Skip to content

Your Apple devices are not as secure as you think. Learn how to raise their protection

Cyber criminals can use much simpler methods to bypass Apple security than malware.

Despite several notable cyber incidents, some iPhone and macOS users may still hold on to the myth that their devices are secure simply because of the way these operating systems are built. The simple answer to these claims is “they are not”; but let’s dive deeper.

Applications (Apps) on iPhone or iPad devices run in their own separate virtual spaces and can communicate with each other to a very limited extent. This also means that malicious applications can neither obtain information from other legitimate applications, nor can they usually spread like they would in the Android OS. This means devices running on iOS are less attractive for a majority of cyber criminals. On the other hand, it also means that an external antivirus app for iOS would only be able to scan itself, and thus, not work properly.

Much like iOS, macOS is also often considered to be more secure in comparison with other operating systems. Built-in protection measures mean lower potential for the creation of security loopholes because Apple created the iOS and macOS ecosystems and has full control over both the OS and app environments. As such, Apple has been seen as being less attractive for cybercriminals because of their lower share of the market.

Armed with that information, you may get a false sense of security about macOS’ and iOS’ security because of their designs, but that is not the end of the story. When attempting to attack devices, attackers have far more options than just using malware. There are other ways they can steal sensitive data, and that is why your iOS or macOS devices’ built-in protections are not enough, and why they can benefit from additional layers of security.

Responding to Apple customers’ needs, ESET brings forward new solutions on a consistent basis. This year’s offering is a huge step forward. Being a digital life protection vendor, ESET introduces two brand-new functionalities for iOS Virtual Private Network (VPN) and Identity Protection  (IP), to already present Password Manager. All these functionalities can be easily managed in updated ESET HOME, the complete security management platform.

MacOS users can have these new features, together with Modern Endpoint Security available in the new subscription-based premium tier product for customers, ESET HOME Security Ultimate.

 

What security threats are targeting iPhones and Macs?

Spreading malware across iPhone apps may be a tough nut to crack, but cyber-criminals can use much simpler methods to bypass Apple security.

For example, they may opt for social engineering techniques such as phishing websites or messages that try to impersonate legitimate companies or institutions to lure sensitive data from potential victims. In fact, Apple was the third-most-impersonated brand in phishing scams in Q2 2023.

Another scam is a false tech support call, wherein a user receives a call impersonating Apple’s support service and requiring personal details in order to deal with an impending problem. To make the call more believable, an attacker will use a spoofed ID, so the caller’s number looks like it is originating from a legitimate Apple support center.

Results of successful phishing attacks depend on how much data can be stolen from the victim in question. The extent of the damage varies from a hijacked e-mail account used for spreading spam to more serious incidents, such as identity theft or money withdrawn from an account.

Your iPhone can be also targeted while using unprotected public Wi-Fi. Connecting to an airport’s Wi-Fi during your travels may be convenient, but also may result in a loss of your sensitive data such as credit card details or passwords. Most public Wi-Fi networks don’t encrypt communications between your device and the router, making your data susceptible to interception.

Lastly, there’s old-school pickpocketing. In February 2023, The Wall Street Journal reported on iPhone thieves across the US who were locking people out of their Apple accounts and draining their bank accounts. First, the thieves watched their victims closely to learn their passcodes, then (physically) stole the devices. Armed with the passcodes, they invaded their victims’ personal and financial lives, while also effectively preventing the iPhones’ owners from locating their phones.

Macs face similar problems when connected to public Wi-Fi, as their users can face phishing threats via emails, private messages, and phony websites, among other threat vectors. Lastly, there are numerous pieces of malware specifically targeting macOS, such as CloudMensis, which was recently discovered by ESET researchers.

How can ESET VPN help?

In general, using public Wi-Fi is not recommended because it is often unsecure. But if you still want to stay connected while in a hotel room or at the airport, connect with a VPN, which establishes a private network connection, making internet users anonymous. After connecting to the ESET VPN application, a user’s device receives a new dynamic IP address, and online traffic is secured and encrypted.

