>
		<category><![CDATA[onestopshop]]></category>
		<category><![CDATA[Openness]]></category>
		<category><![CDATA[Opennessstrongh3]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[platforms]]></category>
		<category><![CDATA[positions]]></category>
		<category><![CDATA[practices]]></category>
		<category><![CDATA[prioritize]]></category>
		<category><![CDATA[priority]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[provides]]></category>
		<category><![CDATA[recycling]]></category>
		<category><![CDATA[reflected]]></category>
		<category><![CDATA[responsible]]></category>
		<category><![CDATA[satisfaction]]></category>
		<category><![CDATA[seamless]]></category>
		<category><![CDATA[seamlessly]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Securitystrongh3]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[strongApple]]></category>
		<category><![CDATA[strongHardware]]></category>
		<category><![CDATA[strongiCloud]]></category>
		<category><![CDATA[strongInteroperability]]></category>
		<category><![CDATA[strongPrivacy]]></category>
		<category><![CDATA[strongSeamless]]></category>
		<category><![CDATA[strongSustainability]]></category>
		<category><![CDATA[strongUnified]]></category>
		<category><![CDATA[sustainability]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Systemsstrongh3]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[third-party]]></category>
		<category><![CDATA[thirdparty]]></category>
		<category><![CDATA[together]]></category>
		<category><![CDATA[trailblazer]]></category>
		<category><![CDATA[transition]]></category>
		<category><![CDATA[unified]]></category>
		<category><![CDATA[unparalleled]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=62209</guid>

					<description><![CDATA[In the fast-paced world of technology, Apple has consistently stood out as a trailblazer, not just for its sleek hardware ]]></description>
										<content:encoded><![CDATA[<p>In the fast-paced world of technology, Apple has consistently stood out as a trailblazer, not just for its sleek hardware and innovative software but also for its ecosystem. The seamless integration of Apple devices, software, and services has become a cornerstone of the company&#8217;s success, setting a high standard for the industry. This article explores the key elements that make up Apple&#8217;s ecosystem and delves into why it has become a model for the future.<span id="more-62209"></span></p>
<h2>The Apple Ecosystem: A Holistic Approach</h2>
<h3>1. <strong>Hardware Harmony</strong></h3>
<p>At the heart of Apple&#8217;s ecosystem lies its meticulously designed hardware. Whether it&#8217;s the iPhone, iPad, Mac, Apple Watch, or AirPods, each device is crafted to work seamlessly with others. This harmony not only enhances user experience but also encourages users to invest in multiple Apple products, deepening their integration into the ecosystem.</p>
<h3>2. <strong>Unified Operating Systems</strong></h3>
<p>Apple&#8217;s ecosystem is powered by unified operating systems — iOS, iPadOS, macOS, watchOS, and tvOS. This common thread ensures a consistent user experience across devices. Users can effortlessly transition from their iPhone to their MacBook, with a familiar interface and shared functionalities, creating a sense of continuity that is unparalleled.</p>
<h2>Services that Bind</h2>
<h3>3. <strong>iCloud: The Digital Hub</strong></h3>
<p>iCloud is the glue that holds the Apple ecosystem together. It seamlessly syncs data across devices, ensuring that photos, documents, and app data are always up to date. This not only provides a convenient backup but also facilitates a smooth transition when moving from one Apple device to another.</p>
<h3>4. <strong>Apple Music, TV, and More</strong></h3>
<p>Beyond hardware and operating systems, Apple&#8217;s ecosystem extends to a suite of services. Apple Music, Apple TV+, Apple Arcade, and Apple News+ are designed to integrate seamlessly into the user experience. This not only keeps users within the ecosystem but also positions Apple as a one-stop-shop for entertainment, news, and more.</p>
<h2>Ecosystem Benefits for Users</h2>
<h3>5. <strong>Seamless User Experience</strong></h3>
<p>The real strength of Apple&#8217;s ecosystem lies in the effortless user experience it offers. Handoff features, Continuity Camera, and AirDrop are just a few examples of how Apple devices work in harmony, making the transition between them fluid and intuitive.</p>
<h3>6. <strong>Privacy and Security</strong></h3>
<p>Apple has made privacy a priority, and this commitment extends across its ecosystem. With end-to-end encryption, biometric authentication, and app permission controls, users can trust that their data is secure. This focus on privacy has become a significant selling point for Apple products.</p>
<h2>A Model for the Future</h2>
<h3>7. <strong>Interoperability and Openness</strong></h3>
<p>While Apple&#8217;s ecosystem is known for its closed ecosystem, recent moves toward interoperability with third-party devices and services signal a shift. This newfound openness allows Apple users to enjoy the benefits of the ecosystem while still integrating with other platforms, making it a more appealing model for a broader audience.</p>
<h3>8. <strong>Sustainability Initiatives</strong></h3>
<p>Apple&#8217;s commitment to sustainability is also reflected in its ecosystem. From energy-efficient devices to recycling programs, the company is setting a standard for environmentally conscious practices. As sustainability becomes a more critical aspect of consumer choices, Apple&#8217;s ecosystem serves as a model for a responsible and eco-friendly tech future.</p>
<h2>Conclusion</h2>
<p>Apple&#8217;s ecosystem has evolved into a comprehensive and interconnected ecosystem that goes beyond individual devices. Its success lies not only in the quality of its products but also in the seamless integration and user experience it provides. As technology continues to advance, other companies may find inspiration in Apple&#8217;s approach to create ecosystems that prioritize user satisfaction, privacy, and sustainability. The Apple ecosystem, with its hardware, software, and services working in harmony, stands as a beacon guiding the way for the future of technology.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Privacy Initiatives: Strengthening data protection measures and user privacy controls</title>
		<link>https://www.latest-apple-news.com/2024/08/10/apple-privacy-initiatives-strengthening-data-protection-measures-and-user-privacy-controls/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Fri, 09 Aug 2024 23:48:29 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[ahead]]></category>
		<category><![CDATA[Aheadstrong]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[balancing]]></category>
		<category><![CDATA[boundaries]]></category>
		<category><![CDATA[challenge]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[collecting]]></category>
		<category><![CDATA[Collection]]></category>
		<category><![CDATA[commitment]]></category>
		<category><![CDATA[commodity]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[complexity]]></category>
		<category><![CDATA[conclusion]]></category>
		<category><![CDATA[considerations]]></category>
		<category><![CDATA[cross-app]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[Designstrong]]></category>
		<category><![CDATA[discourse]]></category>
		<category><![CDATA[empowering]]></category>
		<category><![CDATA[enhancing]]></category>
		<category><![CDATA[environment]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explicitly]]></category>
		<category><![CDATA[exploring]]></category>
		<category><![CDATA[fostering]]></category>
		<category><![CDATA[functionalities]]></category>
		<category><![CDATA[fundamental]]></category>
		<category><![CDATA[harvesting.]]></category>
		<category><![CDATA[harvestingli]]></category>
		<category><![CDATA[hindering]]></category>
		<category><![CDATA[implemented]]></category>
		<category><![CDATA[implementing]]></category>
		<category><![CDATA[In]]></category>
		<category><![CDATA[individual]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[industry's]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[ingrained]]></category>
		<category><![CDATA[initiatives]]></category>
		<category><![CDATA[inspiration]]></category>
		<category><![CDATA[introduced]]></category>
		<category><![CDATA[intrusive]]></category>
		<category><![CDATA[landmark]]></category>
		<category><![CDATA[landscape]]></category>
		<category><![CDATA[landscapemore]]></category>
		<category><![CDATA[liLimited]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[liOndevice]]></category>
		<category><![CDATA[liTransparency]]></category>
		<category><![CDATA[manifests]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[minimizing]]></category>
		<category><![CDATA[navigating]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[nevertheless]]></category>
		<category><![CDATA[On-Device]]></category>
		<category><![CDATA[patchwork]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[personalized]]></category>
		<category><![CDATA[philosophy]]></category>
		<category><![CDATA[policymakers]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[potential]]></category>
		<category><![CDATA[practices]]></category>
		<category><![CDATA[practicesli]]></category>
		<category><![CDATA[prioritizing]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy-conscious]]></category>
		<category><![CDATA[privacy-focused]]></category>
		<category><![CDATA[privacyconscious]]></category>
		<category><![CDATA[Privacyfocused]]></category>
		<category><![CDATA[privacyli]]></category>
		<category><![CDATA[privacystrong]]></category>
		<category><![CDATA[privilege]]></category>
		<category><![CDATA[processed]]></category>
		<category><![CDATA[processing]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Protectionstrong]]></category>
		<category><![CDATA[purposes]]></category>
		<category><![CDATA[purposesli]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[restricted]]></category>
		<category><![CDATA[significantly]]></category>
		<category><![CDATA[strongapproach]]></category>
		<category><![CDATA[strongChallenges]]></category>
		<category><![CDATA[strongConclusionstrong]]></category>
		<category><![CDATA[strongLandmark]]></category>
		<category><![CDATA[strongPrioritizing]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[trackingli]]></category>
		<category><![CDATA[translating]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[transparent]]></category>
		<category><![CDATA[triggered]]></category>
		<category><![CDATA[unnecessary]]></category>
		<category><![CDATA[unnoticed]]></category>
		<category><![CDATA[unwavering]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerabilitiesli]]></category>
		<category><![CDATA[ways:]]></category>
		<category><![CDATA[waysstrong]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=61511</guid>

					<description><![CDATA[In an era where personal data is a valuable commodity, Apple has emerged as a leading advocate for user privacy. ]]></description>
										<content:encoded><![CDATA[<p>In an era where personal data is a valuable commodity, Apple has emerged as a leading advocate for user privacy. Their commitment goes beyond mere lip service, translating into concrete initiatives that empower users and challenge industry norms. This article delves into Apple&#8217;s privacy efforts, exploring the key measures they&#8217;ve implemented and their impact on the broader tech landscape.<span id="more-61511"></span></p>
<p><strong>Prioritizing Privacy by Design:</strong></p>
<p>Apple&#8217;s philosophy hinges on &#8220;privacy by design,&#8221; meaning privacy considerations are ingrained into every product and service from the outset. This approach manifests in<strong> several ways:</strong></p>
<ol>
<li>On-device processing: Whenever possible, data is processed directly on users&#8217; devices, minimizing the need for it to be sent to external servers, thus reducing potential vulnerabilities.</li>
<li>Limited data collection: Apple strives to collect only the data necessary for core functionalities, avoiding unnecessary data harvesting.</li>
<li>Transparency and control: Users are given clear and concise information about how their data is used and have granular controls over who can access it and for what purposes.</li>
</ol>
<p><strong>Landmark Initiatives for Enhanced Protection:</strong></p>
<p>Several Apple initiatives have significantly impacted the tech industry&#8217;s <strong>approach to privacy:</strong></p>
<ul>
<li>App Tracking Transparency (ATT): Introduced in iOS 14.5, ATT requires apps to explicitly ask users for permission to track their activity across other apps and websites. This landmark feature puts users in control and has significantly restricted intrusive cross-app tracking.</li>
<li>Mail Privacy Protection: This iOS 15 feature prevents email senders from collecting information about when and where users open their emails, hindering email tracking practices.</li>
<li>Sign in with Apple: This alternative login method allows users to sign in to apps and websites without sharing their personal information with third parties, enhancing online security and privacy.</li>
</ul>
<p>The Ripple Effect:</p>
<p>Apple&#8217;s privacy stance has not gone unnoticed. It has triggered a chain reaction within the tech industry, with other companies implementing similar privacy-focused features and adopting more transparent data practices. Additionally, it has fueled public discourse about individual data rights and the need for stronger privacy regulations.</p>
<p><strong>Challenges and the Road Ahead:</strong></p>
<p>Despite its efforts, Apple faces challenges in its privacy journey. Balancing user privacy with personalized experiences and targeted advertising remains a complex issue. Additionally, navigating the patchwork of global privacy regulations adds further complexity. Nevertheless, Apple&#8217;s commitment to user privacy is unwavering, and they continue to push boundaries and advocate for stronger data protection measures.</p>
<p><strong>Conclusion:</strong></p>
<p>Apple&#8217;s privacy initiatives have significantly reshaped the tech landscape, empowering users and fostering a more privacy-conscious environment. While challenges remain, their unwavering commitment serves as an inspiration for other companies and policymakers, paving the way for a future where user privacy is a fundamental right, not a privilege.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>macOS Sonoma beta 3 now ready for developers</title>
		<link>https://www.latest-apple-news.com/2023/07/05/macos-sonoma-beta-3-now-ready-for-developers/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 17:51:09 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[Accepting]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[across]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[advised]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[Alternatively]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[appears]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[appropriate]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arrives]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assistant]]></category>
		<category><![CDATA[attach]]></category>
		<category><![CDATA[automatic]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backed]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[becomes]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[beginning]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[betaprogram]]></category>
		<category><![CDATA[better]]></category>
		<category><![CDATA[between]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[capsule]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changed]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[collect]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[continue]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[couple]]></category>
		<category><![CDATA[covers]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[current]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[decoding]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[delivers]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[describe]]></category>
		<category><![CDATA[description]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[detailed]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[diagnostic]]></category>
		<category><![CDATA[difference]]></category>
		<category><![CDATA[differences]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[disclosed]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[double]]></category>
		<category><![CDATA[downgrade]]></category>
		<category><![CDATA[downgrading]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easier]]></category>
		<category><![CDATA[either]]></category>
		<category><![CDATA[enroll]]></category>
		<category><![CDATA[enrolled]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[eventually]]></category>
		<category><![CDATA[Everything]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[expected]]></category>
		<category><![CDATA[explain]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[external]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[feedback]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[finding]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Foundry]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[grateful]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[heading]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[helping]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[ideally]]></category>
		<category><![CDATA[illogical]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[import]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installer]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[keynote]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[license]]></category>
		<category><![CDATA[little]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[losing]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[member]]></category>
		<category><![CDATA[memberships]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[minimize]]></category>
		<category><![CDATA[mission]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[months]]></category>
		<category><![CDATA[motive]]></category>
		<category><![CDATA[nature]]></category>
		<category><![CDATA[necessarily]]></category>
		<category><![CDATA[needing]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[noreferrer]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[obvious]]></category>
		<category><![CDATA[October]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[painless]]></category>
		<category><![CDATA[partition]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Perhaps]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Pickle]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potential]]></category>
		<category><![CDATA[prefer]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[prepare]]></category>
		<category><![CDATA[primary]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[prompt]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[provide]]></category>
		<category><![CDATA[providing]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicly]]></category>
		<category><![CDATA[publish]]></category>
		<category><![CDATA[putting]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[really]]></category>
		<category><![CDATA[receive]]></category>
		<category><![CDATA[recommend]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reformat]]></category>
		<category><![CDATA[register]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[reinstall]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[reproduce]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[requiring]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revert]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[screenshots]]></category>
		<category><![CDATA[second]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[selecting]]></category>
		<category><![CDATA[sentence]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[September]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[single]]></category>
		<category><![CDATA[slightly]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[Sonoma]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[stable]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[storage]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[strongly]]></category>
		<category><![CDATA[suggest]]></category>
		<category><![CDATA[suitable]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[surprise]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[taking]]></category>
		<category><![CDATA[tester]]></category>
		<category><![CDATA[testers]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[timescale]]></category>
		<category><![CDATA[together]]></category>
		<category><![CDATA[trouble]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[unstable]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utility]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Waiting]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[watchOS]]></category>
		<category><![CDATA[webpage]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[worries]]></category>
		<category><![CDATA[wrapper]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=1be5932eee3c2df6e0fa9263712b0fa5</guid>

					<description><![CDATA[Macworld






If you don&#8217;t want to wait to install the next version of macOS &#8211; which we now know will be called Sonoma after Apple revealed all the details at WWDC in June, you can join the beta program and try it out on your Mac before it]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>If you don&rsquo;t want to wait to install the <a href="https://www.macworld.com/article/1670742/macos-14-release-date-features-compatibility-beta.html">next version of macOS</a> &ndash; which we now know will be called Sonoma after Apple revealed all the details at <a href="https://www.macworld.com/article/678333/wwdc-ios-macos-watchos-hardware-keynote.html">WWDC</a> in June, you can join the beta program and try it out on your Mac before it is released to the public in September or October. </p>
<p>The developer beta of macOS 14 Sonoma is already available to download. This year the developer beta isn&rsquo;t just available to developers who have paid to join Apple&rsquo;s Developer Program (which costs $99/&pound;79), Apple has opened it up to anyone who is a registered developer. We explain how to get a free developer account below. </p>
<p>The slightly more stable public beta version will be available for anyone to sign up for the public beta program around the beginning of July. </p>
<p>Even though macOS 14 is now in beta, the beta program is still running for <a href="https://www.macworld.com/article/678251/macos-13-ventura-features-compatibility-download-install.html">macOS 13</a> with testers currently running <a href="https://www.macworld.com/article/1923841/macos-ventura-13-5-beta-features-updates-install.html">macOS 13.5</a>. If you would prefer to run that beta you can do so. </p>
<p>In this article, we&rsquo;ll run through what you need to do to get your hands on the beta of the next version of the Mac operating system, how to install it, and what you should bear in mind if you don&rsquo;t want to end up in a pickle. If you would prefer to wait for the full version of macOS Sonoma here&rsquo;s <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">how to update macOS on your Mac</a>.</p>
<p><em><strong>Update 7/5/23</strong>: Apple has released the beta 3 of macOS Sonoma to developers. </em></p>
<h2 class="wp-block-heading toc" id="macos-sonoma-beta-release-date">macOS Sonoma beta release date</h2>
<p>The first version of the developer beta of Ventura arrived after the WWDC keynote on June 5, 2023 as expected. On July 5, Apple released the third developer beta.</p>
<p>The surprise was that Apple made this Developer Beta available to anyone who had registered as a developer, even if they weren&rsquo;t a paid-up member of Apple&rsquo;s Developer Program. As a result, people who have a basic free developer account are able to download the macOS Sonoma developer beta already, and we will show you how to register below.  </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?quality=50&amp;strip=all" alt="Get developer beta of macOS Sonoma" class="wp-image-1946809" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<p>Whether you should download the developer beta if you aren&rsquo;t a developer is another question. We don&rsquo;t recommend you install the developer beta if you aren&rsquo;t a developer. Instead, our recommendation is to wait a few more weeks until the public beta arrives.</p>
<h2 class="wp-block-heading toc" id="macos-sonoma-public-beta-release-date-and-differences">macOS Sonoma public beta release date and differences</h2>
<p>The public beta of Ventura was released on July 11, 2022, so we expect a similar timescale for macOS Sonoma, perhaps July 10, 2023.</p>
<p>There are a few differences between the public and developer betas. The public beta is not the same as the beta that is released through the developer program. </p>
<p>Developers get updates to their beta first, and possibly more frequently. But you should keep in mind that betas are by nature not stable, and because the public beta comes after the developer beta it could be a little safer to install. </p>
<p>The most significant difference is probably the motive of the testers: Developers usually have the aim of ensuring their apps work when the updated macOS is released to the general public, while public beta testers are essentially helping Apple detect bugs and offering feedback on the features. Because of this developers may get to test new features not available in the public beta.&nbsp;</p>
<p>If you want to get the public beta the first thing you need to do, if you haven&rsquo;t already, is join Apple&rsquo;s beta programs read this for more information:  <a title="How to join Apple beta program" href="https://www.macworld.com/article/674359/how-to-join-apples-beta-program-and-try-out-new-software.html">How to become an Apple beta tester.</a></p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?quality=50&amp;strip=all" alt="How Get Public Beta Apple " class="wp-image-1945558" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=300%2C200&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=768%2C512&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=150%2C100&amp;quality=50&amp;strip=all 150w" width="1024" height="683" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
<p class="imageCredit">Apple</p>
</div>
<h3 class="wp-block-heading toc" id="how-to-get-a-free-developer-account">How to get a free developer account</h3>
<p>If you just want a free Apple Developer account so you can access the beta you can get this via Xcode or the Apple Developer app in iOS. Here&rsquo;s how to do it via the Apple Developer app on an iPhone:</p>
<ol>
<li>Get the Apple Developer App&nbsp;<a rel="noreferrer noopener" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://apps.apple.com/app/apple-developer/id640199958&amp;xcust=1-1-671198-1-0-0&amp;sref=https://www.macworld.com/article/671198/how-to-install-ios-beta.html" >from the App Store</a>.&nbsp;</li>
<li>Open the app on your iPhone.&nbsp;</li>
<li>Tap on Account.&nbsp;</li>
<li>Tap on Sign In.&nbsp;</li>
<li>Sign in using your usual Apple ID.&nbsp;</li>
</ol>
<p>If you wish to actually publish applications to the App Store or receive support, you&rsquo;ll need to pay $99/&pound;79 per year for a paid account. You can&nbsp;<a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/support/compare-memberships/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >compare the free and paid accounts here</a>.</p>
<h2 class="wp-block-heading toc" id="how-to-get-the-macos-sonoma-beta">How to get the macOS Sonoma beta</h2>
<p>The Sonoma developer beta should show up on your Mac if you are running macOS Ventura 13.4 or later, have paid $99/&pound;79 to enroll in Apple&rsquo;s Developer program (<a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/programs/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">here</a>) or if you have a free developer account (follow the instructions above).</p>
<p>When the Public Beta becomes available it will also show up on your Mac in macOS Ventura 13.4, as long as you have signed up for the Public Beta program on <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s beta webpage</a>, signed the <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/login_to_legal&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >NDA</a>, and <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/enroll&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >enrolled</a> your Mac. </p>
<p>Before you download a few warnings: </p>
<ul>
<li>We strongly advise that if you aren&rsquo;t a developer you don&rsquo;t download the developer beta. </li>
<li>We also strongly recommend that you back up your Mac before you upgrade to the Sonoma beta. </li>
<li>We recommend that you do not run Sonoma on your primary Mac; ideally, you <a href="https://www.macworld.com/article/672589/how-to-dual-boot-mac-run-macos-monterey-and-big-sur-together.html">run it in a separate volume</a>.  This should minimize any risks to you. </li>
</ul>
<p><strong>If you are running macOS Ventura 13.4 or later:</strong></p>
<ol>
<li>Open Software Updates on your Mac. (System Settings &gt; General &gt; Software Updates.)</li>
<li>You should see two options: Automatic Updates and Beta Updates. Click on the (i) beside Beta Updates. </li>
<li>You can now turn on Beta Updates (if they weren&rsquo;t already on). </li>
<li>Choose the beta you want to download. </li>
<li>If your developer account is tied to a different Apple ID to your usual one you can change that here. </li>
<li>Click Done. </li>
<li>Now your Mac will Check for updates and eventually show the Sonoma Developer Beta as an upgrade. Click on Upgrade Now. </li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?quality=50&amp;strip=all" alt="Get Sonoma Beta" class="wp-image-1946857" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<p><strong>If you are running macOS Ventura 13.3 or earlier:</strong></p>
<p>Apple changed the way it delivers betas in Ventura 13.4. If you aren&rsquo;t yet running that version of macOS you will need to download the macOS Developer Beta Access Utility or macOS Public Beta Access Utility. </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3513166/download_beta_utility_thumb.jpg" alt="Catalina beta" loading="lazy" /></figure>
</div>
<p>If you were already running an earlier macOS Public Beta you&rsquo;ll find the new macOS beta as an upgrade via Software Update. Just click on Upgrade Now. You may have to update to the latest version of your current beta before you can do so, if not follow the steps below to get the beta access utility. </p>
<ol>
<li>If you are enrolled in the Developer Program, go to Apple&rsquo;s <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/download/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >beta download page</a>. Click on Install Profile to download the new macOS Developer Beta Access Utility to your Mac.</li>
<li>If you are enrolled as a public beta tester, <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/download/1016471&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >download the macOS Public Beta Access Utility</a>. </li>
<li>Go to Downloads on your Mac and click on the macOS Beta Access Utility to open it.</li>
<li>Double-click on the dmg file and the installer will run.</li>
<li>Once the new macOS beta is installed Software Update will check to see if there are any updates. Click Update and the latest version will download.</li>
<li>You&rsquo;ll see a prompt to install the latest macOS beta, click on Continue.</li>
<li>Agree to the Ts&amp;Cs (more on them below).</li>
<li>Click Install.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?quality=50&amp;strip=all" alt="macOS Public Beta Access Utility" class="wp-image-1931251" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?quality=50&amp;strip=all 570w, https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?resize=285%2C300&amp;quality=50&amp;strip=all 285w" width="570" height="600" sizes="auto, (max-width: 570px) 100vw, 570px" /></figure>
<p class="imageCredit">
</div>
<h2 class="wp-block-heading" id="how-to-update-macos-beta-versions">How to update macOS beta versions</h2>
<p>Once you are running the beta the updates will come through to your Mac automatically, you just need to click to install.</p>
<ol>
<li>You will receive a notification when the next update to the beta is available.</li>
<li>Updates will be available via Software Update (in System Settings/System Preferences)</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?quality=50&amp;strip=all" alt="macOS Beta in Software Update" class="wp-image-1931252" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">
</div>
<h2 class="wp-block-heading" id="everything-else-you-need-to-know-about-beta-testing">Everything else you need to know about beta testing</h2>
<p>That covers how to get the betas, but once you have them what can you do, and what should you do? We&rsquo;ll cover that below.</p>
<h2 class="wp-block-heading toc" id="is-the-macos-beta-stable">Is the macOS beta stable?</h2>
<p>By its nature, a beta has the potential to be unstable. Therefore it&rsquo;s not advised that you install it on a Mac that you rely on. If you have a second Mac that isn&rsquo;t mission-critical then install it there. We strongly recommend that you don&rsquo;t risk all by putting the macOS beta on your primary macOS, especially not in the early days of the beta development.&nbsp;</p>
<p>If you don&rsquo;t have a second Mac there are a couple of ways you could run macOS beta on your Mac without running the risk of losing data or finding your Mac stops working:</p>
<ul>
<li>We recommend installing it on a partition &ndash; which these days is really a volume (and is much easier to create than a partition was). Read about how to do that here: <a title="Run macOS beta in a volume" href="https://www.macworld.com/article/672589/how-to-dual-boot-mac-run-macos-monterey-and-big-sur-together.html">How to dual-boot Mac: Run two versions of macOS on a Mac</a>.</li>
<li>Alternatively, you could <a title="Run macOS on external drive" href="https://www.macworld.com/article/672585/how-to-install-macos-on-an-external-drive.html">install the macOS beta on an external drive</a> and run it on that.</li>
</ul>
<p>We discuss the <a title="Is it safe to run Apple's betas " href="https://www.macworld.com/article/674359/how-to-join-apples-beta-program-and-try-out-new-software.html">safety of the macOS beta and the risks you might be taking</a> in more detail in a separate article.</p>
<p>If the stability of the beta worries you then you are probably better off waiting until the final version is out, or at least waiting until testing has been happening for a few months before getting the beta. </p>
<h2 class="wp-block-heading toc" id="how-to-prepare-your-mac-for-the-beta">How to prepare your Mac for the beta</h2>
<p><strong>Update your software</strong>: We recommend you have the latest full version of macOS installed, although Apple says that the macOS Developer Beta Access Utility requires macOS 10.8 or later.</p>
<p><strong>Make space:</strong> We&rsquo;d recommend at least 15GB of available space because the macOS betas tend to be very large. If you end up requiring more space read: <a title="How to free up space on Mac" href="https://www.macworld.com/article/671020/how-to-clear-disk-space-on-a-mac.html">How to free up space on Mac</a><a title="How to delete Other on Mac" href="https://www.macworld.com/article/674829/how-to-delete-other-storage-on-a-mac.html">.</a> Note that we always recommend that you have at least 10% space free on your Mac at any time, so if you don&rsquo;t have that expect problems!</p>
<p><strong>Back up</strong>: Before you install a beta on your Mac you should make a backup of your data and files. You can find <a title="How to back up a Mac with Time Machine" href="https://www.macworld.com/article/670470/how-to-set-up-a-time-capsule.html">out how to use Time Machine to back up your Mac</a>. We also have a round-up<a title="Best Back Up for Mac" href="https://www.macworld.com/article/668696/protect-your-mac-with-these-mac-backup-software-options.html"> of suitable backup solutions</a>.</p>
<h3 class="wp-block-heading" id="how-to-send-feedback-to-apple">How to send feedback to Apple</h3>
<p>Should you come across an error or a bug you should use the Feedback Assistant app to provide feedback to Apple. Launch the app and follow the appropriate steps, selecting the area about which you&rsquo;re providing feedback and then any specific sub-area. Then describe your issue in a single sentence, before providing a more detailed description, including any specific steps that reproduce the issue. You&rsquo;ll also be able to attach other files.</p>
<p>You&rsquo;ll also have to give permission for the Feedback Assistant app to collect diagnostic information from your Mac.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?quality=50&amp;strip=all" alt="Beta Feedback Assistant" class="wp-image-1931253" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?quality=50&amp;strip=all 758w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?resize=300%2C227&amp;quality=50&amp;strip=all 300w" width="758" height="573" sizes="auto, (max-width: 758px) 100vw, 758px" /></figure>
<p class="imageCredit">
</div>
<p>It won&rsquo;t always be obvious whether something is a bug or just not as easy to use as you might have hoped. Either way, if your feedback is that something appears to work in an illogical way, Apple will want to know that.</p>
<p>If you are having trouble with a third-party app you can let Apple know by reporting it through the 3rd-party Application Compatibility category in the Feedback Assistant. However, we&rsquo;d suggest that you also provide feedback to the app&rsquo;s developer who will no doubt be grateful.</p>
<h3 class="wp-block-heading" id="will-i-be-able-to-update-from-macos-beta-to-the-final-version">Will I be able to update from macOS beta to the final version?</h3>
<p>Beta users will be able to install the final build of the OS on release day without needing to reformat or reinstall.</p>
<h3 class="wp-block-heading" id="can-i-talk-about-the-beta-publicly">Can I talk about the beta publicly?</h3>
<p>According to Apple and the license agreement all beta testers must agree to, the beta is &ldquo;Apple confidential information&rdquo;. By accepting those terms, you agree not to discuss your use of the software with anyone who isn&rsquo;t also in the Beta Software Program. That means you can&rsquo;t &ldquo;blog, post screenshots, tweet, or publicly post information about the public beta software.&rdquo;</p>
<p>However, you can discuss any information that Apple has publicly disclosed; the company says that information is no longer considered confidential.</p>
<h2 class="wp-block-heading toc" id="how-to-downgrade-from-the-macos-beta">How to downgrade from the macOS beta</h2>
<p>You can always revert to an earlier version of macOS, though depending on how you back up, it&rsquo;s not necessarily a painless process.</p>
<p>Start by making sure the data on your drive is backed up, then erase the drive and install the latest public version of macOS. When you first startup your Mac you can use the Migration Assistant to import your data from the backup. Here&rsquo;s a more detailed <a title="How to downgrade macOS to earlier version" href="https://www.macworld.com/article/673127/how-to-remove-macos-beta-from-a-mac.html">tutorial on downgrading from the macOS beta</a> we also have a tutorial on <a title="How to downgrade from macOS Mojave" href="https://www.macworld.com/article/671318/how-to-downgrade-macos-revert-back.html">downgrading to an older version of the Mac OS</a>.</p>
<p><category>Personal Software</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>How to download macOS Sonoma beta: Version 3 now ready for developers</title>
		<link>https://www.latest-apple-news.com/2023/07/05/how-to-download-macos-sonoma-beta-version-3-now-ready-for-developers/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 17:51:09 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[Accepting]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[across]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[advised]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[Alternatively]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[appears]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[appropriate]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arrives]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assistant]]></category>
		<category><![CDATA[attach]]></category>
		<category><![CDATA[automatic]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backed]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[becomes]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[beginning]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[betaprogram]]></category>
		<category><![CDATA[better]]></category>
		<category><![CDATA[between]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[capsule]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changed]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[collect]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[continue]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[couple]]></category>
		<category><![CDATA[covers]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[current]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[decoding]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[delivers]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[describe]]></category>
		<category><![CDATA[description]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[detailed]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[diagnostic]]></category>
		<category><![CDATA[difference]]></category>
		<category><![CDATA[differences]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[disclosed]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[double]]></category>
		<category><![CDATA[downgrade]]></category>
		<category><![CDATA[downgrading]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easier]]></category>
		<category><![CDATA[either]]></category>
		<category><![CDATA[enroll]]></category>
		<category><![CDATA[enrolled]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[eventually]]></category>
		<category><![CDATA[Everything]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[expected]]></category>
		<category><![CDATA[explain]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[external]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[feedback]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[finding]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Foundry]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[grateful]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[heading]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[helping]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[ideally]]></category>
		<category><![CDATA[illogical]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[import]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installer]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[keynote]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[license]]></category>
		<category><![CDATA[little]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[losing]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[member]]></category>
		<category><![CDATA[memberships]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[minimize]]></category>
		<category><![CDATA[mission]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[months]]></category>
		<category><![CDATA[motive]]></category>
		<category><![CDATA[nature]]></category>
		<category><![CDATA[necessarily]]></category>
		<category><![CDATA[needing]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[noreferrer]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[obvious]]></category>
		<category><![CDATA[October]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[painless]]></category>
		<category><![CDATA[partition]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Perhaps]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Pickle]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potential]]></category>
		<category><![CDATA[prefer]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[prepare]]></category>
		<category><![CDATA[primary]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[prompt]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[provide]]></category>
		<category><![CDATA[providing]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicly]]></category>
		<category><![CDATA[publish]]></category>
		<category><![CDATA[putting]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[question]]></category>
		<category><![CDATA[really]]></category>
		<category><![CDATA[receive]]></category>
		<category><![CDATA[recommend]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reformat]]></category>
		<category><![CDATA[register]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[reinstall]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[reproduce]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[requiring]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revert]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[screenshots]]></category>
		<category><![CDATA[second]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[selecting]]></category>
		<category><![CDATA[sentence]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[September]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[single]]></category>
		<category><![CDATA[slightly]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[Sonoma]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[stable]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[storage]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[strongly]]></category>
		<category><![CDATA[suggest]]></category>
		<category><![CDATA[suitable]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[surprise]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[taking]]></category>
		<category><![CDATA[tester]]></category>
		<category><![CDATA[testers]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[timescale]]></category>
		<category><![CDATA[together]]></category>
		<category><![CDATA[trouble]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[unstable]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utility]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Waiting]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[watchOS]]></category>
		<category><![CDATA[webpage]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[worries]]></category>
		<category><![CDATA[wrapper]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=c7194a8e38cb593e491aff7ff196bfd2</guid>

