vulnerability

Read Cult of Mac’s latest posts on vulnerability:

AirDrop flaw potentially reveals users’ email and phone number

By

Airdrop ios iPad iPhone
Turns out it's not "contacts only."
Photo: Charlie Sorrel/Cult of Mac

Strangers can see the email address and other personal info of AirDrop users due to a security flaw in Apple’s file-sharing system, security researchers say. All that is required for this exploit to take place is physical proximity to an AirDrop user and a Wi-Fi device.

The researchers reportedly disclosed the flaw to Apple in May 2019, but it remains unfixed. That potentially leaves more than 1.5 billion Apple devices vulnerable.

Apple Watch’s Walkie-Talkie app disabled over eavesdropping concerns

By

watchOS 5
Walkie-Talkie vulnerability allowed users to listen in on each other .
Photo: Ste Smith/Cult of Mac

Apple temporarily disabled the Apple Watch Walkie-Talkie app after discovering a vulnerability that allowed users to listen in on another person’s iPhone calls without their knowledge.

The app will stay installed on devices, although it won’t work until Apple issues a fix.

Zoom rushes to fix its webcam-accessing flaw on Macs

By

Apple offers up to $1.5 million to anyone who spots a software flaw
Flaw allowed hackers to access other people's webcams.
Photo: United Artists

Zoom conference calls are as much of a part of modern office working life as disagreements about the air-con system.

But security researcher Jonathan Leitschuh recently stumbled upon something extremely concerning. As discovered by Leitschuh, Zoom featured a vulnerability that allowed hackers to break into a target’s Mac webcam. This happened regardless of whether the Mac user was using Safari, Chrome or Firefox.

Fortunately, Zoom has, well, zoomed to correct it.

Google’s Project Zero discovers ‘high severity’ flaw in macOS kernel

By

macOS High Sierra
Apple is said to be working on a fix.
Photo: Apple

Google’s Project Zero team has discovered a “high severity” flaw in the macOS kernel.

The issue, which potentially allows attackers to perform malicious actions on a mounted filesystem, was reported to Apple more than 90 days ago. No fix has been made available yet, but Apple has acknowledged the issue and is working with Project Zero on a patch.

Researcher provides Apple with details (and fix) for Keychain flaw

By

macOS Keychain
Apple still won't cough up a reward.
Photo: Killian Bell/Cult of Mac

A security researcher has decided to provide Apple with details — and a patch — for a serious Keychain flaw in macOS Mojave that allows anyone to access your saved usernames and passwords.

Linus Henze previously withheld the information in protest of Apple’s decision not to offer a macOS bug bounty program. He now believes the problem is too serious for the company to ignore.

Apple flaw lets hackers steal business passwords

By

The CIA has a team of more than 5,000 hackers.
Businesses beware.
Photo: Brian Klug/Flickr CC

Many businesses choose to spend more on Apple smartphones and computers because they’re supposed to be safer than more affordable alternatives running Android or Windows. But they’re not completely bulletproof.

Researchers have discovered a worrying flaw in one Apple service that allows hackers to steal business passwords from macOS and iOS devices.

Brand new Macs at risk of hacking during setup process

By

macOs Mojave
Your brand new Mac can be hacked really easily.
Photo: Apple

Apple’s rock-solid supply chain might be churning out new Macs that are already hacked.

Getting a brand new Mac usually means you’re getting the freshest, most bug-free system possible, but security researchers have discovered that there’s a way to hack brand new Macs before they’ve even been turned on.

WikiLeaks vows to share CIA ‘cyberweapons’ so tech firms can fix holes

By

Wikileaks'
Wikileaks' "Vault 7" data dump allegedly reveals CIA hacking tools used to compromise iPhones, Android phones and other devices.
Image: Gordon Johnson/Pixabay

WikiLeaks founder Julian Assange has vowed to give technology firms like Apple access to the CIA’s “cyberweapons” arsenal so they can develop fixes that make our devices more secure.

Earlier this week, thousands of leaked documents and files revealed the full extent of the CIA’s cyber attacks on smartphones, computers and even smart TVs. WikiLeaks says the spy agency has lost control of it all in a “historic act of devastating incompetence.”

Popular iOS apps vulnerable to spilling your sensitive data

By

iPhone 7 front
Be wary when using Wi-Fi.
Photo: Ste Smith/Cult of Mac

Dozens of popular iOS apps are vulnerable to spilling your sensitive data through silent “man-in-the-middle” attacks, according to a reliable mobile security expert.

