<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerabilities &#8211; Latest Apple News</title>
	<atom:link href="https://www.latest-apple-news.com/tag/vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.latest-apple-news.com</link>
	<description>You can stay up-to-date on all the latest news, trends, and updates from the world of Apple. Our website is dedicated to bringing you the most comprehensive and reliable coverage of everything Apple, from the latest iPhone models to the newest Mac releases.</description>
	<lastBuildDate>Fri, 10 Jan 2025 00:30:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.latest-apple-news.com/wp-content/uploads/2023/05/cropped-pngwing.com_-32x32.png</url>
	<title>vulnerabilities &#8211; Latest Apple News</title>
	<link>https://www.latest-apple-news.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New Apple AirTag Features and Security Enhancements</title>
		<link>https://www.latest-apple-news.com/2025/08/05/new-apple-airtag-features-and-security-enhancements/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 23:28:53 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[AirTagequipped]]></category>
		<category><![CDATA[AirTagsstrong]]></category>
		<category><![CDATA[alertsstrong]]></category>
		<category><![CDATA[alertstrong]]></category>
		<category><![CDATA[belongingsli]]></category>
		<category><![CDATA[capabilities]]></category>
		<category><![CDATA[communicates]]></category>
		<category><![CDATA[convenience]]></category>
		<category><![CDATA[Devicesstrong]]></category>
		<category><![CDATA[difficulttoreach]]></category>
		<category><![CDATA[Encryptionstrong]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[Enhancementsstrong]]></category>
		<category><![CDATA[environments]]></category>
		<category><![CDATA[Findingstrong]]></category>
		<category><![CDATA[gamechanger]]></category>
		<category><![CDATA[h4Conclusionh4]]></category>
		<category><![CDATA[implemented]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[introducing]]></category>
		<category><![CDATA[Itemsstrong]]></category>
		<category><![CDATA[knowledgeli]]></category>
		<category><![CDATA[listrongAdditional]]></category>
		<category><![CDATA[listrongAirTag]]></category>
		<category><![CDATA[listrongAvoid]]></category>
		<category><![CDATA[listrongEndtoEnd]]></category>
		<category><![CDATA[listrongImproved]]></category>
		<category><![CDATA[listrongMonitor]]></category>
		<category><![CDATA[listrongMultiple]]></category>
		<category><![CDATA[listrongPrecision]]></category>
		<category><![CDATA[listrongPrivacy]]></category>
		<category><![CDATA[listrongSecurity]]></category>
		<category><![CDATA[listrongSound]]></category>
		<category><![CDATA[listrongUnwanted]]></category>
		<category><![CDATA[listrongUpdate]]></category>
		<category><![CDATA[Monitoringstrong]]></category>
		<category><![CDATA[notifications]]></category>
		<category><![CDATA[notificationsstrong]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[precautions]]></category>
		<category><![CDATA[Purposesstrong]]></category>
		<category><![CDATA[Regularlystrong]]></category>
		<category><![CDATA[reinforcing]]></category>
		<category><![CDATA[responsiblyli]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[simultaneously]]></category>
		<category><![CDATA[streamlined]]></category>
		<category><![CDATA[strongPrecision]]></category>
		<category><![CDATA[strongunwanted]]></category>
		<category><![CDATA[Supportstrong]]></category>
		<category><![CDATA[ultrawideband]]></category>
		<category><![CDATA[unauthorized]]></category>
		<category><![CDATA[userfriendly]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[Vulnerabilitiesstrong]]></category>
		<category><![CDATA[whereabouts]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=121210</guid>

					<description><![CDATA[Apple’s AirTag, a small but powerful device designed to help users track their belongings, has been a game-changer in the ]]></description>
										<content:encoded><![CDATA[<p>Apple’s AirTag, a small but powerful device designed to help users track their belongings, has been a game-changer in the world of personal tracking. Since its launch, it has become an essential tool for many people who want to keep tabs on everything from keys to bags and even pets. As with any popular Apple product, AirTag continues to evolve with regular software updates that introduce new features and security enhancements to improve user experience and safety. In this article, we will explore the latest features and security improvements introduced for Apple AirTag, showcasing how they have made the device even more reliable and secure.<span id="more-121210"></span></p>
<h4>New Features of Apple AirTag</h4>
<p>Apple’s updates to AirTag have introduced several new features that enhance its usability and make it even more convenient for users.</p>
<ol>
<li><strong>Precision Finding Enhancements</strong> One of the standout features of AirTag is its ability to use <strong>Precision Finding</strong> to locate an item with remarkable accuracy. Precision Finding utilizes the iPhone&#8217;s U1 chip, which communicates with the AirTag via ultra-wideband (UWB) technology to provide precise location tracking. With the latest updates, Apple has refined the Precision Finding experience, making it even more accurate and user-friendly. For instance, users can now receive clearer directions when searching for a misplaced item, including visual, haptic, and auditory cues to guide them to the exact location of their AirTag-equipped belongings.</li>
<li><strong>Sound Alerts for Lost Items</strong> A new feature added to AirTags allows users to trigger a sound alert directly from the AirTag, helping them locate lost items. This is especially useful if an item is hidden under a pile of clothes, furniture, or in another difficult-to-reach location. The update has made the sound more prominent and easier to hear, even in noisy environments. This small but effective feature provides an extra layer of convenience when looking for misplaced items around the home or office.</li>
<li><strong>AirTag Battery Monitoring</strong> The latest update to AirTag has introduced a feature that allows users to monitor the battery status of their AirTags. This update can be checked within the <strong>Find My</strong> app, and it will notify users when the battery is running low, giving them plenty of time to replace the CR2032 battery. This addition is incredibly useful, as users no longer have to guess when their AirTag battery might be running out, preventing any unexpected downtime.</li>
<li><strong>Additional Languages and Region Support</strong> AirTags now support a wider range of languages and regions, making the device more accessible to users worldwide. This includes new languages for the <strong>Find My</strong> app, making it easier for non-English speaking users to set up and manage their AirTags.</li>
<li><strong>Multiple AirTag Support in Find My App</strong> As AirTag owners may have multiple devices attached to different items, Apple has enhanced the <strong>Find My</strong> app’s ability to manage multiple AirTags. The app now provides a more organized and streamlined interface for tracking numerous AirTags simultaneously, allowing users to quickly locate and manage their collection of AirTags, whether they’re attached to luggage, keys, or any other personal items.</li>
</ol>
<h4>Security Enhancements in AirTag</h4>
<p>While AirTag has been a popular and useful product, its tracking capabilities raised concerns about privacy and misuse, especially regarding the potential for unwanted tracking. Apple has listened to these concerns and implemented several significant security and privacy features to make AirTag more secure for all users.</p>
<ol>
<li><strong>Unwanted Tracking Alerts</strong> In response to concerns about AirTags being used for stalking or unwanted tracking, Apple has introduced a series of features designed to prevent misuse. One of the most important security updates is the <strong>unwanted tracking alert</strong>. If an AirTag is found moving with you over a period of time, and it is not registered to your Apple ID, your iPhone will send an alert notifying you of a suspicious AirTag nearby. This alert is triggered if the AirTag is traveling with you, without your knowledge, for a certain distance.
<p>If a user does not have an iPhone, the AirTag will emit a sound after a period of time to make it easier for the target to locate the device. These measures ensure that AirTags cannot be used for covert or malicious tracking.</li>
<li><strong>Improved Sound Alerts for Unknown AirTags</strong> Building on the unwanted tracking feature, the sound alert emitted by an AirTag has been made more noticeable. If an AirTag is separated from its owner and traveling with someone else, it will play a sound to draw attention to its presence. Apple has worked to make this alert louder and more persistent, making it harder for potential stalkers to conceal the device.</li>
<li><strong>Privacy Features for Shared Devices</strong> Apple has also introduced privacy features for users who share devices, ensuring that AirTags cannot be used for tracking people without their consent. For example, if you’re in a shared household or a family group, your AirTag’s location information will remain private and secure. Only authorized users will have access to the AirTag’s location data, which ensures that no one else can track your personal belongings or movements without your knowledge.</li>
<li><strong>End-to-End Encryption</strong> Apple has maintained a strong focus on privacy by ensuring that AirTag location data remains encrypted. When you track an AirTag’s location, the data is encrypted end-to-end, meaning only you (or those you authorize) can access it. Even Apple cannot view or track the location of your AirTag. This ensures that your personal information, such as the whereabouts of your items, remains completely private.</li>
<li><strong>Security Fixes for Bluetooth Vulnerabilities</strong> Apple has addressed certain Bluetooth vulnerabilities that were initially a concern for AirTags. These vulnerabilities could have potentially been exploited to manipulate the AirTag’s tracking features. Through regular software updates, Apple has patched these security holes, ensuring that AirTag is a secure and reliable tool for locating personal belongings.</li>
</ol>
<h4>How to Keep Your AirTag Secure</h4>
<p>With these new features and security enhancements, Apple has made the AirTag even more reliable and safe to use. However, users should also take certain precautions to ensure their AirTags remain secure:</p>
<ul>
<li><strong>Update Regularly</strong>: Ensure that your AirTag is always running the latest software by keeping your devices updated. Apple regularly releases security patches and new features that help protect against potential threats.</li>
<li><strong>Monitor AirTag Notifications</strong>: Pay attention to notifications related to unwanted tracking, and if you find an unfamiliar AirTag near you, use the option to disable it.</li>
<li><strong>Avoid Using AirTags for Unauthorized Purposes</strong>: AirTags are designed to track personal items like keys, bags, or luggage, not to be used for tracking people without their consent. Always use AirTags responsibly.</li>
</ul>
<h4>Conclusion</h4>
<p>Apple’s continuous improvements to AirTag have made it an even more reliable and secure tool for tracking personal belongings. With new features like Precision Finding, sound alerts, and battery monitoring, AirTag has become more user-friendly and convenient. At the same time, Apple has taken privacy and security seriously by introducing features to prevent unwanted tracking and to ensure users&#8217; data remains secure. As the technology behind AirTags continues to evolve, Apple is reinforcing its commitment to both innovation and privacy, making AirTag an invaluable product for modern life.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What’s New in the 2025 macOS Ventura Update?</title>
		<link>https://www.latest-apple-news.com/2025/01/20/whats-new-in-the-2025-macos-ventura-update/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Mon, 20 Jan 2025 00:39:48 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[Centerstrong]]></category>
		<category><![CDATA[collections]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[Contextaware]]></category>
		<category><![CDATA[contextually]]></category>
		<category><![CDATA[convenience]]></category>
		<category><![CDATA[customizable]]></category>
		<category><![CDATA[Customizationstrong]]></category>
		<category><![CDATA[distractions]]></category>
		<category><![CDATA[efficiently]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[Enhancementsstrong]]></category>
		<category><![CDATA[Featuresstrong]]></category>
		<category><![CDATA[Finderstrong]]></category>
		<category><![CDATA[functionality]]></category>
		<category><![CDATA[iCloudstrong]]></category>
		<category><![CDATA[improvement]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[integrating]]></category>
		<category><![CDATA[integration]]></category>
		<category><![CDATA[interruptions]]></category>
		<category><![CDATA[introduction]]></category>
		<category><![CDATA[notifications]]></category>
		<category><![CDATA[optimization]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[personalized]]></category>
		<category><![CDATA[Productivity]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[professionalsmorep]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[Stabilitystrong]]></category>
		<category><![CDATA[streamlines]]></category>
		<category><![CDATA[strengthens]]></category>
		<category><![CDATA[strongConclusionstrong]]></category>
		<category><![CDATA[strongDynamic]]></category>
		<category><![CDATA[strongEnhanced]]></category>
		<category><![CDATA[strongFocus]]></category>
		<category><![CDATA[strongImproved]]></category>
		<category><![CDATA[strongNative]]></category>
		<category><![CDATA[strongRevamped]]></category>
		<category><![CDATA[strongUniversal]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[usercentric]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=120109</guid>

					<description><![CDATA[Apple’s macOS updates have always been about enhancing user experience, boosting productivity, and integrating more seamlessly with the broader Apple ]]></description>
										<content:encoded><![CDATA[<p>Apple’s macOS updates have always been about enhancing user experience, boosting productivity, and integrating more seamlessly with the broader Apple ecosystem. The 2025 update to macOS Ventura continues this tradition with a suite of new features and improvements designed to make the operating system more powerful and intuitive. In this article, we will explore the latest enhancements in macOS Ventura, from performance upgrades to new apps and functionality that cater to both casual users and professionals.<span id="more-120109"></span></p>
<p><strong>Enhanced Performance and Stability</strong></p>
<p>One of the primary focuses of the 2025 macOS Ventura update is performance optimization. Apple has fine-tuned the system to run more efficiently, reducing the boot time and improving app launch speeds. Users with older Macs will particularly appreciate the enhanced resource management, which ensures a smoother experience even on devices that have seen several years of use.</p>
<p>Stability has also been a key area of improvement. Apple has addressed numerous bugs and security vulnerabilities, making macOS Ventura more reliable and secure. The update includes the latest security patches, ensuring that users are protected against potential threats.</p>
<p><strong>Dynamic Control Center</strong></p>
<p>The Control Center in macOS Ventura has undergone a significant overhaul. The new Dynamic Control Center adapts based on user activity, providing quick access to frequently used settings and controls. For instance, if you’re in a video call, the Control Center will automatically highlight options like microphone mute, screen sharing, and camera settings. This context-aware functionality streamlines workflows and minimizes distractions.</p>
<p><strong>Revamped Finder</strong></p>
<p>Finder, the file management app, has received several updates to improve user experience. The new version introduces &#8220;Smart Search,&#8221; which leverages machine learning to offer more accurate and contextually relevant search results. Users can now find files faster, with predictive suggestions and improved tagging systems.</p>
<p>Additionally, Finder now supports customizable tabs, allowing users to create personalized workspaces. Whether you’re managing project files or organizing personal documents, the ability to tailor Finder to your specific needs enhances productivity.</p>
<p><strong>Universal Clipboard Enhancements</strong></p>
<p>The Universal Clipboard feature, which allows users to copy and paste content across Apple devices, has been refined in the 2025 update. With macOS Ventura, Universal Clipboard now supports larger file transfers and retains formatting more accurately. This improvement is especially beneficial for users who frequently switch between their Mac, iPad, and iPhone, ensuring a more seamless and consistent experience.</p>
<p><strong>Focus Mode Customization</strong></p>
<p>Focus Mode, introduced in earlier versions of macOS, has become even more customizable. In the latest update, users can create multiple Focus Modes tailored to different activities, such as work, study, or relaxation. Each mode can have its own set of notifications, apps, and even wallpaper settings, helping users stay focused and minimize interruptions during specific tasks.</p>
<p><strong>New Safari Features</strong></p>
<p>Safari, Apple’s web browser, has been updated with several new features aimed at enhancing browsing privacy and convenience. The introduction of “Private Relay” in macOS Ventura offers an extra layer of privacy by masking your IP address and encrypting your browsing activity, making it harder for third parties to track your online behavior.</p>
<p>Safari’s tab management has also been improved. Users can now create &#8220;Tab Groups,&#8221; which organize tabs into collections that can be saved and reopened later. This is particularly useful for users who manage multiple projects or need to separate personal and professional browsing activities.</p>
<p><strong>Improved Integration with iCloud</strong></p>
<p>The 2025 update strengthens macOS Ventura’s integration with iCloud. Users will notice faster and more reliable syncing of files, photos, and backups across their Apple devices. The introduction of &#8220;iCloud+&#8221; features, such as enhanced email privacy and HomeKit Secure Video, provides additional value for users who rely heavily on Apple’s cloud services.</p>
<p><strong>Native Support for More Apps</strong></p>
<p>macOS Ventura now includes native support for more third-party applications, improving performance and compatibility. Developers have been working closely with Apple to optimize their apps for the latest macOS, ensuring smoother operation and better integration with system features. This expansion of native support also extends to gaming, with several popular game titles now running more efficiently on Mac devices.</p>
<p><strong>Conclusion</strong></p>
<p>The 2025 macOS Ventura update brings a host of new features and improvements that enhance both performance and usability. From the Dynamic Control Center and revamped Finder to advanced Safari privacy options and better iCloud integration, Apple continues to refine the macOS experience. Whether you use your Mac for work, creativity, or everyday tasks, these enhancements ensure that macOS Ventura remains a robust and versatile operating system. As Apple pushes the boundaries of what its ecosystem can offer, macOS Ventura 2025 stands out as a testament to continuous innovation and user-centric design.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How could Apple&#8217;s manufacturing strategy change in the next 5 years?</title>
		<link>https://www.latest-apple-news.com/2024/12/16/how-could-apples-manufacturing-strategy-change-in-the-next-5-years/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 15:48:46 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[(AI)_]]></category>
		<category><![CDATA[1.]]></category>
		<category><![CDATA[2.]]></category>
		<category><![CDATA[3.]]></category>
		<category><![CDATA[3D]]></category>
		<category><![CDATA[4.]]></category>
		<category><![CDATA[5.]]></category>
		<category><![CDATA[6.]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[advancements]]></category>
		<category><![CDATA[Agility]]></category>
		<category><![CDATA[Agilitystrongh4]]></category>
		<category><![CDATA[AI_strong]]></category>
		<category><![CDATA[AI-driven]]></category>
		<category><![CDATA[Analytics]]></category>
		<category><![CDATA[artificial]]></category>
		<category><![CDATA[associated]]></category>
		<category><![CDATA[attributes]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Chain]]></category>
		<category><![CDATA[chainemstrong]]></category>
		<category><![CDATA[Chainstrongh4]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[committing]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[conclusion]]></category>
		<category><![CDATA[consumers]]></category>
		<category><![CDATA[continued]]></category>
		<category><![CDATA[customizable]]></category>
		<category><![CDATA[disasters]]></category>
		<category><![CDATA[disruptions]]></category>
		<category><![CDATA[diversify]]></category>
		<category><![CDATA[diversifying]]></category>
		<category><![CDATA[dynamics]]></category>
		<category><![CDATA[economically]]></category>
		<category><![CDATA[effectively]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[electronics]]></category>
		<category><![CDATA[embracing]]></category>
		<category><![CDATA[enhancing]]></category>
		<category><![CDATA[environmental]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[ever-evolving]]></category>
		<category><![CDATA[everevolving]]></category>
		<category><![CDATA[expectations]]></category>
		<category><![CDATA[exploring]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[flexibility]]></category>
		<category><![CDATA[footprint]]></category>
		<category><![CDATA[fostering]]></category>
		<category><![CDATA[geopolitical]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[h3strongConclusionstrongh3]]></category>
		<category><![CDATA[h4strong1]]></category>
		<category><![CDATA[h4strong2]]></category>
		<category><![CDATA[h4strong3]]></category>
		<category><![CDATA[h4strong4]]></category>
		<category><![CDATA[h4strong5]]></category>
		<category><![CDATA[h4strong6]]></category>
		<category><![CDATA[highlighted]]></category>
		<category><![CDATA[implementing]]></category>
		<category><![CDATA[incentives]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[incorporating]]></category>
		<category><![CDATA[increasing]]></category>
		<category><![CDATA[influence]]></category>
		<category><![CDATA[integrate]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[intelligenceem]]></category>
		<category><![CDATA[investing]]></category>
		<category><![CDATA[landscape]]></category>
		<category><![CDATA[leveraging]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[manufacturingmore]]></category>
		<category><![CDATA[materials]]></category>
		<category><![CDATA[minimizing]]></category>
		<category><![CDATA[operations]]></category>
		<category><![CDATA[opportunities]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[partnerships]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[practices]]></category>
		<category><![CDATA[Practicesstrongh4]]></category>
		<category><![CDATA[printing]]></category>
		<category><![CDATA[printingemstrong]]></category>
		<category><![CDATA[prioritizing]]></category>
		<category><![CDATA[processes]]></category>
		<category><![CDATA[production]]></category>
		<category><![CDATA[Productionstrongh4]]></category>
		<category><![CDATA[prompting]]></category>
		<category><![CDATA[regulatory]]></category>
		<category><![CDATA[renewable]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[reshoring]]></category>
		<category><![CDATA[responsibly]]></category>
		<category><![CDATA[revolutionize]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[specifications]]></category>
		<category><![CDATA[stakeholders]]></category>
		<category><![CDATA[stewardship]]></category>
		<category><![CDATA[stimulate]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[streamline]]></category>
		<category><![CDATA[strengthen]]></category>
		<category><![CDATA[strongem3D]]></category>
		<category><![CDATA[strongemagilityemstrong]]></category>
		<category><![CDATA[strongemartificial]]></category>
		<category><![CDATA[strongemautomationemstrong]]></category>
		<category><![CDATA[strongemflexibilityemstrong]]></category>
		<category><![CDATA[strongemreshoringemstrong]]></category>
		<category><![CDATA[strongemsupply]]></category>
		<category><![CDATA[strongemSustainabilityemstrong]]></category>
		<category><![CDATA[suppliers]]></category>
		<category><![CDATA[supply]]></category>
		<category><![CDATA[sustainability]]></category>
		<category><![CDATA[sustainable]]></category>
		<category><![CDATA[technological]]></category>
		<category><![CDATA[technologies]]></category>
		<category><![CDATA[Technologiesstrongh4]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Tensions]]></category>
		<category><![CDATA[throughout]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Transparencystrongh4]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=63093</guid>