					<description><![CDATA[Macworld






If you don&#8217;t want to wait to install the next version of macOS &#8211; which we now know will be called Sonoma after Apple revealed all the details at WWDC in June, you can join the beta program and try it out on your Mac before it]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>If you don&rsquo;t want to wait to install the <a href="https://www.macworld.com/article/1670742/macos-14-release-date-features-compatibility-beta.html">next version of macOS</a> &ndash; which we now know will be called Sonoma after Apple revealed all the details at <a href="https://www.macworld.com/article/678333/wwdc-ios-macos-watchos-hardware-keynote.html">WWDC</a> in June, you can join the beta program and try it out on your Mac before it is released to the public in September or October. </p>
<p>The developer beta of macOS 14 Sonoma is already available to download. This year the developer beta isn&rsquo;t just available to developers who have paid to join Apple&rsquo;s Developer Program (which costs $99/&pound;79), Apple has opened it up to anyone who is a registered developer. We explain how to get a free developer account below. </p>
<p>The slightly more stable public beta version will be available for anyone to sign up for the public beta program around the beginning of July. </p>
<p>Even though macOS 14 is now in beta, the beta program is still running for <a href="https://www.macworld.com/article/678251/macos-13-ventura-features-compatibility-download-install.html">macOS 13</a> with testers currently running <a href="https://www.macworld.com/article/1923841/macos-ventura-13-5-beta-features-updates-install.html">macOS 13.5</a>. If you would prefer to run that beta you can do so. </p>
<p>In this article, we&rsquo;ll run through what you need to do to get your hands on the beta of the next version of the Mac operating system, how to install it, and what you should bear in mind if you don&rsquo;t want to end up in a pickle. If you would prefer to wait for the full version of macOS Sonoma here&rsquo;s <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">how to update macOS on your Mac</a>.</p>
<p><em><strong>Update 7/5/23</strong>: Apple has released the beta 3 of macOS Sonoma to developers. </em></p>
<h2 class="wp-block-heading toc" id="macos-sonoma-beta-release-date">macOS Sonoma beta release date</h2>
<p>The first version of the developer beta of Ventura arrived after the WWDC keynote on June 5, 2023 as expected. On July 5, Apple released the third developer beta.</p>
<p>The surprise was that Apple made this Developer Beta available to anyone who had registered as a developer, even if they weren&rsquo;t a paid-up member of Apple&rsquo;s Developer Program. As a result, people who have a basic free developer account are able to download the macOS Sonoma developer beta already, and we will show you how to register below.  </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?quality=50&amp;strip=all" alt="Get developer beta of macOS Sonoma" class="wp-image-1946809" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<p>Whether you should download the developer beta if you aren&rsquo;t a developer is another question. We don&rsquo;t recommend you install the developer beta if you aren&rsquo;t a developer. Instead, our recommendation is to wait a few more weeks until the public beta arrives.</p>
<h2 class="wp-block-heading toc" id="macos-sonoma-public-beta-release-date-and-differences">macOS Sonoma public beta release date and differences</h2>
<p>The public beta of Ventura was released on July 11, 2022, so we expect a similar timescale for macOS Sonoma, perhaps July 10, 2023.</p>
<p>There are a few differences between the public and developer betas. The public beta is not the same as the beta that is released through the developer program. </p>
<p>Developers get updates to their beta first, and possibly more frequently. But you should keep in mind that betas are by nature not stable, and because the public beta comes after the developer beta it could be a little safer to install. </p>
<p>The most significant difference is probably the motive of the testers: Developers usually have the aim of ensuring their apps work when the updated macOS is released to the general public, while public beta testers are essentially helping Apple detect bugs and offering feedback on the features. Because of this developers may get to test new features not available in the public beta.&nbsp;</p>
<p>If you want to get the public beta the first thing you need to do, if you haven&rsquo;t already, is join Apple&rsquo;s beta programs read this for more information:  <a title="How to join Apple beta program" href="https://www.macworld.com/article/674359/how-to-join-apples-beta-program-and-try-out-new-software.html">How to become an Apple beta tester.</a></p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?quality=50&amp;strip=all" alt="How Get Public Beta Apple " class="wp-image-1945558" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=300%2C200&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=768%2C512&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Apple-Public-Beta-1-1.jpg?resize=150%2C100&amp;quality=50&amp;strip=all 150w" width="1024" height="683" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
<p class="imageCredit">Apple</p>
</div>
<h3 class="wp-block-heading toc" id="how-to-get-a-free-developer-account">How to get a free developer account</h3>
<p>If you just want a free Apple Developer account so you can access the beta you can get this via Xcode or the Apple Developer app in iOS. Here&rsquo;s how to do it via the Apple Developer app on an iPhone:</p>
<ol>
<li>Get the Apple Developer App&nbsp;<a rel="noreferrer noopener" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://apps.apple.com/app/apple-developer/id640199958&amp;xcust=1-1-671198-1-0-0&amp;sref=https://www.macworld.com/article/671198/how-to-install-ios-beta.html" >from the App Store</a>.&nbsp;</li>
<li>Open the app on your iPhone.&nbsp;</li>
<li>Tap on Account.&nbsp;</li>
<li>Tap on Sign In.&nbsp;</li>
<li>Sign in using your usual Apple ID.&nbsp;</li>
</ol>
<p>If you wish to actually publish applications to the App Store or receive support, you&rsquo;ll need to pay $99/&pound;79 per year for a paid account. You can&nbsp;<a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/support/compare-memberships/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >compare the free and paid accounts here</a>.</p>
<h2 class="wp-block-heading toc" id="how-to-get-the-macos-sonoma-beta">How to get the macOS Sonoma beta</h2>
<p>The Sonoma developer beta should show up on your Mac if you are running macOS Ventura 13.4 or later, have paid $99/&pound;79 to enroll in Apple&rsquo;s Developer program (<a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/programs/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">here</a>) or if you have a free developer account (follow the instructions above).</p>
<p>When the Public Beta becomes available it will also show up on your Mac in macOS Ventura 13.4, as long as you have signed up for the Public Beta program on <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s beta webpage</a>, signed the <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/login_to_legal&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >NDA</a>, and <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/betaprogram/enroll&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >enrolled</a> your Mac. </p>
<p>Before you download a few warnings: </p>
<ul>
<li>We strongly advise that if you aren&rsquo;t a developer you don&rsquo;t download the developer beta. </li>
<li>We also strongly recommend that you back up your Mac before you upgrade to the Sonoma beta. </li>
<li>We recommend that you do not run Sonoma on your primary Mac; ideally, you <a href="https://www.macworld.com/article/672589/how-to-dual-boot-mac-run-macos-monterey-and-big-sur-together.html">run it in a separate volume</a>.  This should minimize any risks to you. </li>
</ul>
<p><strong>If you are running macOS Ventura 13.4 or later:</strong></p>
<ol>
<li>Open Software Updates on your Mac. (System Settings &gt; General &gt; Software Updates.)</li>
<li>You should see two options: Automatic Updates and Beta Updates. Click on the (i) beside Beta Updates. </li>
<li>You can now turn on Beta Updates (if they weren&rsquo;t already on). </li>
<li>Choose the beta you want to download. </li>
<li>If your developer account is tied to a different Apple ID to your usual one you can change that here. </li>
<li>Click Done. </li>
<li>Now your Mac will Check for updates and eventually show the Sonoma Developer Beta as an upgrade. Click on Upgrade Now. </li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?quality=50&amp;strip=all" alt="Get Sonoma Beta" class="wp-image-1946857" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/06/Get-Developer-Beta-of-macOS-Sonoma-1.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<p><strong>If you are running macOS Ventura 13.3 or earlier:</strong></p>
<p>Apple changed the way it delivers betas in Ventura 13.4. If you aren&rsquo;t yet running that version of macOS you will need to download the macOS Developer Beta Access Utility or macOS Public Beta Access Utility. </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3513166/download_beta_utility_thumb.jpg" alt="Catalina beta" loading="lazy" /></figure>
</div>
<p>If you were already running an earlier macOS Public Beta you&rsquo;ll find the new macOS beta as an upgrade via Software Update. Just click on Upgrade Now. You may have to update to the latest version of your current beta before you can do so, if not follow the steps below to get the beta access utility. </p>
<ol>
<li>If you are enrolled in the Developer Program, go to Apple&rsquo;s <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://developer.apple.com/download/&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >beta download page</a>. Click on Install Profile to download the new macOS Developer Beta Access Utility to your Mac.</li>
<li>If you are enrolled as a public beta tester, <a rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://beta.apple.com/sp/download/1016471&amp;xcust=1-1-671123-1-0-0&amp;sref=https://www.macworld.com/feed" >download the macOS Public Beta Access Utility</a>. </li>
<li>Go to Downloads on your Mac and click on the macOS Beta Access Utility to open it.</li>
<li>Double-click on the dmg file and the installer will run.</li>
<li>Once the new macOS beta is installed Software Update will check to see if there are any updates. Click Update and the latest version will download.</li>
<li>You&rsquo;ll see a prompt to install the latest macOS beta, click on Continue.</li>
<li>Agree to the Ts&amp;Cs (more on them below).</li>
<li>Click Install.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?quality=50&amp;strip=all" alt="macOS Public Beta Access Utility" class="wp-image-1931251" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?quality=50&amp;strip=all 570w, https://b2c-contenthub.com/wp-content/uploads/2023/05/macos-pubic-beta-access-utility.jpg?resize=285%2C300&amp;quality=50&amp;strip=all 285w" width="570" height="600" sizes="auto, (max-width: 570px) 100vw, 570px" /></figure>
<p class="imageCredit">
</div>
<h2 class="wp-block-heading" id="how-to-update-macos-beta-versions">How to update macOS beta versions</h2>
<p>Once you are running the beta the updates will come through to your Mac automatically, you just need to click to install.</p>
<ol>
<li>You will receive a notification when the next update to the beta is available.</li>
<li>Updates will be available via Software Update (in System Settings/System Preferences)</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?quality=50&amp;strip=all" alt="macOS Beta in Software Update" class="wp-image-1931252" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?quality=50&amp;strip=all 827w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?resize=300%2C211&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-in-Software-Update.jpg?resize=768%2C540&amp;quality=50&amp;strip=all 768w" width="827" height="582" sizes="auto, (max-width: 827px) 100vw, 827px" /></figure>
<p class="imageCredit">
</div>
<h2 class="wp-block-heading" id="everything-else-you-need-to-know-about-beta-testing">Everything else you need to know about beta testing</h2>
<p>That covers how to get the betas, but once you have them what can you do, and what should you do? We&rsquo;ll cover that below.</p>
<h2 class="wp-block-heading toc" id="is-the-macos-beta-stable">Is the macOS beta stable?</h2>
<p>By its nature, a beta has the potential to be unstable. Therefore it&rsquo;s not advised that you install it on a Mac that you rely on. If you have a second Mac that isn&rsquo;t mission-critical then install it there. We strongly recommend that you don&rsquo;t risk all by putting the macOS beta on your primary macOS, especially not in the early days of the beta development.&nbsp;</p>
<p>If you don&rsquo;t have a second Mac there are a couple of ways you could run macOS beta on your Mac without running the risk of losing data or finding your Mac stops working:</p>
<ul>
<li>We recommend installing it on a partition &ndash; which these days is really a volume (and is much easier to create than a partition was). Read about how to do that here: <a title="Run macOS beta in a volume" href="https://www.macworld.com/article/672589/how-to-dual-boot-mac-run-macos-monterey-and-big-sur-together.html">How to dual-boot Mac: Run two versions of macOS on a Mac</a>.</li>
<li>Alternatively, you could <a title="Run macOS on external drive" href="https://www.macworld.com/article/672585/how-to-install-macos-on-an-external-drive.html">install the macOS beta on an external drive</a> and run it on that.</li>
</ul>
<p>We discuss the <a title="Is it safe to run Apple's betas " href="https://www.macworld.com/article/674359/how-to-join-apples-beta-program-and-try-out-new-software.html">safety of the macOS beta and the risks you might be taking</a> in more detail in a separate article.</p>
<p>If the stability of the beta worries you then you are probably better off waiting until the final version is out, or at least waiting until testing has been happening for a few months before getting the beta. </p>
<h2 class="wp-block-heading toc" id="how-to-prepare-your-mac-for-the-beta">How to prepare your Mac for the beta</h2>
<p><strong>Update your software</strong>: We recommend you have the latest full version of macOS installed, although Apple says that the macOS Developer Beta Access Utility requires macOS 10.8 or later.</p>
<p><strong>Make space:</strong> We&rsquo;d recommend at least 15GB of available space because the macOS betas tend to be very large. If you end up requiring more space read: <a title="How to free up space on Mac" href="https://www.macworld.com/article/671020/how-to-clear-disk-space-on-a-mac.html">How to free up space on Mac</a><a title="How to delete Other on Mac" href="https://www.macworld.com/article/674829/how-to-delete-other-storage-on-a-mac.html">.</a> Note that we always recommend that you have at least 10% space free on your Mac at any time, so if you don&rsquo;t have that expect problems!</p>
<p><strong>Back up</strong>: Before you install a beta on your Mac you should make a backup of your data and files. You can find <a title="How to back up a Mac with Time Machine" href="https://www.macworld.com/article/670470/how-to-set-up-a-time-capsule.html">out how to use Time Machine to back up your Mac</a>. We also have a round-up<a title="Best Back Up for Mac" href="https://www.macworld.com/article/668696/protect-your-mac-with-these-mac-backup-software-options.html"> of suitable backup solutions</a>.</p>
<h3 class="wp-block-heading" id="how-to-send-feedback-to-apple">How to send feedback to Apple</h3>
<p>Should you come across an error or a bug you should use the Feedback Assistant app to provide feedback to Apple. Launch the app and follow the appropriate steps, selecting the area about which you&rsquo;re providing feedback and then any specific sub-area. Then describe your issue in a single sentence, before providing a more detailed description, including any specific steps that reproduce the issue. You&rsquo;ll also be able to attach other files.</p>
<p>You&rsquo;ll also have to give permission for the Feedback Assistant app to collect diagnostic information from your Mac.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?quality=50&amp;strip=all" alt="Beta Feedback Assistant" class="wp-image-1931253" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?quality=50&amp;strip=all 758w, https://b2c-contenthub.com/wp-content/uploads/2023/05/Beta-Feedback-Assistant.jpg?resize=300%2C227&amp;quality=50&amp;strip=all 300w" width="758" height="573" sizes="auto, (max-width: 758px) 100vw, 758px" /></figure>
<p class="imageCredit">
</div>
<p>It won&rsquo;t always be obvious whether something is a bug or just not as easy to use as you might have hoped. Either way, if your feedback is that something appears to work in an illogical way, Apple will want to know that.</p>
<p>If you are having trouble with a third-party app you can let Apple know by reporting it through the 3rd-party Application Compatibility category in the Feedback Assistant. However, we&rsquo;d suggest that you also provide feedback to the app&rsquo;s developer who will no doubt be grateful.</p>
<h3 class="wp-block-heading" id="will-i-be-able-to-update-from-macos-beta-to-the-final-version">Will I be able to update from macOS beta to the final version?</h3>
<p>Beta users will be able to install the final build of the OS on release day without needing to reformat or reinstall.</p>
<h3 class="wp-block-heading" id="can-i-talk-about-the-beta-publicly">Can I talk about the beta publicly?</h3>
<p>According to Apple and the license agreement all beta testers must agree to, the beta is &ldquo;Apple confidential information&rdquo;. By accepting those terms, you agree not to discuss your use of the software with anyone who isn&rsquo;t also in the Beta Software Program. That means you can&rsquo;t &ldquo;blog, post screenshots, tweet, or publicly post information about the public beta software.&rdquo;</p>
<p>However, you can discuss any information that Apple has publicly disclosed; the company says that information is no longer considered confidential.</p>
<h2 class="wp-block-heading toc" id="how-to-downgrade-from-the-macos-beta">How to downgrade from the macOS beta</h2>
<p>You can always revert to an earlier version of macOS, though depending on how you back up, it&rsquo;s not necessarily a painless process.</p>
<p>Start by making sure the data on your drive is backed up, then erase the drive and install the latest public version of macOS. When you first startup your Mac you can use the Migration Assistant to import your data from the backup. Here&rsquo;s a more detailed <a title="How to downgrade macOS to earlier version" href="https://www.macworld.com/article/673127/how-to-remove-macos-beta-from-a-mac.html">tutorial on downgrading from the macOS beta</a> we also have a tutorial on <a title="How to downgrade from macOS Mojave" href="https://www.macworld.com/article/671318/how-to-downgrade-macos-revert-back.html">downgrading to an older version of the Mac OS</a>.</p>
<p><category>Personal Software</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>London court dismisses Apple appeal in 4G patent dispute with Optis</title>
		<link>https://www.latest-apple-news.com/2023/07/05/london-court-dismisses-apple-appeal-in-4g-patent-dispute-with-optis/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 11:45:22 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[adsystem]]></category>
		<category><![CDATA[adunit]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[alignnone]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[appeal]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[argument]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[blocked]]></category>
		<category><![CDATA[blockquote]]></category>
		<category><![CDATA[cellular]]></category>
		<category><![CDATA[certain]]></category>
		<category><![CDATA[challenge]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[decision]]></category>
		<category><![CDATA[decoding]]></category>
		<category><![CDATA[discriminatory]]></category>
		<category><![CDATA[dismissed]]></category>
		<category><![CDATA[dismisses]]></category>
		<category><![CDATA[dispute]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[entitled]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forced]]></category>
		<category><![CDATA[Granted]]></category>
		<category><![CDATA[guilty]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[Holder]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[implications]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[infringed]]></category>
		<category><![CDATA[infringement]]></category>
		<category><![CDATA[infringing]]></category>
		<category><![CDATA[injunction]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[JavaScript]]></category>
		<category><![CDATA[Kingdom]]></category>
		<category><![CDATA[license]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[london]]></category>
		<category><![CDATA[macdailynews]]></category>
		<category><![CDATA[manual]]></category>
		<category><![CDATA[MarketPlace]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[October]]></category>
		<category><![CDATA[patent]]></category>
		<category><![CDATA[patents]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[please]]></category>
		<category><![CDATA[reasonable]]></category>
		<category><![CDATA[recalc]]></category>
		<category><![CDATA[reject]]></category>
		<category><![CDATA[rejected]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[reuters]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[ruling]]></category>
		<category><![CDATA[saying]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[selling]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supreme]]></category>
		<category><![CDATA[technological]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[Unlikely]]></category>
		<category><![CDATA[upheld]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[victory]]></category>
		<category><![CDATA[widgets]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[written]]></category>
		<guid isPermaLink="false">https://macdailynews.com/?p=264032</guid>

