The Safari browser stores data from previous sessions in an unencrypted format on a hidden folder that leaves users vulnerable to information loss.
Browsing Tag: apple
If you’re still wondering when the future will get here, stop looking to the skies for flying cars and look down at your iPhone the next time you walk into an Apple store. The company has just kicked off a new in-store tracking initiative that uses Bluetooth to push offers and notifications to customers as they wander through the aisles looking at Beats headphones and One Direction phone cases.
Apple has released a new fix for iOS 7–no, it doesn’t roll your phone back to iOS 6–that patches a vulnerability that enabled a user to make app or in-app purchases without needing to enter a password. The release of iOS 7.04 marks the third update of the iPhone operating system in the short time[...]
Dennis Fisher and Mike Mimoso talk about the major stories from the last couple of weeks, including the changes to the Microsoft bug bounty program, the new Internet bug bounty, the Apple transparency report and a new paper on a weakness in Bitcoin.
In a new report detailing the number and kind of requests for user information it’s gotten from various governments, Apple said it has never received a request for information under Section 215 of the USA PATROT Act and would likely fight one if it ever came. The company also disclosed that it has received between[...]
Apple’s OS X Mavericks release included code that turns on by default a mitigation for the BEAST cryptographic attack.
The release of Mac OS X Mavericks includes Flash Player sandbox protection for the Safari browser.
Apple fixed more than 100 security vulnerabilities across eight different products yesterday including updates for the iTunes, Safari, iOS 7, Keynote 6.0, two versions of Apple’s Remote Desktop (3.7, 3.5.4) and OS X Server 3.0.
The Apple iMessage protocol has been shrouded in secrecy for years now, but a pair of security researchers have reverse-engineered the protocol and found that Apple controls the encryption key infrastructure for the system and therefore has the ability to read users’ text messages–or decrypt them and hand them over at the order of a[...]