Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

security

  1. hyperbolic

    System Files Disk Usage on iPhone 8 Plus, 256 GB

    NOTE: I’ve attached relevant screenshots for all of the issues I describe below. If anyone else out there owns a 256 GB iPhone 8 Plus (preferably Product Red), and you have installed iOS 15.5.x or 15.6.x (especially today’s release of 15.6.1), may you PLEASE respond with the amount of disk...
  2. N

    Why no Kensington locks on new Macbook Pros?

    Hi all, We are trying to have our (big) company buy macs for developers so they can choose between pcs and macs but one problem is the lack of kensington locks on the macbook pros... We have seen some ports back on the macbook pros recently (hdmi, mag safe...), so why not a little hole for a...
  3. Gustavo Pereira

    iPhone 12 mini Can someone hack my phone and access my apps and photos?

    Someone on instagram said they could access my phone and all its content. They then proceeded to post photos that were only on my phone. Some of me and my then gf. Nobody has access to my iphone at home. I dont even have photos on icloud. Could this all be my ex gf or could I have been hacked?
  4. B

    Rooted

    Hi all, I opened this account because I couldn't find answers (easy ones anyway) on how to completely nuke a macbook, including firmware any any piece of preboot software that could be tampered with on a 16.2" MBP M1 2001. It came with Monterey but it doesn't seem to matter, it seems to target...
  5. 00sjsl

    iPad Safari showing weird URLs when following link

    I experience some weird behaviour on safari on my iPad Pro (running iPadOs 15.7). When googling for "id mobile" (A UK mobile service provider), when I clicked on the the www.idmobile.co.uk link a series of weird urls was shown in the address bar for several seconds before I finally got to what...
  6. hassiman

    iPhone 13 Pro Max Is There anything that can protect your iPhone/computer if you need to connect to public Wi-Fi in an airport or hotel?

    I was just wondering if there is anything that can protect your iPhone/computer if you need to connect to public Wi-Fi in an airport or hotel? My wife may need to use her Win laptop to connect to her office if something critical comes up when we are on vacation. I was thinking about a...
  7. hyperbolic

    iCloud SECURITY HOLE: Amazon.com Captured My Real IP Address Despite Private Relay Being Turned ON

    I logged into Amazon.com today using Safari with Private Relay turned ON over a cellular (XFinity Mobile connection — they use Verizon as the underlying carrier). However, despite the fact I have Private Relay turned ON and despite the fact that I confirmed that my real IP address is NOT being...
  8. A

    iPhone 13 Face ID and Apple watch unlock

    Hi everyone! I just wanna know if I am the only one experiencing this problem with face ID and apple watch unlock feature. I am using the regular iPhone 13 and apple watch SE by the way. “Face ID with a mask” and “Unlock with apple watch” features turned on. I noticed the problem when my...
  9. KevinAPearson

    Passkeys and new device setup without a password

    So I like the idea of the new Passkeys in iOS 16 but was wondering: If I buy a new iPhone or iPad etc, will I still need to know my Apple ID password to set up my new device? If we are trying to move away from passwords, how will it work in this situation?
  10. ipedro

    Passkeys supported sites and apps

    Sign In with Apple was the precursor for Passkeys. Given the way it's been engineered, it looks like all of those that have added support for Sign In with Apple will work from the get go with Passkeys – if not directly, then through Sign In With Apple which will look and act the same when...
  11. DominikHoffmann

    How to spot a impersonator WiFi hotspot

    As I was thinking about network security, what came to mind was the threat posed by someone impersonating a public WiFi hotspot with his own hardware and running a man-in-the-middle attack on my system. The way this would work is that my laptop would connect to the impostor hotspot, because it...
  12. Y

    Which user(s) can activate erased Mac with their device password after Mark As Lost?

    I have the following 3 users on my M1 Macbook Air 2020: userA: admin created during macOS installation, no AppleID connected userB: non-admin, its own AppleID connected, FindMy disabled userC: non-admin, its own AppleID connected, FindMy enabled After I invoke Mark As Lost in FindMy iPhone...
  13. DCIFRTHS

    2FA and Apple Mail on iOS 15.x

    I am using Microsoft 365 with an outlook.com email address. I have 2FA enabled, and use an authenticator application. When I setup my email account in Apple Mail, I choose outlook.com, and it displays the live.microsoft.com login page (a redirect in the Safari framework presented in email...
  14. jchap

    Parallels Desktop now a security risk? (according to CleanMyMac)

    I've recently noticed that CleanMyMac now flags Parallels Desktop 17 as a "suspicious" app, as shown below. As shown in the image, their apparent reasoning for this is that the app is "associated with or owned by Russian or Belarusian developers, where government authorities can access their...
  15. A

    Can your iPhone be compromised by simply opening an email?

    A legitimate email I received went to my spam folder so I opened it and re-assigned it to the actual inbox. However, once I did that, the email app automatically opened the next email in my spam folder, which was a clear scam. If I didn't click on any link and immediately closed it, am I fine...
  16. I

    Other Why can I add the same fingerprint twice or more?

    If fingerprints are unique (research suggests they are) then why doesn't my phone tell me this finger is already added if I add the same finger twice? On all of my fingerprint id phones I can add my fingers each twice or more. Some early fingerprint sensor discussion of the version 1 phones...
  17. ThatSomeone

    How safe are permissions against potential spyware/ransomware?

    I've been trying to find out just how much access apps have in later versions of macOS, specifically non-MAS apps that aren't run in sandbox. I know that they require your permission to access personal folders(or "Full Disk Access"), input, screen recording etc. in later macOS versions, but does...
  18. S

    Can I stop using 'broadcast SSID' and MAC addresses? Really?

    Looking at a doc on the Apple site it seems that I don't need to hide my SSID or use MAC addressing anymore. Is that correct/advisable? I'm about to set up a new router, but will need to use WPA2 security due to the age of my attached kit. Does Apple's advice still apply, or are they really...
  19. voraciousvegan

    Airport Extreme Security, Dynamic Global Hostname

    Edited
  20. marco114

    Getting SSL Errors today? This is why.

    If you are using an older MacOS like 10.12.1 or earlier. Any site you visit that uses Let's Encrypt SSL Certificates will no longer work. This is because the root ssl certificate is expired. Here's an article that explains it...