Tag: apple
-
Russia blocks FaceTime and Snapchat for alleged use by terrorists
Russian telecommunications watchdog Roskomnadzor has blocked access to Apple’s FaceTime video conferencing platform and the Snapchat instant messaging service, claiming they’re being used to coordinate terrorist attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russia-blocks-facetime-and-snapchat-over-use-in-terrorist-attacks/
-
Russia blocks FaceTime and Snapchat over use in terrorist attacks
Russian telecommunications watchdog Roskomnadzor has blocked access to Apple’s FaceTime video conferencing platform and the Snapchat instant messaging service, claiming they’re being used to coordinate terrorist attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russia-blocks-facetime-and-snapchat-over-use-in-terrorist-attacks/
-
Sicherheitsforscher warnt: Apple zeigt den Mittelfinger in Richtung MacOS
Forscher erhalten künftig teils deutlich weniger Geld für an Apple gemeldete MacOS-Sicherheitslücken. Betroffene sind nicht begeistert. First seen on golem.de Jump to article: www.golem.de/news/macos-apple-veraergert-forscher-mit-gekuerzten-bug-bounty-praemien-2512-202913.html
-
Sicherheitsforscher warnt: Apple zeigt den Mittelfinger in Richtung MacOS
Forscher erhalten künftig teils deutlich weniger Geld für an Apple gemeldete MacOS-Sicherheitslücken. Betroffene sind nicht begeistert. First seen on golem.de Jump to article: www.golem.de/news/macos-apple-veraergert-forscher-mit-gekuerzten-bug-bounty-praemien-2512-202913.html
-
India Scraps Mandatory App Preinstall Following Industry Pushback
The reversal comes just 48 hours after reports surfaced that Apple refused to comply with the order to preload the government’s Sanchar Saathi app. The post India Scraps Mandatory App Preinstall Following Industry Pushback appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-india-scraps-mandatory-app-preinstall/
-
The Hidden Calendar Threat Putting 4 Million Apple Devices at Risk
Hijacked calendar subscriptions are emerging as a stealthy new way for attackers to push phishing and malware directly onto devices. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/the-hidden-calendar-threat-putting-4-million-apple-devices-at-risk/
-
Apples Podcasts-App gehackt? Warum sie plötzlich fremde Inhalte abspielt
Tags: appleFirst seen on t3n.de Jump to article: t3n.de/news/apples-podcasts-app-gehackt-warum-sie-ploetzlich-fremde-inhalte-abspielt-1719029/
-
Apple’s lousy AI didn’t stop it beating Samsung’s smartphone sales for the first time since 2011
Analyst Counterpoint says second-hand phones are also helping Cupertino to the smartphone shipment summit First seen on theregister.com Jump to article: www.theregister.com/2025/11/27/counterpoint_smartphone_market_predictions/
-
Apple’s lousy AI didn’t stop it beating Samsung’s smartphone sales for the first time since 2011
Analyst Counterpoint says second-hand phones are also helping Cupertino to the smartphone shipment summit First seen on theregister.com Jump to article: www.theregister.com/2025/11/27/counterpoint_smartphone_market_predictions/
-
NDSS 2025 Hidden And Lost Control: On Security Design Risks In loT User-Facing Matter Controller
Session4A: IoT Security Authors, Creators & Presenters: Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy…
-
NDSS 2025 Hidden And Lost Control: On Security Design Risks In loT User-Facing Matter Controller
Session4A: IoT Security Authors, Creators & Presenters: Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy…
-
Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level
Tags: access, apple, attack, crypto, cryptography, data, exploit, government, group, infrastructure, open-source, rust, vulnerabilityTrail of Bits has developed constant-time coding support for LLVM 21, providing developers with compiler-level guarantees that their cryptographic implementations remain secure against branching-related timing attacks. This work introduces the __builtin_ct_select family of intrinsics and supporting infrastructure that prevents the Clang compiler, and potentially other compilers built with LLVM, from inadvertently breaking carefully crafted constant-time…
-
Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level