					<description><![CDATA[In the ever-evolving landscape of technology and consumer electronics, Apple&#8217;s manufacturing strategy plays a pivotal role in its success. As ]]></description>
										<content:encoded><![CDATA[<p>In the ever-evolving landscape of technology and consumer electronics, Apple&#8217;s manufacturing strategy plays a pivotal role in its success. As the company looks ahead to the next five years, several factors are poised to influence and potentially reshape its approach to manufacturing.<span id="more-63093"></span></p>
<h4><strong>1. Embracing Sustainable Practices</strong></h4>
<p><strong><em>Sustainability</em></strong> has become a significant focus for consumers and businesses alike. Apple has already made strides in this area by committing to using 100% renewable energy in its operations and reducing its carbon footprint. Over the next five years, we can expect Apple to further integrate sustainable practices into its manufacturing processes. This may involve sourcing materials responsibly, minimizing waste, and exploring renewable energy options for its manufacturing facilities.</p>
<h4><strong>2. Leveraging Advanced Technologies</strong></h4>
<p>Advancements in technology such as <strong><em>artificial intelligence</em> (AI)_</strong> and <strong><em>automation</em></strong> present opportunities for Apple to streamline its manufacturing operations. By incorporating AI-driven analytics and robotics into its production lines, Apple can improve efficiency, reduce costs, and enhance product quality. Additionally, technologies like <strong><em>3D printing</em></strong> could revolutionize certain aspects of manufacturing, allowing for more flexible and customizable production methods.</p>
<h4><strong>3. Diversifying Supply Chain</strong></h4>
<p>The COVID-19 pandemic highlighted the vulnerabilities of global supply chains, prompting many companies, including Apple, to reassess their reliance on single sourcing and overseas manufacturing. In the next five years, Apple may opt to diversify its <strong><em>supply chain</em></strong> by investing in regional manufacturing facilities and building closer partnerships with suppliers. This move could help mitigate risks associated with geopolitical tensions, natural disasters, and other disruptions.</p>
<h4><strong>4. Investing in Domestic Production</strong></h4>
<p>With increasing pressure to create jobs and stimulate economic growth, there&#8217;s growing interest in <strong><em>reshoring</em></strong> manufacturing operations back to domestic markets. Apple might explore opportunities to ramp up domestic production, particularly in markets like the United States. While this may come with higher labor costs, advancements in automation and government incentives could make domestic manufacturing more economically viable.</p>
<h4><strong>5. Prioritizing Flexibility and Agility</strong></h4>
<p>In a rapidly changing market, <strong><em>flexibility</em></strong> and <strong><em>agility</em></strong> are essential attributes for any manufacturing strategy. Apple may adopt a more agile approach to manufacturing, allowing it to quickly respond to shifts in consumer demand, technological advancements, and regulatory requirements. This could involve implementing modular production systems that can easily adapt to changing product specifications and market dynamics.</p>
<h4><strong>6. Enhancing Collaboration and Transparency</strong></h4>
<p>Transparency and collaboration across the supply chain are crucial for ensuring ethical practices and minimizing environmental impact. Over the next five years, Apple may strengthen its partnerships with suppliers, fostering greater transparency and accountability throughout the manufacturing process. By working closely with suppliers and stakeholders, Apple can address issues such as labor rights, worker safety, and environmental stewardship more effectively.</p>
<h3><strong>Conclusion</strong></h3>
<p>As Apple looks to the future, its manufacturing strategy will continue to evolve in response to changing market dynamics, technological advancements, and societal expectations. By embracing sustainability, leveraging advanced technologies, diversifying its supply chain, investing in domestic production, prioritizing flexibility, and enhancing collaboration and transparency, Apple can position itself for continued success in the years to come.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Privacy Initiatives: Strengthening data protection measures and user privacy controls</title>
		<link>https://www.latest-apple-news.com/2024/08/10/apple-privacy-initiatives-strengthening-data-protection-measures-and-user-privacy-controls/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Fri, 09 Aug 2024 23:48:29 +0000</pubDate>
				<category><![CDATA[Apple News]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[ahead]]></category>
		<category><![CDATA[Aheadstrong]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[balancing]]></category>
		<category><![CDATA[boundaries]]></category>
		<category><![CDATA[challenge]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[collecting]]></category>
		<category><![CDATA[Collection]]></category>
		<category><![CDATA[commitment]]></category>
		<category><![CDATA[commodity]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[complexity]]></category>
		<category><![CDATA[conclusion]]></category>
		<category><![CDATA[considerations]]></category>
		<category><![CDATA[cross-app]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[Designstrong]]></category>
		<category><![CDATA[discourse]]></category>
		<category><![CDATA[empowering]]></category>
		<category><![CDATA[enhancing]]></category>
		<category><![CDATA[environment]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explicitly]]></category>
		<category><![CDATA[exploring]]></category>
		<category><![CDATA[fostering]]></category>
		<category><![CDATA[functionalities]]></category>
		<category><![CDATA[fundamental]]></category>
		<category><![CDATA[harvesting.]]></category>
		<category><![CDATA[harvestingli]]></category>
		<category><![CDATA[hindering]]></category>
		<category><![CDATA[implemented]]></category>
		<category><![CDATA[implementing]]></category>
		<category><![CDATA[In]]></category>
		<category><![CDATA[individual]]></category>
		<category><![CDATA[industry]]></category>
		<category><![CDATA[industry's]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[ingrained]]></category>
		<category><![CDATA[initiatives]]></category>
		<category><![CDATA[inspiration]]></category>
		<category><![CDATA[introduced]]></category>
		<category><![CDATA[intrusive]]></category>
		<category><![CDATA[landmark]]></category>
		<category><![CDATA[landscape]]></category>
		<category><![CDATA[landscapemore]]></category>
		<category><![CDATA[liLimited]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[liOndevice]]></category>
		<category><![CDATA[liTransparency]]></category>
		<category><![CDATA[manifests]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[minimizing]]></category>
		<category><![CDATA[navigating]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[nevertheless]]></category>
		<category><![CDATA[On-Device]]></category>
		<category><![CDATA[patchwork]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[personalized]]></category>
		<category><![CDATA[philosophy]]></category>
		<category><![CDATA[policymakers]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[potential]]></category>
		<category><![CDATA[practices]]></category>
		<category><![CDATA[practicesli]]></category>
		<category><![CDATA[prioritizing]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy-conscious]]></category>
		<category><![CDATA[privacy-focused]]></category>
		<category><![CDATA[privacyconscious]]></category>
		<category><![CDATA[Privacyfocused]]></category>
		<category><![CDATA[privacyli]]></category>
		<category><![CDATA[privacystrong]]></category>
		<category><![CDATA[privilege]]></category>
		<category><![CDATA[processed]]></category>
		<category><![CDATA[processing]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Protectionstrong]]></category>
		<category><![CDATA[purposes]]></category>
		<category><![CDATA[purposesli]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[restricted]]></category>
		<category><![CDATA[significantly]]></category>
		<category><![CDATA[strongapproach]]></category>
		<category><![CDATA[strongChallenges]]></category>
		<category><![CDATA[strongConclusionstrong]]></category>
		<category><![CDATA[strongLandmark]]></category>
		<category><![CDATA[strongPrioritizing]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[trackingli]]></category>
		<category><![CDATA[translating]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[transparent]]></category>
		<category><![CDATA[triggered]]></category>
		<category><![CDATA[unnecessary]]></category>
		<category><![CDATA[unnoticed]]></category>
		<category><![CDATA[unwavering]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerabilitiesli]]></category>
		<category><![CDATA[ways:]]></category>
		<category><![CDATA[waysstrong]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://www.latest-apple-news.com/?p=61511</guid>

					<description><![CDATA[In an era where personal data is a valuable commodity, Apple has emerged as a leading advocate for user privacy. ]]></description>
										<content:encoded><![CDATA[<p>In an era where personal data is a valuable commodity, Apple has emerged as a leading advocate for user privacy. Their commitment goes beyond mere lip service, translating into concrete initiatives that empower users and challenge industry norms. This article delves into Apple&#8217;s privacy efforts, exploring the key measures they&#8217;ve implemented and their impact on the broader tech landscape.<span id="more-61511"></span></p>
<p><strong>Prioritizing Privacy by Design:</strong></p>
<p>Apple&#8217;s philosophy hinges on &#8220;privacy by design,&#8221; meaning privacy considerations are ingrained into every product and service from the outset. This approach manifests in<strong> several ways:</strong></p>
<ol>
<li>On-device processing: Whenever possible, data is processed directly on users&#8217; devices, minimizing the need for it to be sent to external servers, thus reducing potential vulnerabilities.</li>
<li>Limited data collection: Apple strives to collect only the data necessary for core functionalities, avoiding unnecessary data harvesting.</li>
<li>Transparency and control: Users are given clear and concise information about how their data is used and have granular controls over who can access it and for what purposes.</li>
</ol>
<p><strong>Landmark Initiatives for Enhanced Protection:</strong></p>
<p>Several Apple initiatives have significantly impacted the tech industry&#8217;s <strong>approach to privacy:</strong></p>
<ul>
<li>App Tracking Transparency (ATT): Introduced in iOS 14.5, ATT requires apps to explicitly ask users for permission to track their activity across other apps and websites. This landmark feature puts users in control and has significantly restricted intrusive cross-app tracking.</li>
<li>Mail Privacy Protection: This iOS 15 feature prevents email senders from collecting information about when and where users open their emails, hindering email tracking practices.</li>
<li>Sign in with Apple: This alternative login method allows users to sign in to apps and websites without sharing their personal information with third parties, enhancing online security and privacy.</li>
</ul>
<p>The Ripple Effect:</p>
<p>Apple&#8217;s privacy stance has not gone unnoticed. It has triggered a chain reaction within the tech industry, with other companies implementing similar privacy-focused features and adopting more transparent data practices. Additionally, it has fueled public discourse about individual data rights and the need for stronger privacy regulations.</p>
<p><strong>Challenges and the Road Ahead:</strong></p>
<p>Despite its efforts, Apple faces challenges in its privacy journey. Balancing user privacy with personalized experiences and targeted advertising remains a complex issue. Additionally, navigating the patchwork of global privacy regulations adds further complexity. Nevertheless, Apple&#8217;s commitment to user privacy is unwavering, and they continue to push boundaries and advocate for stronger data protection measures.</p>
<p><strong>Conclusion:</strong></p>
<p>Apple&#8217;s privacy initiatives have significantly reshaped the tech landscape, empowering users and fostering a more privacy-conscious environment. While challenges remain, their unwavering commitment serves as an inspiration for other companies and policymakers, paving the way for a future where user privacy is a fundamental right, not a privilege.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Seven big tech companies say they’re platform gatekeepers under EU law</title>
		<link>https://www.latest-apple-news.com/2023/07/04/seven-big-tech-companies-say-theyre-platform-gatekeepers-under-eu-law/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 04 Jul 2023 20:26:54 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[AAsiCm]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[acknowledged]]></category>
		<category><![CDATA[active]]></category>
		<category><![CDATA[advantage]]></category>
		<category><![CDATA[allowing]]></category>
		<category><![CDATA[Alphabet]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[avenues]]></category>
		<category><![CDATA[beginning]]></category>
		<category><![CDATA[behavioural]]></category>
		<category><![CDATA[between]]></category>
		<category><![CDATA[biggest]]></category>
		<category><![CDATA[billion]]></category>
		<category><![CDATA[blockquote]]></category>
		<category><![CDATA[booking]]></category>
		<category><![CDATA[breaking]]></category>
		<category><![CDATA[Breton]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[capitalization]]></category>
		<category><![CDATA[castro]]></category>
		<category><![CDATA[charset]]></category>
		<category><![CDATA[circle]]></category>
		<category><![CDATA[commission]]></category>
		<category><![CDATA[commissioner]]></category>
		<category><![CDATA[companies]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[competition]]></category>
		<category><![CDATA[comply]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[criteria]]></category>
		<category><![CDATA[cwTuqX]]></category>
		<category><![CDATA[DdUEZB]]></category>
		<category><![CDATA[deadline]]></category>
		<category><![CDATA[decide]]></category>
		<category><![CDATA[designate]]></category>
		<category><![CDATA[designation]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[disputed]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[europa]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European]]></category>
		<category><![CDATA[expects]]></category>
		<category><![CDATA[exploiting]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[failures]]></category>
		<category><![CDATA[favorably]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[Gatekeeper]]></category>
		<category><![CDATA[gatekeepers]]></category>
		<category><![CDATA[Giants]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[hashtag]]></category>
		<category><![CDATA[hyVhuW]]></category>
		<category><![CDATA[illustration]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[impose]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[informed]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[interoperate]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[mandating]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[markets]]></category>
		<category><![CDATA[messaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[monthly]]></category>
		<category><![CDATA[months]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[notified]]></category>
		<category><![CDATA[notify]]></category>
		<category><![CDATA[offenders]]></category>
		<category><![CDATA[official]]></category>
		<category><![CDATA[officially]]></category>
		<category><![CDATA[others]]></category>
		<category><![CDATA[oZPZTx]]></category>
		<category><![CDATA[parent]]></category>
		<category><![CDATA[passed]]></category>
		<category><![CDATA[percent]]></category>
		<category><![CDATA[placement]]></category>
		<category><![CDATA[planned]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[preference]]></category>
		<category><![CDATA[presscorner]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[published]]></category>
		<category><![CDATA[regulators]]></category>
		<category><![CDATA[remedies]]></category>
		<category><![CDATA[repeat]]></category>
		<category><![CDATA[reportedly]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[representing]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[restrictions]]></category>
		<category><![CDATA[reuters]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[seeing]]></category>
		<category><![CDATA[September]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[several]]></category>
		<category><![CDATA[sideloading]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[status]]></category>
		<category><![CDATA[stores]]></category>
		<category><![CDATA[structural]]></category>
		<category><![CDATA[submissions]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[theverge]]></category>
		<category><![CDATA[Thierry]]></category>
		<category><![CDATA[ThierryBreton]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[thresholds]]></category>
		<category><![CDATA[thumbor]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[treating]]></category>
		<category><![CDATA[turnover]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[unnecessary]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[widgets]]></category>
		<category><![CDATA[worldwide]]></category>
		<guid isPermaLink="false">https://www.theverge.com/2023/7/4/23783790/eu-digital-markets-act-gatekeepers-apple-google-amazon-meta-tiktok</guid>

					<description><![CDATA[  

    
      
        Illustration: Alex Castro / The Verge
    

  An important deadline just passed for the biggest tech platform companies in the world to notify the European Union (EU) that they are gatekeepers under the Digital Markets Act (DMA)]]></description>
										<content:encoded><![CDATA[<br />
<figure>
      <img decoding="async" alt="A circle of 12 gold stars representing the European Union." src="https://cdn.vox-cdn.com/thumbor/gWUa6jxkgjOFhJdgROS8Go-fcyg=/0x0:2040x1360/1310x873/cdn.vox-cdn.com/uploads/chorus_image/image/72425749/acastro_1800724_1777_EU_0001.0.jpg" /><figcaption>Illustration: Alex Castro / The Verge</figcaption></figure>
<p id="ff9jhb">An important deadline just passed for the biggest tech platform companies in the world to notify the European Union (EU) that they are gatekeepers under the <a href="https://www.theverge.com/2022/3/24/22994234/eu-antitrust-legislation-dma-digital-markets-act-details">Digital Markets Act</a> (DMA). Seven companies have <a href="https://ec.europa.eu/commission/presscorner/detail/en/STATEMENT_23_3674">officially acknowledged they meet the criteria</a>: Alphabet (Google), Amazon, Apple, ByteDance (TikTok), Meta (Facebook, Instagram, Whatsapp), Microsoft, and Samsung. Companies on the list have a market capitalization of over €75 billion ($82 billion) and own a social platform or app that has at least 45 million monthly users or 10,000 active business users.</p>
<p id="oZPZTx">The statement published by EU commissioner Thierry Breton says it “will now check their submissions and designate the gatekeepers for specific platform services by 6 September,” and after that, the companies will have just six months to comply with the DMA’s rules. </p>
<p id="hyVhuW"><a href="https://www.reuters.com/technology/amazon-google-apple-meta-microsoft-say-they-meet-eu-gatekeeper-status-2023-07-04/"><em>Reuters</em></a><em> </em>reports that TikTok parent company Bytedance disputed its placement on the list and noted that Booking.com informed regulators it expects to be on the list next year.</p>
<p id="d8icGd">According to Breton, the new rules include several key items:</p>
<blockquote>
<p id="zusbE2">They will no longer be able to lock in users in their ecosystem.</p>
<p id="cwTuqX"> They will no longer be able to decide which apps you need to have pre-installed on your devices; which app store you have to use.</p>
<p id="u3SQm3"> They will not be able to “self-preference”: exploiting the advantage of being the gatekeeper by treating their own products and services more favorably. </p>
<p id="qBhX5m">Their messaging apps will have to interoperate with others.</p>
</blockquote>
<div id="x49N9N">
<blockquote class="twitter-tweet">
<p lang="en" dir="ltr">7 companies have notified the    Commission that they meet the <a href="https://twitter.com/hashtag/Gatekeepers?src=hash&amp;ref_src=twsrc%5Etfw">#Gatekeepers</a> thresholds under the Digital Markets Act (<a href="https://twitter.com/hashtag/DMA?src=hash&amp;ref_src=twsrc%5Etfw">#DMA</a>): </p>
<p>Alphabet<br />Amazon<br />Apple<br />ByteDance<br />Meta<br />Microsoft<br />Samsung</p>
<p>  Following our review process, official designation will be announced no later than 6 September <a href="https://t.co/1qr5Scly0S">pic.twitter.com/1qr5Scly0S</a></p>
<p>— Thierry Breton (@ThierryBreton) <a href="https://twitter.com/ThierryBreton/status/1676111183282323456?ref_src=twsrc%5Etfw">July 4, 2023</a>
</p></blockquote>
<p><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div>
<p id="GSTjK2">Breaking the rules would put companies at risk of a fine of up to 10 percent of its total worldwide turnover, 20 percent for repeat offenders, and repeat failures could lead the commission to “open a market investigation and, if necessary, impose behavioural or structural remedies.”</p>
<p id="0Vrky7">Apple, which says the new law “will <a href="https://www.ft.com/content/0bc9378b-3e27-45e2-92d8-7c462427f876">create unnecessary privacy and security vulnerabilities</a> for our users,” has reportedly planned to allow third-party app stores in iOS 17, though with <a href="https://www.theverge.com/2022/12/13/23507766/apple-app-store-eu-dma-third-party-sideloading">possible restrictions</a> such as only allowing them in Europe or mandating security requirements.</p>
<p id="AAsiCm">We’re also seeing the beginning of new avenues for competition between the tech giants. Meta said last week <a href="https://www.theverge.com/2023/6/29/23778928/meta-eu-facebook-plans-app-install-android-ads">it would allow users</a> to download apps via Facebook ads in Europe.</p>
<p id="O3Db4Y">
<p id="DdUEZB">
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Apple fixes zero-day security flaws in iOS, macOS, watchOS, and more</title>
		<link>https://www.latest-apple-news.com/2023/06/22/apple-fixes-zero-day-security-flaws-in-ios-macos-watchos-and-more/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Thu, 22 Jun 2023 15:53:14 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[actively]]></category>
		<category><![CDATA[adapter]]></category>
		<category><![CDATA[adsystem]]></category>
		<category><![CDATA[adunit]]></category>
		<category><![CDATA[alignnone]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Andrew]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[arbitrary]]></category>
		<category><![CDATA[arstechnica]]></category>
		<category><![CDATA[blockquote]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[charging]]></category>
		<category><![CDATA[closely]]></category>
		<category><![CDATA[coming]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[crafted]]></category>
		<category><![CDATA[Cunningham]]></category>
		<category><![CDATA[decoding]]></category>
		<category><![CDATA[exceedingly]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[execution]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[Fixing]]></category>
		<category><![CDATA[gadgets]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[highlighting]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[ipados]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[JavaScript]]></category>
		<category><![CDATA[Kernel]]></category>
		<category><![CDATA[labeled]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[Lightning]]></category>
		<category><![CDATA[macdailynews]]></category>
		<category><![CDATA[macOS]]></category>
		<category><![CDATA[maliciously]]></category>
		<category><![CDATA[manual]]></category>
		<category><![CDATA[MarketPlace]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[paired]]></category>
		<category><![CDATA[please]]></category>
		<category><![CDATA[prevents]]></category>
		<category><![CDATA[privileges]]></category>
		<category><![CDATA[processing]]></category>
		<category><![CDATA[recalc]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[remote]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[serious]]></category>
		<category><![CDATA[severity]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Technica]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[Upgraded]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[various]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[watches]]></category>
		<category><![CDATA[watchOS]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[Wednesday]]></category>
		<category><![CDATA[widgets]]></category>
		<guid isPermaLink="false">https://macdailynews.com/?p=263780</guid>

