{"id":2831,"date":"2013-10-03T10:00:47","date_gmt":"2013-10-03T14:00:47","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=2831"},"modified":"2020-02-27T03:36:04","modified_gmt":"2020-02-26T16:36:04","slug":"september-monthly-blog-roundup","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/september-monthly-blog-roundup\/2831\/","title":{"rendered":"September Monthly Blog Roundup"},"content":{"rendered":"<p>Another month has quietly slipped away and you\u2019ve found yourself wondering if you\u2019re all caught up on our articles from September. Not to worry, we\u2019ve rounded up our top posts to keep you in the know.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/10\/06045534\/monthly_roundup_title_EN-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2832\" alt=\"monthly_roundup_title_EN (1)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/10\/06045534\/monthly_roundup_title_EN-1.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/apples-ios-7-has-a-major-security-flaw\/\" target=\"_blank\" rel=\"noopener\">Apple\u2019s iOS 7 Has a Major Security Flaw<\/a><\/p>\n<p>Did you download the latest operating system from Apple? If you were one of the millions who did, the new iOS 7 came with a major flaw. It came with a bug that allowed anyone to access your contact information and social media accounts without entering the security code that keeps your device locked. With new releases often times come bugs, so always be sure to download any software updates that are offered to you to keep your device secure.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/fraudulent-apps-on-apples-app-store\/\" target=\"_blank\" rel=\"noopener\">Fraudulent Apps on Apple\u2019s App Store<\/a><\/p>\n<p>Even though the Apple store is notorious for its strict control over the applications allowed within it, fraudulent apps have still emerged, preying on unsuspecting victims. You can usually spot one of these malicious offerings because it will try to catch your attention, touting features that don\u2019t exist natively on iOS. Always read reviews and check ratings before installing a new app, but if you do download a harmful program, you can always ask Apple for a refund.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/multiple-antivirus-programs-bad-idea\/\" target=\"_blank\" rel=\"noopener\">Why Using Multiple Antivirus Programs is a Bad Idea<\/a><\/p>\n<p>If you\u2019re serious about keeping your device safe, you may have considered running more than one anti-virus program on them to guarantee their protection. Did you know this could actually do more harm than good? If you\u2019re running two programs at once, both will attempt to block and remove one another from your system, they will fight over viruses and they\u2019ll drain your battery life. You\u2019re much better off sticking to one <a href=\"https:\/\/www.kaspersky.com\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive antivirus suite<\/a> to guarantee safety and to keep your system running smoothly.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/securely-configuring-a-wireless-router\/\" target=\"_blank\" rel=\"noopener\">Securely Configuring a Wireless Router<\/a><\/p>\n<p>Your wireless router is the hub of your home network, and if not secured properly, could be vulnerable to attack. Taking measures, like buying a new router, password protecting it and setting up a protected guest network, are good first steps to enhance your security level. After taking these measures, you can even go a step further by accessing your router\u2019s administrative interface to make sure everything is locked down.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/understanding-samsung-knox\/\" target=\"_blank\" rel=\"noopener\">Understanding Samsung Knox<\/a><\/p>\n<p>Samsung recently created a secure Android environment called Knox, with the goal of resolving the security problems IT teams are now up against with the new common practice of employees using personal devices on corporate networks. Knox is meant to protect you and your employer against data leakage that can occur when valuable information is transferred from secure networks to less secure networks, by providing security management features, like Customizable Secure Boot, TrustZone-based Integrity Measurement Architecture (TIMA), and Security Enhancements for Android. The most attractive feature is probably the Knox container feature, which keeps data and applications stored in a container, completely isolated from the rest of the operating system. Samsung may very well have created an incredibly useful tool for companies and their employees, but only time will tell.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.au\/blog\/fingerprint-scanner-iphone-5s\/\" target=\"_blank\" rel=\"noopener\">Touch ID Fingerprint Scanner In iPhone 5S: Everything You Need To Know<\/a><\/p>\n<p>Apple\u2019s new iPhone 5S has received a lot of buzz with the addition of its new biometric identification option, but is it really worth all the hype? A huge positive of having a touch ID fingerprint scanner is the fact that it makes it much harder for illegitimate users to access your data. However, this could become a hindrance if you\u2019re trying to allow a trusted third party to get into your device, or if you\u2019re wearing gloves. \u00a0Furthermore, soon after the release of the iPhone 5S attackers found a possible way past this security feature. So once again, we will have to wait and see if this feature becomes mainstream, or if it falls to the wayside.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another month has quietly slipped away and you\u2019ve found yourself wondering if you\u2019re all caught up on our articles from September. Not to worry, we\u2019ve rounded up our top posts<\/p>\n","protected":false},"author":189,"featured_media":2833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1853,352,97],"class_list":{"0":"post-2831","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-tips","9":"tag-kaspersky-lab","10":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/september-monthly-blog-roundup\/2831\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/september-monthly-blog-roundup\/2511\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/september-monthly-blog-roundup\/2409\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/september-monthly-blog-roundup\/2637\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/september-monthly-blog-roundup\/2475\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/september-monthly-blog-roundup\/2831\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/september-monthly-blog-roundup\/1660\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/september-monthly-blog-roundup\/2831\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/kaspersky-lab\/","name":"Kaspersky Lab"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2831"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2831\/revisions"}],"predecessor-version":[{"id":26105,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2831\/revisions\/26105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/2833"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}