Skip to main content

Security

See All Stories

Security Bite: macOS 15.4 hits “Allow” on TCC event support

9to5Mac security bite cybersecurity Apple

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


For years, macOS security developers and researchers have urged Apple to add TCC events to the Endpoint Security (ES) framework. Doing so would allow them to directly trace a TCC request to the specific application (or malware) that triggered it. This could allow third-party security tools to offer real-time protection around permission requests.

The good news? Apple is finally making this happen in macOS 15.4.

The bad news? It’s rough around the edges right now.

Expand Expanding Close

Security Bite: Has Apple’s Passwords app replaced your password manager yet?

Apple Passwords app iOS 18 macOS seqouia

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


For years, Apple offered its built-in Keychain password management tool tucked away in the Settings app, allowing users to automatically generate and save passwords—but quickly managing specific logins could often feel tedious. With iOS 18, iPadOS 18, and macOS Sequoia, Apple introduced the standalone Passwords app in an effort to make credential management more convenient. Still, many are skeptical about whether the new app has enough features to compete with paid password managers—or if that’s even Apple’s goal.

Expand Expanding Close

Smarter Siri delay could be caused by major security concerns, suggests developer

Smarter Siri delay could be caused by major security concerns, suggests developer | Siri logo on iPhone screen

The long wait for a smarter Siri is to get even longer, with some indications that the new features we were originally expecting in iOS 18.4 may now be pushed back to iOS 19.

Apple hasn’t provided any real explanation, but two theories have so far been put forward, and now a developer and data analyst has suggested that security concerns may be a third reason – and by far the biggest problem …

Expand Expanding Close

Security Bite: Stop typing your sudo password, use Touch ID instead

macos sudo terminal touch id

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.

One of the greatest benefits of Touch ID on Mac is rarely having to type your password when making purchases, signing into apps, and, of course, unlocking the device. It might be ancient technology to the iPhone at this point, but it continues to be a default luxury on Mac. If you frequent Terminal, you’ll be glad to know you can also authenticate as administrator with Touch ID for all the sudo goodness with one tap.

Expand Expanding Close

Exploit lets hackers silently track any Bluetooth device with Apple’s Find My network

Find My app

Apple’s Find My network lets users easily track their devices and accessories such as AirTag. However, despite having anti-stalking features, researchers at George Mason University recently discovered an exploit that lets hackers silently track any Bluetooth device through Apple’s network. The vulnerability isn’t in Apple products, but rather Linux, Android, and Windows systems…

Expand Expanding Close

Apple currently only able to detect Pegasus spyware in half of infected iPhones

Apple currently only able to detect Pegasus spyware in half of infected iPhones | Close-up of man looking through a spy-hole in a wall

NSO’s Pegasus spyware is one of the most frightening privacy threats an iPhone owner can face. Without you taking any action at all, it’s able to completely take over your phone, accessing almost all of the personal data stored on it, and some versions have been able to activate cameras and microphones.

Pegasus exploits zero-day vulnerabilities – security holes Apple doesn’t yet know about – but the iPhone maker has another way to fight back …

Expand Expanding Close

Security Bite: A dangerous place to be an iPhone

9to5Mac security bite cybersecurity Apple

Imagine you’re on your way to dinner, walking down a decently busy street during the day. You’re using your new iPhone 16 Pro for directions before, out of nowhere, a masked individual on an e-bike whips around to your side and snatches your Desert Titanium baby and zooms off. All in seconds. This sounds like a one-off insane situation, but this is precisely what happened to Dimitar Stanimiroff last week in London, England. And he’s not alone…

The most recent statistics say a phone is stolen on average every 6 minutes in London, or about 64,000 annually. It’s so common that the City of London Police deployed special task forces to snuff out these gangs and even had to publish a blog post explaining how to protect your mobile device in public.

Over the years, Apple has made impressive strides in implementing anti-theft measures like Activation Lock and inadvertent “parts pairing” rules. These features and others are meant to deter thieves and minimize situations like Stanimiroff’s. Is it enough?


9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Expand Expanding Close

Apps sold location data for US military and intelligence personnel serving overseas [U]

Apps sold location data for US military and intelligence personnel serving overseas | Soldiers boarding a military transport plane

It was discovered last year that location data for US military and intelligence personnel serving overseas was being sold by a Florida-based data broker, but the source of that sensitive data was unclear at the time.