					<description><![CDATA[<p>With new operating system updates released on Wednesday, Apple has fixed zero-day security flaws in iOS, macOS, watchOS, and more…</p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/06/22/apple-fixes-zero-day-security-flaws-in-ios-macos-watchos-and-more/">Apple fixes zero-day security flaws in iOS, macOS, watchOS, and more</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p]]></description>
										<content:encoded><![CDATA[<p>With new operating system updates released on Wednesday, Apple has fixed a pair of serious zero-day security bugs that the company says &#8220;may have been actively exploited.&#8221;</p>
<p><img fetchpriority="high" decoding="async" src="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?resize=640%2C452&#038;ssl=1" alt="Apple logo lock" width="640" height="452" class="alignnone size-full wp-image-245057" srcset="https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?w=660&amp;ssl=1 660w, https://i0.wp.com/macdailynews.com/wp-content/uploads/2021/05/210506_apple_lock.png?resize=300%2C212&amp;ssl=1 300w" sizes="(max-width: 640px) 100vw, 640px" data-recalc-dims="1" /></p>
<p><a href="https://arstechnica.com/gadgets/2023/06/ios-16-5-1-macos-13-4-1-and-a-slew-of-updates-fix-actively-exploited-security-bugs/">Andrew Cunningham for Ars Technica</a>:</p>
<blockquote>
<p>
One of the vulnerabilities, CVE-2023-32434, is a kernel-level flaw that can allow apps to &#8220;execute arbitrary code with kernel privileges.&#8221; The other, a WebKit bug labeled CVE-2023-32439, can allow the execution of arbitrary code after processing &#8220;maliciously crafted web content.&#8221; The iOS and iPadOS 16.5.1 updates also fix a non-security bug &#8220;that prevents charging with the Lightning to USB 3 Camera Adapter.&#8221;</p>
<p>The updates aren&#8217;t just coming to iPhones, iPads, and Macs running the latest operating systems. Updates fixing the same bugs have been released for iOS and iPadOS 15, plus macOS versions 11 and 12 (via both macOS and Safari updates). Apple also released an update fixing the kernel bug for watchOS 8, which was the last version of the OS that supported the Apple Watch Series 3 (plus newer watches paired to older iPhones that can&#8217;t update to iOS 16). Updates for older versions of watchOS are exceedingly rare, highlighting the severity of any kernel-level security flaw.</p>
<p>The iOS and iPadOS 15.7.7 updates also fix a third closely related WebKit bug that allows remote code execution when processing web content, CVE-2023-32435.
</p>
</blockquote>
<p><strong><span style="color: #ff0000;">MacDailyNews Take: </span></strong>If you haven&#8217;t upgraded already, update your various Apple OSes ASAP.</p>
<p><strong><span style="color: #ff0000;">Please help support MacDailyNews.</span></strong> <a href="https://macdailynews.com/thank_you_for_supporting_our_independent_tech_blog/">Click or tap here to support our <em>independent</em> tech blog</a>. Thank you!</p>
<p><strong>Support MacDailyNews at no extra cost to you by <a href="https://amzn.to/3Kd2rKY">using this link to shop at Amazon</strong></a>.</p>
<p><script type="text/javascript">
amzn_assoc_tracking_id = "macdailynews-20";
amzn_assoc_ad_mode = "manual";
amzn_assoc_ad_type = "smart";
amzn_assoc_marketplace = "amazon";
amzn_assoc_region = "US";
amzn_assoc_design = "enhanced_links";
amzn_assoc_asins = "B0932QJ2JZ";
amzn_assoc_placement = "adunit";
amzn_assoc_linkid = "13868f0e7ff6a317562f49d8c2ab557a";
</script></p>
<p><script src="https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US"></script></p>
<p>The post <a rel="nofollow" href="https://macdailynews.com/2023/06/22/apple-fixes-zero-day-security-flaws-in-ios-macos-watchos-and-more/">Apple fixes zero-day security flaws in iOS, macOS, watchOS, and more</a> appeared first on <a rel="nofollow" href="https://macdailynews.com/">MacDailyNews</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>iOS 16.5.1 and macOS 13.4.1 Address Actively Exploited Vulnerabilities, Make Sure to Update</title>
		<link>https://www.latest-apple-news.com/2023/06/21/ios-16-5-1-and-macos-13-4-1-address-actively-exploited-vulnerabilities-make-sure-to-update/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Wed, 21 Jun 2023 17:38:18 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[actively]]></category>
		<category><![CDATA[actors]]></category>
		<category><![CDATA[adding]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[addressed]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[aligncenter]]></category>
		<category><![CDATA[appeared]]></category>
		<category><![CDATA[arbitrary]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[crafted]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[document]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[execution]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[forums]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[improved]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[integer]]></category>
		<category><![CDATA[ipados]]></category>
		<category><![CDATA[Kernel]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[linkback]]></category>
		<category><![CDATA[macrumors]]></category>
		<category><![CDATA[maliciously]]></category>
		<category><![CDATA[overflow]]></category>
		<category><![CDATA[privileges]]></category>
		<category><![CDATA[received]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[Roundups]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[threads]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[validation]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[watchOS]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[yellow]]></category>
		<guid isPermaLink="false">https://www.macrumors.com/2023/06/21/ios-16-5-1-actively-exploited-vulnerabilities/</guid>

					<description><![CDATA[Apple today released iOS 16.5.1, iPadOS 16.5.1, macOS 13.4.1, and watchOS 9.5.2 updates, with the software adding security improvements. If you haven't updated yet, you should as soon as you can as these updates address actively exploited vulnerabiliti]]></description>
										<content:encoded><![CDATA[<p>Apple today released iOS 16.5.1, iPadOS 16.5.1, macOS 13.4.1, and watchOS 9.5.2 updates, with the software adding security improvements. If you haven&#8217;t updated yet, you should as soon as you can as these updates address actively exploited vulnerabilities.</p>
<p><img decoding="async" src="https://images.macrumors.com/article-new/2022/09/General-iOS-16-Feature-Yellow.jpg" alt="" width="2500" height="1407" class="aligncenter size-full wp-image-866618" /><br />
<br />
According to Apple&#8217;s <a href="https://support.apple.com/en-us/HT201222">security support document</a>, there are fixes for two vulnerabilities that may have been used by hackers and bad actors for system attacks.</p>
<p>A kernel vulnerability that can result in arbitrary code execution with kernel privileges was addressed with improved input validation for an integer overflow. Apple says that it is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7, so you are likely safe if you&#8217;ve been running <a href="https://www.macrumors.com/roundup/ios-16/">iOS 16</a>.</p>
<p>There is also a WebKit vulnerability that could allow maliciously crafted web content to execute code, and Apple says that it has received a report that the issue may have been actively exploited.</p>
<p>You should update your devices running &zwnj;iOS 16&zwnj;, <a href="https://www.macrumors.com/roundup/ipados-16/">iPadOS 16</a>, <a href="https://www.macrumors.com/roundup/macos-13/">macOS Ventura</a>, and <a href="https://www.macrumors.com/roundup/watchos-9/">watchOS 9</a>. If you have an older device, Apple has also released iOS 15.7.7, iPadOS 15.7.7, watchOS 8.8.1, macOS 11.7.8, and macOS 12.6.7.</p>
<div class="linkback">Related Roundups: <a href="https://www.macrumors.com/roundup/ios-16/">iOS 16</a>, <a href="https://www.macrumors.com/roundup/ipados-16/">iPadOS 16</a>, <a href="https://www.macrumors.com/roundup/macos-13/">macOS Ventura</a></div>
<div class="linkback">Related Forums: <a href="https://forums.macrumors.com/forums/ios-16.238">iOS 16</a>, <a href="https://forums.macrumors.com/forums/macos-ventura.239">macOS Ventura</a></div>
<p>This article, &quot;<a href="https://www.macrumors.com/2023/06/21/ios-16-5-1-actively-exploited-vulnerabilities/">iOS 16.5.1 and macOS 13.4.1 Address Actively Exploited Vulnerabilities, Make Sure to Update</a>&quot; first appeared on <a href="https://www.macrumors.com/">MacRumors.com</a></p>
<p><a href="https://forums.macrumors.com/threads/ios-16-5-1-and-macos-13-4-1-address-actively-exploited-vulnerabilities-make-sure-to-update.2393745/">Discuss this article</a> in our forums</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Macs can get viruses, but do Macs need antivirus software?</title>
		<link>https://www.latest-apple-news.com/2023/06/13/macs-can-get-viruses-but-do-macs-need-antivirus-software/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 16:14:05 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[ability]]></category>
		<category><![CDATA[absolutely]]></category>
		<category><![CDATA[acceptable]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[acknowledged]]></category>
		<category><![CDATA[Activation]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[adding]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[additional]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[addresses]]></category>
		<category><![CDATA[adjust]]></category>
		<category><![CDATA[admitted]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[advantages]]></category>
		<category><![CDATA[advertisers]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[affected]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[aggressive]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[Aitivirus]]></category>
		<category><![CDATA[albums]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[almost]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[answers]]></category>
		<category><![CDATA[anticipated]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[anything]]></category>
		<category><![CDATA[anywhere]]></category>
		<category><![CDATA[appearing]]></category>
		<category><![CDATA[appleid]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[applied]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[approves]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrive]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arriving]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assigned]]></category>
		<category><![CDATA[astonishing]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[attacking]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[attempt]]></category>
		<category><![CDATA[August]]></category>
		<category><![CDATA[authenticate]]></category>
		<category><![CDATA[authenticated]]></category>
		<category><![CDATA[authenticating]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authenticator]]></category>
		<category><![CDATA[authorized]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[background]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[banners]]></category>
		<category><![CDATA[bearing]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[benefit]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[beware]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[biometrically]]></category>
		<category><![CDATA[blessing]]></category>
		<category><![CDATA[blockblock]]></category>
		<category><![CDATA[Blocks]]></category>
		<category><![CDATA[bottom]]></category>
		<category><![CDATA[bounties]]></category>
		<category><![CDATA[Bounty]]></category>
		<category><![CDATA[bricked]]></category>
		<category><![CDATA[bringing]]></category>
		<category><![CDATA[brought]]></category>
		<category><![CDATA[Browse]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[bundle]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[bypassed]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[careful]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[Celebrities]]></category>
		<category><![CDATA[certainly]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[challenging]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[character]]></category>
		<category><![CDATA[checked]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[checks]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[closed]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[colleagues]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[Complete]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[components]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[concern]]></category>
		<category><![CDATA[concerned]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[confirmation]]></category>
		<category><![CDATA[confirming]]></category>
		<category><![CDATA[connect]]></category>
		<category><![CDATA[connected]]></category>
		<category><![CDATA[connecting]]></category>
		<category><![CDATA[consensus]]></category>
		<category><![CDATA[consider]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[consistently]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[contaminated]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[contents]]></category>
		<category><![CDATA[controlled]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[course]]></category>
		<category><![CDATA[crashes]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[CrescentCore]]></category>
		<category><![CDATA[criminal]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[criticised]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptographic]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[customer]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dangers]]></category>
		<category><![CDATA[deadline]]></category>
		<category><![CDATA[december]]></category>
		<category><![CDATA[decide]]></category>
		<category><![CDATA[decline]]></category>
		<category><![CDATA[decreased]]></category>
		<category><![CDATA[decreasing]]></category>
		<category><![CDATA[dedicated]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[definitely]]></category>
		<category><![CDATA[degree]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[deleted]]></category>
		<category><![CDATA[delivered]]></category>
		<category><![CDATA[demonstrate]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[depends]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[despite]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[detected]]></category>
		<category><![CDATA[detections]]></category>
		<category><![CDATA[determine]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[difficult]]></category>
		<category><![CDATA[digitally]]></category>
		<category><![CDATA[disable]]></category>
		<category><![CDATA[disaster]]></category>
		<category><![CDATA[discontinued]]></category>
		<category><![CDATA[discover]]></category>
		<category><![CDATA[discovered]]></category>
		<category><![CDATA[discoveries]]></category>
		<category><![CDATA[discovers]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[display]]></category>
		<category><![CDATA[displayed]]></category>
		<category><![CDATA[documented]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloaded]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[dramatically]]></category>
		<category><![CDATA[during]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easily]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[effect]]></category>
		<category><![CDATA[elements]]></category>
		<category><![CDATA[eliminating]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[enables]]></category>
		<category><![CDATA[encourage]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypting]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encrypts]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[enough]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[equipped]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[establish]]></category>
		<category><![CDATA[established]]></category>
		<category><![CDATA[evaluation]]></category>
		<category><![CDATA[everyone]]></category>
		<category><![CDATA[exactly]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[exodus]]></category>
		<category><![CDATA[expanded]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explains]]></category>
		<category><![CDATA[explicit]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[extended]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[extent]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FaceTime]]></category>
		<category><![CDATA[factor]]></category>
		<category><![CDATA[failed]]></category>
		<category><![CDATA[falling]]></category>
		<category><![CDATA[familiar]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[Federighi]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[figures]]></category>
		<category><![CDATA[FileVault]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[finder]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[fluctuated]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forwarded]]></category>
		<category><![CDATA[fraudulent]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[friend]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[further]]></category>
		<category><![CDATA[Gatekeeper]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[generally]]></category>
		<category><![CDATA[generating]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[Granted]]></category>
		<category><![CDATA[growing]]></category>
		<category><![CDATA[guessed]]></category>
		<category><![CDATA[gullible]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hampering]]></category>
		<category><![CDATA[happen]]></category>
		<category><![CDATA[happened]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[harboring]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[Harvest]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[hellip]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[higher]]></category>
		<category><![CDATA[highest]]></category>
		<category><![CDATA[highlighted]]></category>
		<category><![CDATA[hijacked]]></category>
		<category><![CDATA[historically]]></category>
		<category><![CDATA[hogging]]></category>
		<category><![CDATA[Hopefully]]></category>
		<category><![CDATA[hotspot]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[hyperlinks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[identification]]></category>
		<category><![CDATA[identified]]></category>
		<category><![CDATA[ignored]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[imagine]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[Impossible]]></category>
		<category><![CDATA[improved]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[Improves]]></category>
		<category><![CDATA[improving]]></category>
		<category><![CDATA[incentive]]></category>
		<category><![CDATA[Incentivising]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[increasing]]></category>
		<category><![CDATA[increasingly]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[indicates]]></category>
		<category><![CDATA[indicator]]></category>
		<category><![CDATA[infallible]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[infiltrate]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[inspects]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructing]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[Intego]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[intelligent]]></category>
		<category><![CDATA[intended]]></category>
		<category><![CDATA[interested]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[invisibly]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[isolates]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[issuing]]></category>
		<category><![CDATA[itself]]></category>
		<category><![CDATA[keeping]]></category>
		<category><![CDATA[Keychain]]></category>
		<category><![CDATA[kqzyfj]]></category>
		<category><![CDATA[Krstic]]></category>
		<category><![CDATA[larger]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[launching]]></category>
		<category><![CDATA[leaving]]></category>
		<category><![CDATA[legitimate]]></category>
		<category><![CDATA[lengths]]></category>
		<category><![CDATA[letter]]></category>
		<category><![CDATA[lifted]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[Linker]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[locate]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[Lookup]]></category>
		<category><![CDATA[lucrative]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[majority]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[manage]]></category>
		<category><![CDATA[managed]]></category>
		<category><![CDATA[manually]]></category>
		<category><![CDATA[maximum]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[medium]]></category>
		<category><![CDATA[meeting]]></category>
		<category><![CDATA[Members]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[microphone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[miners]]></category>
		<category><![CDATA[minutes]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[namely]]></category>
		<category><![CDATA[nasties]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[normally]]></category>
		<category><![CDATA[Norton]]></category>
		<category><![CDATA[notice]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[November]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Objective]]></category>
		<category><![CDATA[obsolete]]></category>
		<category><![CDATA[obtain]]></category>
		<category><![CDATA[obviously]]></category>
		<category><![CDATA[occasions]]></category>
		<category><![CDATA[offered]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[opening]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[others]]></category>
		<category><![CDATA[overall]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[panicking]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[passing]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[pasteboard]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[percent]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[periodically]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[pernicious]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[player]]></category>
		<category><![CDATA[pleased]]></category>
		<category><![CDATA[pleasingly]]></category>
		<category><![CDATA[pointed]]></category>
		<category><![CDATA[popular]]></category>
		<category><![CDATA[popularity]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[Premium]]></category>
		<category><![CDATA[pretending]]></category>
		<category><![CDATA[pretty]]></category>
		<category><![CDATA[prevalence]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[problematic]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[profiling]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[promotion]]></category>
		<category><![CDATA[promptly]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protected]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[protections]]></category>
		<category><![CDATA[protects]]></category>
		<category><![CDATA[provider]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicised]]></category>
		<category><![CDATA[publicity]]></category>
		<category><![CDATA[pulled]]></category>
		<category><![CDATA[purchase]]></category>
		<category><![CDATA[pushed]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[quickly]]></category>
		<category><![CDATA[QuickTime]]></category>
		<category><![CDATA[rather]]></category>
		<category><![CDATA[reacts]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[reasons]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[recent]]></category>
		<category><![CDATA[recently]]></category>
		<category><![CDATA[recommended]]></category>
		<category><![CDATA[recommending]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[recoverable]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[regardless]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[regularly]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[remains]]></category>
		<category><![CDATA[remember]]></category>
		<category><![CDATA[remotely]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[reported]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[request]]></category>
		<category><![CDATA[requests]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[requirement]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[researchers]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[responded]]></category>
		<category><![CDATA[responding]]></category>
		<category><![CDATA[Responds]]></category>
		<category><![CDATA[restart]]></category>
		<category><![CDATA[restrictions]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[resurgence]]></category>
		<category><![CDATA[retire]]></category>
		<category><![CDATA[retract]]></category>
		<category><![CDATA[retracted]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[reward]]></category>
		<category><![CDATA[rewards]]></category>
		<category><![CDATA[rolling]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[routes]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[safest]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[sandboxed]]></category>
		<category><![CDATA[Sandboxing]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scheme]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selected]]></category>
		<category><![CDATA[senders]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[separating]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[seriousness]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[shouldn]]></category>
		<category><![CDATA[sierra]]></category>
		<category><![CDATA[signature]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[Silverlight]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[Similarly]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[smaller]]></category>
		<category><![CDATA[snoopers]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[soaring]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[someone]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[sometimes]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[speeds]]></category>
		<category><![CDATA[Sponsored]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[started]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[stealers]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[stopped]]></category>
		<category><![CDATA[stored]]></category>
		<category><![CDATA[strains]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[subject]]></category>
		<category><![CDATA[subscriber]]></category>
		<category><![CDATA[subsequently]]></category>
		<category><![CDATA[suggested]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[surfing]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[suspicious]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[target]]></category>
		<category><![CDATA[techhive]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[teenager]]></category>
		<category><![CDATA[Thanks]]></category>
		<category><![CDATA[themselves]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[theverge]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[tkqlhce]]></category>
		<category><![CDATA[traced]]></category>
		<category><![CDATA[tracing]]></category>
		<category><![CDATA[trackers]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[traffic]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[trying]]></category>
		<category><![CDATA[turning]]></category>
		<category><![CDATA[Typhoid]]></category>
		<category><![CDATA[typical]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[underneath]]></category>
		<category><![CDATA[unencrypt]]></category>
		<category><![CDATA[unfortunately]]></category>
		<category><![CDATA[unidentified]]></category>
		<category><![CDATA[Unlikely]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[unsigned]]></category>
		<category><![CDATA[unwanted]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utilised]]></category>
		<category><![CDATA[utilities]]></category>
		<category><![CDATA[various]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[Verification]]></category>
		<category><![CDATA[verified]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[warning]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[whereby]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[widespread]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[wrapper]]></category>
		<category><![CDATA[writing]]></category>
		<category><![CDATA[written]]></category>
		<category><![CDATA[XProtect]]></category>
		<category><![CDATA[yourself]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=73ef28e8b154e92902e3b7fa61570c9f</guid>

					<description><![CDATA[Macworld






Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&#8217;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus soft]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&rsquo;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus software.</p>
<p>Historically, the Mac has been considered <a href="https://www.macworld.com/article/668710/how-secure-mac.html">safe and secure</a> for a number of reasons that we will go into below, but in recent years the consensus has fluctuated. In its <a rel="nofollow" href="https://www.kqzyfj.com/click-100470607-15376698?sid=1-1-670537-1-0-0&amp;url=https://www.malwarebytes.com/resources/files/2020/02/2020_state-of-malware-report.pdf" >2020 State of Malware</a> report, Malwarebytes said it saw &ldquo;a significant rise in the overall prevalence of Mac threats in 2019, with an increase of over 400 percent from 2018.&rdquo; The following year, the company found that overall malware detected on macOS <a title="Malware on Mac 2020" href="https://www.macworld.com/article/676309/malware-on-macs-is-decreasing.html">decreased by 38 percent</a> but that the worst kind, namely &ldquo;backdoors, data stealers, and cryptocurrency stealers/miners,&rdquo; increased by more than 61 percent.</p>
<p>One reason for the decline in 2020 was the pandemic; as restrictions were lifted, malware saw a resurgence in 2021, with the number of Mac detections soaring by more than 200 percent to an astonishing 164 million. Even Apple software boss Craig Federighi <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.theverge.com/2021/5/19/22444353/mac-malware-not-acceptable-craig-federighi-apple-epic&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">acknowledged</a> in May 2021 that Mac malware was a problem&hellip; although it&rsquo;s worth bearing in mind that at the time he was trying to make the case for iOS&rsquo;s very different approach to security. &ldquo;Today,&rdquo; he said, &ldquo;we have a level of malware on the Mac that we don&rsquo;t find acceptable.&rdquo; Federighi revealed that 130 different cases had been documented since May 2020, and that one of these had affected more than 300,000 Macs. He even admitted that members of his family had got malware on their Macs.</p>
<p>When the judge asked about the fact that Mac users can purchase and download software from various places on the Mac, rather than being limited to the Mac App Store, Federighi said: &ldquo;Yeah, it&rsquo;s certainly how we&rsquo;ve done it on the Mac and it&rsquo;s regularly exploited on the Mac. iOS has established a dramatically higher bar for customer protection. The Mac is not meeting that bar today.&rdquo;</p>
<div class="promo_wrap">
<div class="top_head">
<p class="pro_tag">PROMOTION</p>
<p><strong>Antivirus Deal: Intego Mac Premium Bundle</strong></p>
</div>
<div class="promo_row">
<div class="pro_right promotion-item__image-outer-wrapper--small"><img decoding="async" class="promotion-item__image" src="https://b2c-contenthub.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-22-at-15.47.57.png" loading="lazy" /></div>
<p class="promo_text">
<p>Get Intego&rsquo;s Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. </p>
</div>
<div class="clear-both"></div>
<div class="more_btn"><a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-8-0-0"  class="promotion-view-deal-link" rel="nofollow">Get Deal</a></div>
</div>
<p>Federighi noted that Mac users don&rsquo;t download as much software as iOS users, and argued that if iOS was as open to third-party downloads there would be a real problem for that platform. &ldquo;If you took Mac security techniques and applied them to the iOS ecosystem, with all those devices, all that value,&rdquo; he said, &ldquo;it would get run over to a degree dramatically worse than is already happening on the Mac.&rdquo;</p>
<p>To get a feel for the number of attacks on the Mac platform, browse our complete list of <a href="https://www.macworld.com/article/672879/list-of-mac-viruses-malware-and-security-flaws.html">Mac viruses, malware and trojans</a>. Adware and Potentially Unwanted Programs (PUPs) make up the majority of the malware detections on Macs, according to Malwarebytes.</p>
<h2 class="toc" id="do-i-need-antivirus-for-mac">Do I need antivirus for Mac?</h2>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Antivirus on a Mac" class="wp-image-795574" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">
</div>
<p>So should Mac users start panicking? No. Mac malware does pose a risk that users should be aware of, but it doesn&rsquo;t follow that Macs absolutely must be equipped with antivirus software. Such products have their advantages and you may choose to install one for more peace of mind, but we don&rsquo;t view them as essential for the Mac.</p>
<p>For one thing, there are measures put in place by Apple at the operating system level that should protect Mac users from the worst malware threats. These built-in security features make attacking a Mac particularly challenging. They include Gatekeeper, which blocks software that hasn&rsquo;t been digitally approved by Apple from running on your Mac without your agreement, and XProtect, which is Apple&rsquo;s own antivirus built into macOS and inspects every app for malware.</p>
<p>As you can see, Apple goes to great lengths to protect you from malware by making it almost impossible for you to download it in the first place, let alone install it. Additionally, Apple does a pretty good job of keeping on top of vulnerabilities and exploits; if your Mac needs to be protected from these, a patch will quickly be pushed out over auto-update.</p>
<p>Thanks to these features, before you can install an app, your Mac will check it against a list of malware, and even if there is no reason for concern it will not make it easy for you to open an application from a developer that hasn&rsquo;t been approved.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Gatekeeper and XProtect Apple security" class="wp-image-795593" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /><figcaption>Gatekeeper and XProtect are two elements of Apple&rsquo;s macOS security.</figcaption></figure>
<p class="imageCredit">
</div>
<p>These features and other protections built into macOS (which we will discuss in more detail below) mean it&rsquo;s not an essential requirement to install antivirus software on your Mac.</p>
<p>However, as good as these protections are, there have been occasions when malware has managed to infiltrate the Mac platform, and times when Apple hasn&rsquo;t responded to a threat as quickly as Mac users might hope. If you want the very best protection from threats, therefore, consider adding a dedicated Mac security suite such as <a rel="nofollow" href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" >Intego Mac Internet Security</a>. You&rsquo;ll find Intego at the top of our roundup of the <a title="best antivirus for Mac" rel="noopener" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html" >best antivirus for Mac</a>, among other free and paid-for antivirus apps that might give you some peace of mind, including <a title="McAfee" rel="nofollow" href="https://www.kqzyfj.com/click-8807236-13998110?sid=1-1-670537-1-0-0" >McAfee</a> and <a title="Norton" rel="nofollow" href="https://www.tkqlhce.com/click-7928211-10530627?url=https%3A%2F%2Fbuy.norton.com%2Fps%3FselSKU%3D21351077%26ctry%3DGB%26lang%3Den%26tppc%3D337EB012-DD4B-2815-29A7-4C5482D4D60A%26ptype%3Dcart%26trf_id%3Dnortoncom%26inid%3Dhho_nortoncom_store_norton-security_pdpage?sid=1-1-670537-1-0-0" >Norton</a>.</p>
<p class="cta"> <a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" rel="nofollow">Get Intego Mac Security X9 here</a></p>
<p>Read on to find out more about how Apple&rsquo;s security measures work&ndash;and why they may not be enough to keep your Mac secure.</p>
<h2 class="toc" id="how-apple-protects-macs-from-viruses">How Apple protects Macs from viruses</h2>
<p>Macs are generally safer than PCs, but with threats to the Mac growing due to the platform&rsquo;s increasing popularity, Apple has had to build in protections to macOS and the Mac hardware itself.&nbsp;</p>
<p>In this section we will look at the built-in protections in macOS to establish whether they are enough, or if you should also install antivirus software on your Mac.</p>
<h3 id="how-xprotect-works">How XProtect works</h3>
<p>The Mac&rsquo;s malware scanning tool, XProtect, works invisibly and automatically in the background and requires no user configuration. Apple has a list of malicious applications that it checks against when you open downloaded applications. XProtect is&nbsp;regularly updated by Apple, and it updates in the background, so you should always be protected.</p>
<p>This is similar to having antivirus software from a third-party software developer running on your Mac, with the bonus of being written into the operating system and therefore not hampering performance.</p>
<p>If you download and try to open files contaminated with malware, you may see an explicit warning that the files will &ldquo;damage your computer,&rdquo; along with a reference to the type of malware. In that case you should delete the file immediately.</p>
<p>This is great news for Mac users, but is it enough? How does XProtect compare to the antivirus solutions out there? Well, XProtect may not be as up to date as some third-party products and it doesn&rsquo;t look for as many strains of malware. Read our roundup of the <a title="Best Mac Antivirus Apps" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">Best Mac antivirus apps</a> for an in-depth evaluation of the options out there.</p>
<h3 id="how-gatekeeper-works">How Gatekeeper works</h3>
<p>Thanks to Gatekeeper, macOS blocks downloaded software that hasn&rsquo;t been digitally signed, a process whereby Apple approves the developer. This leads to the familiar error message when you try to use or install unsigned software: &ldquo;[This app] can&rsquo;t be opened because it is from an unidentified developer.&rdquo; One change to Gatekeeper that arrived in macOS Catalina a few years back was that software is checked for malware and other issues every time it runs, rather than just the first time you install it.</p>
<p>For maximum protection, GateKeeper can be set to only allow software to be installed if it was downloaded from the Mac App Store. Or you can set it to allow you to install software from the web, but from verified developers only.</p>
<p>You can adjust these settings via the Security &amp; Privacy section of System Preferences:</p>
<ol>
<li>In Security &amp; Privacy, select the General tab.&nbsp;</li>
<li>Choose from the options underneath Allow Applications Downloaded From.</li>
<li>Choose App Store or App Store and Identified Developers.</li>
</ol>
<p>The safest option is App Store only, but if you also want to be able to install legitimate software from the web then App Store and Identified Developers is the best plan. There used to be a further option to disable the feature by choosing &lsquo;Anywhere,&rsquo; but this option is no longer available.</p>
<p>All software downloaded via the App Store is signed, but should you attempt to open an app you&rsquo;ve downloaded from the web that isn&rsquo;t signed, you&rsquo;ll see a Gatekeeper warning like the one below:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/security2_thumb.png" alt="Do Macs get viruses? | Do Macs need antivirus software" loading="lazy" /></figure>
</div>
<p>This may mean you&rsquo;ve almost installed malware. On the other hand, of course, it may be a legitimate app. In which case (and if you&rsquo;re sure) you can bypass Gatekeeper&rsquo;s protection and install it.</p>
<p>To do so, go to the Finder and locate the app there. Now hold down Ctrl when you click on the app, and then select Open. This will mark it as being trusted. For more details, read <a title="How open an app from an unidentified developer" href="https://www.macworld.com/article/672947/how-to-open-a-mac-app-from-an-unidentified-developer.html">how to open an app from an unidentified developer</a>.</p>
<p>Being able to download unsigned software might sound like a benefit, but it essentially enables you to bypass the protections offered by Gatekeeper. That&rsquo;s a mixed blessing, and more and more malicious apps are instructing users to do exactly this when they are installed.</p>
<h3 id="sandboxing-and-related-protections">Sandboxing and related protections</h3>
<p>Software that is approved by Apple is also sandboxed, which means apps do only what they&rsquo;re intended to do. App sandboxing isolates apps from the critical system components of your Mac, your data and your other apps, so they shouldn&rsquo;t be able to do any damage. It doesn&rsquo;t protect you from malware getting into the system, but it does limit the extent of what the malware can do once it&rsquo;s in there.</p>
<p>The main problem here is that while apps sold on the Mac App Store have to be sandboxed, other Mac apps don&rsquo;t.</p>
<p>However, even without app sandboxing, there are related features built into macOS that should still stop apps snooping on your data. Since macOS 10.15 Catalina in 2019 it has been a requirement for all Mac apps to get your permission before they can access your files. macOS will also ask for your permission before an app can access the camera or microphone, or log what you type.</p>
<p>Another change that arrived with Catalina is that macOS itself is now stored on a separate disk volume. This means that your important system files are all completely separate and therefore more challenging to access. Apps can&rsquo;t get to your system files where they could cause problems.</p>
<h3 id="security-updates">Security updates </h3>
<p>Apple regularly issues security updates for the Mac. While these can serve to demonstrate that the Mac isn&rsquo;t infallible, with Apple all too frequently having security flaws pointed out to it, they are generally issued promptly. </p>
<p>Less pleasingly, these security updates have generally been issued as part of a larger macOS update: for example, macOS Monterey 12.2.1 closed a security vulnerability in WebKit that would have made it possible to execute malicious code. Because these security fixes were issued as part of a macOS update, which often requires the computer to reboot during the install process, Mac users may be less likely to install the update promptly, even though these updates can be set to install automatically. </p>
<p>Since the launch of Ventura, however, Apple has started separating out the security updates from wider macOS updates and rolling them out automatically. This way the update can happen in the background, without a restart. </p>
<h3 id="password-protection-and-passkeys">Password protection and Passkeys</h3>
<p>Apple improved the way users can manage passwords in macOS Monterey and also made some changes to two-factor authentication. You can find all your Passwords in System Preferences &gt; Passwords. You just need to unlock it with your main password to see every other password you have. (You can also view this information on your iPhone in Settings &gt; Passwords.)</p>
<p>In Monterey a new authenticator was added, so you can set up verification codes instead of using an authentication app. To add a setup key you need to click on a password and then choose Enter Setup Key, which you should be able to obtain from the provider. Once input the 2FA verification codes should automatically fill.</p>
<p>In macOS Ventura Apple moved from passwords to passkeys. Apple explains: &ldquo;Passkeys use iCloud Keychain public key credentials, eliminating the need for passwords. Instead, they rely on biometric identification such as Touch ID and Face ID in iOS, or a specific confirmation in macOS for generating and authenticating accounts.&rdquo; Passkeys are more secure, according to Apple. Essentially your device will hold one part of a cryptographic key pair and the other part will be stored by the website or service you&rsquo;re logging into. Your device will authenticate you biometrically (with Touch ID or Face ID) and log you in. For more information, read <a href="https://www.macworld.com/article/917751/how-to-use-passkeys.html">How to use Passkeys</a>.</p>
<h3 id="recording-alerts">Recording alerts</h3>
<p>In macOS Monterey Apple added a Recording indicator in the menu bar so you&rsquo;ll know if an app is recording you. A bit like the light that indicates the mic is in use on your iPhone.</p>
<h3 id="pasteboard-alerts">Pasteboard alerts </h3>
<p>Similarly, as of macOS Ventura, any app that wants access to your pasteboard has to request permission. </p>
<h3 id="safari-protections">Safari protections</h3>
<p>Anti-phishing technology in Safari will detect fraudulent websites. It will disable the page and display an alert if you visit a suspect website.</p>
<p>Anti-phishing isn&rsquo;t the only way that Safari protects you when you&rsquo;re surfing. Apple also allows users to prevent advertisers tracking them around the web. You can see a Privacy Report including details of all the cross-site trackers Apple has stopped from profiling you.</p>
<p>You&rsquo;ll also notice that plug-ins such as Silverlight, QuickTime, and Oracle Java won&rsquo;t run if they aren&rsquo;t updated to the latest version, another way of ensuring your Mac is safe. And of course now that Adobe has discontinued Flash people should hopefully no longer fall for malware hidden in Flash Player.</p>
<p>Safari will also flag up weak passwords and make strong password suggestions when you open an account on a website. This strong password will be saved in your iCloud Keychain so you won&rsquo;t have to remember it. It&rsquo;s a lot safer than using the same password you always use. For more on this subject, read about <a title="How Apple plans to retire passwords" href="https://www.macworld.com/article/677077/how-apple-plans-to-retire-passwords.html">How Apple plans to retire passwords</a>. </p>
<p>In the past, one issue with Apple&rsquo;s suggested passwords has been that sometimes they don&rsquo;t match the website&rsquo;s requirement. For example, a website may require one upper-case letter, one special character, one number and so on. As of the launch of Ventura, macOS allows users to edit suggested passwords so they meet these requirements. </p>
<p>New in Safari 15 were improvements to the Intelligent Tracing Prevention that arrived in Safari 14. Now web trackers won&rsquo;t be able to see your IP address so they won&rsquo;t be able to create a profile about you. Check this by choosing Safari from the Safari menu &gt; Preferences &gt; Privacy &gt; Hide IP address from trackers.</p>
<h3 id="photo-privacy">Photo privacy </h3>
<p>A few years ago there was a lot of bad publicity for Apple when celebrities reported that their iCloud photos had been stolen. (For more on this, read <a href="https://www.macworld.com/article/672307/how-to-stop-photo-hacks-on-iphone.html">How to stop photo hacks on iPhone</a>.) There have been a number of security enhancements in iCloud since this happened, and Apple has given users other ways to protect their photo privacy: for example, the ability to hide photos and albums. In Ventura, Apple expanded this so that hidden albums, and the Recently Deleted album, are locked by default, and only authenticated by Touch ID or Face ID.</p>
<h3 id="mail-protections">Mail protections</h3>
<p>macOS Monterey brought a new feature in Mail on the Mac. Mail Privacy Protection improves privacy for users. For example, it stops email senders from being able to track whether you&rsquo;ve opened an email, or even determine your location from your IP address. Check that the feature is working for you by opening Mail &gt; Click on Mail in the menu &gt; choose Preferences &gt; Privacy &gt; and make sure Protect Mail Activity is selected. It should be by default.</p>
<p>There are additional Mail protections if you&rsquo;re an iCloud subscriber. Hide My Email allows you to create an alternative email address that you can give out. The email will still be delivered to your inbox, but you can easily delete the alternative email later. </p>
<p>You can turn this on in System Preferences &gt; click on Apple ID &gt; and select Private Relay (currently in Beta).&nbsp;</p>
<p>In Ventura Hide My Email was extended to third-party apps. </p>
<h3 id="icloud-protections">iCloud+ protections</h3>
<p>If you&rsquo;re an iCloud subscriber, you&rsquo;ll be interested in a feature that arrived in Monterey (part of the upgrade from iCloud to iCloud+) called Private Relay. It&rsquo;s a bit like a VPN in that it encrypts your network traffic and routes your DNS lookup requests through two servers, one of which is not controlled by Apple. However, it&rsquo;s not a VPN, because it only works in Safari and obviously it lacks the other usual features of a VPN. (If you want a VPN, by the way, check out our roundup of the <a title="Best VPNs for Mac" href="https://www.macworld.com/article/668698/best-vpn-for-mac-2.html">best VPNs for Mac</a>. You may even be able to save some money if you take a look at our roundup of <a title="VPN deals" href="https://www.macworld.com/article/673709/best-vpn-deals-find-a-cheap-vpn-for-your-mac-iphone-or-ipad.html">VPN deals</a>, or try one of these <a title="Free VPNs for Mac" href="https://www.macworld.com/article/668942/the-best-free-vpn-for-mac-in-2022.html">free VPNs</a>.)</p>
<p>You can manage your Private Relay settings in System Preferences &gt; Apple ID &gt; click on Options beside Hide my email. Here you will see any fake email addresses you&rsquo;re using; just click on Turn Off if you want to stop those emails arriving. You can also change which email address they are forwarded to.&nbsp;</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/private_relay_thumb.jpg" alt="Private Relay Safari " loading="lazy" /></figure>
</div>
<h3 id="safety-check">Safety Check </h3>
<p>A new feature in macOS Ventura is Safety Check, a feature that will allow anyone who is concerned that they are in danger from a person known to them to revoke any access they have granted to that person. So, for example, that person won&rsquo;t be able to access their location, their photos, or anything else that could help them to be traced. </p>
<h3 id="file-encryption-with-filevault">File encryption with FileVault</h3>
<p>In addition to Gatekeeper, which should keep malware off your Mac, FileVault 2 makes sure your data is safe and secure by encrypting it.</p>
<p>If you&rsquo;re concerned about someone being able to access the files on your Mac you can encrypt them using FileVault, which will mean only you can unencrypt them. Read our <a title="Best Mac security settings" href="https://www.macworld.com/article/1432223/mac-security-tips-password-find-my-users-lockdown-mode.html">tips for keeping your mac secure</a>, of which using FileVault is one.</p>
<h3 id="warnings-about-spyware">Warnings about spyware</h3>
<p>Apple announced in November 2021 that it would warn its users of state-sponsored espionage attacks, such as the well-publicised Pegasus spyware, on their iPhones, iPads and Macs. The notification will come via email or a message. The same warning will be displayed on the user&rsquo;s Apple ID page at <a title="apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://appleid.apple.com&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >appleid.apple.com</a>.</p>
<p>The warning will offer advice about how affected users can protect themselves against attack. There&rsquo;s more information on <a title="Apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://support.apple.com/en-gb/HT212960&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s site</a>.</p>
<h3 id="find-my">Find My</h3>
<p>Not every threat to your data comes from malware. Sometimes a criminal might get hold of your Mac, in which case Apple&rsquo;s Find My service will come into its own.</p>
<p>The Find My app can relay the location of your lost or stolen Mac back to you. If you&rsquo;re concerned that it might not be recoverable, you can wipe the contents of the Mac so that your data can&rsquo;t be accessed. For more on this, read <a href="https://www.macworld.com/article/671675/how-to-use-find-my-iphone-to-find-lost-or-stolen-iphone-or-ipad.html">How to find a lost or stolen iPhone</a>.</p>
<p>In addition, every Mac with an M1-series, M2-series, or T2 chip has an Activation Lock feature that means they can be bricked remotely.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/lifestyle_macbook_side_15_thumb.jpg" alt="MAC SECURITY" loading="lazy" /></figure>
</div>
<h2 class="toc" id="when-apples-security-measures-arent-enough">When Apple&rsquo;s security measures aren&rsquo;t enough&hellip;</h2>
<p>All the above is great, but unfortunately there have been cases where Gatekeeper has been bypassed because malware has got an approved developer signature. For example OSX/CrescentCore was able to bypass Gatekeeper because it was signed by a certificate assigned by Apple to a developer. It took Apple a few days to retract that certificate.</p>
<p>It isn&rsquo;t only when malware gets a certificate from a registered developer. In the case of OSX/Linker, a zero-day vulnerability in Gatekeeper was being exploited.</p>
<p>Zero-day threats mean there are &ldquo;zero days&rdquo; to fix the vulnerabilities, although often a legitimate developer discovers the vulnerability and lets the developer know about it. There is usually a 90-day deadline for the fix to be made available. Some times the developer doesn&rsquo;t act in time and the exploit is publicised.</p>
<p>Apple normally reacts quickly, although there have been cases where the company has ignored the identified vulnerability, such as when a teenager reported the Group FaceTime vulnerability that meant someone could listen in to a call and Apple failed to act. There&rsquo;s more about how Apple reacts to security threats next.</p>
<p>When Apple is made aware of a threat the company usually issues a security update to the latest version of macOS and to the two versions prior to it. This way Apple will protect users from vulnerabilities and flaws in macOS that could be utilised by hackers.</p>
<p>Normally the advice would be to install the update immediately. However, for example a Sierra and High Sierra security update in July 2019 was subsequently pulled after people experiences problems after installing it.</p>
<h2 class="toc" id="how-apple-responds-to-security-threats">How Apple responds to security threats</h2>
<p>Despite the security measures Apple has in place, from time-to-time there are threats to the Mac.</p>
<p>Apple has its own security research team, but it depends on users and independent researchers to help by reporting any flaws they find in Apple products.</p>
<p>To this end, Apple has an incentive program that rewards such discoveries with payments of up to $200,000, depending on the seriousness of the flaw. But it was the last major tech company to set up such a scheme. (Microsoft set up its own bug-reporting incentive programme in 2013, and was itself criticised at the time for leaving it so late.)</p>
<p>On 4 August 2016, Apple security boss Ivan Krstic announced the Apple Security Bounty Program.&nbsp;&ldquo;We&rsquo;ve had great help from researchers in improving iOS security all along,&rdquo; Krstic said. &ldquo;[But] we&rsquo;ve heard pretty consistently&hellip; that it&rsquo;s getting increasingly difficult to find some of those most critical types of security vulnerabilities. So the Apple Security Bounty Program is going to reward researchers who actually share critical vulnerabilities with Apple.&rdquo;</p>
<p>The top reward of $200,000 is given to those who discover&nbsp;vulnerabilities in Apple&rsquo;s secure boot firmware components; for less critical flaws the bounties drop through a series of smaller figures to a bottom tier of $25,000. <a title="Wired" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.wired.com/2016/08/apples-finally-offering-bug-bounties-highest-rewards-ever/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">Wired</a> has the details.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/macbook_air_2018_lifestyle_0011_thumb.jpg" alt="MACBOOK SECURITY" loading="lazy" /></figure>
</div>
<p>We imagine most Mac users will be pleased to hear that Apple has an incentive programme to encourage more widespread reporting of its vulnerabilities. Incentivising security researchers to let Apple know about a flaw instead of passing it on to hackers (which may still, sadly, <a title="9to5Mac" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://9to5mac.com/2016/08/10/iphone-hack-bounty-apple-exodus-intelligence/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">be more lucrative</a>) makes Apple products safer for everyone.</p>
<p>One such flaw was the High Sierra root bug, discovered on 28 November 2017. This flaw in macOS 10.13 could allow access to settings on a Mac without the need for a password. Apple immediately issued a statement confirming that it was working on a fix and an update was anticipated to be issued within days.</p>
<h2 class="toc" id="how-to-keep-your-mac-safe-from-malware">How to keep your Mac safe from malware</h2>
<p>Apple does a lot to keep your Mac safe, but you have to work with it, installing updates when they arrive, not clicking on suspicious links in emails, not installing Flash, and so on. There are also some third party antivirus apps you could try &ndash; we have a complete guide to the <a title="What's the best antivirus for Mac" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">best antivirus for Mac here</a>.</p>
<p>Here are a few of the things you should do:</p>
<h3 id="1-keep-macos-up-to-date">1) Keep macOS up to date</h3>
<p>Despite what we said above about the security update Apple later retracted, normally the advice would be to install a security update as soon as possible.</p>
<p>Apple addresses flaws and vulnerabilities with the Mac by issuing updates to the Mac operating system, it is important to keep your Mac up to date. We advise checking regularly for OS updates remains a key part of a sound security strategy.</p>
<p>You can find out about the latest version of macOS here: <a href="https://www.macworld.com/article/678251/macos-13-ventura-beta-features-compatibility-how-to-update.html">macOS Ventura latest version information</a>.</p>
<p>You can set your Mac to automatically update as soon as a new version of the operating system is made available. Follow these instructions to set that up:</p>
