Apple has released a new fix for iOS 7–no, it doesn’t roll your phone back to iOS 6–that patches a vulnerability that enabled a user to make app or in-app purchases without needing to enter a password. The release of iOS 7.04 marks the third update of the iPhone operating system in the short time[...]
Browsing Category: Apple
Dennis Fisher and Mike Mimoso talk about the major stories from the last couple of weeks, including the changes to the Microsoft bug bounty program, the new Internet bug bounty, the Apple transparency report and a new paper on a weakness in Bitcoin.
In a new report detailing the number and kind of requests for user information it’s gotten from various governments, Apple said it has never received a request for information under Section 215 of the USA PATROT Act and would likely fight one if it ever came. The company also disclosed that it has received between[...]
Apple’s OS X Mavericks release included code that turns on by default a mitigation for the BEAST cryptographic attack.
The release of Mac OS X Mavericks includes Flash Player sandbox protection for the Safari browser.
Apple fixed more than 100 security vulnerabilities across eight different products yesterday including updates for the iTunes, Safari, iOS 7, Keynote 6.0, two versions of Apple’s Remote Desktop (3.7, 3.5.4) and OS X Server 3.0.
The Apple iMessage protocol has been shrouded in secrecy for years now, but a pair of security researchers have reverse-engineered the protocol and found that Apple controls the encryption key infrastructure for the system and therefore has the ability to read users’ text messages–or decrypt them and hand them over at the order of a[...]
After a botched software update over the weekend, Apple re-released version 6.0 of its Apple TV product last night.
Hackers from the venerable Chaos Computer Club in Germany have found a method for bypassing the new iPhone 5S Touch ID fingerprint security mechanism. The method, which is the first known technique for circumventing the iPhone’s newest security feature, involves taking a picture of a user’s fingerprint and then creating a latex copy of it to unlock the phone.
Hackers have only had a few days to play around with Apple’s latest mobile operating system, iOS 7, but apparently that’s all the time one of them needed to find a flaw that can allow anyone to bypass the lockscreen on phones running the much-buzzed operating system.