					<description><![CDATA[<p>Apple has been found guilty of infringing two telecommunications patents used in its iPhones and iPads by London's Court of Appeal…</p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/07/05/london-court-dismisses-apple-appeal-in-4g-patent-dispute-with-optis/">London court dismisses Apple appeal in 4G patent dispute with Optis</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p]]></description>
										<content:encoded><![CDATA[<p>Apple has been found guilty of infringing two telecommunications patents used in its iPhones and iPads by London&#8217;s Court of Appeal. The ruling is a major victory for Optis Cellular Technology LLC, a U.S. patent holder that sued Apple in 2019. Optis says the two patents are essential to certain technological standards, such as 4G.</p>
<p>The Court of Appeal dismissed Apple&#8217;s appeal of a lower court ruling that found the company had infringed the patents. Apple had argued that the patents were not essential to 4G and that it did not need to license them from Optis. However, the Court of Appeal found that the patents were essential and that Apple had infringed them by using the technology without a license.</p>
<p>The ruling could have significant implications for Apple. It could be forced to pay Optis damages, and it could, although unlikely, also be blocked from selling iPhones and iPads in the UK.</p>
<p><a href="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210513_apple_logo.png?ssl=1"><img fetchpriority="high" decoding="async" src="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210513_apple_logo.png?resize=640%2C396&#038;ssl=1" alt="London court dismisses Apple appeal in 4G patent dispute with Optis" width="640" height="396" class="alignnone size-full wp-image-245272" srcset="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210513_apple_logo.png?w=660&amp;ssl=1 660w, https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210513_apple_logo.png?resize=300%2C185&amp;ssl=1 300w" sizes="(max-width: 640px) 100vw, 640px" data-recalc-dims="1" /></a></p>
<p><a href="https://www.reuters.com/technology/apple-loses-london-appeal-4g-patent-dispute-with-optis-2023-07-04/">Reuters</a>:</p>
<blockquote>
<p>
[Apple&#8217;s] challenge was rejected by the Court of Appeal, with Judge Colin Birss saying in a written ruling that the High Court was &#8220;right to reject (Apple&#8217;s) argument for non-infringement&#8221; and on the issue of the patents being essential.</p>
<p>The Court of Appeal last month upheld an appeal by Optis against an earlier decision to revoke two other 4G-related patents, following a ruling in October that Optis is entitled to an injunction to stop Apple infringing its patents before a court has ruled on the fair, reasonable and non-discriminatory terms of use.</p>
<p>Apple was granted permission earlier this year to appeal against the October ruling.
</p>
</blockquote>
<p><strong><span style="color: #ff0000;">MacDailyNews Take: </span></strong>Apple is likely to appeal the ruling to the Supreme Court of the United Kingdom.</p>
<p><strong><span style="color: #ff0000;">Please help support MacDailyNews.</span></strong> <a href="https://macdailynews.com/thank_you_for_supporting_our_independent_tech_blog/">Click or tap here to support our <em>independent</em> tech blog</a>. Thank you!</p>
<p><strong>Support MacDailyNews at no extra cost to you by <a href="https://amzn.to/3Kd2rKY">using this link to shop at Amazon</strong></a>.</p>
<p><script type="text/javascript">
amzn_assoc_tracking_id = "macdailynews-20";
amzn_assoc_ad_mode = "manual";
amzn_assoc_ad_type = "smart";
amzn_assoc_marketplace = "amazon";
amzn_assoc_region = "US";
amzn_assoc_design = "enhanced_links";
amzn_assoc_asins = "B0932QJ2JZ";
amzn_assoc_placement = "adunit";
amzn_assoc_linkid = "13868f0e7ff6a317562f49d8c2ab557a";
</script></p>
<p><script src="https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US"></script></p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/07/05/london-court-dismisses-apple-appeal-in-4g-patent-dispute-with-optis/">London court dismisses Apple appeal in 4G patent dispute with Optis</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Apple opposes UK bill that could mandate backdoor scanning in iMessage</title>
		<link>https://www.latest-apple-news.com/2023/06/27/apple-opposes-uk-bill-that-could-mandate-backdoor-scanning-in-imessage/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 17:24:46 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[abandon]]></category>
		<category><![CDATA[abandoned]]></category>
		<category><![CDATA[abiding]]></category>
		<category><![CDATA[abusive]]></category>
		<category><![CDATA[academics]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[activists]]></category>
		<category><![CDATA[actors]]></category>
		<category><![CDATA[adsystem]]></category>
		<category><![CDATA[adunit]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[alignnone]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[amended]]></category>
		<category><![CDATA[Amnesty]]></category>
		<category><![CDATA[Anderson]]></category>
		<category><![CDATA[Angela]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[arbitrary]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arounds]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[Asocia]]></category>
		<category><![CDATA[assertion]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Associa]]></category>
		<category><![CDATA[Association]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Attorneys]]></category>
		<category><![CDATA[Austrian]]></category>
		<category><![CDATA[avljan]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[backlash]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[benefit]]></category>
		<category><![CDATA[Bernal]]></category>
		<category><![CDATA[between]]></category>
		<category><![CDATA[billion]]></category>
		<category><![CDATA[billions]]></category>
		<category><![CDATA[binding]]></category>
		<category><![CDATA[Birgit]]></category>
		<category><![CDATA[blockquote]]></category>
		<category><![CDATA[borders]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Brazilian]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[breaches]]></category>
		<category><![CDATA[breadth]]></category>
		<category><![CDATA[Brenda]]></category>
		<category><![CDATA[bristol]]></category>
		<category><![CDATA[brother]]></category>
		<category><![CDATA[campaign]]></category>
		<category><![CDATA[Campbell]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[cannot]]></category>
		<category><![CDATA[capability]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[center]]></category>
		<category><![CDATA[centre]]></category>
		<category><![CDATA[challenge]]></category>
		<category><![CDATA[channels]]></category>
		<category><![CDATA[chapter]]></category>
		<category><![CDATA[charities]]></category>
		<category><![CDATA[chatcontrol]]></category>
		<category><![CDATA[children]]></category>
		<category><![CDATA[Childrens]]></category>
		<category><![CDATA[Christian]]></category>
		<category><![CDATA[Cibervoluntarios]]></category>
		<category><![CDATA[CIPESA]]></category>
		<category><![CDATA[citizen]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[clearly]]></category>
		<category><![CDATA[client]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[combat]]></category>
		<category><![CDATA[comments]]></category>
		<category><![CDATA[commission]]></category>
		<category><![CDATA[Committee]]></category>
		<category><![CDATA[communicate]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[communications]]></category>
		<category><![CDATA[community]]></category>
		<category><![CDATA[complementary]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[comply]]></category>
		<category><![CDATA[compromise]]></category>
		<category><![CDATA[compromising]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[concerned]]></category>
		<category><![CDATA[concerns]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[confined]]></category>
		<category><![CDATA[conflict]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contradiction]]></category>
		<category><![CDATA[contradicts]]></category>
		<category><![CDATA[control]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[conversations]]></category>
		<category><![CDATA[Corrigan]]></category>
		<category><![CDATA[corrupt]]></category>
		<category><![CDATA[corrupted]]></category>
		<category><![CDATA[Council]]></category>
		<category><![CDATA[Country]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[creates]]></category>
		<category><![CDATA[creating]]></category>
		<category><![CDATA[criminals]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[cyberstorm]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dangerous]]></category>
		<category><![CDATA[databases]]></category>
		<category><![CDATA[decoding]]></category>
		<category><![CDATA[deeply]]></category>
		<category><![CDATA[defend]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[department]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[destructive]]></category>
		<category><![CDATA[developing]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[difficult]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[Digitalcourage]]></category>
		<category><![CDATA[Digitale]]></category>
		<category><![CDATA[Digitalis]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[Directed]]></category>
		<category><![CDATA[dissemination]]></category>
		<category><![CDATA[document]]></category>
		<category><![CDATA[documents]]></category>
		<category><![CDATA[Duncan]]></category>
		<category><![CDATA[economy]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[either]]></category>
		<category><![CDATA[electronic]]></category>
		<category><![CDATA[emphasised]]></category>
		<category><![CDATA[encrypted]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[enforcement]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[ensures]]></category>
		<category><![CDATA[envisage]]></category>
		<category><![CDATA[Epicenter]]></category>
		<category><![CDATA[equally]]></category>
		<category><![CDATA[etudes]]></category>
		<category><![CDATA[europa]]></category>
		<category><![CDATA[europarl]]></category>
		<category><![CDATA[European]]></category>
		<category><![CDATA[evaluation]]></category>
		<category><![CDATA[everyday]]></category>
		<category><![CDATA[everyone]]></category>
		<category><![CDATA[everywhere]]></category>
		<category><![CDATA[evidence]]></category>
		<category><![CDATA[exclusive]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[expert]]></category>
		<category><![CDATA[experts]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Expression]]></category>
		<category><![CDATA[extent]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[February]]></category>
		<category><![CDATA[Ferguson]]></category>
		<category><![CDATA[Finland]]></category>
		<category><![CDATA[forced]]></category>
		<category><![CDATA[foundation]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[French]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[frontier]]></category>
		<category><![CDATA[Fundaci]]></category>
		<category><![CDATA[future]]></category>
		<category><![CDATA[Gesellschaft]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[Granitt]]></category>
		<category><![CDATA[greater]]></category>
		<category><![CDATA[Grossman]]></category>
		<category><![CDATA[groups]]></category>
		<category><![CDATA[guaranteed]]></category>
		<category><![CDATA[Harbinja]]></category>
		<category><![CDATA[harvested]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[Hermes]]></category>
		<category><![CDATA[hostile]]></category>
		<category><![CDATA[Huppert]]></category>
		<category><![CDATA[Hyderabad]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[identifying]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Ikigai]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[iMessage]]></category>
		<category><![CDATA[impact]]></category>
		<category><![CDATA[implications]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[inconvenient]]></category>
		<category><![CDATA[indeed]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[indexoncensorship]]></category>
		<category><![CDATA[indicated]]></category>
		<category><![CDATA[individual]]></category>
		<category><![CDATA[Informa]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[infringe]]></category>
		<category><![CDATA[infringing]]></category>
		<category><![CDATA[initiative]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Insecurity]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[intention]]></category>
		<category><![CDATA[intercepted]]></category>
		<category><![CDATA[intercepts]]></category>
		<category><![CDATA[interest]]></category>
		<category><![CDATA[interference]]></category>
		<category><![CDATA[international]]></category>
		<category><![CDATA[internationally]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internetsociety]]></category>
		<category><![CDATA[Interpeer]]></category>
		<category><![CDATA[intrusion]]></category>
		<category><![CDATA[invest]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[JavaScript]]></category>
		<category><![CDATA[journalists]]></category>
		<category><![CDATA[judicial]]></category>
		<category><![CDATA[Julian]]></category>
		<category><![CDATA[justified]]></category>
		<category><![CDATA[Karmeinsky]]></category>
		<category><![CDATA[Kijiji]]></category>
		<category><![CDATA[Komaitis]]></category>
		<category><![CDATA[Konstantinos]]></category>
		<category><![CDATA[Larrinaga]]></category>
		<category><![CDATA[lawful]]></category>
		<category><![CDATA[laying]]></category>
		<category><![CDATA[legislative]]></category>
		<category><![CDATA[legitimate]]></category>
		<category><![CDATA[letter]]></category>
		<category><![CDATA[liberal]]></category>
		<category><![CDATA[liberties]]></category>
		<category><![CDATA[Liberty]]></category>
		<category><![CDATA[lightbluetouchpaper]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[macdailynews]]></category>
		<category><![CDATA[maintain]]></category>
		<category><![CDATA[majority]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[mandate]]></category>
		<category><![CDATA[manual]]></category>
		<category><![CDATA[MarketPlace]]></category>
		<category><![CDATA[material]]></category>
		<category><![CDATA[matter]]></category>
		<category><![CDATA[Matthew]]></category>
		<category><![CDATA[McEvedys]]></category>
		<category><![CDATA[McPhail]]></category>
		<category><![CDATA[meaning]]></category>
		<category><![CDATA[measure]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[Messages]]></category>
		<category><![CDATA[messaging]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[minister]]></category>
		<category><![CDATA[Moreover]]></category>
		<category><![CDATA[Muffett]]></category>
		<category><![CDATA[mutually]]></category>
		<category><![CDATA[National]]></category>
		<category><![CDATA[nations]]></category>
		<category><![CDATA[nbcnews]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[NeHUBs]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Nicholas]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[online]]></category>
		<category><![CDATA[OpenMedia]]></category>
		<category><![CDATA[openrightsgroup]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[oppose]]></category>
		<category><![CDATA[opposes]]></category>
		<category><![CDATA[opposition]]></category>
		<category><![CDATA[organisations]]></category>
		<category><![CDATA[organizations]]></category>
		<category><![CDATA[ostensibly]]></category>
		<category><![CDATA[Parkinson]]></category>
		<category><![CDATA[Parliament]]></category>
		<category><![CDATA[parliamentarians]]></category>
		<category><![CDATA[Parliamentary]]></category>
		<category><![CDATA[partners]]></category>
		<category><![CDATA[passed]]></category>
		<category><![CDATA[pentru]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[persecution]]></category>
		<category><![CDATA[perspectives]]></category>
		<category><![CDATA[Pferfferkorn]]></category>
		<category><![CDATA[Phipps]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[photographs]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[platforms]]></category>
		<category><![CDATA[please]]></category>
		<category><![CDATA[pockets]]></category>
		<category><![CDATA[Polaris]]></category>
		<category><![CDATA[police]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[politico]]></category>
		<category><![CDATA[Portuguesa]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[potential]]></category>
		<category><![CDATA[present]]></category>
		<category><![CDATA[preserved]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[prevents]]></category>
		<category><![CDATA[previously]]></category>
		<category><![CDATA[prioritising]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[professor]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[profit]]></category>
		<category><![CDATA[progressive]]></category>
		<category><![CDATA[project]]></category>
		<category><![CDATA[proportionate]]></category>
		<category><![CDATA[proposal]]></category>
		<category><![CDATA[proposed]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[protects]]></category>
		<category><![CDATA[provider]]></category>
		<category><![CDATA[providers]]></category>
		<category><![CDATA[provides]]></category>
		<category><![CDATA[provisions]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publications]]></category>
		<category><![CDATA[quadrature]]></category>
		<category><![CDATA[quotes]]></category>
		<category><![CDATA[raised]]></category>
		<category><![CDATA[ranking]]></category>
		<category><![CDATA[Rapporteur]]></category>
		<category><![CDATA[readlistenwatch]]></category>
		<category><![CDATA[recalc]]></category>
		<category><![CDATA[recipient]]></category>
		<category><![CDATA[reform]]></category>
		<category><![CDATA[refuse]]></category>
		<category><![CDATA[RegData]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reinforcing]]></category>
		<category><![CDATA[relation]]></category>
		<category><![CDATA[removed]]></category>
		<category><![CDATA[removing]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[represent]]></category>
		<category><![CDATA[repression]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[resolution]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[rethink]]></category>
		<category><![CDATA[retrospective]]></category>
		<category><![CDATA[rights]]></category>
		<category><![CDATA[routine]]></category>
		<category><![CDATA[safeguard]]></category>
		<category><![CDATA[safely]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scheme]]></category>
		<category><![CDATA[Schippers]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[Scully]]></category>
		<category><![CDATA[Secretary]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[secured]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Seguran]]></category>
		<category><![CDATA[sender]]></category>
		<category><![CDATA[serious]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[several]]></category>
		<category><![CDATA[severe]]></category>
		<category><![CDATA[sexual]]></category>
		<category><![CDATA[sharing]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[signalled]]></category>
		<category><![CDATA[signatories]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[society]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Solicitors]]></category>
		<category><![CDATA[sources]]></category>
		<category><![CDATA[Southern]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[speeches]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[Staging]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[states]]></category>
		<category><![CDATA[Statewatch]]></category>
		<category><![CDATA[stories]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[SUPERRR]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Surveilled]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Technologists]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Tehnologie]]></category>
		<category><![CDATA[themselves]]></category>
		<category><![CDATA[thereby]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[threatens]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[trafficking]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[trilateral]]></category>
		<category><![CDATA[troubling]]></category>
		<category><![CDATA[trustworthy]]></category>
		<category><![CDATA[Tugendhat]]></category>
		<category><![CDATA[UBUNTEAM]]></category>
		<category><![CDATA[underlying]]></category>
		<category><![CDATA[undermining]]></category>
		<category><![CDATA[UNICEF]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[upheld]]></category>
		<category><![CDATA[upload]]></category>
		<category><![CDATA[uploaded]]></category>
		<category><![CDATA[uploading]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[urging]]></category>
		<category><![CDATA[Vallance]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[verbatim]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[voices]]></category>
		<category><![CDATA[vulnerable]]></category>
		<category><![CDATA[warned]]></category>
		<category><![CDATA[weaken]]></category>
		<category><![CDATA[weakens]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Whitley]]></category>
		<category><![CDATA[widely]]></category>
		<category><![CDATA[widgets]]></category>
		<category><![CDATA[Wikimedia]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[Woodward]]></category>
		<category><![CDATA[workers]]></category>
		<category><![CDATA[worldwide]]></category>
		<category><![CDATA[wpmucdn]]></category>
		<category><![CDATA[writing]]></category>
		<category><![CDATA[written]]></category>
		<guid isPermaLink="false">https://macdailynews.com/?p=263866</guid>

