CONFERENCE NOW LIVE: Threat Detection & Incident Response (TDIR) Summit - Join the Event In-Progress
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Apple Platform Security Guide Updated With Details on Authentication Features

Apple Platform Security Guide updated

Apple this week updated its Platform Security Guide to provide more details on a couple of recently announced authentication features.

Apple Platform Security Guide updated

Apple this week updated its Platform Security Guide to provide more details on a couple of recently announced authentication features.

Apple’s Platform Security Guide contains detailed technical information on the security technologies and features implemented in its products. The first guide was released in 2015, but it only covered the iOS operating system. In its current form, the guide also provides information on macOS and hardware.

The May 2021 update to the Platform Security Guide focuses on two topics: Touch ID on the iMac’s Magic Keyboard, and the iPhone unlock with Apple Watch feature in iOS 14.5. Both these authentication features were announced by Apple in April.

In the case of Touch ID on the Magic Keyboard, the security guide update specifies how the secure channel is established between the Magic Keyboard with Touch ID and the Secure Enclave in iMac with M1 chips.

As for the iPhone unlock with Apple Watch feature in iOS 14.5, the guide provides more details on the cryptography behind the feature, as well as more information on the security parameters that govern its use.

In February, Apple announced the biggest update ever to its Platform Security Guide — the company added nearly 50 pages to the document compared to the previous version.

Related: Apple Patches Under-Attack iOS Zero-Day

Related: Apple Patches Security Bypass Vulnerability Impacting Macs With M1 Chip

Advertisement. Scroll to continue reading.

Related: Researchers Abuse Apple’s Find My Network for Data Upload

Related: Apple Patches macOS Security Bypass Vulnerability Exploited by ‘Shlayer’ Malware

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.