HackDig : Dig high-quality web security articles for hacker

iPad vs. MacBook: is iPadOS a game changer?

It took Apple more than nine years to recognize that the iPad and iPhone were different enough to warrant separate operating systems. While there were minor differences in features between the two devices in recent years, it's only this year that it was officially forked into two slightly different operating systems with distinct names: iOS 13 and iPadOS 13.
Publish At:2019-11-11 22:10 | Read:72 | Comments:0 | Tags:Apple iPad iPadOS iPadOS 13

Apple updates its privacy page with sleek new look

A company’s privacy page usually reads like it was written by lawyers—because it usually is. Information is rarely presented in a way that laypeople can understand, and as for making it both easy to consume and easy on the eyes? Forget it.Apple’s new privacy page thinks different. It presents the company’s privacy info in plain English and in an attractive,
Publish At:2019-11-11 22:10 | Read:85 | Comments:0 | Tags:Security & Privacy Apple privacy

Checkm8 jailbreak and AltStore put cracks in Apple’s walled garden

byDanny BradburyJailbreaking iPhones has become a lot harder with each new version of the hardware, but this weekend saw two new announcements that enable people to install apps on their phones. One of them is a traditional jailbreak, while the other is an alternative app store that uses a loophole in Apple’s code-signing process.Jailbreaking is a form
Publish At:2019-09-30 12:45 | Read:393 | Comments:0 | Tags:Apple iOS Mobile App Store iPhone jailbreak jailbreaking

New iOS exploit checkm8 allows permanent compromise of iPhones

UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the fact that the bug is in the bootrom, where it cannot be patched. UPDATE 9/27, 12:15am: After speaking with @axi0m8, clarified a few other points, including the fact that this cannot be exploited remot
Publish At:2019-09-27 23:20 | Read:444 | Comments:0 | Tags:Mac Apple apple security apple vulnerability checkm8 exploit

Apple Watch Series 5 Review: incremental changes for a solid device

In just four and a half years, the Apple Watch has gone from a whim with vague use cases to a solid device that has found its stride. This year's model, the Series 5, builds on the previous iteration with small, incremental changes, to provide a solid, useful device.The history of the Apple Watch has been brief, and has been marked by some major changes: the
Publish At:2019-09-27 22:10 | Read:342 | Comments:0 | Tags:Apple Apple Watch

Review: iPhone 11, the iPhone for everyone

Last year, I got on Apple‘s iPhone upgrade program to be able to change my phone every year without having the hassle of selling an old one on eBay. Given that I was spreading the cost out over monthly payments, at 0% interest, I decided to go for the best model: the iPhone XS Max. As I wrote on this blog, it was a wonderful phone, but at a high price. And e
Publish At:2019-09-27 22:10 | Read:243 | Comments:0 | Tags:Apple iPhone iPhone 11

Tethered jailbreaks are back

Earlier today, a new iPhone Boot ROM exploit, checkm8 (or Apollo or Moonshine), was published on GitHub by axi0mX, affecting the iPhone 4S through the iPhone X. The vulnerability was patched in devices with A12 and A13 CPUs. As of this writing, the iPhone XS, XS Max, XR, 11, 11 Pro and 11 Pro Max are all safe from this exploit. We strongly urge all journalis
Publish At:2019-09-27 16:30 | Read:283 | Comments:0 | Tags:Apple Exploits iVerify

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been exploiting multiple iPhone vulnerabilities for the last two years. How? Simply by getting users to visit a website. How exactly does this exploitation campaign work? According to WIRED, researchers revealed
Publish At:2019-09-19 23:20 | Read:354 | Comments:0 | Tags:Consumer Threat Notices Apple cybersecurity IoT malware mobi

Apple updates iPhone, Apple Watch, and iPad; gives info on Apple Arcade and Apple TV+

"Spring ahead, fall new iPhone." I think that's what they say. Like clockwork now since 2014 and the release of the iPhone 4S, Apple this week announced the latest model of the iPhone along with other new products and services.Eschewing the Roman numeral naming for the device, this one goes to 11. (I know, it's a cliché, and fortunately, Apple didn't use it.
Publish At:2019-09-19 16:40 | Read:238 | Comments:0 | Tags:Apple Apple Arcade Apple Event Apple TV Apple Watch iPad iPh

From The Depths Of Counterfeit Smartphones

In an age of online second-hand retailers, marketplace exchanges, and third-party refurb shops, it’s easier than ever to save hundreds of dollars when buying a phone. These channels provide an appealing alternative for people foregoing a retail shopping experience for a hefty discount. However, there is an additional option for those bargain hunters seeking
Publish At:2019-09-19 16:00 | Read:180 | Comments:0 | Tags:Apple Malware

Hackers leak WhatsApp screenshots and intimate photos of WWE Diva Paige

A new batch of WhatsApp screenshots and intimate photos of the WWE celebrity Diva Paige was published on a popular celebrity leak website. In March, hackers leaked online nude photos and videos of WWE Diva Paige (real name is Saraya Jade-Bevis), and now a new batch of x-rated images of the celebrity appeared on the Internet. Personal and private photos of m
Publish At:2017-11-06 10:45 | Read:7649 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities data lea

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:3287 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Millions of Macs open to EFI Firmware Hacks even if they are up-to-date

A group of researchers with Duo Security demonstrated that millions of Up-to-Date Apple Macs are vulnerable to EFI Firmware attacks. In 2015, the security researcher Trammell Hudson demonstrated at the Chaos Computer Congress in Hamburg, how it is possible to infect Apple Mac PCs exploiting the Thunderbolt port. Since the disclosure of the attack against th
Publish At:2017-10-01 02:25 | Read:3203 | Comments:0 | Tags:Breaking News Hacking Reports Apple bootkit EFI hack OS X Th

iXintpwn/YJSNPI Abuses iOS’s Config Profile, can Crash Devices

by Hara Hiroaki, Higashi Yuka, Ju Zhu, and Moony Li While iOS devices generally see relatively fewer threats because of the platform’s walled garden approach in terms of how apps are installed, it’s not entirely unbreachable. We saw a number of threats that successfully scaled the walls in 2016, from those that abused enterprise certificates to ones th
Publish At:2017-09-19 00:55 | Read:4475 | Comments:0 | Tags:Mobile Apple iOS iOS Configuration Profile iXintpwn YJSNPI I

6 Million Celebrities Instagram High-Profiles Data available for sale on DoxaGram

Doxagram website claims to be selling the email addresses and phone numbers of 6M High-Profiles Instagram accounts ranging from POTUS to Taylor Swift. The story began with the hack of the Selena Gomez Instagram account, a hacker hijacked it and published three nude photos of Justin Bieber. A few days later, it was reported a vulnerability in the Instagram
Publish At:2017-09-02 08:30 | Read:3388 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Apple celebrit

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud