• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
a breakdown of ios 16's security features

A breakdown of iOS 16’s security features

You are here: Home / General Cyber Security News / A breakdown of iOS 16’s security features
September 12, 2022

With its iPhone 14 start out the way, Apple has begun releasing iOS 16 which will arrive with a host of new characteristics and layouts for suitable products. 

The subsequent variation of its smartphone running method was unveiled at its developer conference in June and it presented end users a glimpse at a number of new security controls and privacy characteristics. Most of these will be of some interest to enterprises, particularly their distant staff, even though not all of the abilities will be offered straight away. 

All eligible gadgets will be in a position to obtain iOS16 straight away, while buyers will have to have an iPhone 8 design or newer (iPhone SE also provided). To get started, buyers need to have to open up the settings app, navigate to ‘General’, then ‘Software Update’ and faucet set up. The unit will reboot alone. 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


iOS 16: passkeys, Lockdown mode, decoupled updates and message recall

Electronic keys can now be applied on iPhones to authenticate a user’s facial area or fingerprint when they signal into internet sites, apps and other companies. This will swap regular passwords and will also operate on other non-Apple solutions, which include when logging into a good Tv. End users will however need to scan a QR code to url, but the iPhone will then use passkeys to affirm with either finger or facial recognition. What is extra, the passkeys will be synced with iCloud Keychain and end users can recover them if they are misplaced or their handset is damaged. 

A new Lockdown mode is also readily available for users. This is potentially a expert services in that not all end users will need to have it as it is for individuals that could possibly have purpose to believe that they are the focus on of point out-sponsored spyware, this kind of as Pegasus or Predator. It adds many limitations and even blocks selected sorts of info transfer. For case in point, most important types of attachments will be blocked, like features like connection preview. If a FaceTime ask for arrives in from a call that the person has no past history with, the ask for will routinely be denied. It is a stringent established of protocols, but also really worth pointing out that it will restrict what you can do with your iPhone. 
Also coming with iOS 16, iPhones will obtain quicker security updates as Apple has decoupled them from entire iOS updates. This permits the tech company to launch bug fixes and patches more rapidly and have them instantly put in on iPhones. 

There are bigger modifying controls for the two iMessages and Mail that allow for buyers to tweak and even remember messages after they have been despatched. For iMessages, there is a 15-minute window to remember and alter, however Mail messages require to be recalled before it reaches the receiver (around about 10 seconds). The Mail application will also use machine learning-primarily based pop-up warnings if a consumer forgets to connect some thing to an email or misses the user’s handle.


Some components of this short article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Over Three-Quarters of Retailers Hit by Ransomware in 2021
Next Post: Why Vulnerability Scanning is Critical for SOC 2 why vulnerability scanning is critical for soc 2»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands
  • N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks
  • Ransomware-as-a-Service: The Growing Threat You Can’t Ignore
  • Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
  • WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
  • Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme
  • Microsoft Warns of COLDRIVER’s Evolving Evading and Credential-Stealing Tactics
  • New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
  • Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’
  • Building a Robust Threat Intelligence with Wazuh

Copyright © TheCyberSecurity.News, All Rights Reserved.