Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys.
The post New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys appeared first on SecurityWeek.
Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys.
The post New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys appeared first on SecurityWeek.
High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user’s knowledge.
The post Apple Shortcuts Vulnerability Exposes Sensitive Information appeared first on SecurityWeek.
Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks.
The post Apple Adds Post-Quantum Encryption to iMessage appeared first on SecurityWeek.
Apple’s latest Magic Keyboard firmware addresses a recently disclosed Bluetooth keyboard injection vulnerability.
The post Apple Patches Keystroke Injection Vulnerability in Magic Keyboard appeared first on SecurityWeek.
Chinese state-backed experts have found a way to identify people who use Apple’s encrypted AirDrop messaging service, according to the Beijing municipal government.
The post China Says State-Backed Experts Crack Apple’s AirDrop appeared first on SecurityWeek.
Apple is testing a new security feature that should limit what iPhone thieves can do with a stolen phone, even if they have the passcode.
The post Apple Testing New Stolen Device Protection Feature for iPhones appeared first on SecurityWeek.
Cupertino’s flagship mobile OS vulnerable to arbitrary code execution and data exposure security vulnerabilities.
The post Apple Ships iOS 17.2 With Urgent Security Patches appeared first on SecurityWeek.
A study commissioned by Apple shows that 2.6 billion personal data records were compromised in breaches in the past two years.
The post Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption appeared first on SecurityWeek.
iVerify, a seed-stage startup spun out of Trail of Bits, ships a mobile threat hunting platform to neutralize iOS and Android zero-days.
The post Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat appeared first on SecurityWeek.
Apple’s security response team warns that flaws CVE-2023-42916 and CVE-2023-42917 were already exploited against versions of iOS before iOS 16.7.1.
The post Apple Patches WebKit Flaws Exploited on Older iPhones appeared first on SecurityWeek.