Blog Posts Tagged with "Apple"

69dafe8b58066478aea48f3d0f384820

Backdoor.Flashback Mac Virus Patch and Removal Tools

April 10, 2012 Added by:Headlines

Last week Doctor Web, found that the Flashback Mac Trojan has infected almost 600,000 systems, and has created an online tool to check to see if your machine is infected. F-Secure has released instructions on how to remove the virus if you are indeed infected...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple: Critical Update for Java for OS X Lion and Mac OS X

April 04, 2012 Added by:Headlines

"Vulnerabilities exist in Java 1.6.0_29, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution..."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Open, Closed, 1984 and the Evil Empire

March 22, 2012 Added by:Ben Kepes

I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Releases Multiple Security Updates

March 09, 2012 Added by:Headlines

Apple has released security updates for Apple iOS, Apple TV, and iTunes to address multiple vulnerabilities which may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or bypass security restrictions...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Apple’s PC Free Feature: Insecure, But Maybe That’s Good

March 02, 2012 Added by:Brent Huston

During the WWDC keynote, Brent Huston spent considerable time discussing the lack of built-in security for the iOS. Each unique identifier on numerous devices would allow possibly unwanted users to see information they shouldn’t see. In some cases, not such a bad idea...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Better Path for Applications: Respecting Users

February 20, 2012 Added by:Electronic Frontier Foundation

Even with industry standard security practices in place, data is still vulnerable to a breach or a subpoena. Companies collecting personal data have an obligation to keep as little personally identifiable data as necessary to provide their services...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

AdiOS: Say Goodbye to Nosy iPhone Apps

February 16, 2012 Added by:Fergal Glynn

I put together a free utility called AdiOS (Addressbook Detector for iOS) that lets Mac users scan the iOS apps in your iTunes directory to see if they have the potential to dump your phone book externally. AdiOS detects apps that access your address book using a binary grep...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Releases Multiple OS X Lion Security Updates

February 03, 2012 Added by:Headlines

Apple has released security updates for Apple OS X Lion 10.7 to 10.7.2, OS X Lion Server 10.7 to 10.7.2, Mac OS 10.6.8, and Mac OS X Server v 10.6.8 to address multiple vulnerabilities that may allow an attacker to execute arbitrary code, a denial-of-service, and bypass security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Exclusive: Interview With Hacker YamaTough

January 13, 2012 Added by:Anthony M. Freed

Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Rim, Nokia and Apple Providing Government Back Doors

January 09, 2012 Added by:Pierluigi Paganini

Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...

Comments  (9)

24a688dde3dc9dcafbbd5dfdcf575d03

Is iCloud the Next Big Security Challenge?

November 10, 2011 Added by:Paula Skokowski

The potential for a data breach a lot higher with the launch of Apple's iCloud. When content changes on one device, all other devices are automatically updated. A wonderful service for consumers; however, for enterprises iCloud has the potential to wreak havoc...

Comments  (1)

53692ae1a8e713373b8a487ce89ee3e2

Top Five Security Settings for Apple iPhones and iPads

November 09, 2011 Added by:Tom Eston

Apple mobile devices are among the most popular gadgets today. In fact, Apple reports that 250 million iOS devices have been sold and 18 million apps downloaded. While the popularity of these devices increases, many don’t understand the basic security features that Apple makes available to them...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Sanctions Researcher Charlie Miller for Exploit

November 09, 2011 Added by:Headlines

Miller "planted a sleeper app in Apple’s App Store to demonstrate the trick–an app can phone home to a remote computer that downloads new unapproved commands onto the device... including stealing the user’s photos, reading contacts... or otherwise repurposing normal iOS app functions..."

Comments  (8)

0f57a863af3b7e5bf59a94319a408ff7

To iTrust or Not?

October 31, 2011 Added by:Enno Rey

Recently Apple launched its new offering iCloud. At this point, most infosec people start to worry a little bit: The common cloud concept of centralized data storage on premise of a third party does not cope well with the usual control focused approach of most technical infosec guys...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

OS X Lion Captive Portal Hijacking Attack

October 07, 2011 Added by:Tom Eston

OS X Lion's new feature poses a security risk. When an OS X laptop joins a network which contains a captive portal, a window is automatically opened to prompt the user to interact with it. This presents a major security risk if an attacker can control this functionality...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Myth: Apple Products Don’t Get Viruses

August 16, 2011 Added by:Robert Siciliano

The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...

Comments  (3)

Page « < 1 - 2 - 3 - 4 > »