					<description><![CDATA[<p>Apple is the Online Safety Bill as it could be used to force encrypted messaging tools like iMessage, WhatsApp, Signal and other to scan;</p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/06/27/apple-opposes-uk-bill-that-could-mandate-backdoor-scanning-in-imessage/">Apple opposes UK bill that could mandate backdoor scanning in iMessage</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p]]></description>
										<content:encoded><![CDATA[<p>Apple is the Online Safety Bill as it could be used to force encrypted messaging tools like iMessage, WhatsApp, Signal and other to scan messages for, ostensibly, child sexual abuse material (CSAM). Apple&#8217;s opposition comes as 80 organizations and tech experts have written to UK Technology Minister Chloe Smith urging a rethink.</p>
<p><a href="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?ssl=1"><img decoding="async" loading="lazy" src="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?resize=640%2C452&#038;ssl=1" alt="Apple logo lock" width="640" height="452" class="alignnone size-full wp-image-245057" srcset="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?w=660&amp;ssl=1 660w, https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?resize=300%2C212&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" data-recalc-dims="1" /></a></p>
<p><a href="https://www.bbc.com/news/technology-66028773">Chris Vallance for The Beeb</a>:</p>
<blockquote>
<p>
Apple told the BBC the bill should be amended to protect encryption.</p>
<p>Police, the government and some high-profile child protection charities maintain the tech &#8211; used in apps such as WhatsApp and Apple&#8217;s iMessage &#8211; prevents law enforcement and the firms themselves from identifying the sharing of child sexual abuse material.</p>
<p>But in a statement Apple said: &#8220;End-to-end encryption is a critical capability that protects the privacy of journalists, human rights activists, and diplomats.<br />
&#8220;It also helps everyday citizens defend themselves from surveillance, identity theft, fraud, and data breaches. The Online Safety Bill poses a serious threat to this protection, and could put UK citizens at greater risk.</p>
<p>&#8220;Apple urges the government to amend the bill to protect strong end-to-end encryption for the benefit of all.&#8221;</p>
<p>Several messaging platforms, including Signal and WhatsApp, have previously told the BBC they will refuse to weaken the privacy of their encrypted messaging systems if directed to do so.</p>
<p>Signal said in February that it would &#8220;walk&#8221; from the UK if forced to weaken the privacy of its encrypted messaging app.</p>
<p>Apple&#8217;s statement now means that some of the most widely used encrypted apps oppose this part of the bill.</p>
<p>In 2021 Apple announced plans to scan photographs on people&#8217;s iPhones for abusive content before they were uploaded to iCloud but these were abandoned after a backlash. It has now clearly signalled its opposition to any measure that weakens the privacy of end-to-end encryption.
</p>
</blockquote>
<p><strong><span style="color: #ff0000;">MacDailyNews Take: </span></strong>As Apple should. (<a href="https://macdailynews.com/2021/12/23/eff-apple-must-abandon-not-just-delay-its-backdoor-surveillance-scheme-211223/">Here&#8217;s why</a>.)</p>
<p><a href="https://www.openrightsgroup.org/publications/open-letter-protect-encrypted-messaging/">The open letter signed by over 80 civil society organizations</a> calls on the UK government to protect digital security and private communications by removing provisions from the Online Safety Bill that would require communications service providers to add &#8220;backdoors&#8221; to encrypted messaging services, undermining safety for all. Here it is, verbatim:</p>
<p><em>To: Chloe Smith, Secretary of State,</p>
<p>Department for Science, Innovation and Technology</p>
<p>cc: Tom Tugendhat, Minister of State for Security, Home Office Paul Scully, Minister for Tech and the Digital Economy Lord Parkinson of Whitley Bay</p>
<p>Dear Ms Smith,</p>
<p>Online Safety Bill: Civil society organisations urge UK to protect global digital security and safeguard private communication.</p>
<p>We are over 80 national and international civil society organisations, academics and cyber- experts. We represent a wide range of perspectives including digital human rights and technology. We are writing to you to raise our concerns about the serious threat to the security of private and encrypted messaging posed by the UK’s proposed Online Safety Bill (OSB).</p>
<p>The Online Safety Bill is a deeply troubling legislative proposal. If passed in its present form, the UK could become the first liberal democracy to require the routine scanning of people’s private chat messages, including chats that are secured by end-to-end encryption. As over 40 million UK citizens and 2 billion people worldwide rely on these services, this poses a significant risk to the security of digital communication services not only in the UK, but also internationally.</p>
<p>End-to-end encryption ensures the security of communications for everyone on a network.</p>
<p>It is designed so that no-one, including the platform provider, can read or alter the messages. The confidentiality between sender and recipient is completely preserved. That’s why the United Nations, several human rights groups, and anti-human trafficking organisations alike have emphasised that encryption is a vital human rights tool. [i]</p>
<p>In order to comply with the Online Safety Bill, platform providers would have to break that protection either by removing it or by developing work-arounds. Any form of work-around risks compromising the security of the messaging platform, creating back-doors, and other dangerous ways and means for malicious actors and hostile states to corrupt the system. [ii] This would put all users in danger.</p>
<p>The UK government has indicated its intention for providers to use a technology that would scan chats on people’s phone and devices – known as client-side scanning. The UK government’s assertion that client-side scanning will not compromise the privacy of messages contradicts the significant evidence of cyber-security experts around the world. This software intercepts chat messages before they are encrypted, and as the user is uploading their images or text, and therefore confidentiality of messages cannot be guaranteed. It would most likely breach human rights law in the UK and internationally. [iii]</p>
<p>Serious concerns have also been raised about similar provisions in the EU’s proposed ‘Child Sexual Abuse Regulation’, which an independent expert study warns is in contradiction to human rights rules. [iv] French, Irish and Austrian parliamentarians have all also warned of severe threats to human rights and of undermining encryption. [v]</p>
<p>Moreover, the scanning software would have to be pre-installed on people’s phones, without their permission or full awareness of the severe privacy and security implications. The underlying databases can be corrupted by hostile actors, meaning that individual phones would become vulnerable to attack. The breadth of the measures proposed in the Online Safety Bill – which would infringe the rights to privacy to the same extent for the internet’s majority of legitimate law-abiding users as it would for potential criminals – means that the measures cannot be considered either necessary or proportionate. [vi]</p>
<p>The inconvenient truth is that it is not possible to scan messages for bad things without infringing on the privacy of lawful messages. It is not possible to create a backdoor that only works for “good people” and that cannot be exploited by “bad people”.</p>
<p>Privacy and free expression rights are vital for all citizens everywhere, in every country, to do their jobs, raise their voices, and hold power to account without arbitrary intrusion, persecution or repression. End-to-end encryption provides vital security that allows them to do that without arbitrary interference. People in conflict zones who rely on secure encrypted communications to be able to speak safely to friends and family as well as for national security. Journalists around the world who rely on the confidential channels of encrypted chat, can communicate to sources and upload their stories in safety.</p>
<p>Children, too, need these rights, as emphasised by UNICEF based on the UN Convention of the Rights of the Child.vii Child safety and privacy are not mutually exclusive; they are mutually reinforcing. Indeed, children are less safe without encrypted communications, as they equally rely on secure digital experiences free from their data being harvested or conversations intercepted. Online content scanning alone cannot hope to find out the serious cases of exploitation, which require a whole-of-society approach. The UK government must invest in education, judicial reform, social services, law enforcement and other critical resources to prevent abuse before it can reach the point of online dissemination, thereby prioritising harm prevention over retrospective scanning. [viii]</p>
<p>As an international community, we are deeply concerned that the UK will become the weak link in the global system. The security risk will not be confined within UK borders. It is difficult to envisage how such a destructive step for the security of billions of users could be justified. [ix]</p>
<p>The UK Prime Minister, Rishi Sunak, has said that the UK will maintain freedom, peace and security around the world. With that in mind, we urge you to ensure that end-to-end encrypted services will be removed from the scope of the Bill and that the privacy of people’s confidential communications will be upheld.</p>
<p>Signatories</p>
<p>Access Now<br />
ARTICLE 19: Global Campaign for Free Expression<br />
Asociația pentru Tehnologie și Internet (ApTI)<br />
Associação Portuguesa para<br />
a Promoção da Segurança da Informação (AP2SI)<br />
Association for Progressive Communications (APC)<br />
Big Brother Watch<br />
Centre for Democracy and Technology<br />
Chaos Computer Club (CCC)<br />
Citizen D / Državljan D<br />
Collaboration on International ICT Policy for East and Southern Africa (CIPESA)<br />
Community NeHUBs Africa<br />
cyberstorm.mu<br />
Defend Digital Me<br />
CASM at Demos<br />
Digitalcourage<br />
Digitale Gesellschaft<br />
DNS Africa Media and Communications<br />
Electronic Frontier Finland<br />
Electronic Frontier Foundation (EFF)<br />
Electronic Frontier Norway<br />
Epicenter.works<br />
European Center for Not-for-Profit Law<br />
European Digital Rights (EDRi)<br />
European Sex Workers Rights Association (ESWA)<br />
Fair Vote<br />
Fight for the Future<br />
Foundation for Information Policy Research<br />
Fundación Cibervoluntarios<br />
Global Partners Digital<br />
Granitt<br />
Hermes Center for Transparency and Digital Human Rights<br />
Homo Digitalis<br />
Ikigai Innovation Initiative<br />
Internet Society<br />
Interpeer gUG<br />
ISOC Brazil – Brazilian Chapter of the Internet Society<br />
ISOC Ghana<br />
ISOC India Hyderabad Chapter<br />
ISOC Venezuela<br />
IT-Pol<br />
JCA-Net (Japan)<br />
Kijiji Yeetu<br />
La Quadrature du Net<br />
Liberty<br />
McEvedys Solicitors and Attorneys Ltd<br />
Open Rights Group<br />
OpenMedia<br />
OPTF<br />
Privacy and Access Council of Canada<br />
Privacy International<br />
Ranking Digital Rights<br />
Statewatch<br />
SUPERRR Lab<br />
Tech for Good Asia<br />
UBUNTEAM<br />
Wikimedia Foundation<br />
Wikimedia UK<br />
Professor Paul Bernal<br />
Nicholas Bohm<br />
Dr Duncan Campbell<br />
Alan Cox<br />
Ray Corrigan<br />
Professor Angela Daly<br />
Dr Erin Ferguson<br />
Wendy M. Grossman<br />
Dr Edina Harbinja<br />
Dr Julian Huppert<br />
Steve Karmeinsky<br />
Dr Konstantinos Komaitis<br />
Professor Douwe Korff<br />
Petr Kučera<br />
Mark A. Lane<br />
Christian de Larrinaga<br />
Mark Lizar<br />
Dr Brenda McPhail<br />
Alec Muffett<br />
Riana Pferfferkorn<br />
Simon Phipps<br />
Dr Birgit Schippers<br />
Peter Wells<br />
Professor Alan Woodward</p>
<p>Notes</p>
<p>[i] Human rights, encryption and anonymity in a digital age: report of the UN Special Rapporteur on freedom of expression: www.ohchr.org/en/stories/2015/06/human-rights-encryption-and-anonymity-digital-age<br />
Encryption: a matter of human rights, Amnesty International: www.amnesty.org/en/documents/pol40/3682/2016/en/ Quotes from Polaris anti-trafficking project in news article: www.nbcnews.com/tech/tech-news/wickr-amazon-aws-child-messaging-app-sex-abuse-problem-rcna20674<br />
[ii] Bugs in Our Pockets: The Risks of Client-Side Scanning: arxiv.org/abs/2110.07450<br />
[iii] Internet Society, Client-side scanning: What it is and why it threatens trustworthy, private communication, May 2023, staging.internetsociety.org/wp-content/uploads/2020/04/Client-side-Scanning-Fact-Sheet-EN.pdf<br />
Open Letter from Public Interest Technologists in relation to the European Commission’s proposed Regulation on Child Sexual Abuse (CSA): www.politico.eu/wp-content/uploads/2023/05/10/Experts-letter-encryption-CSA.pdf<br />
Safety Tech Challenge Fund Evaluation Report, see comments on human rights compliance p2: bpb-eu-w2.wpmucdn.com/ blogs.bristol.ac.uk/dist/1/670/files/2023/02/Safety-Tech-Challenge-Fund-evaluation-framework-report.pdf<br />
[iv] Civil Liberties Committee of the European Parliament and European Parliamentary Research Service (EPRS), Complementary Impact Assessment to the proposed EU Regulation laying down rules to prevent and combat child sexual abuse: www.europarl.europa.eu/RegData/etudes/STUD/2023/740248/EPRS_STU(2023)740248_EN.pdf<br />
[v] Irish and French parliamentarians sound the alarm about EU’s CSA Regulation: edri.org/our-work/irish-and-french- parliamentarians-sound-the-alarm-about-eus-csa-regulation/<br />
Binding Resolution of the Austrian Parliament against the Child Sexual Abuse Regulation: epicenter.works/document/4393 vi Index on Censorship, Opinion from Matthew Ryder KC. Surveilled and Exposed: How the Online Safety Bill Creates Insecurity:<br />
www.indexoncensorship.org/wp-content/uploads/2022/11/Surveilled-Exposed-Index-on-Censorship-report-Nov-2022.pdf<br />
[vii] Convention on the Rights of the Child, UNICEF: www.unicef.org/child-rights-convention/convention-text-childrens-version<br />
[viii] CRIN: Privacy and Protection: A children’s rights approach to encryption: home.crin.org/readlistenwatch/stories/privacy-and-protection; and Ross Anderson: Chat Control of Child Protection: www.lightbluetouchpaper.org/2022/10/13/chatcontrol-or-child-protection/<br />
[ix] Rishi Sunak, Statement 14 March 2023: www.gov.uk/government/speeches/pm-statement-at-aukus-trilateral-press-conference</em></p>
<p><strong><span style="color: #ff0000;">Please help support MacDailyNews.</span></strong> <a href="https://macdailynews.com/thank_you_for_supporting_our_independent_tech_blog/">Click or tap here to support our <em>independent</em> tech blog</a>. Thank you!</p>
<p><strong>Support MacDailyNews at no extra cost to you by <a href="https://amzn.to/3Kd2rKY">using this link to shop at Amazon</strong></a>.</p>
<p><script type="text/javascript">
amzn_assoc_tracking_id = "macdailynews-20";
amzn_assoc_ad_mode = "manual";
amzn_assoc_ad_type = "smart";
amzn_assoc_marketplace = "amazon";
amzn_assoc_region = "US";
amzn_assoc_design = "enhanced_links";
amzn_assoc_asins = "B0932QJ2JZ";
amzn_assoc_placement = "adunit";
amzn_assoc_linkid = "13868f0e7ff6a317562f49d8c2ab557a";
</script></p>
<p><script src="https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US"></script></p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/06/27/apple-opposes-uk-bill-that-could-mandate-backdoor-scanning-in-imessage/">Apple opposes UK bill that could mandate backdoor scanning in iMessage</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>iOS 17: Eight Privacy and Security Improvements Coming in Apple&#8217;s Next Update</title>
		<link>https://www.latest-apple-news.com/2023/06/27/ios-17-eight-privacy-and-security-improvements-coming-in-apples-next-update/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Mon, 26 Jun 2023 22:32:09 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[accidentally]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[across]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[additional]]></category>
		<category><![CDATA[adopted]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[aligncenter]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[anytime]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[appleid]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assigns]]></category>
		<category><![CDATA[attachments]]></category>
		<category><![CDATA[attempt]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[blanket]]></category>
		<category><![CDATA[blocked]]></category>
		<category><![CDATA[bottom]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[calendar]]></category>
		<category><![CDATA[calendars]]></category>
		<category><![CDATA[caption]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[chosen]]></category>
		<category><![CDATA[Collection]]></category>
		<category><![CDATA[coming]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[contact]]></category>
		<category><![CDATA[control]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[created]]></category>
		<category><![CDATA[cutting]]></category>
		<category><![CDATA[denied]]></category>
		<category><![CDATA[depends]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[display]]></category>
		<category><![CDATA[downloading]]></category>
		<category><![CDATA[either]]></category>
		<category><![CDATA[enabled]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[entire]]></category>
		<category><![CDATA[events]]></category>
		<category><![CDATA[eventually]]></category>
		<category><![CDATA[exactly]]></category>
		<category><![CDATA[expire]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[fingerprinting]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forget]]></category>
		<category><![CDATA[forgot]]></category>
		<category><![CDATA[format]]></category>
		<category><![CDATA[forums]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[function]]></category>
		<category><![CDATA[functionality]]></category>
		<category><![CDATA[further]]></category>
		<category><![CDATA[garage]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[giving]]></category>
		<category><![CDATA[heading]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[includes]]></category>
		<category><![CDATA[incorrect]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[Intercept]]></category>
		<category><![CDATA[invitees]]></category>
		<category><![CDATA[ipados]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[learned]]></category>
		<category><![CDATA[library]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[macrumors]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[managed]]></category>
		<category><![CDATA[Members]]></category>
		<category><![CDATA[multiple]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[opening]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[passcode]]></category>
		<category><![CDATA[passkey]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[pasted]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[period]]></category>
		<category><![CDATA[periodically]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[previous]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[provided]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[rather]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[remind]]></category>
		<category><![CDATA[removal]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[replacing]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[resets]]></category>
		<category><![CDATA[restricting]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[rumors]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Scroll]]></category>
		<category><![CDATA[secondary]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[securely]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selected]]></category>
		<category><![CDATA[sensors]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[shoring]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[someone]]></category>
		<category><![CDATA[Sonoma]]></category>
		<category><![CDATA[started]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[stripped]]></category>
		<category><![CDATA[strips]]></category>
		<category><![CDATA[tapping]]></category>
		<category><![CDATA[telling]]></category>
		<category><![CDATA[threads]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[Toggle]]></category>
		<category><![CDATA[trackers]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[turning]]></category>
		<category><![CDATA[unknown]]></category>
		<category><![CDATA[unless]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[upgrades]]></category>
		<category><![CDATA[utilities]]></category>
		<category><![CDATA[videos]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[window]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=7f11f36c72ecde40416f46fb4dab13f1</guid>

					<description><![CDATA[The <a href="https://www.macrumors.com/roundup/ios-17/">iOS 17</a> and <a href="https://www.macrumors.com/roundup/ipados-17/">iPadOS 17</a> updates include a number of privacy and security improvements that make your devices safer than ever, with Apple restricting access to photos and calendar events and cutting down further on how websites track you across the web.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/iOS-17-Privacy-and-Security-Improvements-Feature.jpg" alt="" width="2500" height="1406" class="aligncenter size-full wp-image-901520"><br>
<h2>Private Browsing Upgrades in Safari</h2><br>
In Safari, Private browsing windows are now locked and require secondary authentication to unlock and access. If you hand your phone over to someone and they attempt to open your Safari private browsing tab, access will be denied without a <a href="https://www.macrumors.com/guide/mask-face-id/">Face ID</a>/<a href="https://www.macrumors.com/guide/touch-id/">Touch ID</a> scan or a passcode.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/safari-private-browsing-ios-17.jpg" alt="" width="2000" height="1299" class="aligncenter size-full wp-image-898553"><br>
The Private tab is locked automatically.<br>
<br>
<h2>Tracking URL Removal</h2><br>
Opening up a URL in a private browsing window automatically strips all tracking information added to the URL, plus unknown trackers are completely blocked so companies aren't able to track your browsing across multiple sites.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/safari-tracking-all-browsing-ios-17.jpg" alt="" width="2329" height="1310" class="aligncenter size-full wp-image-901517"><br>
URLs can also be stripped when browsing in non-private browsing mode if the functionality is enabled. Here's how to remove URL-based tracking for all browser windows:<br>
<ol><br>
 <li>Open up the Settings app.</li><br>
 <li>Scroll down to Safari.</li><br>
 <li>Tap on Advanced.</li><br>
 <li>Tap on Advanced Tracking and Fingerprinting Protection.</li><br>
 <li>Toggle on "All Browsing."</li><br>
</ol><br>
Turning this on will ensure that all URLs opened in Safari will strip additional tracking information that's pasted on to the end of a URL.<br>
<br>
<h2>Shared Passwords</h2><br>
With ‌iOS 17‌, ‌iPadOS 17‌, and <a href="https://www.macrumors.com/roundup/macos-sonoma/">macOS Sonoma</a>, you can securely share passwords and passkeys with friends and family members using a new shared password function. Using this feature, passwords for shared media accounts, utilities, bills, and more can be provided to multiple people.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/ios-17-shared-passwords.jpg" alt="" width="2000" height="1299" class="aligncenter size-full wp-image-899239"><br>
Each person can access, add to, and change passwords that are shared, with setup available by going to the Passwords section of the Settings app and choosing "Get Started" under the "Family Passwords" heading.<br>
<br>
<h2>Passcode Resets</h2><br>
If you change the passcode on your <a href="https://www.macrumors.com/guide/iphone/">iPhone</a> and then accidentally forget the new passcode that you chose, you now have a 72-hour grace period to fix it without getting locked out of your device.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/iOS-17-Passcode-Reset-Feature.jpg" alt="" width="1600" height="900" class="aligncenter size-full wp-image-900579"><br>
Apple lets you use your old passcode within 72 hours of setting a new one, which is handy if you're someone who is likely to forget a newly created passcode.<br>
<br>
When you enter an incorrect passcode after making a change, you can tap on the "Forgot Passcode?" option at the bottom of the display to use the "Try Passcode Reset" option. Tapping it allows you to use your old passcode to create yet another new passcode.<br>
<br>
For protection in case someone has learned your passcode, there is an "Expire Previous Passcode Now" setting that you can turn on.<br>
<br>
<h2>Photo Library Access</h2><br>
Apple is shoring up Photo Library access in ‌iOS 17‌, and apps have to ask permission to access your entire collection of photos. Apps are provided with only limited access unless you give them permission to see the whole library, which keeps your images private.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/photos-security-ios-17.jpg" alt="" width="3520" height="1980" class="aligncenter size-full wp-image-901518"><br>
You can give apps the following access:<br>
<ul><br>
 <li>Limited Access - Apps can see only the images that you can select, and you can review the selected images anytime either in the app or by going to Settings &#62; Privacy &#38; Security &#62; <a href="https://www.macrumors.com/guide/photos/">Photos</a>.</li><br>
 <li>Full Access - Apps can see all of the images and videos in your Photo Library, and your device will tell you exactly how many photos and videos you're giving access to.</li><br>
 <li>None - No access to the Photo Library at all.</li><br>
 <li>Add ‌Photos‌ Only - The app can add images to your library, but not view them. This setting depends on the app, and is not available for all apps.</li><br>
</ul><br>
If you open up the Settings app and then go to the Privacy and Security section and choose ‌Photos‌, you can see the ‌Photos‌ access that all apps have access to. You can change the settings from here, and it's a good idea to go through the list to see exactly which apps can see your images. You can also opt to remove information like location and caption, and change photo format. <br>
<br>
Downloading a new app that wants Photo Library access will bring up options to give limited or full access. In the past, apps had the option to just ask for blanket Photo Library access, which gave them the entire library, rather than just chosen images. There's much more control over what apps can see in terms of photos in ‌iOS 17‌.<br>
<br>
Your ‌iPhone‌ will also periodically remind you to limit app access to images by telling you how many images an app can see.<br>
<br>
<h2>Calendar Access</h2><br>
Apps can add an event to the Calendar app without being able to view your Calendar through the "Add Events Only" option.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/calendar-app-privacy-ios-17.jpg" alt="" width="5514" height="3102" class="aligncenter size-full wp-image-901524"><br>
Calendar access can be managed by going to Settings &#62; Privacy &#38; Security &#62; Calendars. You can give apps Full Access, choose Add Events Only, or use the None option to revoke access. This section of the Settings app also details how many calendars you have and how many accounts you're signed in to.<br>
<br>
Apps that have full Calendar access can see location, invitees, attachments, and notes, according to Apple.<br>
<br>
<h2>Passkeys</h2><br>
‌iOS 17‌ automatically assigns a passkey to an <a href="https://www.macrumors.com/guide/apple-id/">Apple ID</a>, which is a more secure password alternative. With a passkey, users can sign into an ‌Apple ID‌ with ‌Face ID‌ or ‌Touch ID‌ instead of their password, with the feature available on icloud.com, appleid.apple.com, and other Apple websites.<br>
<br>
<img src="https://images.macrumors.com/article-new/2023/06/iOS-17-Passkey-With-Apple-ID-Feature-3.jpg" alt="" width="2500" height="1406" class="aligncenter size-full wp-image-901156"><br>
Passkeys use a key pair, one that is public and registered to the website or app and one that is private, held only on device. There is no way for a third party to intercept and access a passkey, so a passkey can't be stolen.<br>
<br>
With ‌iOS 17‌, ‌macOS Sonoma‌, and ‌iPadOS 17‌, when you sign into an Apple website, you'll use biometric authentication rather than your password. Passkeys will eventually be adopted by many sites, replacing passwords.<br>
<br>
<h2>Home Activity History</h2><br>
The Home app now includes an activity history for up to 30 days, so you can see who accessed door locks, garage doors, contact sensors, and alarm sensors, and when.<br>
<br>
<h2>Read More</h2><br>
More information on all of the new features in the ‌iOS 17‌ update can be <a href="https://www.macrumors.com/roundup/ios-17/">found in our iOS 17 roundup</a>.<br>This article, "<a href="https://www.macrumors.com/guide/ios-17-privacy-security/">iOS 17: Eight Privacy and Security Improvements Coming in Apple's Next Update</a>" first appeared on <a href="https://www.macrumors.com/">MacRumors.com</a><br><br><a href="https://forums.macrumors.com/threads/ios-17-eight-privacy-and-security-improvements-coming-in-apples-next-update.2394264/">Discuss this article</a> in our forums<br><br]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://www.macrumors.com/roundup/ios-17/">iOS 17</a> and <a href="https://www.macrumors.com/roundup/ipados-17/">iPadOS 17</a> updates include a number of privacy and security improvements that make your devices safer than ever, with Apple restricting access to photos and calendar events and cutting down further on how websites track you across the web.</p>
<p><img decoding="async" src="https://images.macrumors.com/article-new/2023/06/iOS-17-Privacy-and-Security-Improvements-Feature.jpg" alt="" width="2500" height="1406" class="aligncenter size-full wp-image-901520" /><br />
</p>
<h2 id="private_browsing_upgrades_in_safari">Private Browsing Upgrades in Safari</h2>
<p>
In Safari, Private browsing windows are now locked and require secondary authentication to unlock and access. If you hand your phone over to someone and they attempt to open your Safari private browsing tab, access will be denied without a <a href="https://www.macrumors.com/guide/mask-face-id/">Face ID</a>/<a href="https://www.macrumors.com/guide/touch-id/">Touch ID</a> scan or a passcode.</p>
<p><img decoding="async" src="https://images.macrumors.com/article-new/2023/06/safari-private-browsing-ios-17.jpg" alt="" width="2000" height="1299" class="aligncenter size-full wp-image-898553" /><br />
<br />
The Private tab is locked automatically.</p>
<h2 id="tracking_url_removal">Tracking URL Removal</h2>
<p>
Opening up a URL in a private browsing window automatically strips all tracking information added to the URL, plus unknown trackers are completely blocked so companies aren&#8217;t able to track your browsing across multiple sites.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/safari-tracking-all-browsing-ios-17.jpg" alt="" width="2329" height="1310" class="aligncenter size-full wp-image-901517" /><br />
<br />
URLs can also be stripped when browsing in non-private browsing mode if the functionality is enabled. Here&#8217;s how to remove URL-based tracking for all browser windows:<br />
</p>
<ol>
</p>
<li>Open up the Settings app.</li>
<p></p>
<li>Scroll down to Safari.</li>
<p></p>
<li>Tap on Advanced.</li>
<p></p>
<li>Tap on Advanced Tracking and Fingerprinting Protection.</li>
<p></p>
<li>Toggle on &#8220;All Browsing.&#8221;</li>
<p>
</ol>
<p>
Turning this on will ensure that all URLs opened in Safari will strip additional tracking information that&#8217;s pasted on to the end of a URL.</p>
<h2 id="shared_passwords">Shared Passwords</h2>
<p>
With &zwnj;iOS 17&zwnj;, &zwnj;iPadOS 17&zwnj;, and <a href="https://www.macrumors.com/roundup/macos-sonoma/">macOS Sonoma</a>, you can securely share passwords and passkeys with friends and family members using a new shared password function. Using this feature, passwords for shared media accounts, utilities, bills, and more can be provided to multiple people.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/ios-17-shared-passwords.jpg" alt="" width="2000" height="1299" class="aligncenter size-full wp-image-899239" /><br />
<br />
Each person can access, add to, and change passwords that are shared, with setup available by going to the Passwords section of the Settings app and choosing &#8220;Get Started&#8221; under the &#8220;Family Passwords&#8221; heading.</p>
<h2 id="passcode_resets">Passcode Resets</h2>
<p>
If you change the passcode on your <a href="https://www.macrumors.com/guide/iphone/">iPhone</a> and then accidentally forget the new passcode that you chose, you now have a 72-hour grace period to fix it without getting locked out of your device.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/iOS-17-Passcode-Reset-Feature.jpg" alt="" width="1600" height="900" class="aligncenter size-full wp-image-900579" /><br />
<br />
Apple lets you use your old passcode within 72 hours of setting a new one, which is handy if you&#8217;re someone who is likely to forget a newly created passcode.</p>
<p>When you enter an incorrect passcode after making a change, you can tap on the &#8220;Forgot Passcode?&#8221; option at the bottom of the display to use the &#8220;Try Passcode Reset&#8221; option. Tapping it allows you to use your old passcode to create yet another new passcode.</p>
<p>For protection in case someone has learned your passcode, there is an &#8220;Expire Previous Passcode Now&#8221; setting that you can turn on.</p>
<h2 id="photo_library_access">Photo Library Access</h2>
<p>
Apple is shoring up Photo Library access in &zwnj;iOS 17&zwnj;, and apps have to ask permission to access your entire collection of photos. Apps are provided with only limited access unless you give them permission to see the whole library, which keeps your images private.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/photos-security-ios-17.jpg" alt="" width="3520" height="1980" class="aligncenter size-full wp-image-901518" /><br />
<br />
You can give apps the following access:<br />
</p>
<ul>
</p>
<li>Limited Access &#8211; Apps can see only the images that you can select, and you can review the selected images anytime either in the app or by going to Settings > Privacy &amp; Security > <a href="https://www.macrumors.com/guide/photos/">Photos</a>.</li>
<p></p>
<li>Full Access &#8211; Apps can see all of the images and videos in your Photo Library, and your device will tell you exactly how many photos and videos you&#8217;re giving access to.</li>
<p></p>
<li>None &#8211; No access to the Photo Library at all.</li>
<p></p>
<li>Add &zwnj;Photos&zwnj; Only &#8211; The app can add images to your library, but not view them. This setting depends on the app, and is not available for all apps.</li>
<p>
</ul>
<p>
If you open up the Settings app and then go to the Privacy and Security section and choose &zwnj;Photos&zwnj;, you can see the &zwnj;Photos&zwnj; access that all apps have access to. You can change the settings from here, and it&#8217;s a good idea to go through the list to see exactly which apps can see your images. You can also opt to remove information like location and caption, and change photo format. </p>
<p>Downloading a new app that wants Photo Library access will bring up options to give limited or full access. In the past, apps had the option to just ask for blanket Photo Library access, which gave them the entire library, rather than just chosen images. There&#8217;s much more control over what apps can see in terms of photos in &zwnj;iOS 17&zwnj;.</p>
<p>Your &zwnj;iPhone&zwnj; will also periodically remind you to limit app access to images by telling you how many images an app can see.</p>
<h2 id="calendar_access">Calendar Access</h2>
<p>
Apps can add an event to the Calendar app without being able to view your Calendar through the &#8220;Add Events Only&#8221; option.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/calendar-app-privacy-ios-17.jpg" alt="" width="5514" height="3102" class="aligncenter size-full wp-image-901524" /><br />
<br />
Calendar access can be managed by going to Settings > Privacy &#038; Security > Calendars. You can give apps Full Access, choose Add Events Only, or use the None option to revoke access. This section of the Settings app also details how many calendars you have and how many accounts you&#8217;re signed in to.</p>
<p>Apps that have full Calendar access can see location, invitees, attachments, and notes, according to Apple.</p>
<h2 id="passkeys">Passkeys</h2>
<p>
&zwnj;iOS 17&zwnj; automatically assigns a passkey to an <a href="https://www.macrumors.com/guide/apple-id/">Apple ID</a>, which is a more secure password alternative. With a passkey, users can sign into an &zwnj;Apple ID&zwnj; with &zwnj;Face ID&zwnj; or &zwnj;Touch ID&zwnj; instead of their password, with the feature available on icloud.com, appleid.apple.com, and other Apple websites.</p>
<p><img loading="lazy" decoding="async" src="https://images.macrumors.com/article-new/2023/06/iOS-17-Passkey-With-Apple-ID-Feature-3.jpg" alt="" width="2500" height="1406" class="aligncenter size-full wp-image-901156" /><br />
<br />
Passkeys use a key pair, one that is public and registered to the website or app and one that is private, held only on device. There is no way for a third party to intercept and access a passkey, so a passkey can&#8217;t be stolen.</p>
<p>With &zwnj;iOS 17&zwnj;, &zwnj;macOS Sonoma&zwnj;, and &zwnj;iPadOS 17&zwnj;, when you sign into an Apple website, you&#8217;ll use biometric authentication rather than your password. Passkeys will eventually be adopted by many sites, replacing passwords.</p>
<h2 id="home_activity_history">Home Activity History</h2>
<p>
The Home app now includes an activity history for up to 30 days, so you can see who accessed door locks, garage doors, contact sensors, and alarm sensors, and when.</p>
<h2 id="read_more">Read More</h2>
<p>
More information on all of the new features in the &zwnj;iOS 17&zwnj; update can be <a href="https://www.macrumors.com/roundup/ios-17/">found in our iOS 17 roundup</a>.<br />This article, &quot;<a href="https://www.macrumors.com/guide/ios-17-privacy-security/">iOS 17: Eight Privacy and Security Improvements Coming in Apple&#039;s Next Update</a>&quot; first appeared on <a href="https://www.macrumors.com/">MacRumors.com</a></p>
<p><a href="https://forums.macrumors.com/threads/ios-17-eight-privacy-and-security-improvements-coming-in-apples-next-update.2394264/">Discuss this article</a> in our forums</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>How to disconnect third-party apps from your Google account</title>
		<link>https://www.latest-apple-news.com/2023/06/23/how-to-disconnect-third-party-apps-from-your-google-account/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 12:31:17 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[active]]></category>
		<category><![CDATA[actively]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[ADXuLT]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[ALKSPRNzUqrdo]]></category>
		<category><![CDATA[allowed]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[amount]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[appears]]></category>
		<category><![CDATA[assistant]]></category>
		<category><![CDATA[associated]]></category>
		<category><![CDATA[attached]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[background]]></category>
		<category><![CDATA[behind]]></category>
		<category><![CDATA[beneath]]></category>
		<category><![CDATA[between]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[button]]></category>
		<category><![CDATA[buttons]]></category>
		<category><![CDATA[CaAFmH]]></category>
		<category><![CDATA[cautious]]></category>
		<category><![CDATA[cbhDEM]]></category>
		<category><![CDATA[certain]]></category>
		<category><![CDATA[checker]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[choice]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[combination]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[confirm]]></category>
		<category><![CDATA[connected]]></category>
		<category><![CDATA[connection]]></category>
		<category><![CDATA[Connections]]></category>
		<category><![CDATA[COqkaZ]]></category>
		<category><![CDATA[corner]]></category>
		<category><![CDATA[course]]></category>
		<category><![CDATA[created]]></category>
		<category><![CDATA[cutter]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[DhLrme]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[differently]]></category>
		<category><![CDATA[direct]]></category>
		<category><![CDATA[disconnect]]></category>
		<category><![CDATA[disconnected]]></category>
		<category><![CDATA[dwuJlx]]></category>
		<category><![CDATA[either]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[entries]]></category>
		<category><![CDATA[EoBALl]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[established]]></category>
		<category><![CDATA[Everything]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[extension]]></category>
		<category><![CDATA[extensions]]></category>
		<category><![CDATA[extention]]></category>
		<category><![CDATA[fairly]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[filter]]></category>
		<category><![CDATA[filters]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[forgotten]]></category>
		<category><![CDATA[future]]></category>
		<category><![CDATA[giving]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[grayed]]></category>
		<category><![CDATA[Gxnmze]]></category>
		<category><![CDATA[Haddad]]></category>
		<category><![CDATA[handle]]></category>
		<category><![CDATA[headed]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[holding]]></category>
		<category><![CDATA[hooked]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[ideally]]></category>
		<category><![CDATA[Illustrated]]></category>
		<category><![CDATA[illustration]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[interact]]></category>
		<category><![CDATA[intrinsically]]></category>
		<category><![CDATA[labeled]]></category>
		<category><![CDATA[leaving]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[little]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[manage]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[minimize]]></category>
		<category><![CDATA[minimum]]></category>
		<category><![CDATA[mjZmZJ]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[myaccount]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[Nothing]]></category>
		<category><![CDATA[npdiUa]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[online]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[passkey]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Perhaps]]></category>
		<category><![CDATA[period]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[permissions]]></category>
		<category><![CDATA[PFilDY]]></category>
		<category><![CDATA[picture]]></category>
		<category><![CDATA[PIhQom]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[practice]]></category>
		<category><![CDATA[preferred]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[privileges]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[reading]]></category>
		<category><![CDATA[realize]]></category>
		<category><![CDATA[really]]></category>
		<category><![CDATA[reestablish]]></category>
		<category><![CDATA[regularly]]></category>
		<category><![CDATA[remains]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[robust]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[screens]]></category>
		<category><![CDATA[Scroll]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selective]]></category>
		<category><![CDATA[sending]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[several]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[SjorpI]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[snooze]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[speaker]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[sTKzPD]]></category>
		<category><![CDATA[storage]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[switch]]></category>
		<category><![CDATA[symbol]]></category>
		<category><![CDATA[themes]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[thumbor]]></category>
		<category><![CDATA[together]]></category>
		<category><![CDATA[trimmed]]></category>
		<category><![CDATA[typically]]></category>
		<category><![CDATA[unclick]]></category>
		<category><![CDATA[unusual]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[useful]]></category>
		<category><![CDATA[whMcJw]]></category>
		<category><![CDATA[WOWBma]]></category>
		<category><![CDATA[xawtyI]]></category>
		<category><![CDATA[XEDxxs]]></category>
		<category><![CDATA[XMJOEA]]></category>
		<guid isPermaLink="false">https://www.theverge.com/23770191/google-apps-third-party-disconnect-remove-how-to</guid>

