Apple

Apple emergency security updates fix two new iOS zero-daysApple emergency security updates fix two new iOS zero-days

Apple emergency security updates fix two new iOS zero-days

Apple released emergency security updates to address two new iOS zero-day vulnerabilities actively exploited in the wild against iPhone users.…

1 year ago
Apple created post-quantum cryptographic protocol PQ3 for iMessageApple created post-quantum cryptographic protocol PQ3 for iMessage

Apple created post-quantum cryptographic protocol PQ3 for iMessage

Apple announced the implementation of a post-quantum cryptographic protocol called PQ3 will be integrated into iMessage. Apple announced a new post-quantum cryptographic…

1 year ago
CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalogCISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog

CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog. The U.S.…

1 year ago
iShutdown lightweight method allows to discover spyware infections on iPhonesiShutdown lightweight method allows to discover spyware infections on iPhones

iShutdown lightweight method allows to discover spyware infections on iPhones

Researchers devised a "lightweight method," called iShutdown, to determine whether Apple iOS devices have been infected with spyware. Cybersecurity researchers from Kaspersky…

1 year ago
Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth trafficApple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic

Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic

Apple addressed a recently disclosed Bluetooth keyboard injection vulnerability with the release of Magic Keyboard firmware. Apple released Magic Keyboard…

1 year ago
Operation Triangulation attacks relied on an undocumented hardware featureOperation Triangulation attacks relied on an undocumented hardware feature

Operation Triangulation attacks relied on an undocumented hardware feature

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky…

1 year ago
Apple released iOS 17.2 to address a dozen of security flawsApple released iOS 17.2 to address a dozen of security flaws

Apple released iOS 17.2 to address a dozen of security flaws

Apple rolled out emergency security updates to backport patches for two actively exploited zero-day flaws to older devices. The company…

1 year ago
Apple addressed 2 new iOS zero-day vulnerabilitiesApple addressed 2 new iOS zero-day vulnerabilities

Apple addressed 2 new iOS zero-day vulnerabilities

Apple released emergency security updates to fix two actively exploited zero-day flaws impacting iPhone, iPad, and Mac devices. Apple released…

1 year ago
iLeakage attack exploits Safari to steal data from Apple devicesiLeakage attack exploits Safari to steal data from Apple devices

iLeakage attack exploits Safari to steal data from Apple devices

Boffins devised a new iLeakage side-channel speculative execution attack exploits Safari to steal sensitive data from Macs, iPhones, and iPads.…

2 years ago
Apple releases iOS 16 update to fix CVE-2023-42824 on older devicesApple releases iOS 16 update to fix CVE-2023-42824 on older devices

Apple releases iOS 16 update to fix CVE-2023-42824 on older devices

Apple released versions iOS 16.7.1 and iPadOS 16.7.1 to address the CVE-2023-42824 vulnerability that has been actively exploited in attacks.…

2 years ago