<h4 id="how-to-automatically-install-macos-updates">How to automatically install macOS updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on Software Update.</li>
<li>Tick the box beside Automatically keep my Mac up to date.</li>
<li>Or, click on Advanced and choose from automatically: Check for updates, download new updates when available, Install macOS updates and Install app updates from the App Store.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/install_macos_options.jpg" alt="How to install macOS update" loading="lazy" /></figure>
</div>
<h4 id="how-to-automatically-install-high-sierra-or-older-software-updates">How to automatically install High Sierra or older software updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on App Store.</li>
<li>Tick the box beside Automatically check for updates.</li>
<li>You can choose to download the newly available updates, if you want them to install automatically though you need to make sure the box beside Install macOS updates is checked.</li>
</ol>
<h4 id="how-to-manually-install-macos-software-updates">How to manually install macOS software updates</h4>
<p>If you&rsquo;d rather not let your Mac automatically update, you should periodically check to see if there is an update to your version.</p>
<ul>
<li>In macOS High Sierra and earlier you can go to the Mac App Store and check for updates.</li>
<li>In macOS Mojave and newer you need to go to the Software Update pane in System Preferences.</li>
</ul>
<p>You may need to restart your computer once the update has downloaded. You can expect a typical 460MB download to take about 8 minutes (during which time you will still be able to work) but for a large update you will have to restart and install and that could take as much as 20 minutes, bringing the total install time to about 25 minutes in total.</p>
<p>For our in-depth guide to updating Mac operating systems, see <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">How to update macOS</a>.</p>
<h3 id="2-dont-connect-to-public-wi-fi-networks">2) Don&rsquo;t connect to public Wi-Fi networks</h3>
<p>Beware of connecting to a public Wi-Fi network as there may be someone spying who could gain access to your passwords and other private information, or you could have your session hijacked. Snoopers can set up their own Wi-Fi hotspot, pretending to be your hotel or coffee shop, then once you have connected they can grab any data you send over it. In the past there have been flaws detected in the OS that could allow access to your Mac, such as the SSL error in an earlier version of Mac OS X that meant it was possible for a hacker to access your machine if you were using public WiFi.</p>
<h3 id="3-dont-install-flash">3) Don&rsquo;t install Flash</h3>
<p>Adobe discontinued Flash on 31 December 2020 with good reason. Intego, Malwarebytes and others recommended that you shouldn&rsquo;t install Flash Player. Fake Flash Player updates have often been the means by which people install malware. For example, people want to watch or download a popular movie or TV series for free and they find a search result that leads to a request to update Flash Player in order to view the content. There is no need to install Flash Player now that HTML5 has made Flash obsolete. Now that Flash is no longer be supported the advice is simple: Don&rsquo;t use Flash!</p>
<h3 id="4-keep-java-up-to-date-on-your-mac">4) Keep Java up to date on your Mac</h3>
<p>If you must use Java (which is also problematic) then make sure it&rsquo;s up to date. Vulnerabilities with Java have highlighted the fact that there are cross-platform threats that even Mac users need to be aware of. Apple blocks Java by default, leaving it to the user to decide whether to install those tools. If you do need to update them be very careful where you download updates from!</p>
<h3 id="5-avoid-falling-foul-of-phishing-emails">5) Avoid falling foul of phishing emails</h3>
<p>Protect yourself from phishing attacks not responding to emails that require you to enter a password or install anything. You could also use free software such as <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://objective-see.com/products/blockblock.html&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">BlockBlock</a>. That way even you were to carry out the steps to launch the malware, it would not be able to write files or mark itself as launching on startup.</p>
<h3 id="6-dont-fall-for-facebook-scams">6) Don&rsquo;t fall for Facebook scams</h3>
<p>Facebook scams are usually designed to harvest data about the most gullible people, so if it seems like it might be too good to be true it probably is and you&rsquo;d be wise not to share it on Facebook. At best you might just look silly and those scammers will start to target you with more scams, at worse scammers can access your personal data and that of those you share their post with. So don&rsquo;t click on a link just because a friend shared it and definitely don&rsquo;t give out your personal data on Facebook.</p>
<h2 class="toc" id="why-you-need-to-protect-windows-users">Why you need to protect Windows users </h2>
<p>One of the reasons why, regardless of how safe a Mac is from malware, we should run an antivirus is to protect our Windows using friends and colleagues. While it&rsquo;s unlikely that your Mac will run any malware, there is possibly a more pernicious issue: You Mac could become the Typhoid Mary&nbsp;of Windows viruses, which is to say, you could be harboring viruses on your Mac that won&rsquo;t effect you, but can be problems for Windows users.</p>
<p>Some years ago when writing about Mac malware we identified the following nasties on our Mac:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.techhive.com/images/article/2015/05/mymac-100585505-medium.png?auto=webp&amp;quality=85,70" alt="mymac" loading="lazy" /></figure>
</div>
<p>That is a list of 30 potentially bad things that&hellip; you guessed it, were found on the Mac we ran a test virus scan on, one of which was a Windows virus. </p>
<h2 class="toc" id="how-to-tell-if-a-mac-has-a-virus">How to tell if a Mac has a virus</h2>
<p>Look out for the following signs that your Mac has been infected with malware:&nbsp;</p>
<ol>
<li>Aggressive web page banners and browser pop-ups recommending software.</li>
<li>Web page text turning into hyperlinks.</li>
<li>Programs appearing that you haven&rsquo;t authorized.</li>
<li>Mac crashes.</li>
<li>Mac runs hot.</li>
<li>Mac speeds up for no reason.</li>
</ol>
<p>If you think something suspicious is happening, open <a href="https://www.macworld.com/article/353345/how-to-macos-utilities-activity-monitor.html">Activity Monitor</a> and click on the CPU tab. Check what software is running &ndash; especially if something is hogging a lot of your resources.</p>
<p>We discuss how to tell if your Mac has a virus and how to remove a Mac virus in a separate article: <a href="https://www.macworld.com/article/671430/how-remove-virus-mac.html">How to remove a virus from a Mac</a> and <a href="https://www.macworld.com/article/233894/how-to-protect-your-mac-against-attack-and-disaster.html">How to protect your Mac against attack and disaster</a> to avoid getting infected.</p>
<div class="PH_F_PC_SW"></div>
<p><category>Antivirus, Personal Software, Security</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Macs can get viruses, but do Macs need antivirus software?</title>
		<link>https://www.latest-apple-news.com/2023/06/13/macs-can-get-viruses-but-do-macs-need-antivirus-software-2/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 16:14:05 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[ability]]></category>
		<category><![CDATA[absolutely]]></category>
		<category><![CDATA[acceptable]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[accessed]]></category>
		<category><![CDATA[according]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[acknowledged]]></category>
		<category><![CDATA[Activation]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[adding]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[additional]]></category>
		<category><![CDATA[Additionally]]></category>
		<category><![CDATA[address]]></category>
		<category><![CDATA[addresses]]></category>
		<category><![CDATA[adjust]]></category>
		<category><![CDATA[admitted]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[advantages]]></category>
		<category><![CDATA[advertisers]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[advise]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[affected]]></category>
		<category><![CDATA[against]]></category>
		<category><![CDATA[aggressive]]></category>
		<category><![CDATA[agreement]]></category>
		<category><![CDATA[Aitivirus]]></category>
		<category><![CDATA[albums]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[allows]]></category>
		<category><![CDATA[almost]]></category>
		<category><![CDATA[already]]></category>
		<category><![CDATA[alternative]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[always]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[answers]]></category>
		<category><![CDATA[anticipated]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[anyone]]></category>
		<category><![CDATA[anything]]></category>
		<category><![CDATA[anywhere]]></category>
		<category><![CDATA[appearing]]></category>
		<category><![CDATA[appleid]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[applied]]></category>
		<category><![CDATA[approach]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[approves]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[around]]></category>
		<category><![CDATA[arrive]]></category>
		<category><![CDATA[arrived]]></category>
		<category><![CDATA[arriving]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[assigned]]></category>
		<category><![CDATA[astonishing]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[attacking]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[attempt]]></category>
		<category><![CDATA[August]]></category>
		<category><![CDATA[authenticate]]></category>
		<category><![CDATA[authenticated]]></category>
		<category><![CDATA[authenticating]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authenticator]]></category>
		<category><![CDATA[authorized]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[background]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[banners]]></category>
		<category><![CDATA[bearing]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[become]]></category>
		<category><![CDATA[before]]></category>
		<category><![CDATA[benefit]]></category>
		<category><![CDATA[beside]]></category>
		<category><![CDATA[beware]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[biometrically]]></category>
		<category><![CDATA[blessing]]></category>
		<category><![CDATA[blockblock]]></category>
		<category><![CDATA[Blocks]]></category>
		<category><![CDATA[bottom]]></category>
		<category><![CDATA[bounties]]></category>
		<category><![CDATA[Bounty]]></category>
		<category><![CDATA[bricked]]></category>
		<category><![CDATA[bringing]]></category>
		<category><![CDATA[brought]]></category>
		<category><![CDATA[Browse]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[bundle]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[bypassed]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[camera]]></category>
		<category><![CDATA[careful]]></category>
		<category><![CDATA[Catalina]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[Celebrities]]></category>
		<category><![CDATA[certainly]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[challenging]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[character]]></category>
		<category><![CDATA[checked]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[checks]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Choosing]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[closed]]></category>
		<category><![CDATA[cmsdata]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[colleagues]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[compare]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[Complete]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[components]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[concern]]></category>
		<category><![CDATA[concerned]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[confirmation]]></category>
		<category><![CDATA[confirming]]></category>
		<category><![CDATA[connect]]></category>
		<category><![CDATA[connected]]></category>
		<category><![CDATA[connecting]]></category>
		<category><![CDATA[consensus]]></category>
		<category><![CDATA[consider]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[consistently]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[contaminated]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[contents]]></category>
		<category><![CDATA[controlled]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[course]]></category>
		<category><![CDATA[crashes]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[CrescentCore]]></category>
		<category><![CDATA[criminal]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[criticised]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptographic]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[customer]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dangers]]></category>
		<category><![CDATA[deadline]]></category>
		<category><![CDATA[december]]></category>
		<category><![CDATA[decide]]></category>
		<category><![CDATA[decline]]></category>
		<category><![CDATA[decreased]]></category>
		<category><![CDATA[decreasing]]></category>
		<category><![CDATA[dedicated]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[definitely]]></category>
		<category><![CDATA[degree]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[deleted]]></category>
		<category><![CDATA[delivered]]></category>
		<category><![CDATA[demonstrate]]></category>
		<category><![CDATA[depending]]></category>
		<category><![CDATA[depends]]></category>
		<category><![CDATA[designed]]></category>
		<category><![CDATA[despite]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[detected]]></category>
		<category><![CDATA[detections]]></category>
		<category><![CDATA[determine]]></category>
		<category><![CDATA[developer]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[different]]></category>
		<category><![CDATA[difficult]]></category>
		<category><![CDATA[digitally]]></category>
		<category><![CDATA[disable]]></category>
		<category><![CDATA[disaster]]></category>
		<category><![CDATA[discontinued]]></category>
		<category><![CDATA[discover]]></category>
		<category><![CDATA[discovered]]></category>
		<category><![CDATA[discoveries]]></category>
		<category><![CDATA[discovers]]></category>
		<category><![CDATA[discuss]]></category>
		<category><![CDATA[display]]></category>
		<category><![CDATA[displayed]]></category>
		<category><![CDATA[documented]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[downloaded]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[dramatically]]></category>
		<category><![CDATA[during]]></category>
		<category><![CDATA[earlier]]></category>
		<category><![CDATA[easily]]></category>
		<category><![CDATA[ecosystem]]></category>
		<category><![CDATA[effect]]></category>
		<category><![CDATA[elements]]></category>
		<category><![CDATA[eliminating]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[enables]]></category>
		<category><![CDATA[encourage]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypting]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encrypts]]></category>
		<category><![CDATA[enhancements]]></category>
		<category><![CDATA[enough]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[equipped]]></category>
		<category><![CDATA[especially]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[essential]]></category>
		<category><![CDATA[essentially]]></category>
		<category><![CDATA[establish]]></category>
		<category><![CDATA[established]]></category>
		<category><![CDATA[evaluation]]></category>
		<category><![CDATA[everyone]]></category>
		<category><![CDATA[exactly]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[exodus]]></category>
		<category><![CDATA[expanded]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[experiences]]></category>
		<category><![CDATA[explains]]></category>
		<category><![CDATA[explicit]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[extended]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[extent]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FaceTime]]></category>
		<category><![CDATA[factor]]></category>
		<category><![CDATA[failed]]></category>
		<category><![CDATA[falling]]></category>
		<category><![CDATA[familiar]]></category>
		<category><![CDATA[family]]></category>
		<category><![CDATA[feature]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[Federighi]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[figures]]></category>
		<category><![CDATA[FileVault]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[finder]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[fluctuated]]></category>
		<category><![CDATA[follow]]></category>
		<category><![CDATA[Following]]></category>
		<category><![CDATA[forwarded]]></category>
		<category><![CDATA[fraudulent]]></category>
		<category><![CDATA[frequently]]></category>
		<category><![CDATA[friend]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[further]]></category>
		<category><![CDATA[Gatekeeper]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[generally]]></category>
		<category><![CDATA[generating]]></category>
		<category><![CDATA[getting]]></category>
		<category><![CDATA[Granted]]></category>
		<category><![CDATA[growing]]></category>
		<category><![CDATA[guessed]]></category>
		<category><![CDATA[gullible]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hampering]]></category>
		<category><![CDATA[happen]]></category>
		<category><![CDATA[happened]]></category>
		<category><![CDATA[happening]]></category>
		<category><![CDATA[harboring]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[Harvest]]></category>
		<category><![CDATA[having]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[hellip]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[higher]]></category>
		<category><![CDATA[highest]]></category>
		<category><![CDATA[highlighted]]></category>
		<category><![CDATA[hijacked]]></category>
		<category><![CDATA[historically]]></category>
		<category><![CDATA[hogging]]></category>
		<category><![CDATA[Hopefully]]></category>
		<category><![CDATA[hotspot]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[hyperlinks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[identification]]></category>
		<category><![CDATA[identified]]></category>
		<category><![CDATA[ignored]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[imagine]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[Impossible]]></category>
		<category><![CDATA[improved]]></category>
		<category><![CDATA[improvements]]></category>
		<category><![CDATA[Improves]]></category>
		<category><![CDATA[improving]]></category>
		<category><![CDATA[incentive]]></category>
		<category><![CDATA[Incentivising]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[increasing]]></category>
		<category><![CDATA[increasingly]]></category>
		<category><![CDATA[independent]]></category>
		<category><![CDATA[indicates]]></category>
		<category><![CDATA[indicator]]></category>
		<category><![CDATA[infallible]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[infiltrate]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[inspects]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[installing]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[instructing]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[Intego]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[intelligent]]></category>
		<category><![CDATA[intended]]></category>
		<category><![CDATA[interested]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[invisibly]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[isolates]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[issuing]]></category>
		<category><![CDATA[itself]]></category>
		<category><![CDATA[keeping]]></category>
		<category><![CDATA[Keychain]]></category>
		<category><![CDATA[kqzyfj]]></category>
		<category><![CDATA[Krstic]]></category>
		<category><![CDATA[larger]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[launching]]></category>
		<category><![CDATA[leaving]]></category>
		<category><![CDATA[legitimate]]></category>
		<category><![CDATA[lengths]]></category>
		<category><![CDATA[letter]]></category>
		<category><![CDATA[lifted]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[limited]]></category>
		<category><![CDATA[Linker]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[locate]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[Lookup]]></category>
		<category><![CDATA[lucrative]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[machine]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[majority]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[manage]]></category>
		<category><![CDATA[managed]]></category>
		<category><![CDATA[manually]]></category>
		<category><![CDATA[maximum]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[measures]]></category>
		<category><![CDATA[medium]]></category>
		<category><![CDATA[meeting]]></category>
		<category><![CDATA[Members]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[microphone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[miners]]></category>
		<category><![CDATA[minutes]]></category>
		<category><![CDATA[Mojave]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Monterey]]></category>
		<category><![CDATA[namely]]></category>
		<category><![CDATA[nasties]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[noopener]]></category>
		<category><![CDATA[normally]]></category>
		<category><![CDATA[Norton]]></category>
		<category><![CDATA[notice]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[November]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Objective]]></category>
		<category><![CDATA[obsolete]]></category>
		<category><![CDATA[obtain]]></category>
		<category><![CDATA[obviously]]></category>
		<category><![CDATA[occasions]]></category>
		<category><![CDATA[offered]]></category>
		<category><![CDATA[offering]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[opening]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[options]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[others]]></category>
		<category><![CDATA[overall]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[panicking]]></category>
		<category><![CDATA[particularly]]></category>
		<category><![CDATA[passing]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[pasteboard]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[percent]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[periodically]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[pernicious]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[player]]></category>
		<category><![CDATA[pleased]]></category>
		<category><![CDATA[pleasingly]]></category>
		<category><![CDATA[pointed]]></category>
		<category><![CDATA[popular]]></category>
		<category><![CDATA[popularity]]></category>
		<category><![CDATA[possible]]></category>
		<category><![CDATA[possibly]]></category>
		<category><![CDATA[potentially]]></category>
		<category><![CDATA[preferences]]></category>
		<category><![CDATA[Premium]]></category>
		<category><![CDATA[pretending]]></category>
		<category><![CDATA[pretty]]></category>
		<category><![CDATA[prevalence]]></category>
		<category><![CDATA[prevent]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[probably]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[problematic]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[process]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[profile]]></category>
		<category><![CDATA[profiling]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[programs]]></category>
		<category><![CDATA[promotion]]></category>
		<category><![CDATA[promptly]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protected]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[protections]]></category>
		<category><![CDATA[protects]]></category>
		<category><![CDATA[provider]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[publicised]]></category>
		<category><![CDATA[publicity]]></category>
		<category><![CDATA[pulled]]></category>
		<category><![CDATA[purchase]]></category>
		<category><![CDATA[pushed]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[quickly]]></category>
		<category><![CDATA[QuickTime]]></category>
		<category><![CDATA[rather]]></category>
		<category><![CDATA[reacts]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[reasons]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[recent]]></category>
		<category><![CDATA[recently]]></category>
		<category><![CDATA[recommended]]></category>
		<category><![CDATA[recommending]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[recoverable]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[regardless]]></category>
		<category><![CDATA[registered]]></category>
		<category><![CDATA[regularly]]></category>
		<category><![CDATA[related]]></category>
		<category><![CDATA[remains]]></category>
		<category><![CDATA[remember]]></category>
		<category><![CDATA[remotely]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[reported]]></category>
		<category><![CDATA[reporting]]></category>
		<category><![CDATA[request]]></category>
		<category><![CDATA[requests]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[requirement]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[requires]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[researchers]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[responded]]></category>
		<category><![CDATA[responding]]></category>
		<category><![CDATA[Responds]]></category>
		<category><![CDATA[restart]]></category>
		<category><![CDATA[restrictions]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[resurgence]]></category>
		<category><![CDATA[retire]]></category>
		<category><![CDATA[retract]]></category>
		<category><![CDATA[retracted]]></category>
		<category><![CDATA[revealed]]></category>
		<category><![CDATA[revoke]]></category>
		<category><![CDATA[reward]]></category>
		<category><![CDATA[rewards]]></category>
		<category><![CDATA[rolling]]></category>
		<category><![CDATA[roundup]]></category>
		<category><![CDATA[routes]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[safest]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[sandboxed]]></category>
		<category><![CDATA[Sandboxing]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scheme]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Select]]></category>
		<category><![CDATA[selected]]></category>
		<category><![CDATA[senders]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[separating]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[seriousness]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[shouldn]]></category>
		<category><![CDATA[sierra]]></category>
		<category><![CDATA[signature]]></category>
		<category><![CDATA[signed]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[Silverlight]]></category>
		<category><![CDATA[similar]]></category>
		<category><![CDATA[Similarly]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[smaller]]></category>
		<category><![CDATA[snoopers]]></category>
		<category><![CDATA[snooping]]></category>
		<category><![CDATA[soaring]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[someone]]></category>
		<category><![CDATA[something]]></category>
		<category><![CDATA[sometimes]]></category>
		<category><![CDATA[special]]></category>
		<category><![CDATA[Specific]]></category>
		<category><![CDATA[speeds]]></category>
		<category><![CDATA[Sponsored]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[started]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[stealers]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[stopped]]></category>
		<category><![CDATA[stored]]></category>
		<category><![CDATA[strains]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[subject]]></category>
		<category><![CDATA[subscriber]]></category>
		<category><![CDATA[subsequently]]></category>
		<category><![CDATA[suggested]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[surfing]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[suspicious]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[target]]></category>
		<category><![CDATA[techhive]]></category>
		<category><![CDATA[techniques]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[teenager]]></category>
		<category><![CDATA[Thanks]]></category>
		<category><![CDATA[themselves]]></category>
		<category><![CDATA[therefore]]></category>
		<category><![CDATA[theverge]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[tkqlhce]]></category>
		<category><![CDATA[traced]]></category>
		<category><![CDATA[tracing]]></category>
		<category><![CDATA[trackers]]></category>
		<category><![CDATA[tracking]]></category>
		<category><![CDATA[traffic]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[trying]]></category>
		<category><![CDATA[turning]]></category>
		<category><![CDATA[Typhoid]]></category>
		<category><![CDATA[typical]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[underneath]]></category>
		<category><![CDATA[unencrypt]]></category>
		<category><![CDATA[unfortunately]]></category>
		<category><![CDATA[unidentified]]></category>
		<category><![CDATA[Unlikely]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[unsigned]]></category>
		<category><![CDATA[unwanted]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[usually]]></category>
		<category><![CDATA[utilised]]></category>
		<category><![CDATA[utilities]]></category>
		<category><![CDATA[various]]></category>
		<category><![CDATA[Ventura]]></category>
		<category><![CDATA[Verification]]></category>
		<category><![CDATA[verified]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[warning]]></category>
		<category><![CDATA[warnings]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[whereby]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[widespread]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[within]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[working]]></category>
		<category><![CDATA[wrapper]]></category>
		<category><![CDATA[writing]]></category>
		<category><![CDATA[written]]></category>
		<category><![CDATA[XProtect]]></category>
		<category><![CDATA[yourself]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=73ef28e8b154e92902e3b7fa61570c9f</guid>