					<description><![CDATA[  

    
      
        Illustration by Samar Haddad / The Verge
    

  If you’ve got an active Google account — or especially if you’ve got one you haven’t used in a while — you’ve probably got more apps and services hooked up to your account than yo]]></description>
										<content:encoded><![CDATA[<br />
<figure>
      <img decoding="async" alt="Hand holding phone with Google “G” symbol against an illustrated background." src="https://cdn.vox-cdn.com/thumbor/7VENYiQtFoQzVGEx8q3B0gbyBoM=/0x0:2040x1360/1310x873/cdn.vox-cdn.com/uploads/chorus_image/image/72395497/HT012_google_0002.0.jpg" /><figcaption>Illustration by Samar Haddad / The Verge</figcaption></figure>
<p id="cbhDEM">If you’ve got an active Google account — or especially if you’ve got one you haven’t used in a while — you’ve probably got more apps and services hooked up to your account than you realize. There are all those places where you’ve “signed in with Google,” all those browser extensions you’ve given permissions to, all those add-ons that you’ve installed on top of Gmail and Google Drive, and so on.</p>
<p id="SX4rqB">While it’s always a good idea to be selective and cautious in choosing which apps and sites get these privileges, there’s nothing intrinsically wrong with using your Google account instead of an email address and password combination or in giving another app that may be useful access to your emails or Google storage (depending on the app, of course). </p>
<p id="53L5gd">However, when you stop using these third-party apps and services but keep the connections to your Google account in place, you are potentially leaving your data and your account exposed. It’s good security practice to keep the number of apps that can access your Google account down to a minimum — only the ones you fully trust and regularly use. The fewer connections, the safer you are.</p>
<p id="XMJOEA">Here’s how to find out what apps and services are attached to your Google account and how to remove them.</p>
<h2 id="ac9vv3">Using your Google account page</h2>
<figure class="e-image">
        <img decoding="async" alt="You can manage third-party apps and services from your Google account. " data-mask-text="false" src="https://cdn.vox-cdn.com/thumbor/ZAabvUSNhzq53XgRBQaUZ6VkFrE=/400x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/24746030/01_account.png"><figcaption><em>You can manage third-party apps and services from your Google account. </em></figcaption></figure>
<p id="b5Wvnx">Google’s account management tools are fairly robust. You can access them on the web by going to <a href="https://myaccount.google.com/">your Google account page</a> and logging in.</p>
<ul>
<li id="4CqWVU">Click <strong>Security</strong> from the menu on the left.</li>
<li id="DhLrme">Scroll down the main section to <strong>Your connections to third-party apps and services</strong>.</li>
<li id="SjorpI">Select <strong>See all connections</strong>.</li>
</ul>
<p id="dVcZ9B">You’ll now see a list of everything connected to your Google account — including, probably, a few apps you’d forgotten about. </p>
<h3 id="8XKNBW">Checking connected apps and services</h3>
<p id="Fa3kPk">Click on any of the entries in the list to see more information about it, including what the app is allowed to do and which Google apps it has access to (Gmail for reading and sending emails, for example). If this is an app that you no longer want to have access to your Google account:</p>
<ul>
<li id="COqkaZ">Select <strong>Delete all connections</strong> to break the link between the app or service and your Google account, then click <strong>Confirm</strong>. </li>
<li id="WOWBma">If you need more info first, click on the <strong>See details</strong> button to find out when the connection to your Google account was first established. From there, you can stop access by clicking the blue button (which will say either <strong>Delete connection</strong> or <strong>Stop using Sign in with Google</strong>).</li>
</ul>
<p id="wmYS3j">Note that this doesn’t prevent you from using the app and service again in the future: if you load it up again, however, you’ll have to reestablish the connection to your Google account using your password or passkey.</p>
<h3 id="6XmJQv">Checking specific apps</h3>
<p id="EoBALl">On the <strong>Third-party apps &amp; services page</strong>, just beneath the title that says <strong>[number] total apps and services</strong>, there are several buttons that will filter which apps you want to check out, including one labeled <strong>Access to</strong>. </p>
<figure class="e-image">
        <img decoding="async" alt="A pop-up menu of Google apps over the Third-party apps &amp;amp; services page." data-mask-text="false" src="https://cdn.vox-cdn.com/thumbor/JKdlAdMNlC1zd-ALKSPRNzUqrdo=/400x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/24746009/access_to.png"><figcaption><em>A menu lists specific Google apps that are being access by other apps or devices.</em></figcaption></figure>
<ul>
<li id="Mmmc9v">Click on <strong>Access to</strong> get a drop-down menu that lists specific Google apps that are being accessed by apps or devices (such as a speaker that uses Google Assistant).</li>
<li id="p60L0l">Click on any of the entries in the list to see more information about it, including what the app is allowed to do.</li>
<li id="siRKw1">Select <strong>Delete all connections</strong> to break the link between the app or service and your Google account, then click <strong>Confirm</strong>. </li>
</ul>
<h2 id="a3sffL">Using your mobile device</h2>
<p id="mJ7BcM">You can get to the same screens and options on Android and iOS, too. </p>
<h3 id="28SGzg">On Android:</h3>
<ul>
<li id="9NPQN3">Open Settings and tap <strong>Google</strong>.</li>
<li id="Xdyz8F">Select <strong>Manage your Google Account</strong>.</li>
<li id="sTKzPD">Switch to the <strong>Security</strong> tab.</li>
<li id="J1UnWv">Scroll down to <strong>Your connections to third-party apps &amp; services.</strong>
</li>
</ul>
<h3 id="Gxnmze">On iOS</h3>
<ul>
<li id="2csnhB">Open the Google app and tap your profile picture (top right).</li>
<li id="XEDxxs">Choose <strong>Manage your Google Account</strong>.</li>
<li id="PFilDY">Open the <strong>Security</strong> tab.</li>
<li id="dwuJlx">Scroll down to <strong>Your connections to third-party apps &amp; services.</strong>
</li>
</ul>
<p id="8Y6N23">You can also get to your Google account through the mobile browser on your smartphone: just head to <a href="https://myaccount.google.com/">your Google account page</a> and sign in.</p>
<h2 id="Q5c2Oq">From your Google Drive</h2>
<figure class="e-image">
        <img decoding="async" alt="A pop-up box labeled Disconnect app and just below “Online Audio Cutter will be disconnected from Drive.”" data-mask-text="false" src="https://cdn.vox-cdn.com/thumbor/6zaQRVziTYymR-g4ZGCyUgVbPkw=/400x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/24745819/02_drive.jpg"><figcaption><em>You can disconnect apps from Google Drive and delete their data at the same time. </em></figcaption></figure>
<p id="8X8onj">There’s actually a completely separate list of connected apps and services in your Google Drive account. These are typically plug-ins you’re running on top of Google Drive (perhaps to handle unusual file types) or games and apps that need the cloud storage space.</p>
<p id="TH6kYt">Head to <a href="https://drive.google.com/drive/my-drive">Google Drive on the web</a>, log into your account, and then:</p>
<p id="krRx8H">&#8211; Click the cog icon (top right corner).</p>
<p id="uUSjJ9">&#8211; Choose <strong>Settings</strong> from the menu, then <strong>Manage apps</strong> on the left.</p>
<p id="4Z69Sx">Again, you’ll see a list of connected apps, together with what the app is designed to do and, in some cases, how much storage space its data is using.</p>
<ul>
<li id="mjZmZJ">Click <strong>Options</strong> next to any third-party app to see how you can manage it. (Most Google-created apps will have <strong>Options</strong> grayed out, although you can unclick the <strong>Use by default</strong> if you have a different preferred app.)</li>
<li id="1ad0dN">Choose <strong>Disconnect from Drive</strong> to break the connection with your Google Drive account (this typically appears for apps that are still active, and you get the option to delete its data at the same time).</li>
<li id="6E8773">If an app is grayed out, it’s likely no longer available — you will probably see the message <strong>This app no longer has access to Drive</strong> beneath it, along with the amount of hidden app data that still remains behind. Click <strong>Options</strong> and choose <strong>Delete hidden app data</strong> to remove any associated files.</li>
</ul>
<p id="pOAOh4">This is only something you can do on the web — the same screen isn’t available through the Android and iOS apps for Google Drive.</p>
<h2 id="CaAFmH">Web browser extensions</h2>
<figure class="e-image">
        <img decoding="async" alt="Page headed Extensions with information about the extention Checker Plus for Gmail." data-mask-text="false" src="https://cdn.vox-cdn.com/thumbor/Mz4aMjZ-RW3mhhjMd_WTaIzhlBc=/400x0/filters:no_upscale()/cdn.vox-cdn.com/uploads/chorus_asset/file/24746037/03_browser.png"><figcaption><em>Your browser will tell you which sites an extension has access to.</em></figcaption></figure>
<p id="4BnvcI">Browser extensions work a little differently in that they won’t all have direct access to your Google account, but they may have permission to interact with web apps (such as Gmail and Google Docs) when they’re open in your browser.</p>
<p id="5XeNt7">For example, a Gmail extension that lets you snooze emails for a certain period doesn’t need permission to log into your Google account but will have permission to interact with your Gmail data when the app is open in a browser tab.</p>
<p id="whMcJw">As with full apps and services, keep your list of extensions trimmed down as much as possible to minimize the security risks — ideally, you should only really keep the ones you’re actively using.</p>
<p id="xawtyI">Head to the extensions page in your browser of choice to see active extensions and remove them if necessary:</p>
<ul>
<li id="npdiUa">In Chrome and Edge, click the three dots (top right), then <strong>Extensions &gt; Manage Extensions</strong>.</li>
<li id="ADXuLT">In Firefox, click the three lines (top right), then <strong>Add-ons and themes &gt; Extensions</strong>.</li>
<li id="PIhQom">In Safari, select <strong>Safari &gt; Settings &gt; Extensions</strong> to see a list.</li>
</ul>
<p id="R4NfSl">
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Macs can get viruses, but do Macs need antivirus software?</title>
		<link>https://www.latest-apple-news.com/2023/06/13/macs-can-get-viruses-but-do-macs-need-antivirus-software/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 16:14:05 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[ability]]></category>
		<category><![CDATA[absolutely]]></category>
		<category><![CDATA[acceptable]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[acknowledged]]></category>
		<category><![CDATA[Activation]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[adding]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[additional]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[addresses]]></category>
		<category><![CDATA[adjust]]></category>
		<category><![CDATA[admitted]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[advantages]]></category>
		<category><![CDATA[advertisers]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[affected]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[aggressive]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[Aitivirus]]></category>
		<category><![CDATA[albums]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[almost]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[answers]]></category>
		<category><![CDATA[anticipated]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[anything]]></category>
		<category><![CDATA[anywhere]]></category>
		<category><![CDATA[appearing]]></category>
		<category><![CDATA[appleid]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[applied]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[approves]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrive]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arriving]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assigned]]></category>
		<category><![CDATA[astonishing]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[attacking]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[attempt]]></category>
		<category><![CDATA[August]]></category>
		<category><![CDATA[authenticate]]></category>
		<category><![CDATA[authenticated]]></category>
		<category><![CDATA[authenticating]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authenticator]]></category>
		<category><![CDATA[authorized]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[background]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[banners]]></category>
		<category><![CDATA[bearing]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[benefit]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[beware]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[biometrically]]></category>
		<category><![CDATA[blessing]]></category>
		<category><![CDATA[blockblock]]></category>
		<category><![CDATA[Blocks]]></category>
		<category><![CDATA[bottom]]></category>
		<category><![CDATA[bounties]]></category>
		<category><![CDATA[Bounty]]></category>
		<category><![CDATA[bricked]]></category>
		<category><![CDATA[bringing]]></category>
		<category><![CDATA[brought]]></category>
		<category><![CDATA[Browse]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[bundle]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[bypassed]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[careful]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[Celebrities]]></category>
		<category><![CDATA[certainly]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[challenging]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[character]]></category>
		<category><![CDATA[checked]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[checks]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[closed]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[colleagues]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[Complete]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[components]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[concern]]></category>
		<category><![CDATA[concerned]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[confirmation]]></category>
		<category><![CDATA[confirming]]></category>
		<category><![CDATA[connect]]></category>
		<category><![CDATA[connected]]></category>
		<category><![CDATA[connecting]]></category>
		<category><![CDATA[consensus]]></category>
		<category><![CDATA[consider]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[consistently]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[contaminated]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[contents]]></category>
		<category><![CDATA[controlled]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[course]]></category>
		<category><![CDATA[crashes]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[CrescentCore]]></category>
		<category><![CDATA[criminal]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[criticised]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptographic]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[customer]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dangers]]></category>
		<category><![CDATA[deadline]]></category>
		<category><![CDATA[december]]></category>
		<category><![CDATA[decide]]></category>
		<category><![CDATA[decline]]></category>
		<category><![CDATA[decreased]]></category>
		<category><![CDATA[decreasing]]></category>
		<category><![CDATA[dedicated]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[definitely]]></category>
		<category><![CDATA[degree]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[deleted]]></category>
		<category><![CDATA[delivered]]></category>
		<category><![CDATA[demonstrate]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[depends]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[despite]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[detected]]></category>
		<category><![CDATA[detections]]></category>
		<category><![CDATA[determine]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[difficult]]></category>
		<category><![CDATA[digitally]]></category>
		<category><![CDATA[disable]]></category>
		<category><![CDATA[disaster]]></category>
		<category><![CDATA[discontinued]]></category>
		<category><![CDATA[discover]]></category>
		<category><![CDATA[discovered]]></category>
		<category><![CDATA[discoveries]]></category>
		<category><![CDATA[discovers]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[display]]></category>
		<category><![CDATA[displayed]]></category>
		<category><![CDATA[documented]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloaded]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[dramatically]]></category>
		<category><![CDATA[during]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easily]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[effect]]></category>
		<category><![CDATA[elements]]></category>
		<category><![CDATA[eliminating]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[enables]]></category>
		<category><![CDATA[encourage]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypting]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encrypts]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[enough]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[equipped]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[establish]]></category>
		<category><![CDATA[established]]></category>
		<category><![CDATA[evaluation]]></category>
		<category><![CDATA[everyone]]></category>
		<category><![CDATA[exactly]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[exodus]]></category>
		<category><![CDATA[expanded]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explains]]></category>
		<category><![CDATA[explicit]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[extended]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[extent]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FaceTime]]></category>
		<category><![CDATA[factor]]></category>
		<category><![CDATA[failed]]></category>
		<category><![CDATA[falling]]></category>
		<category><![CDATA[familiar]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[Federighi]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[figures]]></category>
		<category><![CDATA[FileVault]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[finder]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[fluctuated]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forwarded]]></category>
		<category><![CDATA[fraudulent]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[friend]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[further]]></category>
		<category><![CDATA[Gatekeeper]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[generally]]></category>
		<category><![CDATA[generating]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[Granted]]></category>
		<category><![CDATA[growing]]></category>
		<category><![CDATA[guessed]]></category>
		<category><![CDATA[gullible]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hampering]]></category>
		<category><![CDATA[happen]]></category>
		<category><![CDATA[happened]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[harboring]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[Harvest]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[hellip]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[higher]]></category>
		<category><![CDATA[highest]]></category>
		<category><![CDATA[highlighted]]></category>
		<category><![CDATA[hijacked]]></category>
		<category><![CDATA[historically]]></category>
		<category><![CDATA[hogging]]></category>
		<category><![CDATA[Hopefully]]></category>
		<category><![CDATA[hotspot]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[hyperlinks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[identification]]></category>
		<category><![CDATA[identified]]></category>
		<category><![CDATA[ignored]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[imagine]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[Impossible]]></category>
		<category><![CDATA[improved]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[Improves]]></category>
		<category><![CDATA[improving]]></category>
		<category><![CDATA[incentive]]></category>
		<category><![CDATA[Incentivising]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[increasing]]></category>
		<category><![CDATA[increasingly]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[indicates]]></category>
		<category><![CDATA[indicator]]></category>
		<category><![CDATA[infallible]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[infiltrate]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[inspects]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructing]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[Intego]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[intelligent]]></category>
		<category><![CDATA[intended]]></category>
		<category><![CDATA[interested]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[invisibly]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[isolates]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[issuing]]></category>
		<category><![CDATA[itself]]></category>
		<category><![CDATA[keeping]]></category>
		<category><![CDATA[Keychain]]></category>
		<category><![CDATA[kqzyfj]]></category>
		<category><![CDATA[Krstic]]></category>
		<category><![CDATA[larger]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[launching]]></category>
		<category><![CDATA[leaving]]></category>
		<category><![CDATA[legitimate]]></category>
		<category><![CDATA[lengths]]></category>
		<category><![CDATA[letter]]></category>
		<category><![CDATA[lifted]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[Linker]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[locate]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[Lookup]]></category>
		<category><![CDATA[lucrative]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[majority]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[manage]]></category>
		<category><![CDATA[managed]]></category>
		<category><![CDATA[manually]]></category>
		<category><![CDATA[maximum]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[medium]]></category>
		<category><![CDATA[meeting]]></category>
		<category><![CDATA[Members]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[microphone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[miners]]></category>
		<category><![CDATA[minutes]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[namely]]></category>
		<category><![CDATA[nasties]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[normally]]></category>
		<category><![CDATA[Norton]]></category>
		<category><![CDATA[notice]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[November]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Objective]]></category>
		<category><![CDATA[obsolete]]></category>
		<category><![CDATA[obtain]]></category>
		<category><![CDATA[obviously]]></category>
		<category><![CDATA[occasions]]></category>
		<category><![CDATA[offered]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[opening]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[others]]></category>
		<category><![CDATA[overall]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[panicking]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[passing]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[pasteboard]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[percent]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[periodically]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[pernicious]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[player]]></category>
		<category><![CDATA[pleased]]></category>
		<category><![CDATA[pleasingly]]></category>
		<category><![CDATA[pointed]]></category>
		<category><![CDATA[popular]]></category>
		<category><![CDATA[popularity]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[Premium]]></category>
		<category><![CDATA[pretending]]></category>
		<category><![CDATA[pretty]]></category>
		<category><![CDATA[prevalence]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[problematic]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[profiling]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[promotion]]></category>
		<category><![CDATA[promptly]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protected]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[protections]]></category>
		<category><![CDATA[protects]]></category>
		<category><![CDATA[provider]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicised]]></category>
		<category><![CDATA[publicity]]></category>
		<category><![CDATA[pulled]]></category>
		<category><![CDATA[purchase]]></category>
		<category><![CDATA[pushed]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[quickly]]></category>
		<category><![CDATA[QuickTime]]></category>
		<category><![CDATA[rather]]></category>
		<category><![CDATA[reacts]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[reasons]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[recent]]></category>
		<category><![CDATA[recently]]></category>
		<category><![CDATA[recommended]]></category>
		<category><![CDATA[recommending]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[recoverable]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[regardless]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[regularly]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[remains]]></category>
		<category><![CDATA[remember]]></category>
		<category><![CDATA[remotely]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[reported]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[request]]></category>
		<category><![CDATA[requests]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[requirement]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[researchers]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[responded]]></category>
		<category><![CDATA[responding]]></category>
		<category><![CDATA[Responds]]></category>
		<category><![CDATA[restart]]></category>
		<category><![CDATA[restrictions]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[resurgence]]></category>
		<category><![CDATA[retire]]></category>
		<category><![CDATA[retract]]></category>
		<category><![CDATA[retracted]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[reward]]></category>
		<category><![CDATA[rewards]]></category>
		<category><![CDATA[rolling]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[routes]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[safest]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[sandboxed]]></category>
		<category><![CDATA[Sandboxing]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scheme]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selected]]></category>
		<category><![CDATA[senders]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[separating]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[seriousness]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[shouldn]]></category>
		<category><![CDATA[sierra]]></category>
		<category><![CDATA[signature]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[Silverlight]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[Similarly]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[smaller]]></category>
		<category><![CDATA[snoopers]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[soaring]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[someone]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[sometimes]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[speeds]]></category>
		<category><![CDATA[Sponsored]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[started]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[stealers]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[stopped]]></category>
		<category><![CDATA[stored]]></category>
		<category><![CDATA[strains]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[subject]]></category>
		<category><![CDATA[subscriber]]></category>
		<category><![CDATA[subsequently]]></category>
		<category><![CDATA[suggested]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[surfing]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[suspicious]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[target]]></category>
		<category><![CDATA[techhive]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[teenager]]></category>
		<category><![CDATA[Thanks]]></category>
		<category><![CDATA[themselves]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[theverge]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[tkqlhce]]></category>
		<category><![CDATA[traced]]></category>
		<category><![CDATA[tracing]]></category>
		<category><![CDATA[trackers]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[traffic]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[trying]]></category>
		<category><![CDATA[turning]]></category>
		<category><![CDATA[Typhoid]]></category>
		<category><![CDATA[typical]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[underneath]]></category>
		<category><![CDATA[unencrypt]]></category>
		<category><![CDATA[unfortunately]]></category>
		<category><![CDATA[unidentified]]></category>
		<category><![CDATA[Unlikely]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[unsigned]]></category>
		<category><![CDATA[unwanted]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utilised]]></category>
		<category><![CDATA[utilities]]></category>
		<category><![CDATA[various]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[Verification]]></category>
		<category><![CDATA[verified]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[warning]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[whereby]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[widespread]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[wrapper]]></category>
		<category><![CDATA[writing]]></category>
		<category><![CDATA[written]]></category>
		<category><![CDATA[XProtect]]></category>
		<category><![CDATA[yourself]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=73ef28e8b154e92902e3b7fa61570c9f</guid>

