iOS

Pierluigi Paganini June 19, 2015
XARA data stealing flaws affect Apple iOS, OSX

A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Apple’s OS X and iOS that allows Apple Keychain crack. A team of researchers from Indiana University (Luyi Xing, Xialong Bai, XiaoFeng Wang, and Kai Chen lead by Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of […]

Pierluigi Paganini June 11, 2015
Apple iOS flaw exploitable to steal user password with a phishing email

A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]

Pierluigi Paganini June 05, 2015
Hacking Apple Pay to steal credit card data

Experts at Wandera discovered that hackers can set up a bogus access point spoofing Apple Pay and fool users into provide their credit card data. Experts at the mobile security company Wandera have reported a security flaw in Apple iOS that could be exploited to fool a user into provides his credit card data and personal […]

Pierluigi Paganini May 27, 2015
A new iOS Bug Crashing iPhones by receiving a specific text message

A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash A bug in the Apple iOS can cause the Messages app crash and iPhones automatically reboot when they receive a specific crafted text message. The […]

Pierluigi Paganini April 24, 2015
SSL certificate parsing vulnerability could force iOS devices into endless reboot loop

Israeli security researchers have discovered a SSL certificate parsing vulnerability affecting iOS devices that could force them into endless reboot loop. Yair Amit and Adi Sharabani, security experts at the Israeli security firm Skycure have demonstrated at the RSA Conference 2015 the exploitation of a vulnerability that can force any Apple iPhone or iPad into a perpetual reboot loop. The experts explained […]

Pierluigi Paganini April 12, 2015
Darwin kernel, just an IP packet to cause the crash of Apple devices

A serious flaw affecting the Darwin kernel in the Apple OS X 10.10 and iOS 8 could be exploited to cause DoS attack just sending a specific IP packet. At the end of 2014, security experts at Kaspersky Lab discovered a serious vulnerability in the Darwin kernel. The name “Darvin kernel” is unknown to the […]

Pierluigi Paganini March 28, 2015
A critical MiTM flaw in AFNetworking iOS, OS X framework was fixed

Security experts at Minded Security firm have recently discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers Simone Bovi and Mauro Gentile at the security firm Minded Security discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers found the flaw while were […]

Pierluigi Paganini February 14, 2015
EU parliament bans the Microsoft mobile Outlook app

The experts at the IT Department of the EU parliament bans the Microsoft mobile Outlook app due to the recently disclosed privacy and security issues. A few day ago I wrote about serious security issues for day ago I wrote about serious security issues for Microsoft mobile Outlook app, the researcher and Head of Development at midpoints […]

Pierluigi Paganini February 04, 2015
Operation Pawn Storm hackers use a iOS spyware

By investigating on the cyber espionage campaign dubbed Operation Pawn Storm, experts at TrendLabs discovered a spyware designed for iOS devices. Security experts at TrendLabs have discovered a new espionage iOS app while they were investigating on the cyber espionage campaign dubbed Operation Pawn Storm. In October 2014, security experts at Trend Micro uncovered a cyber […]

Pierluigi Paganini January 31, 2015
Hacking sex toys and dolls

The security expert Ken Munro has run a series of penetration tests on sex toys and dolls for children … the results are disconcerting. Everything that could be connected to a computer could be potentially exploited to hack it, we read about several cases that demonstrated how it is possible to compromise a PC by […]