Friday, January 27, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Apple Adding End-to-End Encryption to iCloud Backup

Researcher by Researcher
December 8, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Apple on Wednesday announced plans to beef up data security protections on its flagship devices with the addition of new encryption tools for iCloud backups and a feature to help users verify identities in the Messages app.

The security-themed upgrades, scheduled to ship in 2023, includes a new feature called Advanced Data Protection for iCloud offering end-to-end encryption to protect iCloud backups even in the case of a data breach.

“Advanced Data Protection is Apple’s highest level of cloud data security, giving users the choice to protect the vast majority of their most sensitive iCloud data with end-to-end encryption so that it can only be decrypted on their trusted devices,” apple security engineering chief Ivan Krstic said in note describing the coming upgrades.

Apple devices currently offer end-to-end encryption by default for some data categories like health and passwords but when the new features ship, the categories will be expanded to iCloud backups, Notes and Photos.

[ READ: Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks ]

“For users who opt in, Advanced Data Protection keeps most iCloud data protected even in the case of a data breach in the cloud,” the Cupertino device maker said.

Apple said the only major iCloud data categories that are not covered by the end-to-end encryption are iCloud Mail, Contacts, and Calendar because of the need to interoperate with the global email, contacts, and calendar systems.

The new enhanced security features also include iMessage Contact Key Verification, which will allow users to verify they are communicating only with whom they intend.

Apple is positioning the iMessage contact key verification feature as another roadblock to high-profile hackers that target journalists, human rights activists, and members of government.

[ READ: Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problems? ]

“Conversations between users who have enabled iMessage Contact Key Verification receive automatic alerts if an exceptionally advanced adversary, such as a state-sponsored attacker, were to succeed breaching cloud servers and inserting their own device to eavesdrop on these encrypted communications. And for even higher security, iMessage Contact Key Verification users can compare a Contact Verification Code in person, on FaceTime, or through another secure call,” Apple said.

The company also plans to add support for third-party physical security keys, a feature aimed at helping celebrities, journalists and government figures to have an additional layer of multi-factor authentication.

“For users who opt in, Security Keys strengthens Apple’s two-factor authentication by requiring a hardware security key as one of the two factors. This takes our two-factor authentication even further, preventing even an advanced attacker from obtaining a user’s second factor in a phishing scam,” Apple added.

Related: Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem

Related: Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary Spyware

Related: Apple Adds ‘BlastDoor’ to Secure iPhones From Zero-Click Attacks

view counter

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series.
Ryan is a veteran cybersecurity strategist who has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan’s past career as a security journalist included bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive’s ZDNet, PCMag and PC World.
Ryan is a director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
Follow Ryan on Twitter @ryanaraine.

Previous Columns by Ryan Naraine:
Tags:





Source link

Related articles

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023
Tags: AddingAppleBackupencryptionendtoendiCloud
Share76Tweet47

Related Posts

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
0

Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive...

Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023
0

The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. Image: StackCommerce For...

U.S. Takes Down Hive Ransomware Infrastructure

U.S. Takes Down Hive Ransomware Infrastructure

January 27, 2023
0

The FBI, Europol, and law enforcement authorities from several European countries have disrupted the Hive ransomware group’s operations, seizing two...

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’

January 26, 2023
0

The FBI has at least temporarily dismantled the network of a prolific ransomware gang it infiltrated last year, saving victims...

Cybersecurity budgets aren’t matching cybersecurity challenges

Cybersecurity budgets aren’t matching cybersecurity challenges

January 26, 2023
0

A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Why your data is more valuable than you may realize

Why your data is more valuable than you may realize

January 27, 2023
Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023

Recent Posts

Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Why your data is more valuable than you may realize

Why your data is more valuable than you may realize

January 27, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved