No sooner had we reported that Microsoft will adopt a "rolling update" model for Windows 10...
...than we received notice of Apple's latest "rolling update" for its Safari browser.
.
.
What to do?
Simple: head to Apple Menu | App Store... | Updates and make sure you have the latest version of Safari.
To check your Safari version, run the browser and use Safari | About Safari, or open a Finder window and go to Applications| Safari.app.
For more information from the horse's mouth, visit Apple's Security Updateslanding page (which has been re-numbered from HT1222 to HT20122), or theSafari x.x.6 update page itself (HT204826).
No sooner had we reported that Microsoft will adopt a "rolling update" model for Windows 10...
...than we received notice of Apple's latest "rolling update" for its Safari browser.
What to do?
Simple: head to Apple Menu | App Store... | Updates and make sure you have the latest version of Safari.
To check your Safari version, run the browser and use Safari | About Safari, or open a Finder window and go to Applications| Safari.app.
For more information from the horse's mouth, visit Apple's Security Updateslanding page (which has been re-numbered from HT1222 to HT20122), or theSafari x.x.6 update page itself (HT204826).
Apple users are updating to OS X Mavericks in large numbers, but not fast enough. Corporate users in particular have been slow to upgrade, which could have serious security implications.
Apple is famous for the secrecy around its product and service launches.
===> It's unfortunate it has decided that the safety of Mac users should also require reading tea leaves. <===
One month after the release of OS X Mavericks and the disclosure of 48 vulnerabilities in Mountain Lion, Apple has not released any updates to fix these or any other problems in Mountain Lion.
Macs have never been that popular in business. But if Apple is indeed no longer supporting security updates for older Mac OS X versions, Macs won't have any place left in the enterprise office.
Glad they did. I've been worrying myself sick about the ugh-ly buttons...people say they grow on you...perhaps they do...like warts. You've got to live with you've got.
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.
iPhones and iPads will be vulnerable until they get the iOS 7 update, which is scheduled for release later this year. Until then, you might want to avoid plugging into sleazy charging stations, tho...
These days, it seems that websites are hacked with alarming frequency. While even companies of Apple's sophistication and size aren't immune from successful attacks, it's not quite time to start wearing your tin foil hat--yet.
Apple's Dev Center went down on Thursday causing issues for developers around the world. The system remained down for three days and is still currently unavailable.
This brings up an interesting question regarding single points of failure in the mobile application distribution system. When one component goes down, or is breached in this case it affects the entire ecosystem.
===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===
What is the point of hacking one person’s phone when there are entire app store infrastructures to target?
===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===
===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===
Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".
It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.
Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".
It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.
This article contains information about the security of the iphone and ipad users. This is very useful, because users wil be secured from any harm that could be done with their gadets. passwords were being sent over the internet unencrypted this could cause alot of problems because hackers would easily be able to access your password.
Security researcher Ariel Sanchez recently published a fascinating report on the sort of security you can expect if you do your internet banking on an iPhone or iPad.
The answer, sadly, seems to be, "Very little."
You should head over to IOActive's blog to read the whole report.
Sanchez details the results of a series of offline security tests conducted against 40 different iOS banking apps used by 60 different banks in about 20 different countries.
Kaspersky research shows that Safari, in saving a session for reopening later, stores session information in plain text. This includes usernames and passwords.
Kaspersky researchers have discovered that Apple's Safari web browser on OS X stores session information, including the username and password, in a plain text XML file, available for any user to read.
Are Mac Users safe from Malware? Not as much as you might think. Symantec's Security Expert Kevin Haley breaks down the Mac's invincibility myth. Learn why M...
Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===
Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===
Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===
In iOS7 this can be done even when the phone is locked with a passcode, as the voice-activated assistant Siri can be instructed to carry out the task.
The other flaw is potentially even more serious - allowing users' email and social networking accounts to be hijacked even when the user has locked and password-protected their phone.
In iOS7 this can be done even when the phone is locked with a passcode, as the voice-activated assistant Siri can be instructed to carry out the task.
The other flaw is potentially even more serious - allowing users' email and social networking accounts to be hijacked even when the user has locked and password-protected their phone.
Although iOS generates seemingly random passwords for its hotspots to eliminate the use of 'default' passwords, researchers at a German university have found that
===> they are able to break these passwords in under a minute. <===
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.
What to do?Simple: head to Apple Menu | App Store... | Updates and make sure you have the latest version of Safari.
To check your Safari version, run the browser and use Safari | About Safari, or open a Finder window and go to Applications| Safari.app.
For more information from the horse's mouth, visit Apple's Security Updateslanding page (which has been re-numbered from HT1222 to HT20122), or theSafari x.x.6 update page itself (HT204826).