iOS ChangeLog and Release notes for BlackFog
4.1.2 – April 29, 2021
- Improved subscription activations
4.1.1 – April 1, 2021
- Improved performance
- Added diagnostic information
- Fixed legacy purchases from Europe
4.1.0 – December 18, 2020
- Increased performance and rule size
- Improved reloading and memory use
- Updated to Swift 5.3
- Updated splash screen
- Updated icons to outline style
- Updated color of tab icons
- Changed Cryptomining to Cryptojacking
- Update cloud console more often
- Fixed layout error on newer iOS versions
- Ignore local caches when updating rules
- Updated Blacklist to Deny
- Updated Whitelist to Allow
- Force dark mode on iOS 13 or above
- Added header to deny list
- Detect model information for console
- Added the ability to deactivate from console
- Added PIN code validation
- Allow group assignment using PIN code
4.0.2 – January 27, 2020
-
Added in App purchase icons
- Fixed scrolling on small screens
- Reload after validating license on start
- Updated translations
4.0.1 – January 19, 2020
-
Fixed grandfathering code to detect old purchases
4.0 – January 17, 2020
-
Added In-App purchasing model
-
Added cloud rule updates
-
Added blocking for the Dark Web
-
Added blocking for Botnets
-
Added support for the Enterprise console
-
Added the ability to sign in to existing account
-
Added Whitelisting and BlackListing
- Aligned ruleset across platforms
3.2.0 – October 9, 2018
- Removed block warnings when clicking on Ads shown in Google Search
- Changed Enterprise license handling
- Added Turkish translation
- Updated threat rules
3.1.0 – August 13, 2018
-
Added Fake News blocking option
-
Added Safari Action extension to whitelist while browsing
-
Added new advertising blocks
-
Implemented in app rating capability
-
Automatically deselect table rows after white/blacklist selection
3.0.1 – August 8, 2018
- Added more than 250 new cryptocurrency miners
- Added detail page for each block describing function
- Changed transparency of group heading
- Changed default Facebook option to on
3.0.0 – July 9, 2018
-
Initial release for iOS
-
Blocking Advertising on over 99% of sites
-
Stops web site tracking and data aggregators from analyzing your behavior
-
Eliminates cryptocurrency mining to prevent your device from being hijacked
-
Blocks phishing attacks when browsing the Internet
-
Stops Facebook from profiling and tracking you regardless of whether or not you are a Facebook customer
-
Significantly decreases overall data usage by reducing network traffic volume
-
Supports all versions of Safari on iPhones and iPads
Related Posts
BlackFog unveils AI based anti data exfiltration (ADX) platform for ransomware and data loss prevention
BlackFog unveils the latest version of its AI based anti data exfiltration (ADX) platform for even more powerful ransomware and data loss prevention. Version 5 introduces new features including air gap protection, real-time geofencing, and baseline activity monitoring to ensure the highest level of cybersecurity protection.
EDR Kill Shifter: Why a Layered Cybersecurity Approach is Required
Learn how ransomware-as-a-service is simplifying ransomware tool creation and increasing ransomware attack accessibility in cybercrime. Find out how modern ransomware syndications use RaaS.
The Rise of Ransomware-as-a-Service and Decline of Custom Tool Development
Learn how ransomware-as-a-service is simplifying ransomware tool creation and increasing ransomware attack accessibility in cybercrime. Find out how modern ransomware syndications use RaaS.
The State of Ransomware 2024
BlackFog's state of ransomware report measures publicly disclosed and non-disclosed attacks globally.
Data Exfiltration Detection: Best Practices and Tools
Data exfiltration, a tactic used in 93% of ransomware attacks, can lead to severe consequences including financial losses, reputational damage, and loss of customer trust. To mitigate these risks, organizations must implement effective detection strategies and technologies.
What Causes Victims to Pay in a Ransomware Attack? The Psychology
Learn the main reasons why victims of a ransomware attack are forced to pay, such as the need to avoid operational disruption or the deceptive methods used by attackers to establish confidence.