All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
Up to 1527MB/s sustained performance
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$399 $199
SAVE $200

$2797 $2497
SAVE $300

$1398 $998
SAVE $400

$1499 $999
SAVE $500

$549 $499
SAVE $50

$799 $549
SAVE $250

$1699 $949
SAVE $750

$3899 $1499
SAVE $2400

$999 $849
SAVE $150

$1398 $998
SAVE $400

$1798 $1198
SAVE $600

$240 $175
SAVE $65

$240 $175
SAVE $65

$1399 $799
SAVE $600

$1798 $1198
SAVE $600

$1997 $1797
SAVE $200

$3399 $2699
SAVE $700

$400 $300
SAVE $100

$1699 $949
SAVE $750

$1199 $1099
SAVE $100

$1199 $1099
SAVE $100

$999 $949
SAVE $50

$1699 $949
SAVE $750

All your passwords at risk with OS X and iOS, and Apple Sits on the Problem

The internet is a dangerous place for financial transactions.

The way security flaws work is that the Bad Guys keep finding them and using them to steal. When a company like Apple fails to take immediate action to discuss the risks and to mitigate them, it is MPG’s view that it is exposes itself to massive liability. Apple’s apparent silence on this issue is scary.

The research paper: Unauthorized Cross-App Resource Access on MAC OS X and iOS.

The article in The Register: Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X

Keychains raided, sandboxes busted, passwords p0wned, but Apple silent for six months.

Six university researchers have revealed deadly zero-day flaws in Apple's iOS and OS X, claiming it is possible to crack Apple's password-storing keychain, break app sandboxes, and bypass its App Store security checks.

Attackers can exploit these bugs to steal passwords from installed apps, including the native email client, without being detected.

The team was able to upload malware to Apple's app stores, and passed the vetting processes without triggering any alarms. That malware, when installed on a victim's Mac, raided the keychain to steal passwords for services including iCloud and the Mail app, and all those stored within Google Chrome.

Xing says he reported the flaws to Apple in October 2014.”.

Our study brings to light a series of unexpected, security-critical aws that can be exploited to circumvent Apple's isolation protection and its App Store's security vetting. The consequences of such attacks are devastating, leading to complete disclosure of the most sensitive user information (e.g., passwords) to a malicious app even when it is sandboxed.

...

"We completely cracked the keychain service - used to store passwords and other credentials for different Apple apps - and sandbox containers on OS X, and also identified new weaknesses within the inter-app communication mechanisms on OS X and iOS which can be used to steal confidential data from Evernote, Facebook and other high-profile apps."

MPG: Tim? Apple silence speaks volumes.

OWC Thunderblade Thunderbolt 3 SSD

Blazing fast, up to 16TB.

YEE HAH!



√ No more slow and noisy hard drives!
Thunderbolt 4 Dock

Thunderbolt 4 hub and ports!

Any Mac with Thunderbolt 3.



Save the tax, we pay you back, instantly!

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__