					<description><![CDATA[Macworld






Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&#8217;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus soft]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&rsquo;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus software.</p>
<p>Historically, the Mac has been considered <a href="https://www.macworld.com/article/668710/how-secure-mac.html">safe and secure</a> for a number of reasons that we will go into below, but in recent years the consensus has fluctuated. In its <a rel="nofollow" href="https://www.kqzyfj.com/click-100470607-15376698?sid=1-1-670537-1-0-0&amp;url=https://www.malwarebytes.com/resources/files/2020/02/2020_state-of-malware-report.pdf" >2020 State of Malware</a> report, Malwarebytes said it saw &ldquo;a significant rise in the overall prevalence of Mac threats in 2019, with an increase of over 400 percent from 2018.&rdquo; The following year, the company found that overall malware detected on macOS <a title="Malware on Mac 2020" href="https://www.macworld.com/article/676309/malware-on-macs-is-decreasing.html">decreased by 38 percent</a> but that the worst kind, namely &ldquo;backdoors, data stealers, and cryptocurrency stealers/miners,&rdquo; increased by more than 61 percent.</p>
<p>One reason for the decline in 2020 was the pandemic; as restrictions were lifted, malware saw a resurgence in 2021, with the number of Mac detections soaring by more than 200 percent to an astonishing 164 million. Even Apple software boss Craig Federighi <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.theverge.com/2021/5/19/22444353/mac-malware-not-acceptable-craig-federighi-apple-epic&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">acknowledged</a> in May 2021 that Mac malware was a problem&hellip; although it&rsquo;s worth bearing in mind that at the time he was trying to make the case for iOS&rsquo;s very different approach to security. &ldquo;Today,&rdquo; he said, &ldquo;we have a level of malware on the Mac that we don&rsquo;t find acceptable.&rdquo; Federighi revealed that 130 different cases had been documented since May 2020, and that one of these had affected more than 300,000 Macs. He even admitted that members of his family had got malware on their Macs.</p>
<p>When the judge asked about the fact that Mac users can purchase and download software from various places on the Mac, rather than being limited to the Mac App Store, Federighi said: &ldquo;Yeah, it&rsquo;s certainly how we&rsquo;ve done it on the Mac and it&rsquo;s regularly exploited on the Mac. iOS has established a dramatically higher bar for customer protection. The Mac is not meeting that bar today.&rdquo;</p>
<div class="promo_wrap">
<div class="top_head">
<p class="pro_tag">PROMOTION</p>
<p><strong>Antivirus Deal: Intego Mac Premium Bundle</strong></p>
</div>
<div class="promo_row">
<div class="pro_right promotion-item__image-outer-wrapper--small"><img decoding="async" class="promotion-item__image" src="https://b2c-contenthub.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-22-at-15.47.57.png" loading="lazy" /></div>
<p class="promo_text">
<p>Get Intego&rsquo;s Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. </p>
</div>
<div class="clear-both"></div>
<div class="more_btn"><a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-8-0-0"  class="promotion-view-deal-link" rel="nofollow">Get Deal</a></div>
</div>
<p>Federighi noted that Mac users don&rsquo;t download as much software as iOS users, and argued that if iOS was as open to third-party downloads there would be a real problem for that platform. &ldquo;If you took Mac security techniques and applied them to the iOS ecosystem, with all those devices, all that value,&rdquo; he said, &ldquo;it would get run over to a degree dramatically worse than is already happening on the Mac.&rdquo;</p>
<p>To get a feel for the number of attacks on the Mac platform, browse our complete list of <a href="https://www.macworld.com/article/672879/list-of-mac-viruses-malware-and-security-flaws.html">Mac viruses, malware and trojans</a>. Adware and Potentially Unwanted Programs (PUPs) make up the majority of the malware detections on Macs, according to Malwarebytes.</p>
<h2 class="toc" id="do-i-need-antivirus-for-mac">Do I need antivirus for Mac?</h2>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Antivirus on a Mac" class="wp-image-795574" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">
</div>
<p>So should Mac users start panicking? No. Mac malware does pose a risk that users should be aware of, but it doesn&rsquo;t follow that Macs absolutely must be equipped with antivirus software. Such products have their advantages and you may choose to install one for more peace of mind, but we don&rsquo;t view them as essential for the Mac.</p>
<p>For one thing, there are measures put in place by Apple at the operating system level that should protect Mac users from the worst malware threats. These built-in security features make attacking a Mac particularly challenging. They include Gatekeeper, which blocks software that hasn&rsquo;t been digitally approved by Apple from running on your Mac without your agreement, and XProtect, which is Apple&rsquo;s own antivirus built into macOS and inspects every app for malware.</p>
<p>As you can see, Apple goes to great lengths to protect you from malware by making it almost impossible for you to download it in the first place, let alone install it. Additionally, Apple does a pretty good job of keeping on top of vulnerabilities and exploits; if your Mac needs to be protected from these, a patch will quickly be pushed out over auto-update.</p>
<p>Thanks to these features, before you can install an app, your Mac will check it against a list of malware, and even if there is no reason for concern it will not make it easy for you to open an application from a developer that hasn&rsquo;t been approved.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Gatekeeper and XProtect Apple security" class="wp-image-795593" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /><figcaption>Gatekeeper and XProtect are two elements of Apple&rsquo;s macOS security.</figcaption></figure>
<p class="imageCredit">
</div>
<p>These features and other protections built into macOS (which we will discuss in more detail below) mean it&rsquo;s not an essential requirement to install antivirus software on your Mac.</p>
<p>However, as good as these protections are, there have been occasions when malware has managed to infiltrate the Mac platform, and times when Apple hasn&rsquo;t responded to a threat as quickly as Mac users might hope. If you want the very best protection from threats, therefore, consider adding a dedicated Mac security suite such as <a rel="nofollow" href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" >Intego Mac Internet Security</a>. You&rsquo;ll find Intego at the top of our roundup of the <a title="best antivirus for Mac" rel="noopener" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html" >best antivirus for Mac</a>, among other free and paid-for antivirus apps that might give you some peace of mind, including <a title="McAfee" rel="nofollow" href="https://www.kqzyfj.com/click-8807236-13998110?sid=1-1-670537-1-0-0" >McAfee</a> and <a title="Norton" rel="nofollow" href="https://www.tkqlhce.com/click-7928211-10530627?url=https%3A%2F%2Fbuy.norton.com%2Fps%3FselSKU%3D21351077%26ctry%3DGB%26lang%3Den%26tppc%3D337EB012-DD4B-2815-29A7-4C5482D4D60A%26ptype%3Dcart%26trf_id%3Dnortoncom%26inid%3Dhho_nortoncom_store_norton-security_pdpage?sid=1-1-670537-1-0-0" >Norton</a>.</p>
<p class="cta"> <a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" rel="nofollow">Get Intego Mac Security X9 here</a></p>
<p>Read on to find out more about how Apple&rsquo;s security measures work&ndash;and why they may not be enough to keep your Mac secure.</p>
<h2 class="toc" id="how-apple-protects-macs-from-viruses">How Apple protects Macs from viruses</h2>
<p>Macs are generally safer than PCs, but with threats to the Mac growing due to the platform&rsquo;s increasing popularity, Apple has had to build in protections to macOS and the Mac hardware itself.&nbsp;</p>
<p>In this section we will look at the built-in protections in macOS to establish whether they are enough, or if you should also install antivirus software on your Mac.</p>
<h3 id="how-xprotect-works">How XProtect works</h3>
<p>The Mac&rsquo;s malware scanning tool, XProtect, works invisibly and automatically in the background and requires no user configuration. Apple has a list of malicious applications that it checks against when you open downloaded applications. XProtect is&nbsp;regularly updated by Apple, and it updates in the background, so you should always be protected.</p>
<p>This is similar to having antivirus software from a third-party software developer running on your Mac, with the bonus of being written into the operating system and therefore not hampering performance.</p>
<p>If you download and try to open files contaminated with malware, you may see an explicit warning that the files will &ldquo;damage your computer,&rdquo; along with a reference to the type of malware. In that case you should delete the file immediately.</p>
<p>This is great news for Mac users, but is it enough? How does XProtect compare to the antivirus solutions out there? Well, XProtect may not be as up to date as some third-party products and it doesn&rsquo;t look for as many strains of malware. Read our roundup of the <a title="Best Mac Antivirus Apps" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">Best Mac antivirus apps</a> for an in-depth evaluation of the options out there.</p>
<h3 id="how-gatekeeper-works">How Gatekeeper works</h3>
<p>Thanks to Gatekeeper, macOS blocks downloaded software that hasn&rsquo;t been digitally signed, a process whereby Apple approves the developer. This leads to the familiar error message when you try to use or install unsigned software: &ldquo;[This app] can&rsquo;t be opened because it is from an unidentified developer.&rdquo; One change to Gatekeeper that arrived in macOS Catalina a few years back was that software is checked for malware and other issues every time it runs, rather than just the first time you install it.</p>
<p>For maximum protection, GateKeeper can be set to only allow software to be installed if it was downloaded from the Mac App Store. Or you can set it to allow you to install software from the web, but from verified developers only.</p>
<p>You can adjust these settings via the Security &amp; Privacy section of System Preferences:</p>
<ol>
<li>In Security &amp; Privacy, select the General tab.&nbsp;</li>
<li>Choose from the options underneath Allow Applications Downloaded From.</li>
<li>Choose App Store or App Store and Identified Developers.</li>
</ol>
<p>The safest option is App Store only, but if you also want to be able to install legitimate software from the web then App Store and Identified Developers is the best plan. There used to be a further option to disable the feature by choosing &lsquo;Anywhere,&rsquo; but this option is no longer available.</p>
<p>All software downloaded via the App Store is signed, but should you attempt to open an app you&rsquo;ve downloaded from the web that isn&rsquo;t signed, you&rsquo;ll see a Gatekeeper warning like the one below:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/security2_thumb.png" alt="Do Macs get viruses? | Do Macs need antivirus software" loading="lazy" /></figure>
</div>
<p>This may mean you&rsquo;ve almost installed malware. On the other hand, of course, it may be a legitimate app. In which case (and if you&rsquo;re sure) you can bypass Gatekeeper&rsquo;s protection and install it.</p>
<p>To do so, go to the Finder and locate the app there. Now hold down Ctrl when you click on the app, and then select Open. This will mark it as being trusted. For more details, read <a title="How open an app from an unidentified developer" href="https://www.macworld.com/article/672947/how-to-open-a-mac-app-from-an-unidentified-developer.html">how to open an app from an unidentified developer</a>.</p>
<p>Being able to download unsigned software might sound like a benefit, but it essentially enables you to bypass the protections offered by Gatekeeper. That&rsquo;s a mixed blessing, and more and more malicious apps are instructing users to do exactly this when they are installed.</p>
<h3 id="sandboxing-and-related-protections">Sandboxing and related protections</h3>
<p>Software that is approved by Apple is also sandboxed, which means apps do only what they&rsquo;re intended to do. App sandboxing isolates apps from the critical system components of your Mac, your data and your other apps, so they shouldn&rsquo;t be able to do any damage. It doesn&rsquo;t protect you from malware getting into the system, but it does limit the extent of what the malware can do once it&rsquo;s in there.</p>
<p>The main problem here is that while apps sold on the Mac App Store have to be sandboxed, other Mac apps don&rsquo;t.</p>
<p>However, even without app sandboxing, there are related features built into macOS that should still stop apps snooping on your data. Since macOS 10.15 Catalina in 2019 it has been a requirement for all Mac apps to get your permission before they can access your files. macOS will also ask for your permission before an app can access the camera or microphone, or log what you type.</p>
<p>Another change that arrived with Catalina is that macOS itself is now stored on a separate disk volume. This means that your important system files are all completely separate and therefore more challenging to access. Apps can&rsquo;t get to your system files where they could cause problems.</p>
<h3 id="security-updates">Security updates </h3>
<p>Apple regularly issues security updates for the Mac. While these can serve to demonstrate that the Mac isn&rsquo;t infallible, with Apple all too frequently having security flaws pointed out to it, they are generally issued promptly. </p>
<p>Less pleasingly, these security updates have generally been issued as part of a larger macOS update: for example, macOS Monterey 12.2.1 closed a security vulnerability in WebKit that would have made it possible to execute malicious code. Because these security fixes were issued as part of a macOS update, which often requires the computer to reboot during the install process, Mac users may be less likely to install the update promptly, even though these updates can be set to install automatically. </p>
<p>Since the launch of Ventura, however, Apple has started separating out the security updates from wider macOS updates and rolling them out automatically. This way the update can happen in the background, without a restart. </p>
<h3 id="password-protection-and-passkeys">Password protection and Passkeys</h3>
<p>Apple improved the way users can manage passwords in macOS Monterey and also made some changes to two-factor authentication. You can find all your Passwords in System Preferences &gt; Passwords. You just need to unlock it with your main password to see every other password you have. (You can also view this information on your iPhone in Settings &gt; Passwords.)</p>
<p>In Monterey a new authenticator was added, so you can set up verification codes instead of using an authentication app. To add a setup key you need to click on a password and then choose Enter Setup Key, which you should be able to obtain from the provider. Once input the 2FA verification codes should automatically fill.</p>
<p>In macOS Ventura Apple moved from passwords to passkeys. Apple explains: &ldquo;Passkeys use iCloud Keychain public key credentials, eliminating the need for passwords. Instead, they rely on biometric identification such as Touch ID and Face ID in iOS, or a specific confirmation in macOS for generating and authenticating accounts.&rdquo; Passkeys are more secure, according to Apple. Essentially your device will hold one part of a cryptographic key pair and the other part will be stored by the website or service you&rsquo;re logging into. Your device will authenticate you biometrically (with Touch ID or Face ID) and log you in. For more information, read <a href="https://www.macworld.com/article/917751/how-to-use-passkeys.html">How to use Passkeys</a>.</p>
<h3 id="recording-alerts">Recording alerts</h3>
<p>In macOS Monterey Apple added a Recording indicator in the menu bar so you&rsquo;ll know if an app is recording you. A bit like the light that indicates the mic is in use on your iPhone.</p>
<h3 id="pasteboard-alerts">Pasteboard alerts </h3>
<p>Similarly, as of macOS Ventura, any app that wants access to your pasteboard has to request permission. </p>
<h3 id="safari-protections">Safari protections</h3>
<p>Anti-phishing technology in Safari will detect fraudulent websites. It will disable the page and display an alert if you visit a suspect website.</p>
<p>Anti-phishing isn&rsquo;t the only way that Safari protects you when you&rsquo;re surfing. Apple also allows users to prevent advertisers tracking them around the web. You can see a Privacy Report including details of all the cross-site trackers Apple has stopped from profiling you.</p>
<p>You&rsquo;ll also notice that plug-ins such as Silverlight, QuickTime, and Oracle Java won&rsquo;t run if they aren&rsquo;t updated to the latest version, another way of ensuring your Mac is safe. And of course now that Adobe has discontinued Flash people should hopefully no longer fall for malware hidden in Flash Player.</p>
<p>Safari will also flag up weak passwords and make strong password suggestions when you open an account on a website. This strong password will be saved in your iCloud Keychain so you won&rsquo;t have to remember it. It&rsquo;s a lot safer than using the same password you always use. For more on this subject, read about <a title="How Apple plans to retire passwords" href="https://www.macworld.com/article/677077/how-apple-plans-to-retire-passwords.html">How Apple plans to retire passwords</a>. </p>
<p>In the past, one issue with Apple&rsquo;s suggested passwords has been that sometimes they don&rsquo;t match the website&rsquo;s requirement. For example, a website may require one upper-case letter, one special character, one number and so on. As of the launch of Ventura, macOS allows users to edit suggested passwords so they meet these requirements. </p>
<p>New in Safari 15 were improvements to the Intelligent Tracing Prevention that arrived in Safari 14. Now web trackers won&rsquo;t be able to see your IP address so they won&rsquo;t be able to create a profile about you. Check this by choosing Safari from the Safari menu &gt; Preferences &gt; Privacy &gt; Hide IP address from trackers.</p>
<h3 id="photo-privacy">Photo privacy </h3>
<p>A few years ago there was a lot of bad publicity for Apple when celebrities reported that their iCloud photos had been stolen. (For more on this, read <a href="https://www.macworld.com/article/672307/how-to-stop-photo-hacks-on-iphone.html">How to stop photo hacks on iPhone</a>.) There have been a number of security enhancements in iCloud since this happened, and Apple has given users other ways to protect their photo privacy: for example, the ability to hide photos and albums. In Ventura, Apple expanded this so that hidden albums, and the Recently Deleted album, are locked by default, and only authenticated by Touch ID or Face ID.</p>
<h3 id="mail-protections">Mail protections</h3>
<p>macOS Monterey brought a new feature in Mail on the Mac. Mail Privacy Protection improves privacy for users. For example, it stops email senders from being able to track whether you&rsquo;ve opened an email, or even determine your location from your IP address. Check that the feature is working for you by opening Mail &gt; Click on Mail in the menu &gt; choose Preferences &gt; Privacy &gt; and make sure Protect Mail Activity is selected. It should be by default.</p>
<p>There are additional Mail protections if you&rsquo;re an iCloud subscriber. Hide My Email allows you to create an alternative email address that you can give out. The email will still be delivered to your inbox, but you can easily delete the alternative email later. </p>
<p>You can turn this on in System Preferences &gt; click on Apple ID &gt; and select Private Relay (currently in Beta).&nbsp;</p>
<p>In Ventura Hide My Email was extended to third-party apps. </p>
<h3 id="icloud-protections">iCloud+ protections</h3>
<p>If you&rsquo;re an iCloud subscriber, you&rsquo;ll be interested in a feature that arrived in Monterey (part of the upgrade from iCloud to iCloud+) called Private Relay. It&rsquo;s a bit like a VPN in that it encrypts your network traffic and routes your DNS lookup requests through two servers, one of which is not controlled by Apple. However, it&rsquo;s not a VPN, because it only works in Safari and obviously it lacks the other usual features of a VPN. (If you want a VPN, by the way, check out our roundup of the <a title="Best VPNs for Mac" href="https://www.macworld.com/article/668698/best-vpn-for-mac-2.html">best VPNs for Mac</a>. You may even be able to save some money if you take a look at our roundup of <a title="VPN deals" href="https://www.macworld.com/article/673709/best-vpn-deals-find-a-cheap-vpn-for-your-mac-iphone-or-ipad.html">VPN deals</a>, or try one of these <a title="Free VPNs for Mac" href="https://www.macworld.com/article/668942/the-best-free-vpn-for-mac-in-2022.html">free VPNs</a>.)</p>
<p>You can manage your Private Relay settings in System Preferences &gt; Apple ID &gt; click on Options beside Hide my email. Here you will see any fake email addresses you&rsquo;re using; just click on Turn Off if you want to stop those emails arriving. You can also change which email address they are forwarded to.&nbsp;</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/private_relay_thumb.jpg" alt="Private Relay Safari " loading="lazy" /></figure>
</div>
<h3 id="safety-check">Safety Check </h3>
<p>A new feature in macOS Ventura is Safety Check, a feature that will allow anyone who is concerned that they are in danger from a person known to them to revoke any access they have granted to that person. So, for example, that person won&rsquo;t be able to access their location, their photos, or anything else that could help them to be traced. </p>
<h3 id="file-encryption-with-filevault">File encryption with FileVault</h3>
<p>In addition to Gatekeeper, which should keep malware off your Mac, FileVault 2 makes sure your data is safe and secure by encrypting it.</p>
<p>If you&rsquo;re concerned about someone being able to access the files on your Mac you can encrypt them using FileVault, which will mean only you can unencrypt them. Read our <a title="Best Mac security settings" href="https://www.macworld.com/article/1432223/mac-security-tips-password-find-my-users-lockdown-mode.html">tips for keeping your mac secure</a>, of which using FileVault is one.</p>
<h3 id="warnings-about-spyware">Warnings about spyware</h3>
<p>Apple announced in November 2021 that it would warn its users of state-sponsored espionage attacks, such as the well-publicised Pegasus spyware, on their iPhones, iPads and Macs. The notification will come via email or a message. The same warning will be displayed on the user&rsquo;s Apple ID page at <a title="apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://appleid.apple.com&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >appleid.apple.com</a>.</p>
<p>The warning will offer advice about how affected users can protect themselves against attack. There&rsquo;s more information on <a title="Apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://support.apple.com/en-gb/HT212960&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s site</a>.</p>
<h3 id="find-my">Find My</h3>
<p>Not every threat to your data comes from malware. Sometimes a criminal might get hold of your Mac, in which case Apple&rsquo;s Find My service will come into its own.</p>
<p>The Find My app can relay the location of your lost or stolen Mac back to you. If you&rsquo;re concerned that it might not be recoverable, you can wipe the contents of the Mac so that your data can&rsquo;t be accessed. For more on this, read <a href="https://www.macworld.com/article/671675/how-to-use-find-my-iphone-to-find-lost-or-stolen-iphone-or-ipad.html">How to find a lost or stolen iPhone</a>.</p>
<p>In addition, every Mac with an M1-series, M2-series, or T2 chip has an Activation Lock feature that means they can be bricked remotely.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/lifestyle_macbook_side_15_thumb.jpg" alt="MAC SECURITY" loading="lazy" /></figure>
</div>
<h2 class="toc" id="when-apples-security-measures-arent-enough">When Apple&rsquo;s security measures aren&rsquo;t enough&hellip;</h2>
<p>All the above is great, but unfortunately there have been cases where Gatekeeper has been bypassed because malware has got an approved developer signature. For example OSX/CrescentCore was able to bypass Gatekeeper because it was signed by a certificate assigned by Apple to a developer. It took Apple a few days to retract that certificate.</p>
<p>It isn&rsquo;t only when malware gets a certificate from a registered developer. In the case of OSX/Linker, a zero-day vulnerability in Gatekeeper was being exploited.</p>
<p>Zero-day threats mean there are &ldquo;zero days&rdquo; to fix the vulnerabilities, although often a legitimate developer discovers the vulnerability and lets the developer know about it. There is usually a 90-day deadline for the fix to be made available. Some times the developer doesn&rsquo;t act in time and the exploit is publicised.</p>
<p>Apple normally reacts quickly, although there have been cases where the company has ignored the identified vulnerability, such as when a teenager reported the Group FaceTime vulnerability that meant someone could listen in to a call and Apple failed to act. There&rsquo;s more about how Apple reacts to security threats next.</p>
<p>When Apple is made aware of a threat the company usually issues a security update to the latest version of macOS and to the two versions prior to it. This way Apple will protect users from vulnerabilities and flaws in macOS that could be utilised by hackers.</p>
<p>Normally the advice would be to install the update immediately. However, for example a Sierra and High Sierra security update in July 2019 was subsequently pulled after people experiences problems after installing it.</p>
<h2 class="toc" id="how-apple-responds-to-security-threats">How Apple responds to security threats</h2>
<p>Despite the security measures Apple has in place, from time-to-time there are threats to the Mac.</p>
<p>Apple has its own security research team, but it depends on users and independent researchers to help by reporting any flaws they find in Apple products.</p>
<p>To this end, Apple has an incentive program that rewards such discoveries with payments of up to $200,000, depending on the seriousness of the flaw. But it was the last major tech company to set up such a scheme. (Microsoft set up its own bug-reporting incentive programme in 2013, and was itself criticised at the time for leaving it so late.)</p>
<p>On 4 August 2016, Apple security boss Ivan Krstic announced the Apple Security Bounty Program.&nbsp;&ldquo;We&rsquo;ve had great help from researchers in improving iOS security all along,&rdquo; Krstic said. &ldquo;[But] we&rsquo;ve heard pretty consistently&hellip; that it&rsquo;s getting increasingly difficult to find some of those most critical types of security vulnerabilities. So the Apple Security Bounty Program is going to reward researchers who actually share critical vulnerabilities with Apple.&rdquo;</p>
<p>The top reward of $200,000 is given to those who discover&nbsp;vulnerabilities in Apple&rsquo;s secure boot firmware components; for less critical flaws the bounties drop through a series of smaller figures to a bottom tier of $25,000. <a title="Wired" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.wired.com/2016/08/apples-finally-offering-bug-bounties-highest-rewards-ever/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">Wired</a> has the details.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/macbook_air_2018_lifestyle_0011_thumb.jpg" alt="MACBOOK SECURITY" loading="lazy" /></figure>
</div>
<p>We imagine most Mac users will be pleased to hear that Apple has an incentive programme to encourage more widespread reporting of its vulnerabilities. Incentivising security researchers to let Apple know about a flaw instead of passing it on to hackers (which may still, sadly, <a title="9to5Mac" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://9to5mac.com/2016/08/10/iphone-hack-bounty-apple-exodus-intelligence/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">be more lucrative</a>) makes Apple products safer for everyone.</p>
