SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: Hackers lean into social engineering to attack Apple security — Jamf – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > Hackers lean into social engineering to attack Apple security — Jamf – Computerworld
Software

Hackers lean into social engineering to attack Apple security — Jamf – Computerworld

News Room
Last updated: June 18, 2025 7:23 pm
News Room
Share
2 Min Read
SHARE

This has become such a pervasive problem that Apple in 2024 actually published a support document explaining what you should look for to avoid social engineering attacks. Attackers are increasingly creative, pose as trusted entities, and will use a combination of personal information and AI to create convincing attacks. They recognize, after all, that it is not the attack you spot that gets you, it’s the one you miss.

Within this environment, it is important to note that 25% of organizations have been affected by a social engineering attack — even as 55% of mobile devices used at work run a vulnerable operating system and 32% of organizations still have at least one device with critical vulnerabilities in use across their stack. (The latter is a slight improvement on last year, but not much.)

The nature of what attackers want also seems to be changing. Jamf noticed that attempts to steal information are surging, accounting for 28% of all Mac malware, which suggests some degree of the surveillance taking place. These info-stealing attacks are replacing trojans as the biggest threat to Mac security. The environment is similar on iPhones and iPads, all of which are seeing a similar spike in exploit attempts, zero-day attacks, and convincing social-engineering-driven moves to weaponize digital trust.

Read the full article here

You Might Also Like

Controversial US budget bill is now law; here’s what it means for tech – Computerworld

Welcome to the new world of risk: Microsoft cuts off services to energy company without notice

The essential office apps for Android – Computerworld

The dark side of AI monetization

Kandji helps secure Apple enterprise with Vulnerability Response – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Today’s Wordle clues, hints and answer for August 18 (#1521)

August 18, 2025
Games

The deeply simulated roguelike strangeness of Caves of Qud won this year’s Hugo Award for Best Game or Interactive Work

August 18, 2025
Games

My favorite new desktop buddy on Steam is a cat that goes fishing

August 18, 2025
Games

Sketch crew Aunty Donna’s latest improv piece turned their set into a giant side-scrolling videogame and it’s great

August 18, 2025
Games

There’s already a rollback mod so you can once again kill the bosses in Wuchang: Fallen Feathers who were rendered unkillable in a patch

August 18, 2025
News

‘Game of Thrones’ creator and other science fiction writers trace twists and turns at Seattle Worldcon

August 17, 2025

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?