Apple and WordPress fix dangerous threats to browsers
Apple has released new versions of Safari for its three latest versions of OS X, addressing flaws that could allow a remote attacker to take control of a hacked system via malicious websites.
Apple has released new versions of Safari for its three latest versions of OS X, addressing flaws that could allow a remote attacker to take control of a hacked system via malicious websites.
On Monday Apple issued a security update for Mac OS X Mountain Lion, Mavericks, and Yosemite that fixes a "critical security issue with the software that provides the Network Time Protocol service on OS X." Recommended for all users, Software Update suggests that you install the update as soon as possible. Details are currently unavailable, but Apple should issue them on the Apple Security Updates page shortly.
Christopher Breen | 23 Dec | Read more
Well, this isn't good. Akamai security researcher, Stephane Chazelas, has discovered a devastating flaw in the Unix Bash shell, leaving Linux machines, OS X machines, routers, older IoT devices, and more vulnerable to attack. "Shellshock," as it's been dubbed, allows attackers to run code on your machine after exploiting the flaw, but the true danger here lies in just how old Shell Shock is - this vulnerability has apparently been lurking in the Bash shell for years.
Brad Chacos | 25 Sep | Read more
Apple's iCloud attack is nothing in comparison with the kind of attacks <strong>every tech firm must prepare for</strong>, as they offer payment and connected solutions for home, health and car. Here's some ways for you to protect yourself and for Apple to improve its own security.
Jonny Evans | 03 Sep | Read more
It never rains software update, but it pours. Apple on Monday released OS X Mavericks 10.9.4, incorporating a number of small fixes for the Mac OS, as well as patching some security holes. Apple also released iOS 7.1.2.
On the surface, the critical "Shellshock" bug revealed this week sounds devastating. By exploiting a bug in the Bash shell command line tool found in Unix-based systems, attackers can run code on your system--essentially giving them access to your system. Bad guys are already developing exploits that use Shellshock to crack your passwords and install DDoS bots on computers. And since Bash shell is borderline ubiquitous, a vast swath of devices are vulnerable to Shellshock: Macs, Linux systems, routers, web servers, "Internet of Things" gizmos, you name it.
Brad Chacos | 27 Sep | Read more