					<description><![CDATA[Macworld






Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&#8217;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus soft]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>Do Macs get viruses? Do Macs need antivirus software? The answers to these questions aren&rsquo;t as simple as they might seem. In this article, we look at the dangers faced by Mac users, and the pros and cons of using Mac antivirus software.</p>
<p>Historically, the Mac has been considered <a href="https://www.macworld.com/article/668710/how-secure-mac.html">safe and secure</a> for a number of reasons that we will go into below, but in recent years the consensus has fluctuated. In its <a rel="nofollow" href="https://www.kqzyfj.com/click-100470607-15376698?sid=1-1-670537-1-0-0&amp;url=https://www.malwarebytes.com/resources/files/2020/02/2020_state-of-malware-report.pdf" >2020 State of Malware</a> report, Malwarebytes said it saw &ldquo;a significant rise in the overall prevalence of Mac threats in 2019, with an increase of over 400 percent from 2018.&rdquo; The following year, the company found that overall malware detected on macOS <a title="Malware on Mac 2020" href="https://www.macworld.com/article/676309/malware-on-macs-is-decreasing.html">decreased by 38 percent</a> but that the worst kind, namely &ldquo;backdoors, data stealers, and cryptocurrency stealers/miners,&rdquo; increased by more than 61 percent.</p>
<p>One reason for the decline in 2020 was the pandemic; as restrictions were lifted, malware saw a resurgence in 2021, with the number of Mac detections soaring by more than 200 percent to an astonishing 164 million. Even Apple software boss Craig Federighi <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.theverge.com/2021/5/19/22444353/mac-malware-not-acceptable-craig-federighi-apple-epic&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">acknowledged</a> in May 2021 that Mac malware was a problem&hellip; although it&rsquo;s worth bearing in mind that at the time he was trying to make the case for iOS&rsquo;s very different approach to security. &ldquo;Today,&rdquo; he said, &ldquo;we have a level of malware on the Mac that we don&rsquo;t find acceptable.&rdquo; Federighi revealed that 130 different cases had been documented since May 2020, and that one of these had affected more than 300,000 Macs. He even admitted that members of his family had got malware on their Macs.</p>
<p>When the judge asked about the fact that Mac users can purchase and download software from various places on the Mac, rather than being limited to the Mac App Store, Federighi said: &ldquo;Yeah, it&rsquo;s certainly how we&rsquo;ve done it on the Mac and it&rsquo;s regularly exploited on the Mac. iOS has established a dramatically higher bar for customer protection. The Mac is not meeting that bar today.&rdquo;</p>
<div class="promo_wrap">
<div class="top_head">
<p class="pro_tag">PROMOTION</p>
<p><strong>Antivirus Deal: Intego Mac Premium Bundle</strong></p>
</div>
<div class="promo_row">
<div class="pro_right promotion-item__image-outer-wrapper--small"><img decoding="async" class="promotion-item__image" src="https://b2c-contenthub.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-22-at-15.47.57.png" loading="lazy" /></div>
<p class="promo_text">
<p>Get Intego&rsquo;s Mac Premium Bundle X9 with antivirus, firewall, backup and system performance tools for just $29.99 (down from $84.99) for the first year. </p>
</div>
<div class="clear-both"></div>
<div class="more_btn"><a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-8-0-0"  class="promotion-view-deal-link" rel="nofollow">Get Deal</a></div>
</div>
<p>Federighi noted that Mac users don&rsquo;t download as much software as iOS users, and argued that if iOS was as open to third-party downloads there would be a real problem for that platform. &ldquo;If you took Mac security techniques and applied them to the iOS ecosystem, with all those devices, all that value,&rdquo; he said, &ldquo;it would get run over to a degree dramatically worse than is already happening on the Mac.&rdquo;</p>
<p>To get a feel for the number of attacks on the Mac platform, browse our complete list of <a href="https://www.macworld.com/article/672879/list-of-mac-viruses-malware-and-security-flaws.html">Mac viruses, malware and trojans</a>. Adware and Potentially Unwanted Programs (PUPs) make up the majority of the malware detections on Macs, according to Malwarebytes.</p>
<h2 class="toc" id="do-i-need-antivirus-for-mac">Do I need antivirus for Mac?</h2>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Antivirus on a Mac" class="wp-image-795574" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Do-Macs-need-Aitivirus.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">
</div>
<p>So should Mac users start panicking? No. Mac malware does pose a risk that users should be aware of, but it doesn&rsquo;t follow that Macs absolutely must be equipped with antivirus software. Such products have their advantages and you may choose to install one for more peace of mind, but we don&rsquo;t view them as essential for the Mac.</p>
<p>For one thing, there are measures put in place by Apple at the operating system level that should protect Mac users from the worst malware threats. These built-in security features make attacking a Mac particularly challenging. They include Gatekeeper, which blocks software that hasn&rsquo;t been digitally approved by Apple from running on your Mac without your agreement, and XProtect, which is Apple&rsquo;s own antivirus built into macOS and inspects every app for malware.</p>
<p>As you can see, Apple goes to great lengths to protect you from malware by making it almost impossible for you to download it in the first place, let alone install it. Additionally, Apple does a pretty good job of keeping on top of vulnerabilities and exploits; if your Mac needs to be protected from these, a patch will quickly be pushed out over auto-update.</p>
<p>Thanks to these features, before you can install an app, your Mac will check it against a list of malware, and even if there is no reason for concern it will not make it easy for you to open an application from a developer that hasn&rsquo;t been approved.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Gatekeeper and XProtect Apple security" class="wp-image-795593" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?quality=50&amp;strip=all 1246w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=300%2C209&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=768%2C535&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1200%2C836&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/06/Gatekeeper-and-Security.jpg?resize=1240%2C868&amp;quality=50&amp;strip=all 1240w" width="1200" height="836" sizes="auto, (max-width: 1200px) 100vw, 1200px" /><figcaption>Gatekeeper and XProtect are two elements of Apple&rsquo;s macOS security.</figcaption></figure>
<p class="imageCredit">
</div>
<p>These features and other protections built into macOS (which we will discuss in more detail below) mean it&rsquo;s not an essential requirement to install antivirus software on your Mac.</p>
<p>However, as good as these protections are, there have been occasions when malware has managed to infiltrate the Mac platform, and times when Apple hasn&rsquo;t responded to a threat as quickly as Mac users might hope. If you want the very best protection from threats, therefore, consider adding a dedicated Mac security suite such as <a rel="nofollow" href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" >Intego Mac Internet Security</a>. You&rsquo;ll find Intego at the top of our roundup of the <a title="best antivirus for Mac" rel="noopener" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html" >best antivirus for Mac</a>, among other free and paid-for antivirus apps that might give you some peace of mind, including <a title="McAfee" rel="nofollow" href="https://www.kqzyfj.com/click-8807236-13998110?sid=1-1-670537-1-0-0" >McAfee</a> and <a title="Norton" rel="nofollow" href="https://www.tkqlhce.com/click-7928211-10530627?url=https%3A%2F%2Fbuy.norton.com%2Fps%3FselSKU%3D21351077%26ctry%3DGB%26lang%3Den%26tppc%3D337EB012-DD4B-2815-29A7-4C5482D4D60A%26ptype%3Dcart%26trf_id%3Dnortoncom%26inid%3Dhho_nortoncom_store_norton-security_pdpage?sid=1-1-670537-1-0-0" >Norton</a>.</p>
<p class="cta"> <a href="https://offer.intego.com/Widg_8cbj3hvuz?aff_sub=1-1-670537-1-0-0" rel="nofollow">Get Intego Mac Security X9 here</a></p>
<p>Read on to find out more about how Apple&rsquo;s security measures work&ndash;and why they may not be enough to keep your Mac secure.</p>
<h2 class="toc" id="how-apple-protects-macs-from-viruses">How Apple protects Macs from viruses</h2>
<p>Macs are generally safer than PCs, but with threats to the Mac growing due to the platform&rsquo;s increasing popularity, Apple has had to build in protections to macOS and the Mac hardware itself.&nbsp;</p>
<p>In this section we will look at the built-in protections in macOS to establish whether they are enough, or if you should also install antivirus software on your Mac.</p>
<h3 id="how-xprotect-works">How XProtect works</h3>
<p>The Mac&rsquo;s malware scanning tool, XProtect, works invisibly and automatically in the background and requires no user configuration. Apple has a list of malicious applications that it checks against when you open downloaded applications. XProtect is&nbsp;regularly updated by Apple, and it updates in the background, so you should always be protected.</p>
<p>This is similar to having antivirus software from a third-party software developer running on your Mac, with the bonus of being written into the operating system and therefore not hampering performance.</p>
<p>If you download and try to open files contaminated with malware, you may see an explicit warning that the files will &ldquo;damage your computer,&rdquo; along with a reference to the type of malware. In that case you should delete the file immediately.</p>
<p>This is great news for Mac users, but is it enough? How does XProtect compare to the antivirus solutions out there? Well, XProtect may not be as up to date as some third-party products and it doesn&rsquo;t look for as many strains of malware. Read our roundup of the <a title="Best Mac Antivirus Apps" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">Best Mac antivirus apps</a> for an in-depth evaluation of the options out there.</p>
<h3 id="how-gatekeeper-works">How Gatekeeper works</h3>
<p>Thanks to Gatekeeper, macOS blocks downloaded software that hasn&rsquo;t been digitally signed, a process whereby Apple approves the developer. This leads to the familiar error message when you try to use or install unsigned software: &ldquo;[This app] can&rsquo;t be opened because it is from an unidentified developer.&rdquo; One change to Gatekeeper that arrived in macOS Catalina a few years back was that software is checked for malware and other issues every time it runs, rather than just the first time you install it.</p>
<p>For maximum protection, GateKeeper can be set to only allow software to be installed if it was downloaded from the Mac App Store. Or you can set it to allow you to install software from the web, but from verified developers only.</p>
<p>You can adjust these settings via the Security &amp; Privacy section of System Preferences:</p>
<ol>
<li>In Security &amp; Privacy, select the General tab.&nbsp;</li>
<li>Choose from the options underneath Allow Applications Downloaded From.</li>
<li>Choose App Store or App Store and Identified Developers.</li>
</ol>
<p>The safest option is App Store only, but if you also want to be able to install legitimate software from the web then App Store and Identified Developers is the best plan. There used to be a further option to disable the feature by choosing &lsquo;Anywhere,&rsquo; but this option is no longer available.</p>
<p>All software downloaded via the App Store is signed, but should you attempt to open an app you&rsquo;ve downloaded from the web that isn&rsquo;t signed, you&rsquo;ll see a Gatekeeper warning like the one below:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/security2_thumb.png" alt="Do Macs get viruses? | Do Macs need antivirus software" loading="lazy" /></figure>
</div>
<p>This may mean you&rsquo;ve almost installed malware. On the other hand, of course, it may be a legitimate app. In which case (and if you&rsquo;re sure) you can bypass Gatekeeper&rsquo;s protection and install it.</p>
<p>To do so, go to the Finder and locate the app there. Now hold down Ctrl when you click on the app, and then select Open. This will mark it as being trusted. For more details, read <a title="How open an app from an unidentified developer" href="https://www.macworld.com/article/672947/how-to-open-a-mac-app-from-an-unidentified-developer.html">how to open an app from an unidentified developer</a>.</p>
<p>Being able to download unsigned software might sound like a benefit, but it essentially enables you to bypass the protections offered by Gatekeeper. That&rsquo;s a mixed blessing, and more and more malicious apps are instructing users to do exactly this when they are installed.</p>
<h3 id="sandboxing-and-related-protections">Sandboxing and related protections</h3>
<p>Software that is approved by Apple is also sandboxed, which means apps do only what they&rsquo;re intended to do. App sandboxing isolates apps from the critical system components of your Mac, your data and your other apps, so they shouldn&rsquo;t be able to do any damage. It doesn&rsquo;t protect you from malware getting into the system, but it does limit the extent of what the malware can do once it&rsquo;s in there.</p>
<p>The main problem here is that while apps sold on the Mac App Store have to be sandboxed, other Mac apps don&rsquo;t.</p>
<p>However, even without app sandboxing, there are related features built into macOS that should still stop apps snooping on your data. Since macOS 10.15 Catalina in 2019 it has been a requirement for all Mac apps to get your permission before they can access your files. macOS will also ask for your permission before an app can access the camera or microphone, or log what you type.</p>
<p>Another change that arrived with Catalina is that macOS itself is now stored on a separate disk volume. This means that your important system files are all completely separate and therefore more challenging to access. Apps can&rsquo;t get to your system files where they could cause problems.</p>
<h3 id="security-updates">Security updates </h3>
<p>Apple regularly issues security updates for the Mac. While these can serve to demonstrate that the Mac isn&rsquo;t infallible, with Apple all too frequently having security flaws pointed out to it, they are generally issued promptly. </p>
<p>Less pleasingly, these security updates have generally been issued as part of a larger macOS update: for example, macOS Monterey 12.2.1 closed a security vulnerability in WebKit that would have made it possible to execute malicious code. Because these security fixes were issued as part of a macOS update, which often requires the computer to reboot during the install process, Mac users may be less likely to install the update promptly, even though these updates can be set to install automatically. </p>
<p>Since the launch of Ventura, however, Apple has started separating out the security updates from wider macOS updates and rolling them out automatically. This way the update can happen in the background, without a restart. </p>
<h3 id="password-protection-and-passkeys">Password protection and Passkeys</h3>
<p>Apple improved the way users can manage passwords in macOS Monterey and also made some changes to two-factor authentication. You can find all your Passwords in System Preferences &gt; Passwords. You just need to unlock it with your main password to see every other password you have. (You can also view this information on your iPhone in Settings &gt; Passwords.)</p>
<p>In Monterey a new authenticator was added, so you can set up verification codes instead of using an authentication app. To add a setup key you need to click on a password and then choose Enter Setup Key, which you should be able to obtain from the provider. Once input the 2FA verification codes should automatically fill.</p>
<p>In macOS Ventura Apple moved from passwords to passkeys. Apple explains: &ldquo;Passkeys use iCloud Keychain public key credentials, eliminating the need for passwords. Instead, they rely on biometric identification such as Touch ID and Face ID in iOS, or a specific confirmation in macOS for generating and authenticating accounts.&rdquo; Passkeys are more secure, according to Apple. Essentially your device will hold one part of a cryptographic key pair and the other part will be stored by the website or service you&rsquo;re logging into. Your device will authenticate you biometrically (with Touch ID or Face ID) and log you in. For more information, read <a href="https://www.macworld.com/article/917751/how-to-use-passkeys.html">How to use Passkeys</a>.</p>
<h3 id="recording-alerts">Recording alerts</h3>
<p>In macOS Monterey Apple added a Recording indicator in the menu bar so you&rsquo;ll know if an app is recording you. A bit like the light that indicates the mic is in use on your iPhone.</p>
<h3 id="pasteboard-alerts">Pasteboard alerts </h3>
<p>Similarly, as of macOS Ventura, any app that wants access to your pasteboard has to request permission. </p>
<h3 id="safari-protections">Safari protections</h3>
<p>Anti-phishing technology in Safari will detect fraudulent websites. It will disable the page and display an alert if you visit a suspect website.</p>
<p>Anti-phishing isn&rsquo;t the only way that Safari protects you when you&rsquo;re surfing. Apple also allows users to prevent advertisers tracking them around the web. You can see a Privacy Report including details of all the cross-site trackers Apple has stopped from profiling you.</p>
<p>You&rsquo;ll also notice that plug-ins such as Silverlight, QuickTime, and Oracle Java won&rsquo;t run if they aren&rsquo;t updated to the latest version, another way of ensuring your Mac is safe. And of course now that Adobe has discontinued Flash people should hopefully no longer fall for malware hidden in Flash Player.</p>
<p>Safari will also flag up weak passwords and make strong password suggestions when you open an account on a website. This strong password will be saved in your iCloud Keychain so you won&rsquo;t have to remember it. It&rsquo;s a lot safer than using the same password you always use. For more on this subject, read about <a title="How Apple plans to retire passwords" href="https://www.macworld.com/article/677077/how-apple-plans-to-retire-passwords.html">How Apple plans to retire passwords</a>. </p>
<p>In the past, one issue with Apple&rsquo;s suggested passwords has been that sometimes they don&rsquo;t match the website&rsquo;s requirement. For example, a website may require one upper-case letter, one special character, one number and so on. As of the launch of Ventura, macOS allows users to edit suggested passwords so they meet these requirements. </p>
<p>New in Safari 15 were improvements to the Intelligent Tracing Prevention that arrived in Safari 14. Now web trackers won&rsquo;t be able to see your IP address so they won&rsquo;t be able to create a profile about you. Check this by choosing Safari from the Safari menu &gt; Preferences &gt; Privacy &gt; Hide IP address from trackers.</p>
<h3 id="photo-privacy">Photo privacy </h3>
