Apple Computers also affected by Security Flaw Exposes This Emails, personal information - Blog Life Dady

Apple Computers also affected by Security Flaw Exposes This Emails, personal information

Share:
Apple Computers also affected by Security Flaw Exposes This Emails, personal information -

The vulnerability makes them vulnerable to Apple users to identity theft on iPads, iPods iPhones and also affects Apple computers, as reported by Forbes. The flaw, called "gotofail," allows anyone to access the device user by connecting through an insecure network, such as Wi-Fi, and read or edit the information that the user enters on a website, even if it is encrypted. This means that you may be logging into your online bank account and the hacker could see both your username and password.

What should I do to protect myself?

Since this vulnerability exposes your personal information and e-mails to everyone who knows how to access it, you must take immediate action. Follow the steps below to ensure the security of your personal information and device.

1. Update your device ASAP

Although the company based in Silicon Valley has released a patch for iOS system Friday, he has published updated OS X Tuesday. The update for iOS users is called iOS 7.0.6 for iPhone 4 and later, the 5th generation iPod touch and the iPad 2 and later (or iOS 6.1.6 for iPhone 3GS and iPod touch 4th generation) and OS X update is called OS X 10.9 Mavericks . Note that the security flaw does not affect any iOS before iOS 6 or any other OS X OS X before 10.9.

How can I download updates?

To download the update for iOS, simply click on the Settings menu, then select "General" and "Updating the software." There you will see the update, unless your device is already updated. It is important to note that you must be connected to Wi-Fi to supplement updating iOS.

To download the update to OS X, click the Apple menu - or the Apple logo in the top left of your screen - then select This brings you to the latest software update to Apple Store "update software.".

2. Do not access personal information on unsecured networks

The update from Apple for both iOS and OS X systems protect you from falling victim to this kind of crime, but it is always important to remember that it is better if you opt not to connect to or access personal information using an unsecured network. Identity thieves have a reputation to create their own Wi-Fi spots or hot and creating fake Web sites to collect personal information from potential victims. So even if you think you are connected to your Citi bank account, you are to enter all your information into a fake site designed to look like the real site. It is best to ask the company or a company if they have free Wi-Fi and the title of the Wi-Fi connection before you connect automatically to one and start Internet access. If you are not sure of the legitimacy of a Wi-Fi hotspot or, choose to use your data instead because pay a little more on your monthly phone bill (for those with limited data) is a better idea than giving access identity thief to all your information.

3. Keep personal information on emails

Sending personal information to your relative or roommate email may seem like the best way to communicate, but it is essential to remember that this form of communication are not always secure. The reality is that email can be hacked so it is better to use other forms of communication to share personal information. A good rule to follow is that if you do not want a stranger to see what you wrote in the e-mail, then you should not send it. Instead a better form of communication for sensitive information is verbal communication. Appointment with the person and tell them the information to make sure they are the only ones who receive them. Be sure to share information quietly if you are surrounded by other people. Another way to share information, if you prefer not to speak, is to write it on a piece of paper and put the document to the person so they can pick. Once they are done with the paper, you should ask back and shred or destroy as soon as possible.

4. Take further measures to protect you

These additional steps can be something as simple as shredding junk mail with a cross-cut shredder to sign for a protection service against the identity theft. It is important to always be aware that your information and do not be afraid to ask why they need it and how they store. Also, remember to set stricter privacy settings for all your social media accounts. Learn more about how to set these parameters as well as how social impacts of media identity theft.

If you want extra help to protect you, you should consider signing up for a service protection against identity theft. These services are actively monitoring all your personal information - such as your Social Security number, date of birth, address and the name - on the black market of the Internet and public records to make sure it is not sold , exchanged or used by identity thieves. If any of your information is on the Internet black market or public folders, you will be alerted and provided with steps you should take to protect yourself. In addition to protecting your identity, some of these services also monitor the activity of all three of your credit reports - Experian, TransUnion and Equifax - to ensure that no one is fraudulently opened any sort of credit in your name. If there is no change on your credit reports, you will be alerted immediately and provided with steps you should take to protect yourself. Most of these services offer some kind of free trial that allows you to test it before making any financial commitment. Visit our identity notice of protection against theft to see which service will best suit your needs.