All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com
Thank you for purchasing through links and ads on this site.
OWC / MacSales.com...
diglloyd Deal Finder...
Buy other stuff at Amazon.com...
Upgrade the memory of your 2018 Mac mini up to 64GB
Handpicked deals...
$1599 $1199
SAVE $400

$1599 $1199
SAVE $400

$1480 $1230
SAVE $250

$3999 $2499
SAVE $1500

$1498 $1098
SAVE $400

$2897 $1797
SAVE $1100

$399 $349
SAVE $50

$899 $699
SAVE $200

$3297 $1897
SAVE $1400

$749 $499
SAVE $250

$799 $567
SAVE $232

$870 $749
SAVE $121

$3599 $2199
SAVE $1400

$3899 $2299
SAVE $1600

$4499 $2650
SAVE $1849

$748 $598
SAVE $150

$899 $699
SAVE $200

$729 $729
SAVE $0

$3899 $2299
SAVE $1600

$3599 $2199
SAVE $1400

$4499 $2650
SAVE $1849

$1997 $897
SAVE $1100

$3099 $2499
SAVE $600

$2799 $2199
SAVE $600

$4999 $4599
SAVE $400

$4499 $2650
SAVE $1849

All your passwords at risk with OS X and iOS, and Apple Sits on the Problem

The internet is a dangerous place for financial transactions.

The way security flaws work is that the Bad Guys keep finding them and using them to steal. When a company like Apple fails to take immediate action to discuss the risks and to mitigate them, it is MPG’s view that it is exposes itself to massive liability. Apple’s apparent silence on this issue is scary.

The research paper: Unauthorized Cross-App Resource Access on MAC OS X and iOS.

The article in The Register: Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X

Keychains raided, sandboxes busted, passwords p0wned, but Apple silent for six months.

Six university researchers have revealed deadly zero-day flaws in Apple's iOS and OS X, claiming it is possible to crack Apple's password-storing keychain, break app sandboxes, and bypass its App Store security checks.

Attackers can exploit these bugs to steal passwords from installed apps, including the native email client, without being detected.

The team was able to upload malware to Apple's app stores, and passed the vetting processes without triggering any alarms. That malware, when installed on a victim's Mac, raided the keychain to steal passwords for services including iCloud and the Mail app, and all those stored within Google Chrome.

Xing says he reported the flaws to Apple in October 2014.”.

Our study brings to light a series of unexpected, security-critical aws that can be exploited to circumvent Apple's isolation protection and its App Store's security vetting. The consequences of such attacks are devastating, leading to complete disclosure of the most sensitive user information (e.g., passwords) to a malicious app even when it is sandboxed.

...

"We completely cracked the keychain service - used to store passwords and other credentials for different Apple apps - and sandbox containers on OS X, and also identified new weaknesses within the inter-app communication mechanisms on OS X and iOS which can be used to steal confidential data from Evernote, Facebook and other high-profile apps."

MPG: Tim? Apple silence speaks volumes.


Save the tax, we pay you back, instantly!
View all handpicked deals...

Sigma 14mm f/1.8 DG HSM Art Lens for Nikon F
$1599 $1199
SAVE $400

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2019 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__