Two-part webinar: Security & Compliance for Apple devices in companies

Two-part webinar: Security & Compliance for Apple devices in companies

In this two-part webinar series Learn how to successfully implement the security and compliance requirements for Apple devices in your company. Our experts deal with topics such as the implementation of security guidelines, compliance with data protection regulations, differences between enrollment methods and the safe management of the devices over their entire lifecycle. With this … Read more

With an important security update: MacOS 15.3.2 and iOS 18.3.2 available

With an important security update: MacOS 15.3.2 and iOS 18.3.2 available

For users of iPhone, iPad, Mac, Vision Pro and Apple TV, Important updates are waiting in software updates in the system settings: Apple has presented updates late on Tuesday evening. It is not functional updates, but error deposits – together with at least one heavy vulnerability. Advertisement Streaming problem and old gap IOS 18.3.2 and … Read more

Browser updates: Stuffed security gaps-and µ block turned off

Browser updates: Stuffed security gaps-and µ block turned off

Mozilla has published Security Updates for all currently supported Firefox and Thunderbird versions, Google for the Chrome web browser. Chrome is now also blocking the µblock AdBlocker – but it can be activated again with a few simple steps. Advertisement The Mozilla developers have Firefox in the Versions 136,, ESR 128.8 as well as ESR … Read more

iOS 18: Apple extends information about security patches, but not with everyone

iOS 18: Apple extends information about security patches, but not with everyone

With the appearance of iOS 18, Apple had plugged numerous, even heavy security gaps in September. The associated Support document With further information, which bugs this was concrete, however, as often often, in the past, it was incomplete. Like the mastodon account @applsec writeswho pursues Apple security gaps, Apple has submitted some backgrounds this week, … Read more

Security researchers use Apple's “Where is?” To track all Bluetooth devices

Security researchers use Apple's "Where is?" To track all Bluetooth devices

Apple actually applies “where is?” Network, which can transmit the location of Apple devices such as iPhones and MacBooks, Airtags and other compatible devices as safe and protected via Bluetooth and Ultra-Wideband radio. In the past, there have already been methods of how the network could be used to transfer further, actually not intended data. … Read more

Parallels desktop: Security researcher publishes Zero-Day Exploit

Parallels desktop: Security researcher publishes Zero-Day Exploit

An apparently inadequate patched security gap in parallel desktop could enable a local attacker to achieve root rights in MacOS-and thus take control of the computer. A security researcher has now released the associated zero-day exploit for this weak point in two variants. He wanted to create a problem awareness and urge the software to … Read more