This way, ESET VPN prevents cyber criminals from stealing user data while using public Wi-Fi, and makes it more difficult for third parties to track a user’s activity online, while ESET does not keep logs.

Moreover, using a VPN service can also bring other advantages. For example, users can enjoy access to their favorite streaming services from different parts of the world without geo-blocking.

Introducing Identity Protection* service

Since Apple customers can also fall victim to identity theft, ESET introduces its new Identity Protection* (IP) service for iOS and macOS. It monitors the dark web, searching for leaked sensitive information previously entered by a user such as name, phone number, and account credentials.

If a user is the victim of a data breach, they will be notified if the data they previously entered is found somewhere else online.

For US customers, the IP feature also includes Credit Report Monitoring, Smart SSN (Social Security number) Tracker, Social Media Identity Monitoring, Identity Theft Insurance up to $1 mil., and an on-call identity restoration service. Users will also be notified about leaked credit/debit cards and changes made to credit reports so that they can act against potential misuse of their personal information.

Why having a password manager and 2FA might be useful

Apple has its own password manager iCloud Keychain that stores and protects your passwords, but there are some known vulnerabilities. For example, iPhone thieves described by the Wall Street Journal can also bypass Keychain using stolen passcodes. Having a separate password manager from a different vendor gives you an extra layer of protection in such situations.

ESET Password Manager not only protects and stores your passwords and personal data, but the built-in password generator also prompts you to create strong, unpredictable passwords that you don’t have to remember.

Login credentials are stored automatically as new accounts are created. ESET Password Manager also includes a form completion feature that saves you time by completing web forms automatically and accurately.

To improve account protection even further, experts suggest setting up two-factorial authentication (2FA). This creates an additional authentication layer in case your password has been breached or stolen.

Easily manage your security on the ESET HOME platform

Operating a VPN, Identity Protection*, Password Manager, and 2FA might all sound too complex and time-consuming for a regular iPhone user. But in fact, you can easily manage all these features and more from one, easy-to-use platform, ESET HOME.

This complete security management platform and its companion mobile app for Android and iOS offer users a convenient and informative management dashboard with information about their ESET products, devices, licenses, and services, while also making it all accessible anywhere they go, whenever they need it.

ESET HOME also serves as a notification hub that presents connected devices as an ecosystem, where users can always easily check the security status of their connected devices.

Cyber incidents like leaked private photos of celebrities, iPhone passcode scams, and numerous malwares targeting Macs are proof that even iOS and macOS are not impenetrable, and that there is a need for extra layers of protection. Therefore, having features such as VPN and Identity Protection* can be quite handy, especially if they are easy to manage.

*Currently available in US market only, with global roll out planned in H1/2024

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET  
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Unraveling the Dangers of Phishing: From Basics to Effective Prevention

Surely you may have at one time or another received an email warning of an outstanding invoice, a parcel shipment that you did not expect or a warning from the bank about suspicious activity in your account. These messages usually adopt an alarming tone and provide you with a link to a website that you must visit right away to verify your personal information or to complete payment information. Caution! This is a “phishing” attempt, one of the most popular scam methods on the Internet!

Content:

What is phishing?

Phishing is a form of cyberattack that uses technology and social engineering to breach user security.

The term comes from the word “fishing”, since cybercriminals employ bait tactics waiting for users to “bite” or fall into the trap. They usually aim to get hold of financial information, payment service passwords (such as PayPal), or login credentials.

Actually, phishing is nothing new. The first cases of this type of fraud date back to the mid-1990s, when a group of fraudsters posed as employees of the AOL company to steal confidential customer data. Already in the 2000s, attacks began to specialize, focusing mainly on the banking sector.

Over the years, scams have become more sophisticated and, despite advances in cybersecurity, phenomena such as the rise of teleworking or the fraudulent use of AI have contributed to the rise of new ways of phishing.