<p>A few years ago there was a lot of bad publicity for Apple when celebrities reported that their iCloud photos had been stolen. (For more on this, read <a href="https://www.macworld.com/article/672307/how-to-stop-photo-hacks-on-iphone.html">How to stop photo hacks on iPhone</a>.) There have been a number of security enhancements in iCloud since this happened, and Apple has given users other ways to protect their photo privacy: for example, the ability to hide photos and albums. In Ventura, Apple expanded this so that hidden albums, and the Recently Deleted album, are locked by default, and only authenticated by Touch ID or Face ID.</p>
<h3 id="mail-protections">Mail protections</h3>
<p>macOS Monterey brought a new feature in Mail on the Mac. Mail Privacy Protection improves privacy for users. For example, it stops email senders from being able to track whether you&rsquo;ve opened an email, or even determine your location from your IP address. Check that the feature is working for you by opening Mail &gt; Click on Mail in the menu &gt; choose Preferences &gt; Privacy &gt; and make sure Protect Mail Activity is selected. It should be by default.</p>
<p>There are additional Mail protections if you&rsquo;re an iCloud subscriber. Hide My Email allows you to create an alternative email address that you can give out. The email will still be delivered to your inbox, but you can easily delete the alternative email later. </p>
<p>You can turn this on in System Preferences &gt; click on Apple ID &gt; and select Private Relay (currently in Beta).&nbsp;</p>
<p>In Ventura Hide My Email was extended to third-party apps. </p>
<h3 id="icloud-protections">iCloud+ protections</h3>
<p>If you&rsquo;re an iCloud subscriber, you&rsquo;ll be interested in a feature that arrived in Monterey (part of the upgrade from iCloud to iCloud+) called Private Relay. It&rsquo;s a bit like a VPN in that it encrypts your network traffic and routes your DNS lookup requests through two servers, one of which is not controlled by Apple. However, it&rsquo;s not a VPN, because it only works in Safari and obviously it lacks the other usual features of a VPN. (If you want a VPN, by the way, check out our roundup of the <a title="Best VPNs for Mac" href="https://www.macworld.com/article/668698/best-vpn-for-mac-2.html">best VPNs for Mac</a>. You may even be able to save some money if you take a look at our roundup of <a title="VPN deals" href="https://www.macworld.com/article/673709/best-vpn-deals-find-a-cheap-vpn-for-your-mac-iphone-or-ipad.html">VPN deals</a>, or try one of these <a title="Free VPNs for Mac" href="https://www.macworld.com/article/668942/the-best-free-vpn-for-mac-in-2022.html">free VPNs</a>.)</p>
<p>You can manage your Private Relay settings in System Preferences &gt; Apple ID &gt; click on Options beside Hide my email. Here you will see any fake email addresses you&rsquo;re using; just click on Turn Off if you want to stop those emails arriving. You can also change which email address they are forwarded to.&nbsp;</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/private_relay_thumb.jpg" alt="Private Relay Safari " loading="lazy" /></figure>
</div>
<h3 id="safety-check">Safety Check </h3>
<p>A new feature in macOS Ventura is Safety Check, a feature that will allow anyone who is concerned that they are in danger from a person known to them to revoke any access they have granted to that person. So, for example, that person won&rsquo;t be able to access their location, their photos, or anything else that could help them to be traced. </p>
<h3 id="file-encryption-with-filevault">File encryption with FileVault</h3>
<p>In addition to Gatekeeper, which should keep malware off your Mac, FileVault 2 makes sure your data is safe and secure by encrypting it.</p>
<p>If you&rsquo;re concerned about someone being able to access the files on your Mac you can encrypt them using FileVault, which will mean only you can unencrypt them. Read our <a title="Best Mac security settings" href="https://www.macworld.com/article/1432223/mac-security-tips-password-find-my-users-lockdown-mode.html">tips for keeping your mac secure</a>, of which using FileVault is one.</p>
<h3 id="warnings-about-spyware">Warnings about spyware</h3>
<p>Apple announced in November 2021 that it would warn its users of state-sponsored espionage attacks, such as the well-publicised Pegasus spyware, on their iPhones, iPads and Macs. The notification will come via email or a message. The same warning will be displayed on the user&rsquo;s Apple ID page at <a title="apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://appleid.apple.com&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >appleid.apple.com</a>.</p>
<p>The warning will offer advice about how affected users can protect themselves against attack. There&rsquo;s more information on <a title="Apple" rel="nofollow" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://support.apple.com/en-gb/HT212960&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" >Apple&rsquo;s site</a>.</p>
<h3 id="find-my">Find My</h3>
<p>Not every threat to your data comes from malware. Sometimes a criminal might get hold of your Mac, in which case Apple&rsquo;s Find My service will come into its own.</p>
<p>The Find My app can relay the location of your lost or stolen Mac back to you. If you&rsquo;re concerned that it might not be recoverable, you can wipe the contents of the Mac so that your data can&rsquo;t be accessed. For more on this, read <a href="https://www.macworld.com/article/671675/how-to-use-find-my-iphone-to-find-lost-or-stolen-iphone-or-ipad.html">How to find a lost or stolen iPhone</a>.</p>
<p>In addition, every Mac with an M1-series, M2-series, or T2 chip has an Activation Lock feature that means they can be bricked remotely.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/lifestyle_macbook_side_15_thumb.jpg" alt="MAC SECURITY" loading="lazy" /></figure>
</div>
<h2 class="toc" id="when-apples-security-measures-arent-enough">When Apple&rsquo;s security measures aren&rsquo;t enough&hellip;</h2>
<p>All the above is great, but unfortunately there have been cases where Gatekeeper has been bypassed because malware has got an approved developer signature. For example OSX/CrescentCore was able to bypass Gatekeeper because it was signed by a certificate assigned by Apple to a developer. It took Apple a few days to retract that certificate.</p>
<p>It isn&rsquo;t only when malware gets a certificate from a registered developer. In the case of OSX/Linker, a zero-day vulnerability in Gatekeeper was being exploited.</p>
<p>Zero-day threats mean there are &ldquo;zero days&rdquo; to fix the vulnerabilities, although often a legitimate developer discovers the vulnerability and lets the developer know about it. There is usually a 90-day deadline for the fix to be made available. Some times the developer doesn&rsquo;t act in time and the exploit is publicised.</p>
<p>Apple normally reacts quickly, although there have been cases where the company has ignored the identified vulnerability, such as when a teenager reported the Group FaceTime vulnerability that meant someone could listen in to a call and Apple failed to act. There&rsquo;s more about how Apple reacts to security threats next.</p>
<p>When Apple is made aware of a threat the company usually issues a security update to the latest version of macOS and to the two versions prior to it. This way Apple will protect users from vulnerabilities and flaws in macOS that could be utilised by hackers.</p>
<p>Normally the advice would be to install the update immediately. However, for example a Sierra and High Sierra security update in July 2019 was subsequently pulled after people experiences problems after installing it.</p>
<h2 class="toc" id="how-apple-responds-to-security-threats">How Apple responds to security threats</h2>
<p>Despite the security measures Apple has in place, from time-to-time there are threats to the Mac.</p>
<p>Apple has its own security research team, but it depends on users and independent researchers to help by reporting any flaws they find in Apple products.</p>
<p>To this end, Apple has an incentive program that rewards such discoveries with payments of up to $200,000, depending on the seriousness of the flaw. But it was the last major tech company to set up such a scheme. (Microsoft set up its own bug-reporting incentive programme in 2013, and was itself criticised at the time for leaving it so late.)</p>
<p>On 4 August 2016, Apple security boss Ivan Krstic announced the Apple Security Bounty Program.&nbsp;&ldquo;We&rsquo;ve had great help from researchers in improving iOS security all along,&rdquo; Krstic said. &ldquo;[But] we&rsquo;ve heard pretty consistently&hellip; that it&rsquo;s getting increasingly difficult to find some of those most critical types of security vulnerabilities. So the Apple Security Bounty Program is going to reward researchers who actually share critical vulnerabilities with Apple.&rdquo;</p>
<p>The top reward of $200,000 is given to those who discover&nbsp;vulnerabilities in Apple&rsquo;s secure boot firmware components; for less critical flaws the bounties drop through a series of smaller figures to a bottom tier of $25,000. <a title="Wired" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://www.wired.com/2016/08/apples-finally-offering-bug-bounties-highest-rewards-ever/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">Wired</a> has the details.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/macbook_air_2018_lifestyle_0011_thumb.jpg" alt="MACBOOK SECURITY" loading="lazy" /></figure>
</div>
<p>We imagine most Mac users will be pleased to hear that Apple has an incentive programme to encourage more widespread reporting of its vulnerabilities. Incentivising security researchers to let Apple know about a flaw instead of passing it on to hackers (which may still, sadly, <a title="9to5Mac" href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://9to5mac.com/2016/08/10/iphone-hack-bounty-apple-exodus-intelligence/&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">be more lucrative</a>) makes Apple products safer for everyone.</p>
<p>One such flaw was the High Sierra root bug, discovered on 28 November 2017. This flaw in macOS 10.13 could allow access to settings on a Mac without the need for a password. Apple immediately issued a statement confirming that it was working on a fix and an update was anticipated to be issued within days.</p>
<h2 class="toc" id="how-to-keep-your-mac-safe-from-malware">How to keep your Mac safe from malware</h2>
<p>Apple does a lot to keep your Mac safe, but you have to work with it, installing updates when they arrive, not clicking on suspicious links in emails, not installing Flash, and so on. There are also some third party antivirus apps you could try &ndash; we have a complete guide to the <a title="What's the best antivirus for Mac" href="https://www.macworld.com/article/668850/best-mac-antivirus-software.html">best antivirus for Mac here</a>.</p>
<p>Here are a few of the things you should do:</p>
<h3 id="1-keep-macos-up-to-date">1) Keep macOS up to date</h3>
<p>Despite what we said above about the security update Apple later retracted, normally the advice would be to install a security update as soon as possible.</p>
<p>Apple addresses flaws and vulnerabilities with the Mac by issuing updates to the Mac operating system, it is important to keep your Mac up to date. We advise checking regularly for OS updates remains a key part of a sound security strategy.</p>
<p>You can find out about the latest version of macOS here: <a href="https://www.macworld.com/article/678251/macos-13-ventura-beta-features-compatibility-how-to-update.html">macOS Ventura latest version information</a>.</p>
<p>You can set your Mac to automatically update as soon as a new version of the operating system is made available. Follow these instructions to set that up:</p>
<h4 id="how-to-automatically-install-macos-updates">How to automatically install macOS updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on Software Update.</li>
<li>Tick the box beside Automatically keep my Mac up to date.</li>
<li>Or, click on Advanced and choose from automatically: Check for updates, download new updates when available, Install macOS updates and Install app updates from the App Store.</li>
</ol>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.macworld.co.uk/cmsdata/features/3454926/install_macos_options.jpg" alt="How to install macOS update" loading="lazy" /></figure>
</div>
<h4 id="how-to-automatically-install-high-sierra-or-older-software-updates">How to automatically install High Sierra or older software updates</h4>
<ol>
<li>Open System Preferences.</li>
<li>Click on App Store.</li>
<li>Tick the box beside Automatically check for updates.</li>
<li>You can choose to download the newly available updates, if you want them to install automatically though you need to make sure the box beside Install macOS updates is checked.</li>
</ol>
<h4 id="how-to-manually-install-macos-software-updates">How to manually install macOS software updates</h4>
<p>If you&rsquo;d rather not let your Mac automatically update, you should periodically check to see if there is an update to your version.</p>
<ul>
<li>In macOS High Sierra and earlier you can go to the Mac App Store and check for updates.</li>
<li>In macOS Mojave and newer you need to go to the Software Update pane in System Preferences.</li>
</ul>
<p>You may need to restart your computer once the update has downloaded. You can expect a typical 460MB download to take about 8 minutes (during which time you will still be able to work) but for a large update you will have to restart and install and that could take as much as 20 minutes, bringing the total install time to about 25 minutes in total.</p>
<p>For our in-depth guide to updating Mac operating systems, see <a href="https://www.macworld.com/article/671172/how-to-update-macos.html">How to update macOS</a>.</p>
<h3 id="2-dont-connect-to-public-wi-fi-networks">2) Don&rsquo;t connect to public Wi-Fi networks</h3>
<p>Beware of connecting to a public Wi-Fi network as there may be someone spying who could gain access to your passwords and other private information, or you could have your session hijacked. Snoopers can set up their own Wi-Fi hotspot, pretending to be your hotel or coffee shop, then once you have connected they can grab any data you send over it. In the past there have been flaws detected in the OS that could allow access to your Mac, such as the SSL error in an earlier version of Mac OS X that meant it was possible for a hacker to access your machine if you were using public WiFi.</p>
<h3 id="3-dont-install-flash">3) Don&rsquo;t install Flash</h3>
<p>Adobe discontinued Flash on 31 December 2020 with good reason. Intego, Malwarebytes and others recommended that you shouldn&rsquo;t install Flash Player. Fake Flash Player updates have often been the means by which people install malware. For example, people want to watch or download a popular movie or TV series for free and they find a search result that leads to a request to update Flash Player in order to view the content. There is no need to install Flash Player now that HTML5 has made Flash obsolete. Now that Flash is no longer be supported the advice is simple: Don&rsquo;t use Flash!</p>
<h3 id="4-keep-java-up-to-date-on-your-mac">4) Keep Java up to date on your Mac</h3>
<p>If you must use Java (which is also problematic) then make sure it&rsquo;s up to date. Vulnerabilities with Java have highlighted the fact that there are cross-platform threats that even Mac users need to be aware of. Apple blocks Java by default, leaving it to the user to decide whether to install those tools. If you do need to update them be very careful where you download updates from!</p>
<h3 id="5-avoid-falling-foul-of-phishing-emails">5) Avoid falling foul of phishing emails</h3>
<p>Protect yourself from phishing attacks not responding to emails that require you to enter a password or install anything. You could also use free software such as <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://objective-see.com/products/blockblock.html&amp;xcust=1-1-670537-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">BlockBlock</a>. That way even you were to carry out the steps to launch the malware, it would not be able to write files or mark itself as launching on startup.</p>
<h3 id="6-dont-fall-for-facebook-scams">6) Don&rsquo;t fall for Facebook scams</h3>
<p>Facebook scams are usually designed to harvest data about the most gullible people, so if it seems like it might be too good to be true it probably is and you&rsquo;d be wise not to share it on Facebook. At best you might just look silly and those scammers will start to target you with more scams, at worse scammers can access your personal data and that of those you share their post with. So don&rsquo;t click on a link just because a friend shared it and definitely don&rsquo;t give out your personal data on Facebook.</p>
<h2 class="toc" id="why-you-need-to-protect-windows-users">Why you need to protect Windows users </h2>
<p>One of the reasons why, regardless of how safe a Mac is from malware, we should run an antivirus is to protect our Windows using friends and colleagues. While it&rsquo;s unlikely that your Mac will run any malware, there is possibly a more pernicious issue: You Mac could become the Typhoid Mary&nbsp;of Windows viruses, which is to say, you could be harboring viruses on your Mac that won&rsquo;t effect you, but can be problems for Windows users.</p>
<p>Some years ago when writing about Mac malware we identified the following nasties on our Mac:</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image"><img decoding="async" src="https://images.techhive.com/images/article/2015/05/mymac-100585505-medium.png?auto=webp&amp;quality=85,70" alt="mymac" loading="lazy" /></figure>
</div>
<p>That is a list of 30 potentially bad things that&hellip; you guessed it, were found on the Mac we ran a test virus scan on, one of which was a Windows virus. </p>
<h2 class="toc" id="how-to-tell-if-a-mac-has-a-virus">How to tell if a Mac has a virus</h2>
<p>Look out for the following signs that your Mac has been infected with malware:&nbsp;</p>
<ol>
<li>Aggressive web page banners and browser pop-ups recommending software.</li>
<li>Web page text turning into hyperlinks.</li>
<li>Programs appearing that you haven&rsquo;t authorized.</li>
<li>Mac crashes.</li>
<li>Mac runs hot.</li>
<li>Mac speeds up for no reason.</li>
</ol>
<p>If you think something suspicious is happening, open <a href="https://www.macworld.com/article/353345/how-to-macos-utilities-activity-monitor.html">Activity Monitor</a> and click on the CPU tab. Check what software is running &ndash; especially if something is hogging a lot of your resources.</p>
<p>We discuss how to tell if your Mac has a virus and how to remove a Mac virus in a separate article: <a href="https://www.macworld.com/article/671430/how-remove-virus-mac.html">How to remove a virus from a Mac</a> and <a href="https://www.macworld.com/article/233894/how-to-protect-your-mac-against-attack-and-disaster.html">How to protect your Mac against attack and disaster</a> to avoid getting infected.</p>
<div class="PH_F_PC_SW"></div>
<p><category>Antivirus, Personal Software, Security</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>iOS versions: Every version of iOS from the oldest to the newest</title>
		<link>https://www.latest-apple-news.com/2023/06/13/ios-versions-every-version-of-ios-from-the-oldest-to-the-newest/</link>
		
