Apple

Pierluigi Paganini September 24, 2016
Cracking Apple iOS 10 Backup Encryption is now 2,500 times faster

Experts from Elcomsoft discovered a new vector of attack to access password-protected local backups produced by iOS 10 devices. According to security experts from the computer forensics company Elcomsoft, Apple has weakened the backup security protection of its recently-issued iOS 10 skipping certain security checks. This means that hackers could easily crack password protection used […]

Pierluigi Paganini September 23, 2016
Young hacker Luca Todesco announced the iPhone 7 jailbreak

The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10. Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of […]

Pierluigi Paganini September 02, 2016
Apple issued fixes for Pegasus spyware bugs in OS X, Safari. Apply it now!

Apple issued security fixes for Mac OS X and Safari to patch zero-day flaws exploited by Pegasus spyware to spy on mobile users. A few days ago, we reported a detailed analysis of the Trident exploit that triggers three vulnerabilities in order to remotely hack Apple mobile devices through the installation of the Pegasus spyware. The […]

Pierluigi Paganini September 02, 2016
BitTorrent client Transmission found distributing Mac malware once again

It has happened again, Mac users who were looking for the BitTorrent client Transmission might have been infected by the OSX/Keydnap malware. Security experts from ESET have spotted the popular BitTorrent client called Transmission distributing Mac malware called OSX/Keydnap that is used to steal the content of OS X’s keychain and maintain a permanent backdoor on victims’PC. […]

Pierluigi Paganini August 31, 2016
iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit

Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group. Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers say it’s belonging to an exploit infrastructure connected to the NSO […]

Pierluigi Paganini August 26, 2016
Apple fixed Zero-Days flaws exploited by nation-state spyware

Apple issued emergency iOS updates to patch three Zero-Days exploited by a government spyware in an high-sophisticated attack. Apple has released the iOS 9.3.5 update for its mobile devices (iPhones and iPads). The security updates address three zero-day vulnerabilities exploited by nation-state actors to spy on activists. Security experts have spotted a strain of spyware targeting […]

Pierluigi Paganini August 10, 2016
Exodus announces a bug bounty program. Who will pay more for a zero-day?

The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on the zero-day market. Almost every IT giant has launched its bug bounty program, the last in order of time is Apple that last week announced the initiative during the Black Hat Conference. How much is […]

Pierluigi Paganini August 05, 2016
Apple will pay up to $200,000 in Bug Bounty Program

Apple has chosen the Black Hat 2016 security conference to announce the launch of its bug bounty program, hackers can earn up to $200,000 for a flaw. Great news for bug hunters, finally Apple announced that it will pay hackers that will find bugs in its products. Apple is the last IT giant to launch […]

Pierluigi Paganini July 20, 2016
Hacking Apple devices with just a Message exploiting the CVE-2016-4631

This critical flaw CVE-2016-4631 resides in the ImageIO and could be exploited by a remote attacker to steal sensitive information from Apple devices. Apple fans, I have a bad news for you, just one specially-crafted message can expose your personal information, including your authentication credentials stored in the memory of your Apple device. This means […]

Pierluigi Paganini July 10, 2016
Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]