Phishing as a source of concern

Anyone can become a victim of phishing. Even though cybersecurity systems are getting more powerful by the day, scammers have also honed their skills and organized themselves into small teams, specializing in social engineering tactics.

Companies often become the preferred target of these cybercriminals who try to steal your sensitive data or trick intermediary charges into making unauthorized transfers. A fairly common example of phishing is vendor invoice fraud, in which fraudsters impersonate trusted business partners to request payment for an outstanding invoice.

Even more disturbing are cases like the one we saw at the beginning of 2020 in the magazine Forbes in which a Japanese company was the victim of an elaborate scam in which the generative AI was used to clone the voice of a manager and authorize a transfer of 35 million dollars.

Audio cloning, audiovisual deep fakes and, in general, the use of the latest technology for criminal purposes pose a great threat and, at the same time, a challenge for cybersecurity companies.

Risks associated to phishing attacks

Financial losses have an immediate impact, but there are other long-term consequences that phishing victims can experience:

  • Reputational damage: Data breaches can erode customer trust, causing permanent damage to the company’s reputation.
  • Service outage: A cyberattack can cripple the company’s computer systems, especially if it involves ransomware. It all starts by downloading a malicious file included in the phishing messages. Once in the system, it encrypts critical files and blocks access to business-critical information.
  • Fines and penalties: Violation of data protection regulations (such as GDPR) may result in sanctions by authorities.

It is important to be prepared to deal with these threats using robust cybersecurity solutions and internal employee awareness programs as the main weapons to prevent phishing attacks.

Relevant statistics and data

Email fraud already accounts for 27% of economic losses for cybersecurity breaches and is responsible for 90% of data breaches, according to the report Cybersecurity Threat Trends 2021 (CISCO). This is mainly because phishing campaigns have become massive and scammers use hundreds of emails to reach more people.

Key elements in a phishing attack

Luckily, phishing messages are usually quite clumsy and recipients quickly realize that they are facing a scam, but sometimes they are so customized that they cast doubt on whether they are legitimate or not.

To gain the trust of their victims, fraudsters impersonate institutions, banks or companies that offer their services over the Internet.

Most of these fraudulent emails consist of:

  1. An unknown sender, with generic email extensions (Gmail, Hotmail, etc.) or names that resemble those of official companies, but with strange words that we cannot identify.
  2. A generic greeting (“Dear customer”, “Dear friend”) since cybercriminals generally do not know the identity of the recipient.
  3. An urgent request for our personal information (ID, credit card number) under the pretext of solving an issue.
  4. An external link that leads to a fraudulent website with the same logo, design and colors of the brand they intend to impersonate. On this landing page you will be prompted to update your details to continue. Here is where information is stolen.
  5. There is also the possibility that the email contains an attachment infected with malicious software (malware, ransomware). If you download it, it will compromise the security of the system.

It is important to be cautious and learn to recognize these phishing signals to minimize risks.

Types of phishing

There are currently over 10,000 forms of phishing (as reported by Wikipedia). These are some of the best known embodiments.

Traditional phishing

It is the most common form of email fraud. It is based on the random issuance of emails impersonating the identity of a trusted company or institution. Messages include links to fraudulent websites or infected files.

Spear phishing

While traditional phishing is a random scam, spear phishing targets a specific person, usually an influential position within the company. To earn their trust, cybercriminals conduct extensive research on the Internet, collecting personal data from social networks such as LinkedIn, where they check information such as age, location or position within the company.

Whaling

In whaling, the target is important people within the company or executive positions (CEO, CFO, etc.). Scammers investigate their prey for weeks and send highly personalized emails, related to critical business issues.

Smishing

Fraudulent messages are sent via text messages (SMS) or WhatsApp. For example, we received a notice from our bank reporting an unauthorized purchase with our card with a link to change the PIN and login details. If YOU do, we will have fallen into the trap.

