Apple

Impressive iPhone Exploit

This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a…

4 days ago

Manipulating Systems Using Remote Lasers

Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers…

5 days ago

Apple-Notarized Malware: What It Is and How It Affects Mac Users

Malicious actors are targeting Apple. Although Apple introduced a notarization mechanism to scan and prevent malicious code from running on…

2 weeks ago

Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies

In episode 147 for November 16th 2020: The latest about source code stolen from US government agencies and private companies,…

3 weeks ago

How to Remove a Root Certificate

Instructions for removing roots for Apple, Microsoft, and Mozilla. Need to know how to remove a root certificate? You’re in…

1 month ago

Tripwire Patch Priority Index for October 2020

Tripwire‘s October 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, Adobe, and Oracle. First on the…

1 month ago

Tripwire Patch Priority Index for September 2020

Tripwire‘s September 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, and various Linux distributions. Up first…

2 months ago

Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements

In episode 140 for September 28th 2020: Details on the first human death related to a ransomware attack, popular fitness…

2 months ago

Apple Notarized Malware by Mistake, Hackers Ran it Through Third-Party Website

Notarized apps should be safe on macOS Threat actors try to deploy “approved” malware through website Apple revoked certificates, but…

3 months ago