{"id":74013,"date":"2023-12-11T12:20:10","date_gmt":"2023-12-11T04:20:10","guid":{"rendered":"https:\/\/version-2.com\/?p=74013"},"modified":"2023-12-08T12:38:10","modified_gmt":"2023-12-08T04:38:10","slug":"your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/12\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/","title":{"rendered":"Your Apple devices are not as secure as you think. Learn how to raise their protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"74013\" class=\"elementor elementor-74013\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10123648\" class=\"csc-frame csc-frame-default\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div id=\"content-c10095709\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Cyber criminals can use much simpler methods to bypass Apple security than malware.<\/h3><p class=\"bodytext\">Despite several <a href=\"https:\/\/www.welivesecurity.com\/2017\/02\/17\/8-things-know-spyware\/\" target=\"_blank\" rel=\"noopener\">notable cyber incidents<\/a>, some iPhone and macOS users may still hold on to the myth that their devices are secure simply because of the way these operating systems are built. The simple answer to these claims is \u201cthey are not\u201d; but let\u2019s dive deeper.<\/p><p class=\"bodytext\">Applications (Apps) on iPhone or iPad devices <a href=\"https:\/\/www.eset.com\/us\/ios-cyber-security\/\" target=\"_blank\" rel=\"noopener\">run in their own separate virtual spaces<\/a> and can communicate with each other to a very limited extent. This also means that malicious applications can neither obtain information from other legitimate applications, nor can they <a href=\"https:\/\/www.welivesecurity.com\/2022\/05\/04\/3-most-dangerous-types-android-malware\/\" target=\"_blank\" rel=\"noopener\">usually spread<\/a> like they would in the Android OS. This means devices running on iOS are less attractive for a majority of cyber criminals. On the other hand, it also means that an external antivirus app for iOS would only be able to scan itself, and thus, not work properly.<\/p><p class=\"bodytext\">Much like iOS, macOS is also often considered to be more secure in comparison with other operating systems. <a href=\"https:\/\/www.macworld.com\/article\/668710\/how-secure-mac.html#:~:text=On%20the%20software%20side%2C%20macOS,if%20it%20has%20been%20changed.\" target=\"_blank\" rel=\"noopener\">Built-in protection measures<\/a> mean <a href=\"https:\/\/www.trustedreviews.com\/news\/are-macs-safer-than-windows-laptops-4205593\" target=\"_blank\" rel=\"noopener\">lower potential for the creation of security loopholes<\/a> because Apple created the iOS and macOS ecosystems and has full control over both the OS and app environments. As such, Apple has been seen as being less attractive for cybercriminals because of <a href=\"https:\/\/gs.statcounter.com\/os-market-share#monthly-202111-202303\" target=\"_blank\" rel=\"noopener\">their lower share of the market<\/a>.<\/p><p class=\"bodytext\">Armed with that information, you may get a false sense of security about macOS\u2019 and iOS\u2019 security because of their designs, but that is not the end of the story. When attempting to attack devices, attackers have far more options than just using malware. There are <a href=\"https:\/\/www.welivesecurity.com\/2022\/09\/19\/can-iphone-be-hacked-what-know-ios-security\/\" target=\"_blank\" rel=\"noopener\">other ways<\/a> they can steal sensitive data, and that is why your iOS or macOS devices\u2019 built-in protections are not enough, and why they can benefit from additional layers of security.<\/p><p class=\"bodytext\">Responding to Apple customers\u2019 needs, ESET brings forward new solutions on a consistent basis. This year\u2019s offering is a huge step forward. Being a digital life protection vendor, ESET introduces two brand-new functionalities for iOS Virtual Private Network (VPN) and Identity Protection\u00a0 (IP), to already present Password Manager. All these functionalities can be easily managed in updated ESET HOME, the complete security management platform.<\/p><p class=\"bodytext\">MacOS users can have these new features, together with Modern Endpoint Security available in the new subscription-based premium tier product for customers, ESET HOME Security Ultimate.<\/p><\/div><div><div id=\"content-c10095711\" class=\"csc-frame csc-frame-default\"><div class=\"align-center\">\u00a0<\/div><\/div><div id=\"content-c10095748\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">What security threats are targeting iPhones and Macs?<\/h3><p class=\"bodytext\">Spreading malware across iPhone apps may be a tough nut to crack, but cyber-criminals can use much simpler methods to bypass Apple security.<\/p><p class=\"bodytext\">For example, they may opt for social engineering techniques such as <a href=\"https:\/\/www.welivesecurity.com\/en\/scams\/dear-all-what-are-some-common-subject-lines-in-phishing-emails\/\" target=\"_blank\" rel=\"noopener\">phishing websites or messages<\/a> that try to impersonate legitimate companies or institutions to lure sensitive data from potential victims. In fact, Apple was the <a href=\"https:\/\/www.checkpoint.com\/press-releases\/microsoft-dominates-as-the-most-impersonated-brand-for-phishing-scams-in-q2-2023\/\" target=\"_blank\" rel=\"noopener\">third-most-impersonated brand<\/a> in phishing scams in Q2 2023.<\/p><p class=\"bodytext\">Another scam is a <a href=\"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/scam-alert-beware-of-fake-tech-support-phone-calls-1\/\" target=\"_blank\" rel=\"noopener\">false tech support call<\/a>, wherein a user receives a call impersonating Apple\u2019s support service and requiring personal details in order to deal with an impending problem. To make the call more believable, an attacker will use a spoofed ID, so the caller\u2019s number looks like it is originating from a legitimate Apple support center.