All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
Upgrade the memory of your 2020 iMac up to 128GB
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$1398 $998
SAVE $400

$1798 $1198
SAVE $600

$151 $79
SAVE $72

$2299 $2069
SAVE $230

$240 $120
SAVE $120

$240 $120
SAVE $120

$1399 $749
SAVE $650

$2198 $1998
SAVE $200

$2299 $1799
SAVE $500

$2000 $1500
SAVE $500

$898 $798
SAVE $100

$1799 $1699
SAVE $100

$1699 $1499
SAVE $200

$999 $799
SAVE $200

$1798 $1198
SAVE $600

$1997 $1797
SAVE $200

$3199 $3199
SAVE $click

$80 $33
SAVE $46

$199 $149
SAVE $50

$699 $549
SAVE $150

$400 $300
SAVE $100

$2090 $1690
SAVE $400

$1699 $949
SAVE $750

$1199 $1099
SAVE $100

$1199 $1099
SAVE $100

$999 $949
SAVE $50

$1699 $949
SAVE $750

If Apple Can’t Get the Basics Right, How Can you Expect Security? — “We Hacked Apple for 3 Months: Here’s What We Found”

Apple cannot get the basics right.

Apple T2 Chip: Unfixable Security Flaw that Gives Attacker Full Control

But security is among the most difficult challenges of software development—far more difficult than ordinary features.

We Hacked Apple for 3 Months: Here’s What We Found

Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program.


During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would've allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim's iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.

There were a total of 55 vulnerabilities discovered with 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity reports. These severities were assessed by us for summarization purposes and are dependent on a mix of CVSS and our understanding of the business related impact.

As of October 6th, 2020, the vast majority of these findings have been fixed and credited. They were typically remediated within 1-2 business days (with some being fixed in as little as 4-6 hours).

MPG: should give anyone pause. Then consider state actors.


Thunderbolt 4 Dock

Thunderbolt 4 hub and ports!

Any Mac with Thunderbolt 3.


OWC Accelsior 4M2 PCIe SSD
6000 MB/sec!
Mac or PC.


Ideal for Lightroom, Photoshop, video.
Capacity up to 16TB!
View all handpicked deals...

Sony Alpha a7R II Mirrorless Digital Camera (Body Only)
$1798 $1198
SAVE $600

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__