iphone
-
Корпорация Apple призвала обновить все iPhone и прочую фирменную технику. Об этом компания сообщила в бюллетене по безопасности. Специалисты рассказали, что в компонентах операционных систем (ОС) CoreAudio (CVE-2025-31200) и RPAC (CVE-2025-31201) нашли критические уязвимости, которым присвоены соответствующие идентификаторы. Проблема затрагивает iOS, macOS, tvOS, iPadOS и visionOS. «Apple известно о том, что уязвимости могли быть использованы…
-
Apple has released emergency security updates for iOS/iPadOS, macOS, tvOS and visionOS that fix two zero-day vulnerabilities (CVE-2025-31200, CVE-2025-31201) that have been exploited “in an extremely sophisticated attack against specific targeted individuals on iOS.” CVE-2025-31200 and CVE-2025-31201 CVE-2025-31200 affects CoreAudio, an API Apple devices use for processing audio. The memory corruption vulnerability can be triggered…
-
Apple’s iOS 18.4.1 update fixes a bug with wireless CarPlay and resolves two security holes already exploited in targeted attacks.
-
Apple’s iOS 18.4.1 update fixes a bug with wireless CarPlay and resolves two security holes already exploited in targeted attacks.
-
Apple has released iOS 18.4.1 and iPadOS 18.4.1 to address two critical zero-day vulnerabilities that were actively exploited in highly targeted, sophisticated attacks against specific individuals iPhone. The vulnerabilities, identified in the CoreAudio and RPAC components, could allow attackers to execute arbitrary code or bypass security protections on affected devices. 2 Zero Vulnerabilities Under Active…
-
Enhance your privacy, stream foreign Netflix and Disney Plus content and avoid mobile traffic-shaping with the best iPhone VPNs on the market.
-
Apple released emergency security updates to patch two zero-day vulnerabilities that were used in an “extremely sophisticated attack” against specific targets’ iPhones. […]
-
A vulnerability has been found in Apple iPhone OS up to 1.1.2 and classified as very critical. This vulnerability affects unknown code. The manipulation leads to improper resource management. This vulnerability was named CVE-2008-4231. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
You can connect a surprising variety of things to iPhones and iPads via their USB-C (or Lightning) ports, including storage devices, SD card readers, Ethernet, video adapters, and more. Here are all the adapters you might need, and things you should know, if you want to connect anything to your iPad or iPhone. The post…
-
How did Atlantic editor-in-chief Jeffrey Goldberg get added to a Signal group chat with Trump administration officials discussing their plans for an airstrike in Yemen? The simplest explanation: National Security Adviser Mike Waltz had Goldberg saved as a contact in his phone and accidentally added him. Indeed, when Waltz first claimed that Goldberg’s phone number…
-
You don’t need your friends — or potential scammers — to know when you’ve read their message.
-
Apple has been rumored to be working on new foldable devices, which will be a first for the Cupertino-based company. A new report by analyst Jeff Pu of GF Securities not only corroborates the launch of Apple’s first foldable in 2026, but suggests that it will help the company recover from lower iPhone sales in…
-
Apple has rolled out emergency patches for a bug affecting Webkit, the open-source web browser engine used primarily in Safari, against active exploitations in the wild. The vulnerability, CVE-2025024201, was reportedly exploited in zero-day attacks against targeted individuals. “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated…
-
The iPhone 16e is not the best iPhone, but it’s pretty darn good. The post iPhone 16e Review: An iPhone That’s Good Enough for Most People appeared first on The Mac Security Blog.
-
Both iOS and iPadOS include plenty of default apps. But is it best to use Apple’s Mail, Safari, and Messages apps, or third-party apps? And is it possible to set third-party apps as the default? The post Switch default apps on iPhone or iPad for better security and privacy appeared first on The Mac Security…
-
The new iPhone 16e is more expensive than the iPhone SE it replaces, but its rich feature set could make it the iPhone for almost everyone. The post Apple’s new iPhone 16e: The iPhone for almost everyone? appeared first on The Mac Security Blog.
-
Less than a month after Apple released its own “budget” iPhone, the iPhone 16e, Samsung is out with a new midrange Galaxy A series update for 2025. And unlike Apple’s $599 phone, the Galaxy A26, an admittedly more budget-friendly device, starts at just $300. The Galaxy A56 on the other hand, a more direct iPhone…
-
A vulnerability was found in Apple iPhone up to X. It has been declared as critical. This vulnerability affects unknown code of the component UBS Handler. The manipulation leads to improper privilege management. This vulnerability was named CVE-2019-8900. It is possible to launch the attack on the physical device. Furthermore, there is an exploit available.…