Vishing

It comes from the union of “voice” and “phishing”. In this case, the scam is done by phone call. A typical example is technical service fraud where scammers call to report a computer failure that doesn’t actually exist and convince us to install a Trojan that will steal your data.

Angler Phishing

It is a new tactic that consists of creating fake profiles on social networks with the name of prestigious institutions and companies. The goal is to steal sensitive data from other users.

How to detect Phishing attacks?

Recognizing a phishing message is not always easy, but there are some indications that may make us suspect that the request is unusual.

  • Alarmist tone: They often convey urgency and urge the user to act immediately. Cybercriminals use emotions such as fear or curiosity and use intimidation tactics to make us act irrationally.
  • Grammatical errors: Many phishing messages contain spelling and grammatical errors as they were written by non-native speakers. Anyway, nowadays many scammers use tools like Chat GPT to correct their texts, so we must be wary even of messages without spelling mistakes.
  • Suspicious links or unsolicited attachments: Does the sender ask you to click on a link? Does it include alleged unpaid bills or fines that you can’t identify? This is most likely a cyberattack.

How to prevent a Phishing attack?

  • Do not open messages from unknown senders.
  • Do not provide your personal information through a link in an email.
  • Don’t download suspicious attachments.
  • Hover over the link and check if the url starts with https. This indicates that the site has a safe certificate.

If despite these precautions you fell into the trap and provided your data, change the passwords of the affected accounts as soon as possible and report the scam to the local police. You may also contact the Internet User Security Office of INCIBE (National Institute of Security) to investigate the fraud.

Protecting your organization from phishing

IBM assures in its report Cost of a Data Breach Report 2021 that it can take an average of 213 days for a company to warn that it was the victim of a phishing attack. During this time, cybercriminals will access all kinds of confidential information: database passwords, trade secrets, access credentials to the corporate network… That is why it is important to be prepared and work proactively to stop the threat of phishing.

Some preventive measures:

Employee Awareness

Make cybersecurity part of your company’s organizational culture and create campaigns to warn your employees of the risks of Internet scams. A good measure is to implement a phishing simulation software to train them and teach them to differentiate an authentic email from a fraudulent one.

Implementing email security solutions

The first line of defense against a phishing attack is the anti-spam filter built into email. Make sure it’s up to date with the latest versions and security patches. You may also configure email authentication policies as Domain-based Message Authentication, Reporting, and Conformance (DMARC) to reduce the risk of phishing.

Endpoint monitoring and protection

Endpoints are the end devices (computers, tablets, smartphones) connected to the network. EDR solutions have been designed to monitor and detect the presence of malware on these endpoints.

Unlike antiviruses that work with previously identified patterns, EDR solutions are more advanced since they give automated and real-time responses to contain the attack. They use technologies such as AI and machine learning capable of detecting anomalous behaviors, such as the execution of malicious scripts.

Endpoint protection is a basic cybersecurity measure, but should be combined with other solutions such as network traffic monitoring or safe remote access solutions such as Pandora RC.

How does Pandora RC help improve remote access security?

More and more companies are adopting policies of teleworking or hybrid work. It is a reality that poses new challenges in terms of cybersecurity. Remote workers operate in less secure environments than those under the supervision of IT teams.

Tools like Pandora RC help monitor your systems by offering remote support and quick assistance if a phishing attack is suspected.

Other ways Pandora RC can help prevent cyberattacks:

  • It generates 100% local passwords avoiding vulnerabilities in centralized systems.
  • Remote connections must be pre-approved.
  • It uses dual authentication access policies. This reduces the risk of unauthorized access, as users have to validate their identity in two steps.
  • It is a flexible and scalable solution. In addition, it is available as a SaaS or On-Premise solution for companies that want to have more control over their infrastructures.

