惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

酷 壳 – CoolShell
酷 壳 – CoolShell
H
Hacker News: Front Page
P
Palo Alto Networks Blog
T
ThreatConnect
Apple Machine Learning Research
Apple Machine Learning Research
博客园_首页
T
True Tiger Recordings
P
Privacy & Cybersecurity Law Blog
B
Blog
IT之家
IT之家
Last Week in AI
Last Week in AI
F
Full Disclosure
Hacker News: Ask HN
Hacker News: Ask HN
C
Comments on: Blog
Microsoft Azure Blog
Microsoft Azure Blog
C
Cybersecurity and Infrastructure Security Agency CISA
Microsoft Security Blog
Microsoft Security Blog
博客园 - 【当耐特】
N
News and Events Feed by Topic
NISL@THU
NISL@THU
腾讯CDC
雷峰网
雷峰网
Security Latest
Security Latest
李成银的技术随笔
M
Microsoft Research Blog - Microsoft Research
L
LangChain Blog
L
Lohrmann on Cybersecurity
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
C
Check Point Blog
Y
Y Combinator Blog
Recent Announcements
Recent Announcements
博客园 - Franky
N
News | PayPal Newsroom
V
V2EX
A
About on SuperTechFans
The Register - Security
The Register - Security
月光博客
月光博客
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Google Online Security Blog
Google Online Security Blog
MyScale Blog
MyScale Blog
Cisco Talos Blog
Cisco Talos Blog
Vercel News
Vercel News
WordPress大学
WordPress大学
C
Cyber Attacks, Cyber Crime and Cyber Security
The Hacker News
The Hacker News
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
爱范儿
爱范儿
A
Arctic Wolf
L
LINUX DO - 最新话题
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises – Computerworld

Google focuses on autonomous AI agents in Gemini 3.5 Flash Beth Tschida takes over at Jamf as AI transforms Apple in the enterprise Google talks ‘singularity’ while scaling up agentic AI for enterprises Copilot Chat: Your hub for document creation and analysis 10 Android Circle to Search superpowers you probably never noticed EnterpriseClaw wants to bring governance to the OpenClaw era The Big Four accounting firms are now hiring more AI specialists than accountants Arxiv: Researchers who submit AI-generated junk could get 1-year suspension Coming Bright Up: Apple's AI moment looms How Apple turned circular manufacturing into a competitive edge Why ‘open AI’ models are gaining ground on LLMs Microsoft May security patch fails for some due to boot partition size glitch Microsoft to retire ‘Together Mode,’ its virtual meeting space for Teams 5 ways to curb AI sprawl without stifling innovation For May, Patch Tuesday means 139 updates — but no zero-days Here’s one career emerging from the AI shift: ‘forward-deployed engineers’ Why Apple needs Intel — and America needs them both Microsoft business software faces UK antitrust probe over bundling, AI lock-in The trouble with emotion-reading AI Apple’s App Store model for AI How Southwest Airlines is putting endpoint operations on autopilot Nearly every enterprise is investing in AI, but only 5% say their data is ready Jobs lost to AI could reappear elsewhere — and solidify AI-focused roles Cyberattack: First they come for Foxconn, then they come for you Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs 8 critical questions about the Googlebook, Android, and ChromeOS Who’s the winner in the new Microsoft-OpenAI deal? AI is ready to take over Python programming, but not much else WWDC: From NeXTStep for Apple to Apple’s next step for AI OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos Arm’s software chief sees human language as the new way to program IMF warns of the potential for AI attacks on global financial systems The European Commission eyes rules to restrict US cloud services No hire, no fire: Employers get picky on tech skills amid AI disruption Apple vs. social engineering: Terminal paste trap blocked AI clones: the good, the bad, and the ugly LinkedIn illegally blocking free accounts from seeing 'who's viewed your profile' data, group alleges EU lawmakers strike provisional deal to soften AI Act WWDC 2026: How Apple can take a great leap in AI US government agency to safety test frontier AI models before release Chrome's AI features can take up to 4GB of space on your computer ServiceNow continues its AI transformation with an integrated experience Apple Intelligence hype cost the company $250M Give yourself an on-demand Android taskbar Edge browser leaves passwords exposed in plain text, says researcher Ask Jeeves bites the dust Apple can't make chips fast enough, but that's only part of the story AI-led job cuts don’t always mean stronger ROI — Gartner Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs Microsoft, Google push AI agent governance into enterprise IT mainstream Microsoft now has more than 20M paying Copilot users AI is more accurate than doctors in emergency diagnoses — study Start small, but start now: How to bring AI into your small business Apple is preparing to spend, but not necessarily on AI 10 quick productivity tips for Microsoft 365 mobile apps Relying on LLMs is nearly impossible when AI vendors keep changing things AI agents can bypass guardrails and put credentials at risk, Okta study finds Windows shell spoofing vulnerability puts sensitive data at risk Apple breaks records, admits it can’t make Macs fast enough Spotlight report: Transforming software development with AI - Whitepaper Repository - 25 great uses for an old Android device AI chatbots need ‘deception mode’ Are we ready to give AI agents the keys to the cloud? Cloudflare thinks so Friendlier chatbots can be less reliable, study says Gartner sees untamed growth in agentic AI Apple reportedly abandons Vision Pro AI venture funding to shoot up this year as bubble looms Scaling up a tech startup in Europe is hard — 'EU Inc.' aims to help Apple will be behind on AI — until it isn’t EU lawmakers fail to agree on watered-down AI Act, talks pushed to May Android reminders, reinvented Who’s the better CEO, Apple’s Tim Cook or Microsoft’s Satya Nadella? AWS unveils trio of key AI strategy announcements SAS makes AI governance the centerpiece of its agent strategy Can Apple’s new CEO turn things around? Enterprises need to think beyond GPUs for agentic AI, analysts say Fleet hopes to be the MDM provider for the AI Era Xiaomi releases MIT‑licensed MiMo models for long‑running AI agents Why simplicity is the silent driver of hybrid workplace success Why security matters in the meeting room Can everyday IT decisions turn sustainability from intent into impact? Why the meeting room has become the true test of hybrid work Why smart meeting rooms are becoming strategic IT assets How collaboration technology defines the next phase of hybrid work Microsoft, OpenAI change contract terms–again OpenAI plans its own ‘iPhone killer’ Your AI strategy is all wrong Meta's compute grab continues with agreement to deploy tens of millions of AWS Graviton cores Germany's sovereign AI hope changes hands Agent Mode is now available in Microsoft Word, Excel, and PowerPoint CISA last in line for access to Anthropic Mythos Former OpenAI research scientist launches new AI model for Tencent Adobe bets on AI agents to stay at the center of marketing workflows Microsoft to offer voluntary retirement buyouts to about 7% of the US workforce Google Keep cheat sheet: How to get started The AI workplace paradox: Higher productivity, higher anxiety The agentic AI frenzy increases as more vendors stake their claims Gartner: Global IT spending to grow by 13.5% this year Apple may be the only laptop vendor to grow in 2026 Tim Cook’s legacy: a successful CEO who stumbled over AI
Apple needs to fix admin authentication in ABM
2026-05-11 · via Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises – Computerworld