Tags: access, apple, attack, crypto, cryptography, data, exploit, government, group, infrastructure, open-source, rust, vulnerabilityTrail of Bits has developed constant-time coding support for LLVM 21, providing developers with compiler-level guarantees that their cryptographic implementations remain secure against branching-related timing attacks. This work introduces the __builtin_ct_select family of intrinsics and supporting infrastructure that prevents the Clang compiler, and potentially other compilers built with LLVM, from inadvertently breaking carefully crafted constant-time…
-
Google enables PixeliPhone file sharing via Quick Share, AirDrop
Google has added interoperability support between Android Quick Share and Apple AirDrop, to let users share files between Pixel devices and iPhones. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/mobile/google-enables-pixel-to-iphone-file-sharing-via-quick-share-airdrop/
-
MY TAKE: Carol Sturka declares ‘I have agency!’, Big Tech’s AI models now testing that claim
It was a tense moment in Episode 4 of Pluribus, the Apple TV series about a world linked by a single intelligence. Related: Mistaking pattern mastery for wisdom A character named Carol Sturka, surrounded by a seemingly benevolent collective… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/my-take-carol-sturka-declares-i-have-agency-big-techs-ai-models-now-testing-that-claim/
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices.The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad,…
-
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices.The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad,…
-
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices.The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad,…
-
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices.The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad,…
-
Apple iPhone & Google Pixel – AirDrop und Quick Share auf Android sind jetzt kompatibel
Google stärkt die Kompatibilität der Dateiübertragung zwischen Quick Share auf Android und AirDrop auf iPhones. First seen on computerbase.de Jump to article: www.computerbase.de/news/smartphones/apple-iphone-und-google-pixel-airdrop-und-quick-share-auf-android-sind-jetzt-kompatibel.95141
-
Apple iPhone & Google Pixel – AirDrop und Quick Share auf Android sind jetzt kompatibel
Google stärkt die Kompatibilität der Dateiübertragung zwischen Quick Share auf Android und AirDrop auf iPhones. First seen on computerbase.de Jump to article: www.computerbase.de/news/smartphones/apple-iphone-und-google-pixel-airdrop-und-quick-share-auf-android-sind-jetzt-kompatibel.95141
-
Google links Android’s Quick Share to Apple’s AirDrop, without Cupertino’s help
Relies on very loose permissions, but don’t worry Google wrote it in Rust First seen on theregister.com Jump to article: www.theregister.com/2025/11/21/google_links_androids_quick_share/
-
Google links Android’s Quick Share to Apple’s AirDrop, without Cupertino’s help
Relies on very loose permissions, but don’t worry Google wrote it in Rust First seen on theregister.com Jump to article: www.theregister.com/2025/11/21/google_links_androids_quick_share/
-
MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
A new infostealer is targeting macOS users by masquerading as the legitimate DynamicLake UI enhancement and productivity utility and possibly Google’s Drive for desktop app. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/macos-digitstealer-malware-poses-as-dynamiclake-targets-apple-silicon-m2-m3-devices/
-
MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
A new infostealer is targeting macOS users by masquerading as the legitimate DynamicLake UI enhancement and productivity utility and possibly Google’s Drive for desktop app. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/20/macos-digitstealer-malware-poses-as-dynamiclake-targets-apple-silicon-m2-m3-devices/
-
Exploit macht aus iPhone ein iPad mit Multitasking
Dank der Modifikation einer Datei auf dem iPhone gibt sich dieses als iPad aus – und verfügt dann über Funktionen wie Multitasking. First seen on golem.de Jump to article: www.golem.de/news/apple-exploit-macht-aus-iphone-ein-ipad-mit-multitasking-2511-202324.html
-
Apple’s new 15% mini-app deal finally gets Tencent to cut Cupertino in
Tags: appleWhen is an app not an app? When it’s a mini app inside another app First seen on theregister.com Jump to article: www.theregister.com/2025/11/15/apple_tencent_app_deal/
-
Apple schließt kritische Sicherheitslücken – Apple schließt über 50 Schwachstellen mit iOS 26.1
First seen on security-insider.de Jump to article: www.security-insider.de/apple-ios-26-1-update-sicherheitsluecken-behebung-a-a1725aeead5520caf3cc9c6181a7121d/