Other tips to prevent phishing attacks in the business environment

As phishing techniques become more sophisticated, the need for protection is increasing. Therefore, it is not a bad idea to keep in mind some basic tips:

  • Try to stay up to date on new scams, follow the news in the media, and read tech blogs like Pandora FMS blog.
  • Use strong passwords on your accounts that include a combination of numbers, letters, and special characters. Never choose personal data such as date of birth, cities or pet names for your passwords; phishers could guess this information by checking your social media.
  • Use a multi-factor authentication (MFA) system to add an extra layer of security to your connections. That way, if a hacker gets your login credentials, they would still need to know the code sent to your mobile to access your accounts.
  • Installing a firewall is critical to blocking unauthorized access to sensitive information. Make sure it’s properly configured and only allows safe transactions.
  • Keep your browser and operating system up to date as cybercriminals often take advantage of vulnerabilities in outdated systems.
  • Prevents access to sensitive information over public Wi-Fi networks. Many of these networks lack encryption protocols and transmitted data could be intercepted. Turn off the option to automatically connect to open Wi-Fi networks on your mobile.
  • Make automatic backups of company data to be able to recover information in the event of an attack. We recommend them to be immutable backups (they cannot be deleted or modified). This ensures that copies are protected and can be restored even if a ransomware attack takes place.

Conclusion

As we mentioned at the beginning, phishing has existed since the beginning of the Internet and will probably evolve and we will learn about new forms of this form of cyberattack. Although we must be vigilant in the face of these threats, slowing technological development is not the solution. The key is to adopt cybersecurity measures and educate users to minimize risks and create a safe working environment.

Estudié Filología, pero las circunstancias de la vida me llevaron a trabajar en el sector del Marketing como redactora de contenidos. Me apasiona el mundo del blogging y la oportunidad de aprender que se presenta con cada proyecto nuevo. Te invito a seguir mis publicaciones en el blog de Pandora FMS para descubrir las tendencias tecnológicas que están transformando el mundo de los negocios.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

23.11.1 Saturn released

Changes compared to 23.11.0

Bug Fixes

  • Fixed an issue with email settings for Comet Hosted.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Scale Computing Announces Second Annual Scale Computing Platform Summit April 16-18 2024

INDIANAPOLIS – November 14, 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced its Scale Computing Platform Summit (Platform//2024) will be held April 16-18, 2024 at Resorts World in Las Vegas, NV. The second annual event is open to all Scale Computing customers, partners, and technology alliances.

The three-day event will feature a series of live and virtual sessions and offer exciting networking opportunities, educational and best practices sessions, an awards reception, and more. Attendees will also have the chance to get to know the Scale Computing product and engineering teams, as well as have time to meet and learn from peers. The 2024 conference will include discussion topics ranging from the power of automation, security, and data protection to hybrid cloud, edge computing, and more.

“We’re thrilled to welcome our customers, partners, and technology alliances back to Las Vegas in April. Last year’s Scale Computing Platform Summit was incredibly successful, as we hosted over 250 partners and customers from around the world,” said Jeff Ready, CEO and co-founder, Scale Computing. “We continue to see the high demand for thoughtful and innovative edge computing, virtualization, and hyperconverged solutions as more global IT leaders require the ability to deploy applications wherever they are needed. We look forward to seeing everyone at Platform//2024 and providing company news, offering updates, and networking opportunities for our industry partners, customers, and colleagues.”

Scale Computing Advanced Training will also be offered onsite at Platform//2024. The training course consists of two sessions, followed by the certification test at the end, and is designed to provide customers and partners with a deep dive into the advanced technical and theoretical features of SC//HyperCore. This two-part training session offers valuable information related to network configuration, installation, and post-installation features, as well as a comprehensive overview of ongoing compliance and security, additional software options, troubleshooting, and management of the SC//Platform.

Visit the Platform//2024 event page for more information or to register for this year’s summit. Use the code “EARLYBIRD” to take $200 off your registration fee until December 31, 2023.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

23.11.0 ‘Saturn’ released

Saturn is the latest entry in our quarterly rollup series. It branches off from our main rolling Voyager development into a fixed target for our partners to qualify and build upon.

