Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed the two vulnerabilities exploited in the Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). The two exploits […]
A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Apple’s OS X and iOS that allows Apple Keychain crack. A team of researchers from Indiana University (Luyi Xing, Xialong Bai, XiaoFeng Wang, and Kai Chen lead by Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of […]
Apple announced a series of improvement for it IOS 9, including a content blocker can kill a lot of applications similar the popular AdBlock. A lot have been talks about IOS 9, and now looks like Apple included an ad-blocking feature in its OS, I would say it is a great news for its customers, […]
A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Experts at Wandera discovered that hackers can set up a bogus access point spoofing Apple Pay and fool users into provide their credit card data. Experts at the mobile security company Wandera have reported a security flaw in Apple iOS that could be exploited to fool a user into provides his credit card data and personal […]
A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI rootkits. The cyber security expert Pedro Vilaça has discovered a low-level zero-day vulnerability in Apple Mac systems that could be exploited by privileged users to more install an EFI rootkits. Vilaça explained that the attack is […]
The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the world’s biggest internet companies, such as Google, Apple and Facebook […]
A URL Spoofing flaw affects the Apple Safari browser. It could trick users into visiting malicious websites despite they are accessing to legitimate URLs. A serious security vulnerability affects the Apple Safari browser, the flaw could be exploited by attackers to trick Safari users into visiting malicious websites while are trying to surf on legitimate websites. […]
Israeli security researchers have discovered a SSL certificate parsing vulnerability affecting iOS devices that could force them into endless reboot loop. Yair Amit and Adi Sharabani, security experts at the Israeli security firm Skycure have demonstrated at the RSA Conference 2015 the exploitation of a vulnerability that can force any Apple iPhone or iPad into a perpetual reboot loop. The experts explained […]
The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]