HackDig : Dig high-quality web security articles for hacker

What’s New in iOS 13 and iPadOS 13

Apple has released iOS 13 for the iPhone and iPod touch, and the newly-named iPadOS 13 for the iPad. This is the first year that the company has created differently named versions of its mobile operating system for different devices, and there are a number of new features specific to the iPad.iOS 13 runs on the iPhone 6s or later (including the iPhone SE), a
Publish At:2019-09-20 10:10 | Read:138 | Comments:0 | Tags:Software & Apps iOS iOS 13 iPad iPad Air 2 iPad mini 4 iPad

New iOS 13 features, Smart TVs spying on you, and more – Intego Mac Podcast, Episode 101

This week on the Intego Mac Podcast, episode 101…As iOS 13 is out, Josh and Kirk discuss its new features and what you can look forward to. They also discuss how smart TVs spy on you and send data about everything you watch, as well as a new SIM card flaw and an iOS 13 lock screen bypass. Check out the full show notes for links.If you like what you hear, be
Publish At:2019-09-20 10:10 | Read:163 | Comments:0 | Tags:How To Intego Mac Security Podcast IOS

Apple iOS Attack Underscores Importance of Threat Research

The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected, through the use of zero-day vulnerabilities. In this scenario, a threat actor or actors operated multiple compromised websites, using at least one or more zero-day vulnerabilities and numerous unique
Publish At:2019-09-19 23:20 | Read:51 | Comments:0 | Tags:McAfee Labs IOS

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been exploiting multiple iPhone vulnerabilities for the last two years. How? Simply by getting users to visit a website. How exactly does this exploitation campaign work? According to WIRED, researchers revealed
Publish At:2019-09-19 23:20 | Read:115 | Comments:0 | Tags:Consumer Threat Notices Apple cybersecurity IoT malware mobi

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of
Publish At:2019-09-19 14:33 | Read:76 | Comments:0 | Tags:Android App Security iOS Mobile Malware Mobile Security Mobi

The Bad, The Ugly & The Good of Mobile Phishing Protection

“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security.  Phishing has a very low barrier of entry, attacks can be
Publish At:2019-09-19 14:33 | Read:92 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

New iOS Jailbreak Tools put Organizations at Risk

According to iDownloadBlog.com (iDB), “in an unforeseen turn of events, hacker Pwn20wnd released v3.5.0 of the unc0ver jailbreak tool to the general public Sunday morning with official support for iOS 12.4, the latest available firmware release from Apple with support for Apple Card.”  While users wanting to bypass existing Apple operating system precaution
Publish At:2019-09-19 14:33 | Read:62 | Comments:0 | Tags:Mobile Malware advanced mobile threat defense iOS malware mo

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our recent blog,
Publish At:2019-09-19 14:33 | Read:105 | Comments:0 | Tags:iOS Machine Learning Mobile Security Mobile Threat Defense T

App Stores that Formerly Coddled ZNIU Found Distributing a New iXintpwn/YJSNPI Variant

by Lilang Wu, Ju Zhu, and Moony Li We covered iXintpwn/YJSNPI in a previous blog post and looked into how it renders an iOS device unresponsive by overflowing it with icons. This threat comes in the form of an unsigned profile that crashes the standard application that manages the iOS home screen when installed. The malicious profile also exploits certain fe
Publish At:2017-11-02 20:40 | Read:4613 | Comments:0 | Tags:Bad Sites Malware Mobile android app stores iOS

APPLE-SA-2017-10-31-1 iOS 11.1

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512APPLE-SA-2017-10-31-1 iOS 11.1iOS 11.1 is now available and addresses the following:CoreTextAvailable for: iPhone 5s and later, iPad Air and later, and iPodtouch 6th generationImpact: Processing a maliciously crafted text file may lead to anunexpected application terminationDescription: A denial of service issue
Publish At:2017-11-01 20:05 | Read:5474 | Comments:0 | Tags: IOS

APPLE-SA-2017-10-31-9 Additional information for APPLE-SA-2017-09-19-1 iOS 11

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512APPLE-SA-2017-10-31-9Additional information for APPLE-SA-2017-09-19-1 iOS 11iOS 11 addresses the following:802.1XAvailable for: iPhone 5s and later, iPad Air and later, and iPodtouch 6th generationImpact: An attacker may be able to exploit weaknesses in TLS 1.0Description: A protocol security issue was addressed
Publish At:2017-11-01 20:05 | Read:3211 | Comments:0 | Tags: IOS

Dangerous liaisons

It seems just about everyone has written about the dangers of online dating, from psychology magazines to crime chronicles. But there is one less obvious threat not related to hooking up with strangers – and that is the mobile apps used to facilitate the process. We’re talking here about intercepting and stealing personal information and the de-anonymi
Publish At:2017-10-24 11:55 | Read:4124 | Comments:0 | Tags:Featured Mobile threats Android Certificate HTTPS iOS Mobile

iOS apps can access metadata revealing users’ locations and much more

Developer discovered that iOS apps can read metadata revealing users’ locations and much more, a serious threat to our privacy. The developer Felix Krause, founder of Fastlane.Tools, has discovered that iOS apps can access image metadata revealing users’ location history. Krause published a detailed analysis on the Open Radar community, he explai
Publish At:2017-09-28 18:26 | Read:3845 | Comments:0 | Tags:Breaking News Digital ID Hacking Mobile DetectLocations Exif

CISCO addressed several critical IOS flaws that expose devices to remote attacks

Cisco has released security updates for its IOS Operating System to fix more than a dozen critical and high severity vulnerabilities. Cisco has released updates for its IOS software to fix more than a dozen critical and high severity vulnerabilities that could be exploited by attackers to remotely take over company’s switches and routers. Giving a close loo
Publish At:2017-09-28 18:26 | Read:3411 | Comments:0 | Tags:Breaking News Hacking CISCO iOS RCE IOS

APPLE-SA-2017-09-25-4 Additional information for APPLE-SA-2017-09-19-1 iOS 11

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512APPLE-SA-2017-09-25-4Additional information for APPLE-SA-2017-09-19-1 iOS 11iOS 11 addresses the following:BluetoothAvailable for: iPhone 5s and later, iPad Air and later,and iPod touch 6th generationImpact: An application may be able to access restricted filesDescription: A privacy issue existed in the handling
Publish At:2017-09-26 11:15 | Read:3561 | Comments:0 | Tags: IOS


Share high-quality web security related articles with you:)


Tag Cloud