Jonny Evans

opinion

May 11, 20265 mins

Apple’s platforms are secure by design, but when it comes to authentication, the company seems to be protecting employees more than it protects IT admins. It’s an attack vector just waiting to be exploited — if it hasn’t been already.

As noted first by Six Colors, the problem is that administrator and People Manager accounts on Apple Business Manager (ABM) can’t sign in using federated authentication, even though they manage the federation process for everyone else. 

What are the implications?

What this means in practice is that when admins engage with the authentication process, they need to do so using non-federated Apple Account sign-in with Apple’s two‑factor authentication (typically via a trusted device or trusted phone number using SMS/voice). That’s weird; it means the key accounts that manage protection for sometimes thousands of devices are still only protected by a six-digit SMS code sent to a specified phone number. We know that SMS authentication is risky, with three well-known attack paths:

  • SIM swapping, where an assailant contacts your cellular company posing as you and convinces them to transfer your phone number to a SIM in their control. Once that takes place, all your SMS codes go to them.
  • Phishing, such as a fake login page that acts normally but intercepts your SMS code once you enter it, capturing and immediately using it to attack your actual account.
  • Interception, in which sophisticated, usually nation-state-adjacent attackers exploit the known vulnerabilities of SMS to intercept messages in transit.

While it is true most small and mid-size businesses probably don’t need to worry about that third attack possibility, and the second can be mitigated against by being careful never to use a link provided in an email to access key accounts, the first exploit sits within the reach of determined attackers.

A hole in the bucket

The consequences of a successful attack can be serious. Equipped with a compromised ABM account, an attacker could reassign enrolled devices to an MDM server they control, wipe devices, or push malicious apps/profiles or configurations at your devices. Those outcomes are, shall we say, sub-optimal.

I’m certain Apple has thought about this. It has, after all, introduced a range of security protections for all its devices, including managed devices. But in this case, it’s left things a little exposed. That weakness is made more critical because Apple’s system permits just a small number of administrators for each ABM setup, regardless of company size. 

As a result, an attacker might be able to penetrate a company with perhaps tens of thousands of users simply by identifying five names to target with any/all of the above attacks. Apple does not need to leave this hole in its security bucket.

What can you do to improve protection?

There are some easy wins when you try to protect your business while using Apple’s existing system:

  • The best practice seems to be for admins to use a dedicated phone number that is only used to handle the ABM and never anything else.
  • The number should have SIM swap protection in place. You might be able to set this up with a call to your carrier to have this applied to the account.
  • The number of active admin accounts should be limited to a minimum to narrow the target surface.

What can Apple do better?

Apple needs to change things up. Doing so needn’t be horrifically complex, either, as most of these mitigations are already in place elsewhere in its ecosystem. Here are some suggestions:

  • Extend authenticator support to ABM admin accounts.
  • Introduce Passkeys for admin accounts.
  • Put FIDO2 support in place so admins can use hardware security keys to authenticate, if they choose.
  • Introduce mitigations such as conditional access, so logins from unexpected locations aren’t respected.
  • Introduce support for Sign in with Apple, using biometric data to a specific device as a second factor.

All of these protections are already available in the Apple ecosystem; all Apple needs is to divert a little of its R&D cash into implementing the same protections in Apple Business Manager. From what I’ve seen, the Apple admin community would rejoice if it did. I imagine the Apple Business team is already lobbying for it to find the resources to do just that.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Jonny Evans

Hello, and thanks for dropping in. I'm pleased to meet you. I'm Jonny Evans, and I've been writing (mainly about Apple) since 1999. These days I write my daily AppleHolic blog at Computerworld.com, where I explore Apple's growing identity in the enterprise. You can also keep up with my work at AppleMust, and follow me on BlueSky,Mastodon, and LinkedIn.

More from this author