Close Menu
    Latest Category
    • Finance
    • Tech
    • EU Law
    • Energy
    • About
    • Contact
    EUbusiness.com | EU news, business and politicsEUbusiness.com | EU news, business and politics
    Login
    • EU News
    • Focus
    • Guides
    • Press
    • Jobs
    • Events
    • Directory
    EUbusiness.com | EU news, business and politicsEUbusiness.com | EU news, business and politics
    Home » Apple Touts Security In EU Speech, But Tech Remains Vulnerable

    Apple Touts Security In EU Speech, But Tech Remains Vulnerable

    npsnps25 November 2018Updated:3 July 2024
    — Filed under: Focus
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Apple has a difficult relationship with the EU, where the company has been doing battle over illegal tax benefits from the Irish government, and facing challenges in light of the new GDPR standards.

    That’s why it was so surprising when Apple CEO Tim Cook took the stage at the 40th International Conference of Data Protection and Privacy Commissioners as the keynote speaker and attacked what he termed the “data industrial complex.”

    Expressing concern over the ways in which personal data might be used against individuals, Cook noted that “Our own information – from the everyday to the deeply personal – is being weaponized against us with military efficiency.” But how believable are Cook’s comments? As he promotes security, his own company’s technology remains vulnerable, and maybe even acts in intentionally predatory ways regarding personal information mining.

    What Apple Knows

    One of the quickest ways to assess Apple’s relationship to data acquisition and use is through a new tool the company recently released as part of GDPR guidelines; under GDPR, companies needed to improve client security practices. In response, for EU users, Apple launched a data transparency tool allowing clients to see exactly what the company knows about them. This was back in May, and more recently they released an additional, non-required version for US-based customers. But this data reveal can also be disillusioning. It’s a reminder of everything that goes on behind the scenes at major corporations and of the fact Cook’s statements may be disingenuous.

    Growing Vulnerabilities

    In addition to active data collection, Apple’s systems have become increasingly vulnerable to outside security incursions. Particularly as Apple products have started to play host to a variety of browser extensions and apps, Macs have been exposed to viruses more often. And though it’s possible to remove viruses from the Mac system, most users experience at least some data theft or other system damage before they realize there’s a virus present.

    Some of the apps responsible for surreptitiously selecting user data are actually popular programs with a wide distribution, including Adware Doctor, Dr. Unarchiver, and Dr. Cleaner, all distributed by Trend Micro. Using fake system dialogue, the apps fooled users into giving them access to their systems so that they could collect their browser history. The company has since apologized, but who knows how many other companies are collecting data. And what is Tim Cook doing about it? Unfortunately, the answer may be somewhat unsavory.

    Apple’s Own Shortfalls

    Tim Cook may have limited control over the underlying code of App Store offerings, but he certainly oversees Apple’s own products, and recently those items have been less than top performers in terms of security. The company’s recent Mojave OS update was released with several major security flaws, and one of those preyed on the system’s new dark mode. This new mode, which can make the desktop more visually pleasing and easier to read, left the system vulnerable to hackers, who could break into MacOS Install. This is just one of several major vulnerabilities Apple has had to contend with since the launch.

    Tim Cook can put on a sincere face and claim that Apple makes customer privacy a top priority, but until users see evidence of that, it will continue to be a hard sell. As such, the first step is to improve internal security measures. The company needs to lead by example, and then crack down on secondary infractions.

    Add A Comment
    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    nps
    • Website

    Related Content

    Chemical production nature clouds - Image by andreas N from Pixabay

    Commission to halt Omnibus packages as environmental rules reach “optimal simplicity”

    Sponsor: WWF2 April 2026
    BEAK UAV drone made by Origin Robotics - Photo by Gints Ivuskans © European Union 2025

    Brussels boosts support to Ukrainian deep tech innovators

    Zelensky - Kallas- Ukraine - Photo © European Union 2026

    EU to deliver EUR 1.4 bn revenue from frozen Russian assets to be used for support to Ukraine

    House sparrow - Photo by Alexas Fotos on Pexels

    Brussels issues guidance for ‘more balanced’ rules on protecting wild birds

    Bankruptcy - Image by Michael Schüller from Pixabay

    EU Council greenlights common EU rules for insolvency proceedings

    European-made armoured vehicles - Photo © European Union 2025

    Brussels EUR 1.5 bn work programme to boost European and Ukrainian defence industry

    LATEST EU NEWS
    BEAK UAV drone made by Origin Robotics - Photo by Gints Ivuskans © European Union 2025

    Brussels boosts support to Ukrainian deep tech innovators

    2 April 2026
    Zelensky - Kallas- Ukraine - Photo © European Union 2026

    EU to deliver EUR 1.4 bn revenue from frozen Russian assets to be used for support to Ukraine

    2 April 2026
    House sparrow - Photo by Alexas Fotos on Pexels

    Brussels issues guidance for ‘more balanced’ rules on protecting wild birds

    1 April 2026
    Bankruptcy - Image by Michael Schüller from Pixabay

    EU Council greenlights common EU rules for insolvency proceedings

    30 March 2026
    European-made armoured vehicles - Photo © European Union 2025

    Brussels EUR 1.5 bn work programme to boost European and Ukrainian defence industry

    30 March 2026

    Subscribe to EUbusiness Week

    Get the latest EU news

    CONTACT INFO

    • EUbusiness, 117 High Street, Chesham Buckinghamshire, HP5 1DE, United Kingdom
    • +44(0)20 8058 8232
    • service@eubusiness.com

    INFORMATION

    • About Us
    • Advertising
    • Contact Info

    Services

    • Cookie Policy
    • Terms
    • Disclaimer

    SOCIAL MEDIA

    Facebook
    eubusiness.com © EUbusiness Ltd 2026

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}

    Sign In or Register

    Welcome Back!

    Login to your account below.

    Lost password?