Skip to main content

Security

See All Stories

Major Thunderbolt security flaws found, affect Macs shipped 2011-2020 [U]

Thunderbolt flaws present in old and new Macs

Update: Intel comment added at end.

No fewer than seven serious Thunderbolt security flaws have been discovered, affecting machines with both standalone Thunderbolt ports and the Thunderbolt-compatible USB-C ports used on modern Macs.

The flaws allow an attacker to access data even when the machine is locked, and even when the drive is encrypted …


Expand
Expanding
Close

Comment: ‘$3k Macs reduced to $12 scrap’ shows need for a new T2 chip approach

A new T2 chip approach is needed

Apple has made great progress over the years in protecting its customers against two big risks: theft of their Apple devices, and exposure of their personal data.

Activation Lock was introduced in 2013 and made it impossible for a thief to restore an iPhone or iPad to factory settings without the Apple ID credentials of its owner, or proof of purchase. Apple’s T2 chip did the same job for Macs as of 2018.

But while that’s great for protecting data, and making Apple devices far less appealing targets to thieves, there is a big downside …


Expand
Expanding
Close

Apple and DOJ fight over photos that have ‘national security concerns’

Apple-Corellium lawsuit may raise national security concerns

Apple’s lawsuit against virtualization company Corellium has taken a surprising turn, as the Department of Justice claims that photos Apple wants to introduce into evidence may have ‘national security concerns.’

The DOJ wants Apple to hand over the photos before introducing them into evidence so that it can examine them before deciding whether the government has an interest in the case …


Expand
Expanding
Close

Security researchers agree iPhone Mail vulnerabilities may have been exploited

iPhone Mail vulnerabilities may have been exploited without Apple's awareness

Last week saw contradictory claims about iPhone Mail vulnerabilities, with a security company claiming that they had been exploited in real-world attacks, and Apple stating that it can find no evidence of this.

Two leading security researchers have now weighed in on this, agreeing with Apple on one point, while stating it remains possible that the bugs have been exploited …


Expand
Expanding
Close

Apple strongly denies that iPhone Mail vulnerabilities have been exploited

iPhone Mail vulnerabilities have not been exploited says Apple

A security company which discovered iPhone Mail vulnerabilities claimed that they have been ‘widely exploited’ in real-world attacks. Apple has now denied this claim, stating that it could find ‘no evidence’ that the exploits have been used.

Additionally, it says that the vulnerabilities in question cannot bypass iPhone and iPad security safeguards …


Expand
Expanding
Close

Report: iPhone Mail app zero-day exploits found in the wild, Apple has fix coming in next public iOS release

A new potentially serious software vulnerability has been discovered in iOS 13 that works via the default Mail app on iPhone and iPad. The security group ZecOps (via Motherboard) says that one of the two vulnerabilities is a zero-click exploit (no user interaction needed) that can be performed remotely.


Expand
Expanding
Close

Facebook tried to buy controversial tool to spy on iPhone users, court filing reveals

Mark Zuckerberg announces Meta lay

Over the last few years, Facebook has had a slew of privacy and security blunders and more details about one of them have come to light through a new court filing as the social media company is suing the spyware company NSO Group. It turns out Facebook tried to buy controversial government spyware to monitor iPhone and iPad users.


Expand
Expanding
Close

White-hat hacker able to hijack iPhone camera; Apple has now fixed

Hacker managed to hijack iPhone cameras

A white-hat hacker was able to hijack iPhone cameras using a chain of three vulnerabilities he discovered. The same approach would also work with the cameras on Macs.

Ryan Pickren disclosed the vulnerabilities to Apple in December of last year. The company fixed the most serious of them in January, and the rest last month.

The approach relied on an exception to the normal privacy requirement for apps to seek permission for camera or microphone access…


Expand
Expanding
Close

[Update: Zoom patches and responds] Ex-NSA hacker finds new Zoom flaws to takeover Macs again, including webcam, mic, and root access

zoom vulnerability

Zoom, the popular video call service has had a number of privacy and security issues over the years and we’ve seen several very recently as Zoom has seen usage skyrocket during the coronavirus pandemic. Now two new bugs have been discovered that allow hackers to take control of Macs including the webcam, microphone, and even full root access.


Expand
Expanding
Close

Zoom video calls are not actually end-to-end encrypted

As reported by The Intercept, the Zoom video conferencing app offers options for end to end encryption in its UI (and in its marketing materials) but the calls are not actually end-to-end encrypted at all.

The Zoom video app is bursting into the public consciousness this year as the coronavirus causes most people to work from home. However, the security of the app has come under fire in many ways. In this instance, it turns out Zoom calls are only encrypted in transmission. This means the central Zoom servers could decrypt the incoming calls and see all participants if the company wanted to.


Expand
Expanding
Close