apple_badger
About
- Username
- apple_badger
- Joined
- Visits
- 52
- Last Active
- Roles
- member
- Points
- 202
- Badges
- 0
- Posts
- 86
Reactions
-
Apple's latest security update is important, but the mass-media response is unhinged
I'm going to respectfully disagree here. Speaking as someone who heads up Information security for an organization, this may not be as quite bad as it gets (it won't kill your dog), but it's darn close. A remote code execution flaw in webkit paired with the ability to execute arbitrary code with kernel privileges is really, really, *really* bad. -
Compared: Apple Studio Display vs LG UltraFine 5K Display
hal301 said:One other difference, although not clearly mentioned by Apple, is that the LG monitor has an internal power supply - the power cord plugs directly into the back of the monitor. The Studio Display most likely uses the same (or at least very similar) external brick that the 24" iMac uses. So one more small box on the floor. -
Apple 'poisoned the well' for client-side CSAM scanning, says former Facebook security chi...
lkrupp said:Remember, people, this is the former 'Facebook security chief’. Facebook and security are mutually exclusionary terms. It’s like trying to put a square peg into a round hole. It ain’t happening.
He's guest hosted the Risky Business security podcast numerous times. If you want to get a sense of the guy, I recommend listening to those episodes. -
Apple says iOS Mail vulnerabilities do not pose immediate threat, patch coming
It's probably a good idea to read the original release from ZecOps (https://blog.zecops.com/vulnerabilities/youve-got-0-click-mail/) or at least their FAQ for this (https://blog.zecops.com/vulnerabilities/youve-got-0-click-mail/#post-faq). They lay out their case for why they think there's been exploitation and also explain that this is, by itself, not enough to fully take over the phone.
Speaking as someone who works in IT security, I'm going to make two observations:1. Gaining control of an email account can have catastrophic consequences, both for the individuals and organizations.2. Whenever some locally exploitable bug is reported on here, there is always a chorus of people who disclaim it based on the fact that you need access to the device or to be running software on the device in order to exploit it, and they only get their software from the App Store, or some such thing. This is the other half of the exploit chain that makes local vulnerabilities so dangerous; this is the kind of thing that makes local vulnerabilities into remote ones. -
U.S. Senate, Google ban Zoom days after its launch of 'security council'
Andy.Hardwake said:Security advisory council headed by a Facebook security officer... Bwahahahahaha long way to go guys!