USB-C devices will need to request permission before sending data to macOS Ventura | TechBuzz

- Advertisement -

macOS Ventura will ask the user for permission before recovering data from a USB device, a welcome extra protection against malicious code.

If USB devices are extremely practical, especially USB keys because they allow files to be transported very easily, they can also represent a great security risk for our machines. Indeed, these devices are often “mounted” automatically on the operating systems and scripts can be executed automatically on the machines. This can have terrible consequences for your data and your machine itself. Apple has found a parade with macOS Ventura.

macOS Ventura will ask the user for permission before recovering data from a USB device

macOS Ventura will be a little more reassuring if you’re worried that compromised devices might damage your computer. As The Verge reports, the Cupertino company explains that macOS Ventura will ask the user for permission before USB-C and Thunderbolt accessories can transfer any data on Macs with an Apple Silicon M1 or M2 chip. You will no longer have to fear that malware will arrive on your machine simply by plugging in a USB key or that a poorly designed product will cause damage to your device and send bad information.

A welcome additional protection against malicious code

- Advertisement -

This procedure will be enabled by default, but it will not apply to accessories plugged into your Mac during the OS update. Additionally, this protection will not affect external monitors, power adapters, or products attached to already approved hubs. Devices will also continue to charge even if they’re blocked, so you can still use your computer to charge a friend’s phone, for example.

READ  Linkypage is an essential social media management tool | TechBuzz

This device will not prevent a device from burning out the USB port via an electrical impulse, but it does add an additional layer of security that is very valuable for all those who use USB devices regularly. The user will have the final say on access to support data and this could help avoid ending up with malicious code on their machine.

Source link

- Advertisement -
I am admin of blog & I provide tech-related news. As a part of my hobby, I make content related to technology and gadgets reviews too. I love to be a content creator apart from it, I am a full-time employee in an MNC company and manage blogs systematically. You can mail me at [email protected]

More from author

Related posts


Latest posts

Apple Watch 8 in comparison: This picture shows how big the smartwatch really is | TechBuzz

The Apple Watch 8 will not be available in two sizes as usual, but in three. Added to this is a new XL...

Asus ROG Phone 6 (Pro) introduced: Gamers will love this phone | TechBuzz

The new Asus ROG Phone 6 in white and black finish. (Image source: Asus) Asus has presented a new smartphone from the ROG series that...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!