Saturn is the sixth planet from the Sun and is the second-largest planet in our solar system, after Jupiter. It is large enough that it can fit more than 760 Earths inside it.

Despite its enormous size, Saturn has a relatively fast rotation. A day on Saturn lasts only about 10.7 hours. This rapid rotation causes the planet to flatten slightly at the poles and bulge at the equator.

Saturn has been known since ancient times, and its rings were first observed by Galileo Galilei in 1610. The true nature of the rings was identified by Christiaan Huygens in 1655.

As for the software, Comet 23.11.0 Saturn brings 8 new features and 23 enhancements, including our new VMware Protected Item type.

As always for a new quarterly release, there are two changelogs for 23.11.0 Saturn depending on whether you are coming from the previous quarterly release or the previous Voyager release:

Changes compared to 23.8.3

New Features

  • Added new VMware Protected Item type. Comet supports both the free and paid versions of VMware ESXi for backups and restores
  • Added a lobby option to the Comet Backup desktop app installers, allowing for silent installation with fully-remote device authentication via the Devices page in the Comet Server web interface
  • Updated the name of the Connected Devices page to Devices in the Comet Server web interface and redesigned the page to show all devices
  • Added bulk actions to the Devices page in the Comet Server web interface
  • Added support for restoring Disk image backups as VMware-compatible virtual disks
  • Added new “Comet Storage” and “Comet Storage (Object Lock)” storage destinations, allowing users to select Comet’s new bundled Wasabi storage option for Storage Vaults (including Storage Templates)
  • Added the ability to enforce policies created by a top-level administrator onto tenant administrators and tenant users. This allows top-level administrators to enforce settings and preferences across an entire Comet Server

Enhancements

  • Protected Item types that are not compatible with the device operating system will now be greyed out and disabled in the Comet Server web interface
  • Added the ability to mark jobs that are stuck in the running state as abandoned if they are unable to be cancelled in the Comet Server web interface
  • Changed clients on Linux platforms to log to stdin/stderr for background services
  • Improved the performance of restoring data from backups which contain large amounts of blank data, such as Disk Images
  • Improved Comet Server behavior when it fails to start due to license issues. It now starts successfully with limited functionality and displays an error message indicating how to identify the issue
  • Added logging of the reason the job started at the beginning of backup job logs
  • Added option to aggregate usage by Account Name for Gradient PSA integration
  • Added automatic cancellation of running jobs using a Storage Vault when that Storage Vault is deleted
  • Improved the appearance of the “About” window in the Comet Server Service Manager
  • Reduced memory usage when loading large index files from Comet Server Storage Role-type Storage Vaults
  • Renamed “Restore files and folders” to “Granular restore” when restoring files and folders from a Disk Image or Hyper-V backup
  • Added a new template for Amazon S3 and Wasabi Storage Templates to make it easier to set Object Lock on a template.
  • Added ability to configure server audit file logging from the Comet Server web interface
  • Significantly improved the speed of granular restores from Disk Image backups
  • Improved the performance of restoring files and/or folders from Disk Image backups
  • Significantly improved performance when restoring directories containing only a few files from a File and Folder Protected Item
  • Updated the Activity browser filter names in the Comet Backup desktop app to better clarify their functionality
  • Slightly changed the appearance of the Comet Backup desktop app About dialog
  • Improve security posture of the Comet Server web interface by adding additional XSS protections
  • Updated the preconfigured exclusion list for File and Folder Protected Items on the Comet Server web interface with valid exclusions
  • Lowered memory usage when uploading to S3-backed Storage Vaults in some use cases
  • Removed the device dropdown in the Comet Server web interface when adding a Protected Item when there’s only one device
  • Improved the admin accounts dialogue to have a separate Policies tab in the Comet Server web interface

Changes compared to 23.9.11

Bug Fixes

  • Fixed an issue with the Comet Server web interface showing an internal error popup when the server is first started
  • Fixed an issue with the Comet Server web interface throwing an error before valid VMware credentials have been added

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×