<p>One such flaw was the High Sierra root bug, discovered on 28 November 2017. This flaw in macOS 10.13 could allow access to settings on a Mac without the need for a password. Apple immediately issued a statement confirming that it was working on a fix and an update was anticipated to be issued within days.</p>
<h2 class="toc" id="how-to-keep-your-mac-safe-from-malware">How to keep your Mac safe from malware</h2>
<p>Apple does a lot to keep your Mac safe, but you have to work with it, installing updates when they arrive, not clicking on suspicious links in emails, not installing Flash, and so on. There are also some third party antivirus apps you could try &ndash; we have a complete guide to the <a title="What's the best antivirus for Mac" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">best antivirus for Mac here</a>.</p>
<p>Here are a few of the things you should do:</p>
<h3 id="1-keep-macos-up-to-date">1) Keep macOS up to date</h3>
<p>Despite what we said above about the security update Apple later retracted, normally the advice would be to install a security update as soon as possible.</p>
<p>Apple addresses flaws and vulnerabilities with the Mac by issuing updates to the Mac operating system, it is important to keep your Mac up to date. We advise checking regularly for OS updates remains a key part of a sound security strategy.</p>
<p>You can find out about the latest version of macOS here: <a href="https://www.macworld.com/article/678251/macos-13-ventura-beta-features-compatibility-how-to-update.html">macOS Ventura latest version information</a>.</p>
<p>You can set your Mac to automatically update as soon as a new version of the operating system is made available. Follow these instructions to set that up:</p>
<h4 id="how-to-automatically-install-macos-updates">How to automatically install macOS updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on Software Update.</li>
<li>Tick the box beside Automatically keep my Mac up to date.</li>
<li>Or, click on Advanced and choose from automatically: Check for updates, download new updates when available, Install macOS updates and Install app updates from the App Store.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/install_macos_options.jpg" alt="How to install macOS update" loading="lazy" /></figure>
</div>
<h4 id="how-to-automatically-install-high-sierra-or-older-software-updates">How to automatically install High Sierra or older software updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on App Store.</li>
<li>Tick the box beside Automatically check for updates.</li>
<li>You can choose to download the newly available updates, if you want them to install automatically though you need to make sure the box beside Install macOS updates is checked.</li>
</ol>
<h4 id="how-to-manually-install-macos-software-updates">How to manually install macOS software updates</h4>
<p>If you&rsquo;d rather not let your Mac automatically update, you should periodically check to see if there is an update to your version.</p>
<ul>
<li>In macOS High Sierra and earlier you can go to the Mac App Store and check for updates.</li>
<li>In macOS Mojave and newer you need to go to the Software Update pane in System Preferences.</li>
</ul>
<p>You may need to restart your computer once the update has downloaded. You can expect a typical 460MB download to take about 8 minutes (during which time you will still be able to work) but for a large update you will have to restart and install and that could take as much as 20 minutes, bringing the total install time to about 25 minutes in total.</p>
<p>For our in-depth guide to updating Mac operating systems, see <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">How to update macOS</a>.</p>
<h3 id="2-dont-connect-to-public-wi-fi-networks">2) Don&rsquo;t connect to public Wi-Fi networks</h3>
<p>Beware of connecting to a public Wi-Fi network as there may be someone spying who could gain access to your passwords and other private information, or you could have your session hijacked. Snoopers can set up their own Wi-Fi hotspot, pretending to be your hotel or coffee shop, then once you have connected they can grab any data you send over it. In the past there have been flaws detected in the OS that could allow access to your Mac, such as the SSL error in an earlier version of Mac OS X that meant it was possible for a hacker to access your machine if you were using public WiFi.</p>
<h3 id="3-dont-install-flash">3) Don&rsquo;t install Flash</h3>
<p>Adobe discontinued Flash on 31 December 2020 with good reason. Intego, Malwarebytes and others recommended that you shouldn&rsquo;t install Flash Player. Fake Flash Player updates have often been the means by which people install malware. For example, people want to watch or download a popular movie or TV series for free and they find a search result that leads to a request to update Flash Player in order to view the content. There is no need to install Flash Player now that HTML5 has made Flash obsolete. Now that Flash is no longer be supported the advice is simple: Don&rsquo;t use Flash!</p>
<h3 id="4-keep-java-up-to-date-on-your-mac">4) Keep Java up to date on your Mac</h3>
<p>If you must use Java (which is also problematic) then make sure it&rsquo;s up to date. Vulnerabilities with Java have highlighted the fact that there are cross-platform threats that even Mac users need to be aware of. Apple blocks Java by default, leaving it to the user to decide whether to install those tools. If you do need to update them be very careful where you download updates from!</p>
<h3 id="5-avoid-falling-foul-of-phishing-emails">5) Avoid falling foul of phishing emails</h3>
<p>Protect yourself from phishing attacks not responding to emails that require you to enter a password or install anything. You could also use free software such as <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://objective-see.com/products/blockblock.html&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">BlockBlock</a>. That way even you were to carry out the steps to launch the malware, it would not be able to write files or mark itself as launching on startup.</p>
<h3 id="6-dont-fall-for-facebook-scams">6) Don&rsquo;t fall for Facebook scams</h3>
<p>Facebook scams are usually designed to harvest data about the most gullible people, so if it seems like it might be too good to be true it probably is and you&rsquo;d be wise not to share it on Facebook. At best you might just look silly and those scammers will start to target you with more scams, at worse scammers can access your personal data and that of those you share their post with. So don&rsquo;t click on a link just because a friend shared it and definitely don&rsquo;t give out your personal data on Facebook.</p>
<h2 class="toc" id="why-you-need-to-protect-windows-users">Why you need to protect Windows users </h2>
<p>One of the reasons why, regardless of how safe a Mac is from malware, we should run an antivirus is to protect our Windows using friends and colleagues. While it&rsquo;s unlikely that your Mac will run any malware, there is possibly a more pernicious issue: You Mac could become the Typhoid Mary&nbsp;of Windows viruses, which is to say, you could be harboring viruses on your Mac that won&rsquo;t effect you, but can be problems for Windows users.</p>
<p>Some years ago when writing about Mac malware we identified the following nasties on our Mac:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.techhive.com/images/article/2015/05/mymac-100585505-medium.png?auto=webp&amp;quality=85,70" alt="mymac" loading="lazy" /></figure>
</div>
<p>That is a list of 30 potentially bad things that&hellip; you guessed it, were found on the Mac we ran a test virus scan on, one of which was a Windows virus. </p>
<h2 class="toc" id="how-to-tell-if-a-mac-has-a-virus">How to tell if a Mac has a virus</h2>
<p>Look out for the following signs that your Mac has been infected with malware:&nbsp;</p>
<ol>
<li>Aggressive web page banners and browser pop-ups recommending software.</li>
<li>Web page text turning into hyperlinks.</li>
<li>Programs appearing that you haven&rsquo;t authorized.</li>
<li>Mac crashes.</li>
<li>Mac runs hot.</li>
<li>Mac speeds up for no reason.</li>
</ol>
<p>If you think something suspicious is happening, open <a href="https://www.macworld.com/article/353345/how-to-macos-utilities-activity-monitor.html">Activity Monitor</a> and click on the CPU tab. Check what software is running &ndash; especially if something is hogging a lot of your resources.</p>
<p>We discuss how to tell if your Mac has a virus and how to remove a Mac virus in a separate article: <a href="https://www.macworld.com/article/671430/how-remove-virus-mac.html">How to remove a virus from a Mac</a> and <a href="https://www.macworld.com/article/233894/how-to-protect-your-mac-against-attack-and-disaster.html">How to protect your Mac against attack and disaster</a> to avoid getting infected.</p>
<div class="PH_F_PC_SW"></div>
<p><category>Antivirus, Personal Software, Security</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Macs can get viruses, but do Macs need antivirus software?</title>
		<link>https://www.latest-apple-news.com/2023/06/13/macs-can-get-viruses-but-do-macs-need-antivirus-software-2/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 16:14:05 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[ability]]></category>
		<category><![CDATA[absolutely]]></category>
		<category><![CDATA[acceptable]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[acknowledged]]></category>
		<category><![CDATA[Activation]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[adding]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[additional]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[addresses]]></category>
		<category><![CDATA[adjust]]></category>
		<category><![CDATA[admitted]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[advantages]]></category>
		<category><![CDATA[advertisers]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[affected]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[aggressive]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[Aitivirus]]></category>
		<category><![CDATA[albums]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[almost]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[answers]]></category>
		<category><![CDATA[anticipated]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[anything]]></category>
		<category><![CDATA[anywhere]]></category>
		<category><![CDATA[appearing]]></category>
		<category><![CDATA[appleid]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[applied]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[approves]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrive]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arriving]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assigned]]></category>
		<category><![CDATA[astonishing]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[attacking]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[attempt]]></category>
		<category><![CDATA[August]]></category>
		<category><![CDATA[authenticate]]></category>
		<category><![CDATA[authenticated]]></category>
		<category><![CDATA[authenticating]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authenticator]]></category>
		<category><![CDATA[authorized]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[background]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[banners]]></category>
		<category><![CDATA[bearing]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[benefit]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[beware]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[biometrically]]></category>
		<category><![CDATA[blessing]]></category>
		<category><![CDATA[blockblock]]></category>
		<category><![CDATA[Blocks]]></category>
		<category><![CDATA[bottom]]></category>
		<category><![CDATA[bounties]]></category>
		<category><![CDATA[Bounty]]></category>
		<category><![CDATA[bricked]]></category>
		<category><![CDATA[bringing]]></category>
		<category><![CDATA[brought]]></category>
		<category><![CDATA[Browse]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[bundle]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[bypassed]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[careful]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[Celebrities]]></category>
		<category><![CDATA[certainly]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[challenging]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[character]]></category>
		<category><![CDATA[checked]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[checks]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[closed]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[colleagues]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[Complete]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[components]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[concern]]></category>
		<category><![CDATA[concerned]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[confirmation]]></category>
		<category><![CDATA[confirming]]></category>
		<category><![CDATA[connect]]></category>
		<category><![CDATA[connected]]></category>
		<category><![CDATA[connecting]]></category>
		<category><![CDATA[consensus]]></category>
		<category><![CDATA[consider]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[consistently]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[contaminated]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[contents]]></category>
		<category><![CDATA[controlled]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[course]]></category>
		<category><![CDATA[crashes]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[CrescentCore]]></category>
		<category><![CDATA[criminal]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[criticised]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptographic]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[customer]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dangers]]></category>
		<category><![CDATA[deadline]]></category>
		<category><![CDATA[december]]></category>
		<category><![CDATA[decide]]></category>
		<category><![CDATA[decline]]></category>
		<category><![CDATA[decreased]]></category>
		<category><![CDATA[decreasing]]></category>
		<category><![CDATA[dedicated]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[definitely]]></category>
		<category><![CDATA[degree]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[deleted]]></category>
		<category><![CDATA[delivered]]></category>
		<category><![CDATA[demonstrate]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[depends]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[despite]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[detected]]></category>
		<category><![CDATA[detections]]></category>
		<category><![CDATA[determine]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[difficult]]></category>
		<category><![CDATA[digitally]]></category>
		<category><![CDATA[disable]]></category>
		<category><![CDATA[disaster]]></category>
		<category><![CDATA[discontinued]]></category>
		<category><![CDATA[discover]]></category>
		<category><![CDATA[discovered]]></category>
		<category><![CDATA[discoveries]]></category>
		<category><![CDATA[discovers]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[display]]></category>
		<category><![CDATA[displayed]]></category>
		<category><![CDATA[documented]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloaded]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[dramatically]]></category>
		<category><![CDATA[during]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easily]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[effect]]></category>
		<category><![CDATA[elements]]></category>
		<category><![CDATA[eliminating]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[enables]]></category>
		<category><![CDATA[encourage]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypting]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encrypts]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[enough]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[equipped]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[establish]]></category>
		<category><![CDATA[established]]></category>
		<category><![CDATA[evaluation]]></category>
		<category><![CDATA[everyone]]></category>
		<category><![CDATA[exactly]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[exodus]]></category>
		<category><![CDATA[expanded]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explains]]></category>
		<category><![CDATA[explicit]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[extended]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[extent]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FaceTime]]></category>
		<category><![CDATA[factor]]></category>
		<category><![CDATA[failed]]></category>
		<category><![CDATA[falling]]></category>
		<category><![CDATA[familiar]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[Federighi]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[figures]]></category>
		<category><![CDATA[FileVault]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[finder]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[fluctuated]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forwarded]]></category>
		<category><![CDATA[fraudulent]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[friend]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[further]]></category>
		<category><![CDATA[Gatekeeper]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[generally]]></category>
		<category><![CDATA[generating]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[Granted]]></category>
		<category><![CDATA[growing]]></category>
		<category><![CDATA[guessed]]></category>
		<category><![CDATA[gullible]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hampering]]></category>
		<category><![CDATA[happen]]></category>
		<category><![CDATA[happened]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[harboring]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[Harvest]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[hellip]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[higher]]></category>
		<category><![CDATA[highest]]></category>
		<category><![CDATA[highlighted]]></category>
		<category><![CDATA[hijacked]]></category>
		<category><![CDATA[historically]]></category>
		<category><![CDATA[hogging]]></category>
		<category><![CDATA[Hopefully]]></category>
		<category><![CDATA[hotspot]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[hyperlinks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[identification]]></category>
		<category><![CDATA[identified]]></category>
		<category><![CDATA[ignored]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[imagine]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[Impossible]]></category>
		<category><![CDATA[improved]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[Improves]]></category>
		<category><![CDATA[improving]]></category>
		<category><![CDATA[incentive]]></category>
		<category><![CDATA[Incentivising]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[increasing]]></category>
		<category><![CDATA[increasingly]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[indicates]]></category>
		<category><![CDATA[indicator]]></category>
		<category><![CDATA[infallible]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[infiltrate]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[inspects]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructing]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[Intego]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[intelligent]]></category>
		<category><![CDATA[intended]]></category>
		<category><![CDATA[interested]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[invisibly]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[isolates]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[issuing]]></category>
		<category><![CDATA[itself]]></category>
		<category><![CDATA[keeping]]></category>
		<category><![CDATA[Keychain]]></category>
		<category><![CDATA[kqzyfj]]></category>
		<category><![CDATA[Krstic]]></category>
		<category><![CDATA[larger]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[launching]]></category>
		<category><![CDATA[leaving]]></category>
		<category><![CDATA[legitimate]]></category>
		<category><![CDATA[lengths]]></category>
		<category><![CDATA[letter]]></category>
		<category><![CDATA[lifted]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[Linker]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[locate]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[Lookup]]></category>
		<category><![CDATA[lucrative]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[majority]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[manage]]></category>
		<category><![CDATA[managed]]></category>
		<category><![CDATA[manually]]></category>
		<category><![CDATA[maximum]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[medium]]></category>
		<category><![CDATA[meeting]]></category>
		<category><![CDATA[Members]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[microphone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[miners]]></category>
		<category><![CDATA[minutes]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[namely]]></category>
		<category><![CDATA[nasties]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[normally]]></category>
		<category><![CDATA[Norton]]></category>
		<category><![CDATA[notice]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[November]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Objective]]></category>
		<category><![CDATA[obsolete]]></category>
		<category><![CDATA[obtain]]></category>
		<category><![CDATA[obviously]]></category>
		<category><![CDATA[occasions]]></category>
		<category><![CDATA[offered]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[opening]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[others]]></category>
		<category><![CDATA[overall]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[panicking]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[passing]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[pasteboard]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[percent]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[periodically]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[pernicious]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[player]]></category>
		<category><![CDATA[pleased]]></category>
		<category><![CDATA[pleasingly]]></category>
		<category><![CDATA[pointed]]></category>
		<category><![CDATA[popular]]></category>
		<category><![CDATA[popularity]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[Premium]]></category>
		<category><![CDATA[pretending]]></category>
		<category><![CDATA[pretty]]></category>
		<category><![CDATA[prevalence]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[problematic]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[profiling]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[promotion]]></category>
		<category><![CDATA[promptly]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protected]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[protections]]></category>
		<category><![CDATA[protects]]></category>
		<category><![CDATA[provider]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicised]]></category>
		<category><![CDATA[publicity]]></category>
		<category><![CDATA[pulled]]></category>
		<category><![CDATA[purchase]]></category>
		<category><![CDATA[pushed]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[quickly]]></category>
		<category><![CDATA[QuickTime]]></category>
		<category><![CDATA[rather]]></category>
		<category><![CDATA[reacts]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[reasons]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[recent]]></category>
		<category><![CDATA[recently]]></category>
		<category><![CDATA[recommended]]></category>
		<category><![CDATA[recommending]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[recoverable]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[regardless]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[regularly]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[remains]]></category>
		<category><![CDATA[remember]]></category>
		<category><![CDATA[remotely]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[reported]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[request]]></category>
		<category><![CDATA[requests]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[requirement]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[researchers]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[responded]]></category>
		<category><![CDATA[responding]]></category>
		<category><![CDATA[Responds]]></category>
		<category><![CDATA[restart]]></category>
		<category><![CDATA[restrictions]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[resurgence]]></category>
		<category><![CDATA[retire]]></category>
		<category><![CDATA[retract]]></category>
		<category><![CDATA[retracted]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[reward]]></category>
		<category><![CDATA[rewards]]></category>
		<category><![CDATA[rolling]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[routes]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[safest]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[sandboxed]]></category>
		<category><![CDATA[Sandboxing]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scheme]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selected]]></category>
		<category><![CDATA[senders]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[separating]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[seriousness]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[shouldn]]></category>
		<category><![CDATA[sierra]]></category>
		<category><![CDATA[signature]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[Silverlight]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[Similarly]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[smaller]]></category>
		<category><![CDATA[snoopers]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[soaring]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[someone]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[sometimes]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[speeds]]></category>
		<category><![CDATA[Sponsored]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[started]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[stealers]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[stopped]]></category>
		<category><![CDATA[stored]]></category>
		<category><![CDATA[strains]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[subject]]></category>
		<category><![CDATA[subscriber]]></category>
		<category><![CDATA[subsequently]]></category>
		<category><![CDATA[suggested]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[surfing]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[suspicious]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[target]]></category>
		<category><![CDATA[techhive]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[teenager]]></category>
		<category><![CDATA[Thanks]]></category>
		<category><![CDATA[themselves]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[theverge]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[tkqlhce]]></category>
		<category><![CDATA[traced]]></category>
		<category><![CDATA[tracing]]></category>
		<category><![CDATA[trackers]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[traffic]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[trying]]></category>
		<category><![CDATA[turning]]></category>
		<category><![CDATA[Typhoid]]></category>
		<category><![CDATA[typical]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[underneath]]></category>
		<category><![CDATA[unencrypt]]></category>
		<category><![CDATA[unfortunately]]></category>
		<category><![CDATA[unidentified]]></category>
		<category><![CDATA[Unlikely]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[unsigned]]></category>
		<category><![CDATA[unwanted]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utilised]]></category>
		<category><![CDATA[utilities]]></category>
		<category><![CDATA[various]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[Verification]]></category>
		<category><![CDATA[verified]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[warning]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[whereby]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[widespread]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[wrapper]]></category>
		<category><![CDATA[writing]]></category>
		<category><![CDATA[written]]></category>
		<category><![CDATA[XProtect]]></category>
		<category><![CDATA[yourself]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=73ef28e8b154e92902e3b7fa61570c9f</guid>

