How 'GoFetch' Cyber Attacks Can Be A Problem for Macs

How 'GoFetch' Cyber Attacks Can Be A Problem for Macs

You purchased an iMac, Macbook, or Mac Mini because you thought Apple computers were immune from cyber attacks. Unfortunately, experts from various American universities have uncovered a new vulnerability in Apple M-series processors that can allow criminals to remotely access your sensitive files, but also can allow them to remove data encryption you may have installed on your Mac to protect it. This vulnerability has been dubbed 'GoFetch' and it takes advantage of the processes Apple's M-series processors use to fetch data that make these processors run faster. Read more to find out more about this dangerous breach.


Hardware and software manufacturers frequently reach out to the tech community to ask them to find vulnerabilities within their products. When these vulnerabilities are found, security updates are issued to protect your devices from a cyber attack. Most security flaws are software-based, which are easy to patch. The 'Go Fetch' flaw is hardware-based, which means Apple can't patch it with a simple software update. GoFetch has been described as unpatchable for the M1 and M2 but not the M3.?


What Should You Do If You Own a Mac?

Apple released the M1 processor in 2020 and the M2 processor in 2022. If you own a Mac with an M1 or M2 processor, there is not much you can do other than practice safe computing habits. That means regularly updating your operating system and software and only installing software from reputable sources to prevent malware infections. Also, keep in mind that the 'Go Fetch' exploit doesn't require physical access to the computer which means criminals can send malicious code to your computer via, email links, website links and via tech support scams that allow them access to your computer.


Hopefully, this will help you keep an eye out for 'Go Fetch' If you have any questions, please reach out. I'm always available.


Looking for More Useful Tech Tips?

Our Tuesday Tech Tips Blog is released every Tuesday. If you like video tips, we LIVE STREAM new episodes of 'Computer and Tech Tips for Non-Tech People' every Wednesday at 6:00 pm CST on Facebook, Instagram, LinkedIn, and X. Technology product reviews are posted every Thursday. You can view previous episodes on our YouTube channel.


Click this link to sign up and subscribe and you will receive every tip directly in your inbox each week.


Want to ask me a tech question? Send it to [email protected]. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone.?


Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829.?


Please share this with your friends and family! If you found this post useful, would you mind helping me out by sharing it? Just click one of the handy social media sharing buttons below.


The above content is provided for information purposes only. All information included therein is subject to change without notice. I am not responsible for any direct or indirect damages, arising from or related to the use of or reliance on the above content.



要查看或添加评论,请登录

Burton Kelso, The Technology Expert的更多文章

  • How to Organize Your Messy Computer Cables

    How to Organize Your Messy Computer Cables

    As an IT Professional and Cyber Security expert, I don't mind computer cables. For me on some days, chaos is comfort…

    1 条评论
  • How to Store Your Smartphone Photos in the Cloud For Free

    How to Store Your Smartphone Photos in the Cloud For Free

    If you're like me, you struggle with taking too many pictures with your smartphone. Why shouldn't you? Modern…

    1 条评论
  • How To Avoid AI-Powered Hacking Attacks

    How To Avoid AI-Powered Hacking Attacks

    Artificial intelligence has dramatically changed how we run our businesses and our lives but there is a dark side to…

  • How To Use DeepSeek AI (But Should You?)

    How To Use DeepSeek AI (But Should You?)

    The world of AI is constantly changing and there's a new player on the scene. DeepSeek R1 is the latest generative AI…

  • How to Avoid Zombie College Scams

    How to Avoid Zombie College Scams

    Did you know over 12,000 colleges have closed since 2004? You might not have noticed this, but cyber crooks have and…

  • How to Thrive and Survive After The TikTok Ban

    How to Thrive and Survive After The TikTok Ban

    It looks like the TikTok Apocalypse was upon us, but it's back! We aren't out of the woods yet. TikTok has yet to find…

  • How To Encrypt Your Text Messages and Phone Calls

    How To Encrypt Your Text Messages and Phone Calls

    The FBI has recently issued a warning that state-sponsored Chinese hackers had infiltrated the U.S.

    1 条评论
  • The Top Tech Resolutions You Need To Make in 2025

    The Top Tech Resolutions You Need To Make in 2025

    Happy New Year! The New Year is here, and turning the calendar to 2025 provides the perfect opportunity to reflect on…

  • How To Find The Best Free Streaming Services

    How To Find The Best Free Streaming Services

    Remember when cutting the cord and getting rid of cable was supposed to save you money? Unfortunately, the price of…

    1 条评论
  • How To Find The Best Free Streaming Services

    How To Find The Best Free Streaming Services

    Remember when cutting the cord and getting rid of cable was supposed to save you money? Unfortunately, the price of…

    1 条评论

社区洞察

其他会员也浏览了