<\/p><p class=\"bodytext\">Results of successful phishing attacks depend on how much data can be stolen from the victim in question. The extent of the damage varies from a hijacked e-mail account used for spreading spam to more serious incidents, such as identity theft or money withdrawn from an account.<\/p><p class=\"bodytext\">Your iPhone can be also targeted while using <a href=\"https:\/\/www.welivesecurity.com\/2020\/10\/07\/working-from-hotel-beware-dangers-public-wifi\/\" target=\"_blank\" rel=\"noopener\">unprotected public Wi-Fi<\/a>. Connecting to an airport\u2019s Wi-Fi during your travels may be convenient, but also may result in a loss of your sensitive data such as credit card details or passwords. Most public Wi-Fi networks don\u2019t encrypt communications between your device and the router, making your data susceptible to interception.<\/p><p class=\"bodytext\">Lastly, there\u2019s old-school pickpocketing. In February 2023, <a href=\"https:\/\/www.wsj.com\/articles\/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a\" target=\"_blank\" rel=\"noopener\">The Wall Street Journal reported<\/a> on iPhone thieves across the US who were locking people out of their Apple accounts and draining their bank accounts. First, the thieves watched their victims closely to learn their passcodes, then (physically) stole the devices. Armed with the passcodes, they invaded their victims\u2019 personal and financial lives, while also effectively preventing the iPhones\u2019 owners from locating their phones.<\/p><p class=\"bodytext\">Macs face similar problems when connected to public Wi-Fi, as their users can face phishing threats via emails, private messages, and phony websites, among other threat vectors. Lastly, there are numerous pieces of malware <a href=\"https:\/\/www.welivesecurity.com\/2022\/07\/22\/macos-malware-myth-vs-reality-week-security-tony-anscombe\/\" target=\"_blank\" rel=\"noopener\">specifically targeting macOS<\/a>, such as CloudMensis, which was recently discovered by <a href=\"https:\/\/www.welivesecurity.com\/2022\/07\/19\/i-see-what-you-did-there-look-cloudmensis-macos-spyware\/\" target=\"_blank\" rel=\"noopener\">ESET researchers<\/a>.<\/p><\/div><div id=\"content-c10095749\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">How can ESET VPN help?<\/h3><p class=\"bodytext\">In general, using public Wi-Fi <a href=\"https:\/\/www.cyber.gov.au\/protect-yourself\/staying-secure-online\/connecting-to-public-wi-fi\" target=\"_blank\" rel=\"noopener\">is not recommended<\/a> because it is often unsecure. But if you still want to stay connected while in a hotel room or at the airport, connect with a VPN, which establishes a private network connection, making internet users anonymous. After connecting to the ESET VPN application, a user\u2019s device receives a new dynamic IP address, and online traffic is secured and encrypted.<\/p><p class=\"bodytext\">This way, ESET VPN prevents cyber criminals from stealing user data while using public Wi-Fi, and makes it more difficult for third parties to track a user&#8217;s activity online, <a href=\"https:\/\/www.welivesecurity.com\/2022\/06\/23\/virtual-private-networks-5-common-questions-vpns-answered\/\" target=\"_blank\" rel=\"noopener\">while ESET does not keep logs<\/a>.<\/p><p class=\"bodytext\">Moreover, using a VPN service can also bring other advantages. For example, users can enjoy access to their favorite streaming services from different parts of the world without geo-blocking.<\/p><\/div><div id=\"content-c10095750\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Introducing Identity Protection* service<\/h3><p class=\"bodytext\">Since Apple customers can also fall victim to identity theft, ESET introduces its new Identity Protection* (IP) service for iOS and macOS. It monitors the dark web, searching for leaked sensitive information previously entered by a user such as name, phone number, and account credentials.<\/p><p class=\"bodytext\">If a user is the victim of a data breach, they will be notified if the data they previously entered is found somewhere else online.<\/p><p class=\"bodytext\">For US customers, the IP feature also includes Credit Report Monitoring, Smart SSN (Social Security number) Tracker, Social Media Identity Monitoring, Identity Theft Insurance up to $1 mil., and an on-call identity restoration service. Users will also be notified about leaked credit\/debit cards and changes made to credit reports so that they can act against potential misuse of their personal information.<\/p><\/div><div id=\"content-c10095751\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Why having a password manager and 2FA might be useful<\/h3><p class=\"bodytext\">Apple has its own password manager iCloud Keychain that stores and protects your passwords, but there are some known vulnerabilities. For example, iPhone thieves described by the Wall Street Journal can also <a href=\"https:\/\/infosecwriteups.com\/protecting-your-iphone-from-the-rising-shoulder-surfing-phone-theft-scheme-aae9d1d746da\" target=\"_blank\" rel=\"noopener\">bypass Keychain<\/a> using stolen passcodes. Having a separate password manager from a different vendor gives you an extra layer of protection in such situations.<\/p><p class=\"bodytext\"><a href=\"https:\/\/help.eset.com\/password_manager\/3\/en-US\/index.html\" target=\"_blank\" rel=\"noopener\">ESET Password Manager<\/a> not only protects and stores your passwords and personal data, but the built-in password generator also prompts you to create strong, unpredictable passwords that you don\u2019t have to remember.<\/p><p class=\"bodytext\">Login credentials are stored automatically as new accounts are created. ESET Password Manager also includes a form completion feature that saves you time by completing web forms automatically and accurately.