How to review App Privacy data on your iPhone, iPad, or Mac

In organizations, Apple’s App Privacy data can start a conversation about privacy-respecting apps as well as help IT leaders stop the use of apps that collect more data than necessary.

Illustration: Andy Wolber/TechRepublic

In late 2020, Apple began requiring every developer to disclose data gathered by an app. Apple includes this developer-reported information in the App Store. The most privacy respecting apps report “Data Not Collected,” since “the developer does not collect any data from this app.” For apps that do gather some sort of data, Apple’s App Privacy policy groups the data into three categories: Data Used To Track You, Data Linked To You, and Data Not Linked To You. Apps not yet updated will simply indicate “No Details Provided” until the developer issues an update to the app. For more details, see: How Apple’s new App Store privacy requirements may affect users and app developers.

What’s Hot at TechRepublic

Apple’s easy-to-review privacy policies give IT administrators an excellent opportunity both to talk about privacy and to take steps to protect data. The following steps guide you through how to review currently installed apps, deliberate concerns and ultimately decide what action to take (if any) for each app.

Read More View More How to review App Privacy data on your iPhone, iPad, or Mac

2021 Ford Escape review: A sensible choice


Antuan Goodwin/Roadshow

There are so many exciting things happening at Ford right now. The rough and tumble Bronco arrives this year, following the launch of the tiny-tough Bronco Sport. There’s now an electric Mustang SUV. Heck, the F-150 is a dang hybrid with an inverter so beefy that it can power an entire house. So where does that leave other products, like the Escape?

Like

  • Strong acceleration from 2.0-liter EcoBoost engine
  • Sync 3 has excellent voice command and smartphone connectivity
  • Top notch driver-assistance and parking tech

Don’t Like

  • Interior feels a touch cheap
  • Odd ergonomics

The 2021 Ford Escape is not a particularly exciting ride, even loaded up in Titanium trim with its most potent EcoBoost turbocharged engine. It’s just a fine and comfortable commuter with broad appeal. Unable to get by on playing to emotions and hype, the humble Escape is faced with, in many ways, a much harder task than its more spectacular stablemates: to sell itself on practicality and value alone.

I suppose you’d get used to it, but finding the Escape’s tucked away Start button was my first challenge.


Antuan Goodwin/Roadshow

EcoBoost with AWD

The first thing I notice about the Escape? The oddly

Read More View More 2021 Ford Escape review: A sensible choice

$2,000 third stimulus check: What happens now to pledges over a bigger payment?

President-elect Joe Biden already had his sights set on a third stimulus check.


Sarah Tew/CNET

Hours before supporters of President Donald Trump forced their way into the US Capitol on Wednesday, Chuck Schumer, the Senate Majority Leader-Designate, pledged to pass a $2,000 third stimulus check through Congress. During the chaos and destruction, which involved members of Congress being evacuated to a secure location for hours, the Senate changed from red to blue, as the results of Georgia’s runoff for two Senate seats were called in favor of the Democratic candidates.

“One of the first things that I want to do when our new Senators are seated is deliver the $2,000 checks to the American families,” Schumer said Wednesday from the Senate floor.

“Their election will put an end to the block in Washington on that $2,000 stimulus check. That money will go out the door immediately to people in real trouble,” President-elect Joe Biden said Monday while campaigning in Georgia for Rev. Raphael Warnock and Jon Ossoff, who both won their seats against Republican incumbents.

Scant hours after the declarations were made, the nation’s focus swung to the dramatic events on Capitol Hill and then to calls of

Read More View More $2,000 third stimulus check: What happens now to pledges over a bigger payment?

Homebrew: How to install exploit tools on macOS

We’ll guide you through the process of using Homebrew package manager to install security tools on macOS to exploit vulnerabilities found in your Apple equipment.

Image: Homebrew

In this follow-up to the installing security tools on macOS via Homebrew series, we’ll be looking at various applications that can be used to exploit any vulnerabilities that have been found after performing an assessment using scanning tools to determine what—if any—issues exist. 

While some pentesters find this to be the fun part of the project, exploiting the vulnerabilities found to see how the devices respond and react to attacks, it’s important to not let the fun factor associated with this part of the campaign to overtake the true purpose of this phase: To verify the information retrieved during the assessment phase is accurate.

SEE: Cybersecurity: Let’s get tactical (free PDF) (TechRepublic)

This is another step along the path to completing a successful penetration testing engagement. Otherwise, it will be incorrect, and likely your supervisors and clients will be none too happy with you for providing misinformation; and potentially making their IT department go on a wild goose chase to correct issues that were never there to begin with.

Taking the identified

Read More View More Homebrew: How to install exploit tools on macOS

Homebrew: How to install vulnerability tools on macOS

We’ll guide you through the process of using Homebrew package manager to install security tools on macOS to assess vulnerabilities and the security posture of the devices on your network.

Illustration: Lisa Hornung, Getty Images/iStockPhoto

When attempting to determine the security posture of the devices on your organization’s network, performing security assessments is the next logical step.This type of assessment serves to suss out any deficiencies that exist within the client systems compared with the current known baseline of patches for the operating system and the applications installed therein.

SEE: iPhone 12 event: What Apple announced at its 2020 Hi Speed event (free PDF) (TechRepublic)

After performing reconnaissance to find out the number of devices to scan and determine the type of devices, their OSes, and the apps and services installed on them, a proper plan to carry out the vulnerability assessment may be created. 

In order to carry out the assessment, it is important to identify which tools will be necessary. Some tools may be used to obtain vulnerability information from generic devices, while other tools are suited only to identify specific vulnerabilities related to certain types of applications and services, such as web servers, for example. The tools

Read More View More Homebrew: How to install vulnerability tools on macOS