It’s now been claimed that the data was captured by a variety of mobile apps with revenue-sharing agreements with a Lithuanian ad-tech company, and then resold by an American company …

Expand Expanding Close

Android users who want TikTok would be best advised to copy iPhone users

Android users who want TikTok would be best advised to copy iPhone users | Screengrab of option to save a website to the Home Screen

Neither Apple nor Google have returned TikTok to their respective app stores, and with very good reason: the supposed get-out-of-jail-free card offered by Trump is nothing of the sort. Both companies would be left exposed to hundreds of billions of dollars of liability.

As of the weekend, Android users who want to download TikTok do have another option – but it’s not one I’d advise them to take. Instead, they’d be better off using the workaround available to iPhone users …

Expand Expanding Close

Multiple security flaws found in DeepSeek iOS app, including sending unencrypted data

Multiple security flaws have been found in the DeepSeek iOS app, which is still one of the most popular downloads in the App Store after topping the charts when it first launched.

The latest findings are far worse than the previous security failure which exposed chat history and other sensitive information in a database requiring no authentication …

Expand Expanding Close

British government secretly ordered Apple to create a worldwide iCloud backdoor

British government secretly ordered Apple to create a worldwide iCloud backdoor | Photo shows partly-open door with a red room beyond it

It’s being reported that the British government secretly ordered Apple to create a security backdoor into all content uploaded by iCloud users anywhere in the world.

Apple is certain to refuse the demand, leading to the possibility of a similar privacy stand-off to the one seen between the iPhone maker and the FBI back in the San Bernardino shooter case

Expand Expanding Close

iPhone apps found on App Store with malware that reads your screenshots for key data

iPhone

One of the promises of the App Store is that anything you download has gone through a vetting process by Apple. Occasionally though, iPhone apps with malicious code slip through the cracks, and today, researchers at Kaspersky have reported on new malware they discovered in App Store apps—which they say is ‘the first known case.’

Expand Expanding Close

Mac malware after your passwords and credit cards will get much worse this year

So-called macOS Stealers – malware that seeks to extract personal data like passwords and credit card numbers from your machine – is expected to be significantly more prevalent this year.

A new annual report on the state of malware says that Mac owners could be at almost as much risk as Windows PC users this year …

Expand Expanding Close

Grubhub security breach exposed customer and driver data, says company

Grubhub security breach exposed customer and driver data | A food delivery rider on a scooter

A Grubhub security breach has exposed personal data for both customers and drivers, says the company, after an “incident” involving a third-party contractor.

The company has not revealed the exact scale of the security fail, but has admitted that the personal data includes names, email addresses, phone numbers, and partial credit card numbers …

Expand Expanding Close

Meta says its future AI models could have ‘catastrophic outcomes’

Meta plans to block 'catastrophic' AI models – but admits it may not be able to | Render of robot in wasteland

A Meta policy document describes the company’s fears that it could accidentally develop an AI model which would lead to “catastrophic outcomes.” It describes its plans to prevent the release of such models, but admits that it may not be able to do so.

Among the capabilities the company most fears are an AI system that could break through the security of even the best-protected corporate or government computer network without human assistance …

Expand Expanding Close

Security Bite: Top macOS threat found riding the DeepSeek wave

9to5Mac security bite cybersecurity Apple

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Tired of hearing about DeepSeek yet? The China-based LLM chatbot beached itself onto the scene this week, dominating the tech news cycle and even taking #1 on the App Store, where it still sits as of writing. However, its rapid popularity has led to a wave of new phishing campaigns, investment scams, and macOS malware disguised as real DeepSeek applications. Here’s the latest.

You’re reading 9to5Mac Security Bite, where each week, I share insights on data privacy, discuss the latest vulnerabilities, and shed light on emerging threats within Apple’s vast ecosystem of over 2 billion active devices.

Expand Expanding Close

SLAP and FLOP security flaws affect all current Apple devices, and many older ones

SLAP and FLOP security flaws affect all current Apple devices | M-series chip shown

Security researchers have discovered two flaws present in all current iPhones, iPads, and Macs – as well as many earlier ones. The vulnerabilities, known as SLAP and FLOP, could potentially allow an attacker to see the current contents of your open web tabs.

The flaws were introduced in the A15 and M2 chips, and are also found in subsequent ones, up to and including the latest version of each device …

Expand Expanding Close

Judge limits FBI powers to trawl data from Apple and others; Cloudflare privacy flaw

Judge limits FBI powers to use data from Apple and others | FBI command post shown

A judge has limited FBI powers to trawl through data obtained from tech giants like Apple, Google, and ISPs under FISA (the Foreign Intelligence Surveillance Act).

Separately, a Cloudflare privacy flaw has been identified in one of Apple’s IT service providers, which could have exposed the rough location of millions of web and app users before it was fixed …

Expand Expanding Close