Why quickly patching your iPhones and Macs is more important than ever | ZDNet

0

Apple products are secure and don’t get malware or hacked. This is a dangerous myth that continues to circulate despite being total garbage.

ZDNet Recommends

The best security key

The best security key

While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.

Read More

In fact, the number of vulnerabilities in Apple’s products is rapidly catching up with companies like Google and Microsoft.

A report by Atlas VPN (based on data from Telefonica Tech Cybersecurity) shows how vulnerabilities found in Apple products surged by 467% during the second half of 2021 to 380 exploits, a dramatic rise from the 67 uncovered during the first half of 2021.

In fact, this puts the number of vulnerabilities found in Apple products in the latter six months of 2021 a stone’s throw away from the top generators of vulnerabilities — Google (511 vulnerabilities) and Microsoft (428 vulnerabilities).

Companies with the most vulnerabilities in 2021 H1 and H2

Companies with the most vulnerabilities in 2021 H1 and H2


Atlas VPN/Telefonica Tech

According to the report, a good chunk of Apple’s vulnerabilities seems to relate to the Safari web browser and its various operating systems, while the majority of Microsoft’s vulnerabilities are associated with Windows OS versions, Office tools, and the Microsoft Edge browser, while Google’s vulnerabilities are mostly focused around the Android operating system and the Chrome browser.

So, what does this mean for Apple users?

First, let go of the perilous myth that your Apple gadgets are immune to hacking and malware.

They’re not invulnerable.

Next, get serious about patching your iPhones, Macs, iPads, and other Apple products.

Do it quickly, and check for any updates you might have missed often.

Finally, be aware of when your Apple products stop being supported by security updates. Once this point is reached, your devices can start to collect vulnerabilities at a rapid pace. As painful as it is, having an eye on replacing obsolete devices is essential to securing your digital information.

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

Read original article here

Denial of responsibility! Rapidtelecast.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.
Leave a comment