TECHNOBABBLE

TECHNOLOGY | SECURITY | NEWS

Category: Apple

BlueBorne vulnerability places billions of devices at risk…

Armis Labs has revealed a new attack vector that places billions of devices at risk and is completely platform agnostic. Virtually every device with Bluetooth enabled is exploitable via BlueBorne regardless of operating system  – Mac OS, iOS (only devices running iOS 9.3.5 and lower are affected), Android, Linux and Windows are all affected.     So what is BlueBorne?…

How to prevent WINMAIL.DAT attachments in Exchange Online by disabling TNEF

I’ve run into this problem a handful of times over the last few years. An Exchange user sends and e-mail with attachment(s) to a non-Exchange user and the recipient receives nothing but a WINMAIL.DAT file that they cannot open. The most commonly preached resolution was simply to tell the sender to stop using the Rich Text Format (RTF) when sending…

Adobe Flash 0-Day listed in the Angler and Magnitude Exploit Kits

It’s no surprise that another vulnerability was found in Adobe Flash. The latest flaw has been branded CVE-2015-3113 and has been added to the ever growing list of vulnerabilities listed in the Angler and Magnitude exploit kits (both of which are readily available). While Adobe released an update for this exploit last week, that update is dependent on users actually…

Apple patches bash Shellshock vulnerability in OS X

Apple has just released an update for OS X, patching the bash Shellshock vulnerability for those potentially effected by the bug. You can download the update immediately from the Apple support site, though it does not show up in automatic updates. OS X bash Update 1.0 – OS X Mavericks http://support.apple.com/kb/DL1769 This update fixes a security flaw in the bash…

How to determine if you’re vulnerable to the Shellshock / Bashdoor Bug

The Shellshock bug, though recently discovered, is a security vulnerability that has been present in Bash for two decades and primarily effects Linux/Unix/Mac users – not Windows users. An attacker leveraging this exploit could potentially execute commands remotely. The Shellshock vulnerability was discovered on September 12th, 2014 Stéphane Chazelas. How can you ensure that your system is not vulnerable? First, check which version of Bash…

Follow the Apple iPhone 6 event on my Twitter feed… https://twitter.com/aaadinolfi

You can follow the latest from the Apple iPhone 6 event on my Twitter feed, here… https://twitter.com/aaadinolfi You can also follow the live video and blog via Apple.com here: http://www.apple.com/live/2014-sept-event/# and via CNET, here: http://live.cnet.com/Event/Apple_September_9_event …and the event has started!  

iOS 8 Beta 5 is now available (for Developers)

iOS 8 Beta 5 is now available (for Developers) The latest version of the iOS 8 Beta (Beta 5) is now available to developers via the iOS Dev Center! For more information and additional support resources, visit http://developer.apple.com/programs/ios/.   Full release notes for iOS 8 Beta 5… Introduction iOS SDK 8.0 provides support for developing iOS apps. It is packaged with…

iOS 8 Beta 3 is now available (for Developers)

iOS 8 Beta 3 is now available (for Developers) The latest version of the iOS 8 Beta (Beta 3) is now available to developers via the iOS Dev Center! For more information and additional support resources, visit http://developer.apple.com/programs/ios/.   Full release notes for iOS 8 Beta 3… Introduction iOS SDK 8.0 provides support for developing iOS apps. It is packaged…

BlueBorne vulnerability places billions of devices at risk via Bluetooth protocols... Would you like to know more?
+ +