Blog Posts Tagged with "Apple"
April 04, 2012 Added by:Headlines
"Vulnerabilities exist in Java 1.6.0_29, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution..."
March 22, 2012 Added by:Ben Kepes
I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...
March 09, 2012 Added by:Headlines
Apple has released security updates for Apple iOS, Apple TV, and iTunes to address multiple vulnerabilities which may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or bypass security restrictions...
March 02, 2012 Added by:Brent Huston
During the WWDC keynote, Brent Huston spent considerable time discussing the lack of built-in security for the iOS. Each unique identifier on numerous devices would allow possibly unwanted users to see information they shouldn’t see. In some cases, not such a bad idea...
February 20, 2012 Added by:Electronic Frontier Foundation
Even with industry standard security practices in place, data is still vulnerable to a breach or a subpoena. Companies collecting personal data have an obligation to keep as little personally identifiable data as necessary to provide their services...
February 16, 2012 Added by:Fergal Glynn
I put together a free utility called AdiOS (Addressbook Detector for iOS) that lets Mac users scan the iOS apps in your iTunes directory to see if they have the potential to dump your phone book externally. AdiOS detects apps that access your address book using a binary grep...
February 03, 2012 Added by:Headlines
Apple has released security updates for Apple OS X Lion 10.7 to 10.7.2, OS X Lion Server 10.7 to 10.7.2, Mac OS 10.6.8, and Mac OS X Server v 10.6.8 to address multiple vulnerabilities that may allow an attacker to execute arbitrary code, a denial-of-service, and bypass security...
January 13, 2012 Added by:Anthony M. Freed
Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...
January 09, 2012 Added by:Pierluigi Paganini
Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...
November 10, 2011 Added by:Paula Skokowski
The potential for a data breach a lot higher with the launch of Apple's iCloud. When content changes on one device, all other devices are automatically updated. A wonderful service for consumers; however, for enterprises iCloud has the potential to wreak havoc...
November 09, 2011 Added by:Tom Eston
Apple mobile devices are among the most popular gadgets today. In fact, Apple reports that 250 million iOS devices have been sold and 18 million apps downloaded. While the popularity of these devices increases, many don’t understand the basic security features that Apple makes available to them...
November 09, 2011 Added by:Headlines
Miller "planted a sleeper app in Apple’s App Store to demonstrate the trick–an app can phone home to a remote computer that downloads new unapproved commands onto the device... including stealing the user’s photos, reading contacts... or otherwise repurposing normal iOS app functions..."
October 31, 2011 Added by:Enno Rey
Recently Apple launched its new offering iCloud. At this point, most infosec people start to worry a little bit: The common cloud concept of centralized data storage on premise of a third party does not cope well with the usual control focused approach of most technical infosec guys...
October 07, 2011 Added by:Tom Eston
OS X Lion's new feature poses a security risk. When an OS X laptop joins a network which contains a captive portal, a window is automatically opened to prompt the user to interact with it. This presents a major security risk if an attacker can control this functionality...
August 16, 2011 Added by:Robert Siciliano
The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...
June 28, 2011 Added by:Kelly Colgan
Recent cloud-based data breaches have solidified the notion of cloud-insecurity in the consumers' mind. My concern with the iCloud is that Apple, which has mastered the art of slick marketing, could make the American consumer a whole lot less skeptical, and a whole lot less secure...
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013