<\/p><p class=\"bodytext\">To improve account protection even further, <a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/04\/creating-strong-user-friendly-passwords-tips-business-password-policy\/\" target=\"_blank\" rel=\"noopener\">experts suggest setting up two-factorial authentication (2FA)<\/a>. This creates an additional <a href=\"https:\/\/www.eset.com\/us\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">authentication layer<\/a> in case your password has been breached or stolen.<\/p><\/div><div id=\"content-c10095752\" class=\"csc-frame csc-frame-default\"><h3 class=\"bold\">Easily manage your security on the ESET HOME platform<\/h3><p class=\"bodytext\">Operating a VPN, Identity Protection*, Password Manager, and 2FA might all sound too complex and time-consuming for a regular iPhone user. But in fact, you can easily manage all these features and more from one, easy-to-use platform, ESET HOME.<\/p><p class=\"bodytext\">This complete security management platform and its companion mobile app for Android and iOS offer users a convenient and informative management dashboard with information about their ESET products, devices, licenses, and services, while also making it all accessible anywhere they go, whenever they need it.<\/p><p class=\"bodytext\">ESET HOME also serves as a notification hub that presents connected devices as an ecosystem, where users can always easily check the security status of their connected devices.<\/p><p class=\"bodytext\">Cyber incidents like leaked <a href=\"https:\/\/www.forbes.com\/sites\/briansolomon\/2014\/09\/02\/apple-admits-celebrity-photos-were-stolen-in-targeted-hack\/\" target=\"_blank\" rel=\"noopener\">private photos<\/a> of celebrities, iPhone <a href=\"https:\/\/www.wsj.com\/articles\/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a\" target=\"_blank\" rel=\"noopener\">passcode scams<\/a>, and <a href=\"https:\/\/www.eset.com\/int\/mac-malware-facts\/\" target=\"_blank\" rel=\"noopener\">numerous malwares<\/a> targeting Macs are proof that even iOS and macOS are not impenetrable, and that there is a need for extra layers of protection. Therefore, having features such as VPN and Identity Protection* can be quite handy, especially if they are easy to manage.<\/p><p class=\"bodytext\"><em>*Currently available in US market only, with global roll out planned in H1\/2024<\/em><\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber criminals can use much simpler methods to bypass  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,40,61],"tags":[41,1076],"class_list":["post-74013","post","type-post","status-publish","format-standard","hentry","category-year2023","category-eset","category-press-release","tag-eset","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2\" \/>\n<meta property=\"og:description\" content=\"Cyber criminals can use much simpler methods to bypass [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-11T04:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Your Apple devices are not as secure as you think. Learn how to raise their protection\",\"datePublished\":\"2023-12-11T04:20:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/\"},\"wordCount\":1389,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/7\\\/b\\\/csm_blog3-ios-thumbnail_7c279df07e.png\",\"keywords\":[\"ESET\",\"2023\"],\"articleSection\":[\"2023\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/\",\"name\":\"Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/7\\\/b\\\/csm_blog3-ios-thumbnail_7c279df07e.png\",\"datePublished\":\"2023-12-11T04:20:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/7\\\/b\\\/csm_blog3-ios-thumbnail_7c279df07e.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/7\\\/b\\\/csm_blog3-ios-thumbnail_7c279df07e.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Apple devices are not as secure as you think. Learn how to raise their protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/","og_locale":"zh_HK","og_type":"article","og_title":"Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2","og_description":"Cyber criminals can use much simpler methods to bypass [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/","og_site_name":"Version 2","article_published_time":"2023-12-11T04:20:10+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/12\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Your Apple devices are not as secure as you think. Learn how to raise their protection","datePublished":"2023-12-11T04:20:10+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/12\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/"},"wordCount":1389,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png","keywords":["ESET","2023"],"articleSection":["2023","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/12\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/","url":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/","name":"Your Apple devices are not as secure as you think. Learn how to raise their protection - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png","datePublished":"2023-12-11T04:20:10+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/7\/b\/csm_blog3-ios-thumbnail_7c279df07e.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/consumer\/your-apple-devices-are-not-as-secure-as-you-think-learn-how-to-raise-their-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Your Apple devices are not as secure as you think. Learn how to raise their protection"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jfL","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=74013"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74013\/revisions"}],"predecessor-version":[{"id":74031,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74013\/revisions\/74031"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=74013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=74013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=74013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}