Apple
Impressive iPhone Exploit
This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access ...
Manipulating Systems Using Remote Lasers
Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the microphones on ...
Apple-Notarized Malware: What It Is and How It Affects Mac Users
Malicious actors are targeting Apple. Although Apple introduced a notarization mechanism to scan and prevent malicious code from running on Apple devices, attackers have found ways to circumvent this process. Such Apple-notarized ...
Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies
In episode 147 for November 16th 2020: The latest about source code stolen from US government agencies and private companies, three actively exploited iOS zero-days in the wild and new App Store ...
How to Remove a Root Certificate
Instructions for removing roots for Apple, Microsoft, and Mozilla. Need to know how to remove a root certificate? You’re in the right place. Digital Certificates, but for our explicit purposes,... The post ...
Tripwire Patch Priority Index for October 2020
Tripwire‘s October 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, Adobe, and Oracle. First on the patch priority list this month is a very high priority vulnerability in ...
Tripwire Patch Priority Index for September 2020
Tripwire‘s September 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, and various Linux distributions. Up first on the patch priority list this month is a very high priority ...
Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements
In episode 140 for September 28th 2020: Details on the first human death related to a ransomware attack, popular fitness app Strava is caught giving away your location data to strangers, and ...
Apple U-Turn: It Will ‘Delay’ Killing Facebook’s Business Model
“Would you like evil advertisers to track you in this app?” Is anyone going to answer “Yes”? ...
Apple Notarized Malware by Mistake, Hackers Ran it Through Third-Party Website
Notarized apps should be safe on macOS Threat actors try to deploy “approved” malware through website Apple revoked certificates, but malware is still up Apple’s notarization system let a piece of malware ...