		<dc:creator><![CDATA[tigaman webdesign]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 16:07:50 +0000</pubDate>
				<category><![CDATA[Latest Apple News]]></category>
		<category><![CDATA[across]]></category>
		<category><![CDATA[allowing]]></category>
		<category><![CDATA[alongside]]></category>
		<category><![CDATA[Although]]></category>
		<category><![CDATA[announced]]></category>
		<category><![CDATA[another]]></category>
		<category><![CDATA[answers]]></category>
		<category><![CDATA[archive]]></category>
		<category><![CDATA[article]]></category>
		<category><![CDATA[August]]></category>
		<category><![CDATA[automatically]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[because]]></category>
		<category><![CDATA[better]]></category>
		<category><![CDATA[bifurcation]]></category>
		<category><![CDATA[bigbite]]></category>
		<category><![CDATA[breakdown]]></category>
		<category><![CDATA[brought]]></category>
		<category><![CDATA[button]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[category]]></category>
		<category><![CDATA[changed]]></category>
		<category><![CDATA[checking]]></category>
		<category><![CDATA[coming]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[compatible]]></category>
		<category><![CDATA[considered]]></category>
		<category><![CDATA[container]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[contenthub]]></category>
		<category><![CDATA[continue]]></category>
		<category><![CDATA[coreImage]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[currently]]></category>
		<category><![CDATA[dedicated]]></category>
		<category><![CDATA[delivering]]></category>
		<category><![CDATA[details]]></category>
		<category><![CDATA[detective]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[eligible]]></category>
		<category><![CDATA[enabling]]></category>
		<category><![CDATA[Everything]]></category>
		<category><![CDATA[example]]></category>
		<category><![CDATA[expect]]></category>
		<category><![CDATA[expected]]></category>
		<category><![CDATA[experience]]></category>
		<category><![CDATA[extendedBlock]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[February]]></category>
		<category><![CDATA[figcaption]]></category>
		<category><![CDATA[figure]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[founder]]></category>
		<category><![CDATA[Foundry]]></category>
		<category><![CDATA[fourth]]></category>
		<category><![CDATA[gaining]]></category>
		<category><![CDATA[general]]></category>
		<category><![CDATA[generation]]></category>
		<category><![CDATA[generations]]></category>
		<category><![CDATA[gesture]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[harness]]></category>
		<category><![CDATA[height]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[holding]]></category>
		<category><![CDATA[However]]></category>
		<category><![CDATA[imageCredit]]></category>
		<category><![CDATA[includes]]></category>
		<category><![CDATA[including]]></category>
		<category><![CDATA[initial]]></category>
		<category><![CDATA[install]]></category>
		<category><![CDATA[instead]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[introduced]]></category>
		<category><![CDATA[introduction]]></category>
		<category><![CDATA[ipados]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[iteration]]></category>
		<category><![CDATA[itself]]></category>
		<category><![CDATA[January]]></category>
		<category><![CDATA[joining]]></category>
		<category><![CDATA[keynote]]></category>
		<category><![CDATA[larger]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[legendary]]></category>
		<category><![CDATA[likely]]></category>
		<category><![CDATA[little]]></category>
		<category><![CDATA[loading]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[macosx]]></category>
		<category><![CDATA[macworld]]></category>
		<category><![CDATA[making]]></category>
		<category><![CDATA[marked]]></category>
		<category><![CDATA[message]]></category>
		<category><![CDATA[milestones]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[necessary]]></category>
		<category><![CDATA[nofollow]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[numbers]]></category>
		<category><![CDATA[obsolete]]></category>
		<category><![CDATA[October]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[option]]></category>
		<category><![CDATA[original]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[plenty]]></category>
		<category><![CDATA[potted]]></category>
		<category><![CDATA[powered]]></category>
		<category><![CDATA[powering]]></category>
		<category><![CDATA[present]]></category>
		<category><![CDATA[preview]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[recommend]]></category>
		<category><![CDATA[redirectingat]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[reported]]></category>
		<category><![CDATA[require]]></category>
		<category><![CDATA[resize]]></category>
		<category><![CDATA[revealing]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[scattered]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[separate]]></category>
		<category><![CDATA[September]]></category>
		<category><![CDATA[settings]]></category>
		<category><![CDATA[shortened]]></category>
		<category><![CDATA[should]]></category>
		<category><![CDATA[significant]]></category>
		<category><![CDATA[significantly]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[sports]]></category>
		<category><![CDATA[srcset]]></category>
		<category><![CDATA[stayed]]></category>
		<category><![CDATA[Staying]]></category>
		<category><![CDATA[straight]]></category>
		<category><![CDATA[strong]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[supported]]></category>
		<category><![CDATA[supports]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[things]]></category>
		<category><![CDATA[though]]></category>
		<category><![CDATA[through]]></category>
		<category><![CDATA[timeline]]></category>
		<category><![CDATA[tutorial]]></category>
		<category><![CDATA[undefined]]></category>
		<category><![CDATA[Updatae]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updated]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[upgrade]]></category>
		<category><![CDATA[uploads]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[versions]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[watchOS]]></category>
		<category><![CDATA[Webkit]]></category>
		<category><![CDATA[whether]]></category>
		<category><![CDATA[whistlestop]]></category>
		<category><![CDATA[without]]></category>
		<category><![CDATA[wondered]]></category>
		<category><![CDATA[wrapper]]></category>
		<guid isPermaLink="false">http://www.latest-apple-news.com/?guid=3099f97655b32a31638016732090d331</guid>

					<description><![CDATA[Macworld






iOS is at the heart of the iPhone experience. It&#8217;s the operating system on which everything else sits, while also delivering plenty of features and dedicated apps built by Apple itself. If you&#8217;ve ever wondered about when vers]]></description>
										<content:encoded><![CDATA[<p><a rel="nofollow" href="https://www.macworld.com/">Macworld</a></p>
<div id="link_wrapped_content">
<body></p>
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>iOS is at the heart of the iPhone experience. It&rsquo;s the operating system on which everything else sits, while also delivering plenty of features and dedicated apps built by Apple itself. If you&rsquo;ve ever wondered about when versions came out, how you can check the one you&rsquo;re currently using, or how to update to the latest iteration, we have the answers. Here&rsquo;s our whistlestop tour of iOS.</p>
<h2 class="toc" id="ios-version-history">iOS version history</h2>
<p>iOS made its debut in 2007 alongside the first iPhone. Although, when Steve Jobs held the little device aloft revealing it to the world for the first time, it wasn&rsquo;t running iOS 1. Instead, it was reported by Apple to be <a href="https://go.redirectingat.com/?id=111346X1569486&amp;url=https://web.archive.org/web/20080115184612/http:/www.apple.com/iphone/features/index.html#macosx&amp;xcust=1-1-1659017-1-0-0&amp;sref=https://www.macworld.com/feed" rel="nofollow">powered by OS X</a>, the software for the Mac. Over time it was called iPhone OS, until finally gaining its now legendary name in the fourth generation of the software when it was shortened to iOS in 2010.</p>
<p>Significant milestones are scattered across the iOS timeline, with the first being the introduction of the App Store in iPhone OS 2 in 2008. iOS 4 saw the iPad joining the scene and using the operating system alongside the iPhone.</p>
<p>iOS 5 was introduced along with the iPhone 4S in 2011, which saw the debut of Siri as a built-in part of the operating system. Sadly, this was the last version of the software to be released when Apple CEO and Founder Steve Jobs was still alive.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/03/Steve-Jobs-with-Original-iPhone.jpg?quality=50&amp;strip=all" alt="Steve Jobs with original iPhone" class="wp-image-1659245" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/03/Steve-Jobs-with-Original-iPhone.jpg?quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/03/Steve-Jobs-with-Original-iPhone.jpg?resize=300%2C200&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/03/Steve-Jobs-with-Original-iPhone.jpg?resize=768%2C512&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/03/Steve-Jobs-with-Original-iPhone.jpg?resize=150%2C100&amp;quality=50&amp;strip=all 150w" width="1024" height="683" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Steve Jobs holding the first iPhone at the launch in 2007.</figcaption></figure>
<p class="imageCredit">Apple </p>
</div>
<p>Things changed significantly in iOS 11 in 2017 as it brought the first touch and gesture interface, allowing the first iPhone without a Home button&ndash;the iPhone X.  </p>
<p>Another major shift was with iOS 13 in 2019, as it marked the bifurcation of Apple&rsquo;s mobile operating systems, with iPhones staying on iOS but the newly announced iPadOS powering the new iPads. This would continue through to the present day, although the version numbers have stayed in sync, with the latest ones being iOS 16 and iPadOS 16.</p>
<p><a href="https://www.macworld.com/article/1519552/ios-17-release-date-features-compatibility-beta.html">iOS 17</a> and <a href="https://www.macworld.com/article/1794980/ipados-17-release-date-features-compatibility-beta.html">iPadOS 17</a> are the next expected versions of the software and Apple gave us a preview of what is coming at <a href="https://www.macworld.com/article/678333/wwdc-ios-macos-watchos-hardware-keynote.html">WWDC</a> in June. You can <a href="https://www.macworld.com/article/671198/how-to-install-ios-beta.html">install the beta of iOS 17</a> now, but we recommend you wait for the final version, which should be available in September. </p>
<h2 class="toc" id="list-of-ios-versions-and-latest-versions">List of iOS versions and latest versions</h2>
<p>Here&rsquo;s a breakdown of all the versions of iOS that have been released, when they were released, when they were last updated, and the latest iOS version. </p>
<ul>
<li>iPhone OS 1 &ndash; Released June 29, 2007 (Latest 1.1.5 July 15, 2008)</li>
<li>iPhone OS 2 &ndash; Released July 11, 2008 (Latest 2.2.1 January 27, 2009)</li>
<li>iPhone OS 3 &ndash; Released June 17, 2009 (Latest 3.2.2 August 11, 2010)</li>
<li>iOS 4 &ndash; Released June 22, 2010 (Latest 4.3.5 July 25, 2011)</li>
<li>iOS 5 &ndash; Released October 12, 2011 (Latest 5.1.1 May 7, 2012)</li>
<li>iOS 6 &ndash; Released September 19, 2012 (Latest 6.1.6 February 21, 2014)</li>
<li>iOS 7 &ndash; Released September 18, 2013 (Latest 7.1.2 June 30, 2014)</li>
<li>iOS 8 &ndash; Released September 17, 2014 (Latest 8.4.1 August 13, 2015)</li>
<li>iOS 9 &ndash; Released September 16, 2015 (Latest 9.3.6 July 22, 2019)</li>
<li>iOS 10 &ndash; Released September 13, 2016 (Latest 10.3.4 July 22, 2019)</li>
<li>iOS 11 &ndash; Released September 19, 2017 (Latest 11.4.1 July 9, 2018)</li>
<li>iOS 12 &ndash; Released September 17, 2018 (Latest 12.5.7 January 23, 2023)</li>
<li><a href="https://www.macworld.com/article/673109/ios-13-latest-version-updates-problems-fixes-new-features.html">iOS 13</a> &ndash; Released September 19, 2019 (Latest 13.7 September 1, 2020)</li>
<li><a href="https://www.macworld.com/article/673817/ios-14-latest-version-problems-new-features-for-iphone.html">iOS 14</a> &ndash; Released September 17, 2020 (Latest <a href="https://www.macworld.com/article/547549/ios-14-8-1-and-ipados-14-8-1-critical-security-updates.html">14.8.1</a> October 26, 2021)</li>
<li><a href="https://www.macworld.com/article/675711/ios-15-latest-version-problems-new-features-for-iphone.html">iOS 15</a> &ndash; Released September 24, 2021 (Latest <a href="https://www.macworld.com/article/1781127/ios-15-7-5-zero-day-vulnerabilities-iphone-webkit.html">15.7.5</a> April 10, 2023)</li>
<li><a href="https://www.macworld.com/article/631448/ios-16-features-compatibility-how-to-update.html">iOS 16</a> &ndash; Released September 12, 2022 (Latest <a href="https://www.macworld.com/article/1674501/ios-16-5-features-sports-news-siri-install.html">iOS 16.5</a> May 18, 2023)</li>
<li>iOS 17 &ndash; In Beta, full release expected in September 2023. </li>
</ul>
<h2 class="toc" id="list-of-ipados-versions">List of iPadOS versions </h2>
<p>While iOS was the initial operating system for iPad, this changed with the release of iPadOS 13 in 2019. Since then, iPads have had their own platform, enabling Apple to better harness the power of its larger devices. Here&rsquo;s the short release history of iPadOS:</p>
<ul>
<li>iPadOS 13 &ndash; Released September 24, 2019 (Latest 13.7 September 1, 2020)</li>
<li>iPadOS 14 &ndash; Released September 16, 2020 (Latest 14.8.1 October 26, 2021 )</li>
<li>iPadOS 15 &ndash; Released September 20, 2021 (Latest 15.7.3 January 23, 2023)</li>
<li>iPadOS 16 &ndash; Released October 24, 2022 (Latest 16.3.1 February 13, 2023) </li>
<li>iPadOS 17 &ndash; In Beta, full release expected in September 2023. </li>
</ul>
<h2 class="toc" id="which-ios-versions-are-currently-supported">Which iOS versions are currently supported?</h2>
<p>In terms of new features, only <a href="https://www.macworld.com/article/631448/ios-16-features-compatibility-how-to-update.html">iOS 16</a> is currently supported by Apple. For those with older versions though, Apple does still support iOS 15 with security updates. iOS 14 and iOS 13 are considered obsolete by Apple because the same phones that can run those operating systems can run iOS 15. When necessary Apple will support iOS 12&ndash;for example, in January 2023 there was a security update for iOS 12. </p>
<p>Apple has done a great job of making the newer iOS versions compatible with iPhones from older generations, so many iPhones are able to run supported versions of iOS. This includes the iPhone 5S, which was released in September 2013 and runs iOS 12. However, we expect that Apple will not support iOS 12 for much longer. See: <a href="https://www.macworld.com/article/675021/how-long-does-apple-support-iphones.html">How long does Apple support iPhones?</a></p>
<p>We run through which iPhone supports which version of iOS in a separate article: <a href="https://www.macworld.com/article/1811287/which-version-of-ios-can-my-iphone-run.html">iOS compatibility: Find out the latest version your iPhone can run.</a> </p>
<p>When iOS 17 launches it is likely that Apple will continue to support iOS 15 for the iPhone SE, iPhone 6s, iPhones 7 and 7 Plus, and iOS 16 for the iPhones 8 and 8 Plus. But the iPhones 6, 6 Plus and 5S will likely be left out in the cold as they only support iOS 12. </p>
<h2 class="toc" id="how-to-tell-which-version-of-ios-your-iphone-is-running">How to tell which version of iOS your iPhone is running</h2>
<p>If you&rsquo;re not sure which version of iOS you&rsquo;re currently using, it&rsquo;s very easy to find out. Just go to <strong>Settings &gt; General &gt; About</strong> and look for the <strong>iOS Version</strong> number. It&rsquo;s the same steps for iPadOS. </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?quality=50&amp;strip=all&amp;w=1200" alt="How to check which version of iOS you are using" class="wp-image-1659079" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?quality=50&amp;strip=all 1800w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=1200%2C675&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Checking-VERSION.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w" width="1200" height="675" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<h2 id="how-to-install-the-latest-version-of-ios">How to install the latest version of iOS</h2>
<p>Updating your iPhone to the latest version of iOS is simple, so long as your device is compatible. This doesn&rsquo;t require much detective work though, as your iPhone will know whether it is eligible for the upgrade or not.</p>
<p>To find out, go to <strong>Settings &gt; General &gt; Software Update</strong>, and your iPhone will check to see if there are any available. You may also see a notification on the Settings page that says &lsquo;Software Update Available&rsquo;, which you can click to go straight to the update page. iPadOS works the same way. </p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" src="https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?quality=50&amp;strip=all&amp;w=1200" alt="How to update iOS" class="wp-image-1659078" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?quality=50&amp;strip=all 1800w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=1200%2C675&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https://b2c-contenthub.com/wp-content/uploads/2023/03/iOS-Versions-Updatae-software.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w" width="1200" height="675" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></figure>
<p class="imageCredit">Foundry</p>
</div>
<p>If there are no updates, you&rsquo;ll see a message along the lines of &lsquo;iOS is up to date&rsquo;. Should there be one available, it should tell you on the screen and give you the option to &lsquo;Download and Install&rsquo;. Do this and your iPhone will automatically apply the update and bring your software to the latest version.</p>
<p>You can also read our tutorial on <a href="https://www.macworld.com/article/670944/how-to-update-ios-on-your-iphone.html">how to update iOS on iPhone</a> for more details.</p>
<p>So, there it is. A potted history of iOS. Want to know about all the versions of macOS? Read: <a href="https://www.macworld.com/article/672681/list-of-all-macos-versions-including-the-latest-macos.html">Mac OS X and macOS: Every version released so far</a>. </p>
<p><category>iOS, iPhone</category></body></div>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
	</channel>
</rss>