					<description><![CDATA[Macworld






Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&#8217;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus soft]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&rsquo;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus software.</p>
<p>Historically, the Mac has been considered <a href="https://www.macworld.com/article/668710/how-secure-mac.html">safe and secure</a> for a number of reasons that we will go into below, but in recent years the consensus has fluctuated. In its <a rel="nofollow" href="https://www.kqzyfj.com/click-100470607-15376698?sid=1-1-670537-1-0-0&amp;url=https://www.malwarebytes.com/resources/files/2020/02/2020_state-of-malware-report.pdf" >2020 State of Malware</a> report, Malwarebytes said it saw &ldquo;a significant rise in the overall prevalence of Mac threats in 2019, with an increase of over 400 percent from 2018.&rdquo; The following year, the company found that overall malware detected on macOS <a title="Malware on Mac 2020" href="https://www.macworld.com/article/676309/malware-on-macs-is-decreasing.html">decreased by 38 percent</a> but that the worst kind, namely &ldquo;backdoors, data stealers, and cryptocurrency stealers/miners,&rdquo; increased by more than 61 percent.</p>
<p>One reason for the decline in 2020 was the pandemic; as restrictions were lifted, malware saw a resurgence in 2021, with the number of Mac detections soaring by more than 200 percent to an astonishing 164 million. Even Apple software boss Craig Federighi <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.theverge.com/2021/5/19/22444353/mac-malware-not-acceptable-craig-federighi-apple-epic&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">acknowledged</a> in May 2021 that Mac malware was a problem&hellip; although it&rsquo;s worth bearing in mind that at the time he was trying to make the case for iOS&rsquo;s very different approach to security. &ldquo;Today,&rdquo; he said, &ldquo;we have a level of malware on the Mac that we don&rsquo;t find acceptable.&rdquo; Federighi revealed that 130 different cases had been documented since May 2020, and that one of these had affected more than 300,000 Macs. He even admitted that members of his family had got malware on their Macs.</p>
<p>When the judge asked about the fact that Mac users can purchase and download software from various places on the Mac, rather than being limited to the Mac App Store, Federighi said: &ldquo;Yeah, it&rsquo;s certainly how we&rsquo;ve done it on the Mac and it&rsquo;s regularly exploited on the Mac. iOS has established a dramatically higher bar for customer protection. The Mac is not meeting that bar today.&rdquo;</p>
<div class="promo_wrap">
<div class="top_head">
<p class="pro_tag">PROMOTION</p>
<p><strong>Antivirus Deal: Intego Mac Premium Bundle</strong></p>
</div>
<div class="promo_row">
<div class="pro_right promotion-item__image-outer-wrapper--small"><img decoding="async" class="promotion-item__image" src="https://b2c-contenthub.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-22-at-15.47.57.png" loading="lazy" /></div>
<p class="promo_text">
<p>Get Intego&rsquo;s Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. </p>
</div>
<div class="clear-both"></div>
<div class="more_btn"><a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-8-0-0"  class="promotion-view-deal-link" rel="nofollow">Get Deal</a></div>
</div>
<p>Federighi noted that Mac users don&rsquo;t download as much software as iOS users, and argued that if iOS was as open to third-party downloads there would be a real problem for that platform. &ldquo;If you took Mac security techniques and applied them to the iOS ecosystem, with all those devices, all that value,&rdquo; he said, &ldquo;it would get run over to a degree dramatically worse than is already happening on the Mac.&rdquo;</p>
<p>To get a feel for the number of attacks on the Mac platform, browse our complete list of <a href="https://www.macworld.com/article/672879/list-of-mac-viruses-malware-and-security-flaws.html">Mac viruses, malware and trojans</a>. Adware and Potentially Unwanted Programs (PUPs) make up the majority of the malware detections on Macs, according to Malwarebytes.</p>
<h2 class="toc" id="do-i-need-antivirus-for-mac">Do I need antivirus for Mac?</h2>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Antivirus on a Mac" class="wp-image-795574" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">
</div>
<p>So should Mac users start panicking? No. Mac malware does pose a risk that users should be aware of, but it doesn&rsquo;t follow that Macs absolutely must be equipped with antivirus software. Such products have their advantages and you may choose to install one for more peace of mind, but we don&rsquo;t view them as essential for the Mac.</p>
<p>For one thing, there are measures put in place by Apple at the operating system level that should protect Mac users from the worst malware threats. These built-in security features make attacking a Mac particularly challenging. They include Gatekeeper, which blocks software that hasn&rsquo;t been digitally approved by Apple from running on your Mac without your agreement, and XProtect, which is Apple&rsquo;s own antivirus built into macOS and inspects every app for malware.</p>
<p>As you can see, Apple goes to great lengths to protect you from malware by making it almost impossible for you to download it in the first place, let alone install it. Additionally, Apple does a pretty good job of keeping on top of vulnerabilities and exploits; if your Mac needs to be protected from these, a patch will quickly be pushed out over auto-update.</p>
<p>Thanks to these features, before you can install an app, your Mac will check it against a list of malware, and even if there is no reason for concern it will not make it easy for you to open an application from a developer that hasn&rsquo;t been approved.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Gatekeeper and XProtect Apple security" class="wp-image-795593" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /><figcaption>Gatekeeper and XProtect are two elements of Apple&rsquo;s macOS security.</figcaption></figure>
<p class="imageCredit">
</div>
<p>These features and other protections built into macOS (which we will discuss in more detail below) mean it&rsquo;s not an essential requirement to install antivirus software on your Mac.</p>
<p>However, as good as these protections are, there have been occasions when malware has managed to infiltrate the Mac platform, and times when Apple hasn&rsquo;t responded to a threat as quickly as Mac users might hope. If you want the very best protection from threats, therefore, consider adding a dedicated Mac security suite such as <a rel="nofollow" href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" >Intego Mac Internet Security</a>. You&rsquo;ll find Intego at the top of our roundup of the <a title="best antivirus for Mac" rel="noopener" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html" >best antivirus for Mac</a>, among other free and paid-for antivirus apps that might give you some peace of mind, including <a title="McAfee" rel="nofollow" href="https://www.kqzyfj.com/click-8807236-13998110?sid=1-1-670537-1-0-0" >McAfee</a> and <a title="Norton" rel="nofollow" href="https://www.tkqlhce.com/click-7928211-10530627?url=https%3A%2F%2Fbuy.norton.com%2Fps%3FselSKU%3D21351077%26ctry%3DGB%26lang%3Den%26tppc%3D337EB012-DD4B-2815-29A7-4C5482D4D60A%26ptype%3Dcart%26trf_id%3Dnortoncom%26inid%3Dhho_nortoncom_store_norton-security_pdpage?sid=1-1-670537-1-0-0" >Norton</a>.</p>
<p class="cta"> <a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" rel="nofollow">Get Intego Mac Security X9 here</a></p>
<p>Read on to find out more about how Apple&rsquo;s security measures work&ndash;and why they may not be enough to keep your Mac secure.</p>
<h2 class="toc" id="how-apple-protects-macs-from-viruses">How Apple protects Macs from viruses</h2>
<p>Macs are generally safer than PCs, but with threats to the Mac growing due to the platform&rsquo;s increasing popularity, Apple has had to build in protections to macOS and the Mac hardware itself.&nbsp;</p>
<p>In this section we will look at the built-in protections in macOS to establish whether they are enough, or if you should also install antivirus software on your Mac.</p>
<h3 id="how-xprotect-works">How XProtect works</h3>
<p>The Mac&rsquo;s malware scanning tool, XProtect, works invisibly and automatically in the background and requires no user configuration. Apple has a list of malicious applications that it checks against when you open downloaded applications. XProtect is&nbsp;regularly updated by Apple, and it updates in the background, so you should always be protected.</p>
<p>This is similar to having antivirus software from a third-party software developer running on your Mac, with the bonus of being written into the operating system and therefore not hampering performance.</p>
<p>If you download and try to open files contaminated with malware, you may see an explicit warning that the files will &ldquo;damage your computer,&rdquo; along with a reference to the type of malware. In that case you should delete the file immediately.</p>
<p>This is great news for Mac users, but is it enough? How does XProtect compare to the antivirus solutions out there? Well, XProtect may not be as up to date as some third-party products and it doesn&rsquo;t look for as many strains of malware. Read our roundup of the <a title="Best Mac Antivirus Apps" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">Best Mac antivirus apps</a> for an in-depth evaluation of the options out there.</p>
<h3 id="how-gatekeeper-works">How Gatekeeper works</h3>
<p>Thanks to Gatekeeper, macOS blocks downloaded software that hasn&rsquo;t been digitally signed, a process whereby Apple approves the developer. This leads to the familiar error message when you try to use or install unsigned software: &ldquo;[This app] can&rsquo;t be opened because it is from an unidentified developer.&rdquo; One change to Gatekeeper that arrived in macOS Catalina a few years back was that software is checked for malware and other issues every time it runs, rather than just the first time you install it.</p>
<p>For maximum protection, GateKeeper can be set to only allow software to be installed if it was downloaded from the Mac App Store. Or you can set it to allow you to install software from the web, but from verified developers only.</p>
<p>You can adjust these settings via the Security &amp; Privacy section of System Preferences:</p>
<ol>
<li>In Security &amp; Privacy, select the General tab.&nbsp;</li>
<li>Choose from the options underneath Allow Applications Downloaded From.</li>
<li>Choose App Store or App Store and Identified Developers.</li>
</ol>
<p>The safest option is App Store only, but if you also want to be able to install legitimate software from the web then App Store and Identified Developers is the best plan. There used to be a further option to disable the feature by choosing &lsquo;Anywhere,&rsquo; but this option is no longer available.</p>
<p>All software downloaded via the App Store is signed, but should you attempt to open an app you&rsquo;ve downloaded from the web that isn&rsquo;t signed, you&rsquo;ll see a Gatekeeper warning like the one below:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/security2_thumb.png" alt="Do Macs get viruses? | Do Macs need antivirus software" loading="lazy" /></figure>
</div>
<p>This may mean you&rsquo;ve almost installed malware. On the other hand, of course, it may be a legitimate app. In which case (and if you&rsquo;re sure) you can bypass Gatekeeper&rsquo;s protection and install it.</p>
<p>To do so, go to the Finder and locate the app there. Now hold down Ctrl when you click on the app, and then select Open. This will mark it as being trusted. For more details, read <a title="How open an app from an unidentified developer" href="https://www.macworld.com/article/672947/how-to-open-a-mac-app-from-an-unidentified-developer.html">how to open an app from an unidentified developer</a>.</p>
<p>Being able to download unsigned software might sound like a benefit, but it essentially enables you to bypass the protections offered by Gatekeeper. That&rsquo;s a mixed blessing, and more and more malicious apps are instructing users to do exactly this when they are installed.</p>
<h3 id="sandboxing-and-related-protections">Sandboxing and related protections</h3>
<p>Software that is approved by Apple is also sandboxed, which means apps do only what they&rsquo;re intended to do. App sandboxing isolates apps from the critical system components of your Mac, your data and your other apps, so they shouldn&rsquo;t be able to do any damage. It doesn&rsquo;t protect you from malware getting into the system, but it does limit the extent of what the malware can do once it&rsquo;s in there.</p>
<p>The main problem here is that while apps sold on the Mac App Store have to be sandboxed, other Mac apps don&rsquo;t.</p>
<p>However, even without app sandboxing, there are related features built into macOS that should still stop apps snooping on your data. Since macOS 10.15 Catalina in 2019 it has been a requirement for all Mac apps to get your permission before they can access your files. macOS will also ask for your permission before an app can access the camera or microphone, or log what you type.</p>
<p>Another change that arrived with Catalina is that macOS itself is now stored on a separate disk volume. This means that your important system files are all completely separate and therefore more challenging to access. Apps can&rsquo;t get to your system files where they could cause problems.</p>
<h3 id="security-updates">Security updates </h3>
<p>Apple regularly issues security updates for the Mac. While these can serve to demonstrate that the Mac isn&rsquo;t infallible, with Apple all too frequently having security flaws pointed out to it, they are generally issued promptly. </p>
<p>Less pleasingly, these security updates have generally been issued as part of a larger macOS update: for example, macOS Monterey 12.2.1 closed a security vulnerability in WebKit that would have made it possible to execute malicious code. Because these security fixes were issued as part of a macOS update, which often requires the computer to reboot during the install process, Mac users may be less likely to install the update promptly, even though these updates can be set to install automatically. </p>
<p>Since the launch of Ventura, however, Apple has started separating out the security updates from wider macOS updates and rolling them out automatically. This way the update can happen in the background, without a restart. </p>
<h3 id="password-protection-and-passkeys">Password protection and Passkeys</h3>
<p>Apple improved the way users can manage passwords in macOS Monterey and also made some changes to two-factor authentication. You can find all your Passwords in System Preferences &gt; Passwords. You just need to unlock it with your main password to see every other password you have. (You can also view this information on your iPhone in Settings &gt; Passwords.)</p>
<p>In Monterey a new authenticator was added, so you can set up verification codes instead of using an authentication app. To add a setup key you need to click on a password and then choose Enter Setup Key, which you should be able to obtain from the provider. Once input the 2FA verification codes should automatically fill.</p>
<p>In macOS Ventura Apple moved from passwords to passkeys. Apple explains: &ldquo;Passkeys use iCloud Keychain public key credentials, eliminating the need for passwords. Instead, they rely on biometric identification such as Touch ID and Face ID in iOS, or a specific confirmation in macOS for generating and authenticating accounts.&rdquo; Passkeys are more secure, according to Apple. Essentially your device will hold one part of a cryptographic key pair and the other part will be stored by the website or service you&rsquo;re logging into. Your device will authenticate you biometrically (with Touch ID or Face ID) and log you in. For more information, read <a href="https://www.macworld.com/article/917751/how-to-use-passkeys.html">How to use Passkeys</a>.</p>
<h3 id="recording-alerts">Recording alerts</h3>
<p>In macOS Monterey Apple added a Recording indicator in the menu bar so you&rsquo;ll know if an app is recording you. A bit like the light that indicates the mic is in use on your iPhone.</p>
<h3 id="pasteboard-alerts">Pasteboard alerts </h3>
<p>Similarly, as of macOS Ventura, any app that wants access to your pasteboard has to request permission. </p>
<h3 id="safari-protections">Safari protections</h3>
<p>Anti-phishing technology in Safari will detect fraudulent websites. It will disable the page and display an alert if you visit a suspect website.</p>
<p>Anti-phishing isn&rsquo;t the only way that Safari protects you when you&rsquo;re surfing. Apple also allows users to prevent advertisers tracking them around the web. You can see a Privacy Report including details of all the cross-site trackers Apple has stopped from profiling you.</p>
<p>You&rsquo;ll also notice that plug-ins such as Silverlight, QuickTime, and Oracle Java won&rsquo;t run if they aren&rsquo;t updated to the latest version, another way of ensuring your Mac is safe. And of course now that Adobe has discontinued Flash people should hopefully no longer fall for malware hidden in Flash Player.</p>
<p>Safari will also flag up weak passwords and make strong password suggestions when you open an account on a website. This strong password will be saved in your iCloud Keychain so you won&rsquo;t have to remember it. It&rsquo;s a lot safer than using the same password you always use. For more on this subject, read about <a title="How Apple plans to retire passwords" href="https://www.macworld.com/article/677077/how-apple-plans-to-retire-passwords.html">How Apple plans to retire passwords</a>. </p>
<p>In the past, one issue with Apple&rsquo;s suggested passwords has been that sometimes they don&rsquo;t match the website&rsquo;s requirement. For example, a website may require one upper-case letter, one special character, one number and so on. As of the launch of Ventura, macOS allows users to edit suggested passwords so they meet these requirements. </p>
<p>New in Safari 15 were improvements to the Intelligent Tracing Prevention that arrived in Safari 14. Now web trackers won&rsquo;t be able to see your IP address so they won&rsquo;t be able to create a profile about you. Check this by choosing Safari from the Safari menu &gt; Preferences &gt; Privacy &gt; Hide IP address from trackers.</p>
<h3 id="photo-privacy">Photo privacy </h3>
<p>A few years ago there was a lot of bad publicity for Apple when celebrities reported that their iCloud photos had been stolen. (For more on this, read <a href="https://www.macworld.com/article/672307/how-to-stop-photo-hacks-on-iphone.html">How to stop photo hacks on iPhone</a>.) There have been a number of security enhancements in iCloud since this happened, and Apple has given users other ways to protect their photo privacy: for example, the ability to hide photos and albums. In Ventura, Apple expanded this so that hidden albums, and the Recently Deleted album, are locked by default, and only authenticated by Touch ID or Face ID.</p>
<h3 id="mail-protections">Mail protections</h3>
<p>macOS Monterey brought a new feature in Mail on the Mac. Mail Privacy Protection improves privacy for users. For example, it stops email senders from being able to track whether you&rsquo;ve opened an email, or even determine your location from your IP address. Check that the feature is working for you by opening Mail &gt; Click on Mail in the menu &gt; choose Preferences &gt; Privacy &gt; and make sure Protect Mail Activity is selected. It should be by default.</p>
<p>There are additional Mail protections if you&rsquo;re an iCloud subscriber. Hide My Email allows you to create an alternative email address that you can give out. The email will still be delivered to your inbox, but you can easily delete the alternative email later. </p>
<p>You can turn this on in System Preferences &gt; click on Apple ID &gt; and select Private Relay (currently in Beta).&nbsp;</p>
<p>In Ventura Hide My Email was extended to third-party apps. </p>
<h3 id="icloud-protections">iCloud+ protections</h3>
<p>If you&rsquo;re an iCloud subscriber, you&rsquo;ll be interested in a feature that arrived in Monterey (part of the upgrade from iCloud to iCloud+) called Private Relay. It&rsquo;s a bit like a VPN in that it encrypts your network traffic and routes your DNS lookup requests through two servers, one of which is not controlled by Apple. However, it&rsquo;s not a VPN, because it only works in Safari and obviously it lacks the other usual features of a VPN. (If you want a VPN, by the way, check out our roundup of the <a title="Best VPNs for Mac" href="https://www.macworld.com/article/668698/best-vpn-for-mac-2.html">best VPNs for Mac</a>. You may even be able to save some money if you take a look at our roundup of <a title="VPN deals" href="https://www.macworld.com/article/673709/best-vpn-deals-find-a-cheap-vpn-for-your-mac-iphone-or-ipad.html">VPN deals</a>, or try one of these <a title="Free VPNs for Mac" href="https://www.macworld.com/article/668942/the-best-free-vpn-for-mac-in-2022.html">free VPNs</a>.)</p>
<p>You can manage your Private Relay settings in System Preferences &gt; Apple ID &gt; click on Options beside Hide my email. Here you will see any fake email addresses you&rsquo;re using; just click on Turn Off if you want to stop those emails arriving. You can also change which email address they are forwarded to.&nbsp;</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/private_relay_thumb.jpg" alt="Private Relay Safari " loading="lazy" /></figure>
</div>
<h3 id="safety-check">Safety Check </h3>
<p>A new feature in macOS Ventura is Safety Check, a feature that will allow anyone who is concerned that they are in danger from a person known to them to revoke any access they have granted to that person. So, for example, that person won&rsquo;t be able to access their location, their photos, or anything else that could help them to be traced. </p>
<h3 id="file-encryption-with-filevault">File encryption with FileVault</h3>
<p>In addition to Gatekeeper, which should keep malware off your Mac, FileVault 2 makes sure your data is safe and secure by encrypting it.</p>
<p>If you&rsquo;re concerned about someone being able to access the files on your Mac you can encrypt them using FileVault, which will mean only you can unencrypt them. Read our <a title="Best Mac security settings" href="https://www.macworld.com/article/1432223/mac-security-tips-password-find-my-users-lockdown-mode.html">tips for keeping your mac secure</a>, of which using FileVault is one.</p>
<h3 id="warnings-about-spyware">Warnings about spyware</h3>
<p>Apple announced in November 2021 that it would warn its users of state-sponsored espionage attacks, such as the well-publicised Pegasus spyware, on their iPhones, iPads and Macs. The notification will come via email or a message. The same warning will be displayed on the user&rsquo;s Apple ID page at <a title="apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://appleid.apple.com&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >appleid.apple.com</a>.</p>
<p>The warning will offer advice about how affected users can protect themselves against attack. There&rsquo;s more information on <a title="Apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://support.apple.com/en-gb/HT212960&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s site</a>.</p>
<h3 id="find-my">Find My</h3>
<p>Not every threat to your data comes from malware. Sometimes a criminal might get hold of your Mac, in which case Apple&rsquo;s Find My service will come into its own.</p>
<p>The Find My app can relay the location of your lost or stolen Mac back to you. If you&rsquo;re concerned that it might not be recoverable, you can wipe the contents of the Mac so that your data can&rsquo;t be accessed. For more on this, read <a href="https://www.macworld.com/article/671675/how-to-use-find-my-iphone-to-find-lost-or-stolen-iphone-or-ipad.html">How to find a lost or stolen iPhone</a>.</p>
<p>In addition, every Mac with an M1-series, M2-series, or T2 chip has an Activation Lock feature that means they can be bricked remotely.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/lifestyle_macbook_side_15_thumb.jpg" alt="MAC SECURITY" loading="lazy" /></figure>
</div>
<h2 class="toc" id="when-apples-security-measures-arent-enough">When Apple&rsquo;s security measures aren&rsquo;t enough&hellip;</h2>
<p>All the above is great, but unfortunately there have been cases where Gatekeeper has been bypassed because malware has got an approved developer signature. For example OSX/CrescentCore was able to bypass Gatekeeper because it was signed by a certificate assigned by Apple to a developer. It took Apple a few days to retract that certificate.</p>
<p>It isn&rsquo;t only when malware gets a certificate from a registered developer. In the case of OSX/Linker, a zero-day vulnerability in Gatekeeper was being exploited.</p>
<p>Zero-day threats mean there are &ldquo;zero days&rdquo; to fix the vulnerabilities, although often a legitimate developer discovers the vulnerability and lets the developer know about it. There is usually a 90-day deadline for the fix to be made available. Some times the developer doesn&rsquo;t act in time and the exploit is publicised.</p>
<p>Apple normally reacts quickly, although there have been cases where the company has ignored the identified vulnerability, such as when a teenager reported the Group FaceTime vulnerability that meant someone could listen in to a call and Apple failed to act. There&rsquo;s more about how Apple reacts to security threats next.</p>
<p>When Apple is made aware of a threat the company usually issues a security update to the latest version of macOS and to the two versions prior to it. This way Apple will protect users from vulnerabilities and flaws in macOS that could be utilised by hackers.</p>
<p>Normally the advice would be to install the update immediately. However, for example a Sierra and High Sierra security update in July 2019 was subsequently pulled after people experiences problems after installing it.</p>
<h2 class="toc" id="how-apple-responds-to-security-threats">How Apple responds to security threats</h2>
<p>Despite the security measures Apple has in place, from time-to-time there are threats to the Mac.</p>
<p>Apple has its own security research team, but it depends on users and independent researchers to help by reporting any flaws they find in Apple products.</p>
<p>To this end, Apple has an incentive program that rewards such discoveries with payments of up to $200,000, depending on the seriousness of the flaw. But it was the last major tech company to set up such a scheme. (Microsoft set up its own bug-reporting incentive programme in 2013, and was itself criticised at the time for leaving it so late.)</p>
<p>On 4 August 2016, Apple security boss Ivan Krstic announced the Apple Security Bounty Program.&nbsp;&ldquo;We&rsquo;ve had great help from researchers in improving iOS security all along,&rdquo; Krstic said. &ldquo;[But] we&rsquo;ve heard pretty consistently&hellip; that it&rsquo;s getting increasingly difficult to find some of those most critical types of security vulnerabilities. So the Apple Security Bounty Program is going to reward researchers who actually share critical vulnerabilities with Apple.&rdquo;</p>
<p>The top reward of $200,000 is given to those who discover&nbsp;vulnerabilities in Apple&rsquo;s secure boot firmware components; for less critical flaws the bounties drop through a series of smaller figures to a bottom tier of $25,000. <a title="Wired" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.wired.com/2016/08/apples-finally-offering-bug-bounties-highest-rewards-ever/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">Wired</a> has the details.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/macbook_air_2018_lifestyle_0011_thumb.jpg" alt="MACBOOK SECURITY" loading="lazy" /></figure>
</div>
<p>We imagine most Mac users will be pleased to hear that Apple has an incentive programme to encourage more widespread reporting of its vulnerabilities. Incentivising security researchers to let Apple know about a flaw instead of passing it on to hackers (which may still, sadly, <a title="9to5Mac" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://9to5mac.com/2016/08/10/iphone-hack-bounty-apple-exodus-intelligence/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">be more lucrative</a>) makes Apple products safer for everyone.</p>
<p>One such flaw was the High Sierra root bug, discovered on 28 November 2017. This flaw in macOS 10.13 could allow access to settings on a Mac without the need for a password. Apple immediately issued a statement confirming that it was working on a fix and an update was anticipated to be issued within days.</p>
<h2 class="toc" id="how-to-keep-your-mac-safe-from-malware">How to keep your Mac safe from malware</h2>
<p>Apple does a lot to keep your Mac safe, but you have to work with it, installing updates when they arrive, not clicking on suspicious links in emails, not installing Flash, and so on. There are also some third party antivirus apps you could try &ndash; we have a complete guide to the <a title="What's the best antivirus for Mac" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">best antivirus for Mac here</a>.</p>
<p>Here are a few of the things you should do:</p>
<h3 id="1-keep-macos-up-to-date">1) Keep macOS up to date</h3>
<p>Despite what we said above about the security update Apple later retracted, normally the advice would be to install a security update as soon as possible.</p>
<p>Apple addresses flaws and vulnerabilities with the Mac by issuing updates to the Mac operating system, it is important to keep your Mac up to date. We advise checking regularly for OS updates remains a key part of a sound security strategy.</p>
<p>You can find out about the latest version of macOS here: <a href="https://www.macworld.com/article/678251/macos-13-ventura-beta-features-compatibility-how-to-update.html">macOS Ventura latest version information</a>.</p>
<p>You can set your Mac to automatically update as soon as a new version of the operating system is made available. Follow these instructions to set that up:</p>
<h4 id="how-to-automatically-install-macos-updates">How to automatically install macOS updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on Software Update.</li>
<li>Tick the box beside Automatically keep my Mac up to date.</li>
<li>Or, click on Advanced and choose from automatically: Check for updates, download new updates when available, Install macOS updates and Install app updates from the App Store.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/install_macos_options.jpg" alt="How to install macOS update" loading="lazy" /></figure>
</div>
<h4 id="how-to-automatically-install-high-sierra-or-older-software-updates">How to automatically install High Sierra or older software updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on App Store.</li>
<li>Tick the box beside Automatically check for updates.</li>
<li>You can choose to download the newly available updates, if you want them to install automatically though you need to make sure the box beside Install macOS updates is checked.</li>
</ol>
<h4 id="how-to-manually-install-macos-software-updates">How to manually install macOS software updates</h4>
<p>If you&rsquo;d rather not let your Mac automatically update, you should periodically check to see if there is an update to your version.</p>
<ul>
<li>In macOS High Sierra and earlier you can go to the Mac App Store and check for updates.</li>
<li>In macOS Mojave and newer you need to go to the Software Update pane in System Preferences.</li>
</ul>
<p>You may need to restart your computer once the update has downloaded. You can expect a typical 460MB download to take about 8 minutes (during which time you will still be able to work) but for a large update you will have to restart and install and that could take as much as 20 minutes, bringing the total install time to about 25 minutes in total.</p>
<p>For our in-depth guide to updating Mac operating systems, see <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">How to update macOS</a>.</p>
<h3 id="2-dont-connect-to-public-wi-fi-networks">2) Don&rsquo;t connect to public Wi-Fi networks</h3>
<p>Beware of connecting to a public Wi-Fi network as there may be someone spying who could gain access to your passwords and other private information, or you could have your session hijacked. Snoopers can set up their own Wi-Fi hotspot, pretending to be your hotel or coffee shop, then once you have connected they can grab any data you send over it. In the past there have been flaws detected in the OS that could allow access to your Mac, such as the SSL error in an earlier version of Mac OS X that meant it was possible for a hacker to access your machine if you were using public WiFi.</p>
<h3 id="3-dont-install-flash">3) Don&rsquo;t install Flash</h3>
<p>Adobe discontinued Flash on 31 December 2020 with good reason. Intego, Malwarebytes and others recommended that you shouldn&rsquo;t install Flash Player. Fake Flash Player updates have often been the means by which people install malware. For example, people want to watch or download a popular movie or TV series for free and they find a search result that leads to a request to update Flash Player in order to view the content. There is no need to install Flash Player now that HTML5 has made Flash obsolete. Now that Flash is no longer be supported the advice is simple: Don&rsquo;t use Flash!</p>
<h3 id="4-keep-java-up-to-date-on-your-mac">4) Keep Java up to date on your Mac</h3>
<p>If you must use Java (which is also problematic) then make sure it&rsquo;s up to date. Vulnerabilities with Java have highlighted the fact that there are cross-platform threats that even Mac users need to be aware of. Apple blocks Java by default, leaving it to the user to decide whether to install those tools. If you do need to update them be very careful where you download updates from!</p>
<h3 id="5-avoid-falling-foul-of-phishing-emails">5) Avoid falling foul of phishing emails</h3>
<p>Protect yourself from phishing attacks not responding to emails that require you to enter a password or install anything. You could also use free software such as <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://objective-see.com/products/blockblock.html&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">BlockBlock</a>. That way even you were to carry out the steps to launch the malware, it would not be able to write files or mark itself as launching on startup.</p>
<h3 id="6-dont-fall-for-facebook-scams">6) Don&rsquo;t fall for Facebook scams</h3>
<p>Facebook scams are usually designed to harvest data about the most gullible people, so if it seems like it might be too good to be true it probably is and you&rsquo;d be wise not to share it on Facebook. At best you might just look silly and those scammers will start to target you with more scams, at worse scammers can access your personal data and that of those you share their post with. So don&rsquo;t click on a link just because a friend shared it and definitely don&rsquo;t give out your personal data on Facebook.</p>
<h2 class="toc" id="why-you-need-to-protect-windows-users">Why you need to protect Windows users </h2>
<p>One of the reasons why, regardless of how safe a Mac is from malware, we should run an antivirus is to protect our Windows using friends and colleagues. While it&rsquo;s unlikely that your Mac will run any malware, there is possibly a more pernicious issue: You Mac could become the Typhoid Mary&nbsp;of Windows viruses, which is to say, you could be harboring viruses on your Mac that won&rsquo;t effect you, but can be problems for Windows users.</p>
<p>Some years ago when writing about Mac malware we identified the following nasties on our Mac:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.techhive.com/images/article/2015/05/mymac-100585505-medium.png?auto=webp&amp;quality=85,70" alt="mymac" loading="lazy" /></figure>
</div>
<p>That is a list of 30 potentially bad things that&hellip; you guessed it, were found on the Mac we ran a test virus scan on, one of which was a Windows virus. </p>
<h2 class="toc" id="how-to-tell-if-a-mac-has-a-virus">How to tell if a Mac has a virus</h2>
<p>Look out for the following signs that your Mac has been infected with malware:&nbsp;</p>
<ol>
<li>Aggressive web page banners and browser pop-ups recommending software.</li>
<li>Web page text turning into hyperlinks.</li>
<li>Programs appearing that you haven&rsquo;t authorized.</li>
<li>Mac crashes.</li>
<li>Mac runs hot.</li>
<li>Mac speeds up for no reason.</li>
</ol>
<p>If you think something suspicious is happening, open <a href="https://www.macworld.com/article/353345/how-to-macos-utilities-activity-monitor.html">Activity Monitor</a> and click on the CPU tab. Check what software is running &ndash; especially if something is hogging a lot of your resources.</p>
<p>We discuss how to tell if your Mac has a virus and how to remove a Mac virus in a separate article: <a href="https://www.macworld.com/article/671430/how-remove-virus-mac.html">How to remove a virus from a Mac</a> and <a href="https://www.macworld.com/article/233894/how-to-protect-your-mac-against-attack-and-disaster.html">How to protect your Mac against attack and disaster</a> to avoid getting infected.</p>
<div class="PH_F_PC_SW"></div>
<p><category>Antivirus, Personal Software, Security</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
	</channel>
</rss>