During testing, Will Strafach, one of the first to hack open the iOS platform, found 76 apps that were guilty of accepting invalid certificates that could be used to intercept data.

Chrome browser bug makes movie piracy even easier

By

Screen Shot 2016-06-24 at 19.06.08
Stealing movies is simple with Chrome.
Photo: David Livshits/Alexandra Mikityuk

A worrying flaw uncovered in Google Chrome makes it even easier for pirates to download movies and TV shows from the web. Google was made aware of the issue a month ago, but the company is yet to release an update that fixes it.

In-app purchases flaw exposes developers to costly hacks

By

App Store icon
Business is booming for the App Store.
Photo: PhotoAtelier/Flickr

Sloppy coding in some popular iOS games allows hackers to give themselves and others thousands of dollars’ worth of in-app purchases for free.

The hole was discovered by developers at DigiDNA, creator of a backup tool called iMazing that allows iPhone and iPad users to access their devices’ hidden file systems. The developers found that the app backup/restore feature in iMazing 1.3 exposes weaknesses in the way games like Angry Birds 2 and Tetris Free handle in-app purchases.

To demonstrate how easy it is to hack in-app purchases using this method, the DigiDNA team tweaked Angry Birds 2 to start the game with 999,999,999 gems — the equivalent of $10,000 of in-game credits.

Serious OS X vulnerability isn’t fixed after all

By

Tim Cook addresses the White House Summit on Cybersecurity and Consumer Protection. Photo: White House
Tim Cook addresses the White House Summit on Cybersecurity and Consumer Protection. Photo: White House

A significant security flaw affecting OS X Yosemite hasn’t been fixed as previously thought, according to a former NSA staffer.

The flaw, known as Rootpipe, is said to have existed since 2011, and could allow an attacker to gain full control of another user’s Mac without requiring authentication.

Why you really want to update iOS now (it’s not emojis)

By

Apple offers up to $1.5 million to anyone who spots a software flaw
Artist's impression of the people potentially behind iOS vulnerability. Photo: Hackers, United Artists
Photo: United Artists

With reports that it can break elements of Touch ID, there are plenty of reasons to consider not upgrading to iOS 8.3, the latest version of Apple’s mobile OS.

But here’s a very good reason to: according to security researchers, the update fixes a vulnerability which has the potential to render your iPhone almost useless.

1Password Proves It Can Stand Up To Password Crackers

By

1Password goes head-to-head with password cracker and shows why complex passwords are important.
1Password goes head-to-head with a password cracker and shows why complex passwords are important.

 

1Password by AgileBits is a an incredible tool for keeping your data safe. More than just a password manager, 1Password allows you to encrypt and organize a wide range of data (website passwords, non-web digital accounts, credit/debit card numbers and financial account details, software licenses, and files containing confidential information.

Those features are all well and good, but the biggest feature is 1Password’s ability to keep all that data secure in the face of brute force attacks – the kind of attacks where a piece of software simply tries combination after combination of possible passwords. Password cracking software that rely on such attacks can easily try thousands of potential passwords each second.

To find out whether or not 1Password can withstand such attacks, AgileBits tested one 1Password against John the Ripper, one of the most well-known password cracking tools.

Got An AT&T iPhone? It May Be Vulnerable To Cellular Hijacking

By

... thanks to AT&T.
... thanks to AT&T.

AT&T is one of 48 carriers worldwide which have a network vulnerability that allows hackers to intercept cellular data and inject malicious content into the traffic that passes between smartphones and the websites they visit. The flaw can be used to transfer code to unencrypted pages which causes a user to perform unintended actions, like sending messages or friend requests from Facebook and Twitter. And your iPhone may be vulnerable.

Apple Suffers More Vulnerabilities Than Google, Microsoft, Adobe In Last Quarter

By

This Apple's software is free from vulnerabilities? You couldn't be more wrong.
Think Apple's software is free from vulnerabilities? You couldn't be more wrong.

Apple’s operating systems and its software are generally believed to be the best available in terms of security and stability, but a new report from Trend Micro reveals that’s a huge misconception… at least in recent months. In fact, the Cupertino company suffered more vulnerabilities during the last quarter than rivals like Oracle, Google, Adobe, and even Microsoft.