How to Protect Your iPhone and Macbook from a Dangerous Hacked

How to Protect Your iPhone and Macbook from a Dangerous Hacked

Apple has ensured that all devices, both macOS, iOS and tvOS, are affected by Meltdown and Specters security holes. Then as a user, what should be done?



In order to make our device secure and protected from Meltdown security holes exploiting processor performance, it is recommended to update the operating system. The way is as follows: 
MacOS- Tap the Apple icon in the top left corner- Choose the About This Mac option- Then check the OS version used, make sure it has used macOS 13.2 or above- If not, just hit Software Update at the bottom.


 
iOS- Go to Settings- Select General- Then press Software Update- Make sure you're using iOS 11.2 or above, if you have not done any updates yet 

tvOS- Go to Settings- Select System- Select Software Update- Make sure Apple TV is running tvOS 11.2, if you have not made any updates available 

In addition to updating the operating system, Apple recommends Mac and iOS users to download applications only from the application store. The reason, Meltdown and Specter can only attack after they managed to infiltrate the system through malware. 

For the Specters own vulnerability is quite difficult. However Apple says it will update the Safari browser to protect users from certain exploit techniques on macOS, iOS, tvOS or watchOS. 

To note two dangerous vulnerabilities are found in a number of Intel and ARM chips. The two gaps are named Meltdown and Specters by security researchers. 

The gap is called impact to almost all devices made within the span of 20 years back. Gap is meant to make others can infiltrate into a special memory in the processor by exploiting the workings of processors running in parallel. In short, this security hole allows the attacker to steal any data in the system. 

But the biggest problem of these two security holes are not found on home PC or mobile devices and tablets. Frightened Meltdown and Specters are exploited by hackers to attack cloud services. If that happens, the impact will be very large and wide. 

"This security hole allows one user to connect to other users 'data, so many companies avoid other companies' services to process sensitive information," said Mounir Hahad, head of threat research at Juniper Networks. 

Fortunately, today various cloud service providers are already menyeriusi these two loopholes. AWS, Google Cloud, and Microsoft Azure immediately patch the Meltdown gap. While Google representatives claim that their cloud services already protect their servers from both Meltdown and Specter. 

Apple itself was silent without issuing any statement when these two vulnerabilities began to be crowded talked about. Though already a lot of rumors spread that the Apple device is also affected by this gap. 

In the end Apple spoke about Meltdown and Specters. They make sure that all of their Mac and iOS devices are affected by the gap. 

"All Mac systems and iOS devices are affected, but until now there has been no exploits that affect the user," wrote Apple in a blog post. They have started patching the security gap with a number of patches to the operating system it creates.


0 comments:

Post a Comment