Tag: apple
-
Apple’s ultra-thin iPhone flops as foldable iPad hits a crease
Weak demand for iPhone Air and delays to a costly foldable tablet suggest Cupertino’s hardware experiments are struggling First seen on theregister.com Jump to article: www.theregister.com/2025/10/23/apples_ultrathin_iphone_flops/
-
AI browsers can be abused by malicious AI sidebar extensions: Report
‘Dumpster fires’: David Shipley, head of Canadian employee security awareness training firm Beauceron Security, agrees.”I think if CISOs are bored and want to spice up their lives with an incident, they should roll out these AI-powered hot messes to their users,” he said .”But, if they’re like most CISOs and they have lots of problems,…
-
DTTS – Zero Trust DNS Enforcement: Policy Violation Management
In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, including being able to enforce “My network, my rules” approach to egress control. However, in this world where existing applications need to…
-
Russia pressures Apple to make Russian search engines default on locally-sold iPhones
In a letter to Apple cited by the state news agency TASS, the Federal Antimonopoly Service (FAS) said Apple’s current setup gives preference to foreign search engines, putting local providers at a “competitive disadvantage” and infringing on consumers’ rights. First seen on therecord.media Jump to article: therecord.media/russia-apple-search-engine-default
-
Apple alerts exploit developer that his iPhone was targeted with government spyware
A developer at Trenchant, a leading Western spyware and zero-day maker, was suspected of leaking company tools and fired. Weeks later, Apple notified him that his personal iPhone was targeted with spyware. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/
-
U.S. CISA adds Oracle, Windows, Kentico, and Apple flaws to its Known Exploited Vulnerabilities catalog
Tags: apple, cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, oracle, update, vulnerability, windowsU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Oracle, Windows, Kentico, and Apple flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Oracle, Windows, Kentico, and Apple flaws to its Known Exploited Vulnerabilities (KEV) catalog. Oracle recently released an emergency patch to address an information disclosure flaw, tracked as CVE-2025-61884 (CVSS…
-
Apple and Google challenged by parents’ rights coalition on youth privacy protections
The Digital Childhood Institute, which filed a complaint with the FTC, is part of a newer crop of online safety groups focused on shaping tech policy around conservative political beliefs. First seen on cyberscoop.com Jump to article: cyberscoop.com/digital-childhood-institute-files-ftc-complaint-against-google-online-safety/
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
CISOs face quantum leap in prioritizing quantum resilience
Tags: apple, attack, ciso, cloud, computer, computing, crypto, cybersecurity, data, data-breach, encryption, finance, governance, government, Hardware, healthcare, infrastructure, nist, resilience, risk, service, software, supply-chain, technology, threat, vulnerabilityState of migration: Encryption underpins the security of everything from healthcare records to government data and e-commerce transactions.But just 8.5% of SSH servers currently support quantum-safe encryption.TLS 1.3 adoption, currently at 19%, also trails older, quantum-vulnerable versions, according to a recent study by Forescout.Other experts paint a more optimistic picture of PQC deployment since NIST…
-
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems.”UNC5142 is characterized by its use of compromised WordPress websites and ‘EtherHiding,’ a technique used…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
Court dismisses Apple’s appeal against Home Office backdoor
Investigatory Powers Tribunal rules that Apple’s appeal against the Home Office will no longer proceed because of a ‘change in circumstances’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632561/Apple-and-Home-Office-agree-to-drop-legal-claim-over-encryption-backdoor
-
iPhone besser vor Behördenzugriff schützen: Apple verdoppelt Bug-Bounty-Prämie
First seen on t3n.de Jump to article: t3n.de/news/iphone-apple-bug-bounty-1711809/
-
Apple and Home Office agree to drop legal claim over encryption backdoor
Investigatory Powers Tribunal rules that Apple’s appeal against the Home Office will no longer proceed because of a ‘change in circumstances’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632561/Apple-and-Home-Office-agree-to-drop-legal-claim-over-encryption-backdoor
-
Apple and Home Office agree to drop legal claim over encryption backdoor
Investigatory Powers Tribunal rules that Apple’s appeal against the Home Office will no longer proceed because of a ‘change in circumstances’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632561/Apple-and-Home-Office-agree-to-drop-legal-claim-over-encryption-backdoor
-
Apple and Home Office agree to drop legal claim over encryption backdoor
Investigatory Powers Tribunal rules that Apple’s appeal against the Home Office will no longer proceed because of a ‘change in circumstances’ First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632561/Apple-and-Home-Office-agree-to-drop-legal-claim-over-encryption-backdoor
-
Belohnung – Apple erhöhte die Prämien für gemeldete Schwachstellen
Apples Belohnungsprogramm für das Auffinden von Sicherheitslücken wird lukrativer. Die Prämien steigen deutlich. First seen on computerbase.de Jump to article: www.computerbase.de/news/wirtschaft/belohnung-apple-erhoehte-die-praemien-fuer-gemeldete-schwachstellen.94644
-
Apple Bug Bounty Payouts Can Now Top $5m
Apple has doubled its top bug bounty reward to $2m but with bonuses it could reach $5m First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/apple-bug-bounty-payouts-can-now/
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Apple ups the reward for finding major exploits to $2 million
With bonuses, maximum rewards can be as high as $5 million. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/apple-ups-the-reward-for-finding-major-exploits-to-2-million/
-
Apple doubles maximum bug bounty to $2M for zero-click RCEs
Apple raised bug bounties to $2M for zero-click RCEs, doubling payouts. Since 2020, it’s paid $35M to 800 researchers. Apple doubled its bug bounty rewards, now offering up to $2 million for zero-click remote code execution flaws. Since 2020, the tech giant has paid $35M to 800 researchers. Apple aims to pay exploit chains comparable…
-
Apple bumps RCE bug bounties to $2M to counter commercial spyware vendors
Higher difficulty means higher rewards: The culmination of that work is what Apple now calls Memory Integrity Enforcement (MIE) and is a feature of its new A19 and A19 Pro chips found in its iPhone 17 and iPhone Air lineup. MIE is leveraged in iOS to protect the entire kernel and over 70 userland processes,…
-
Apple now offers $2 million for zero-click RCE vulnerabilities
Apple is announcing a major expansion and redesign of its bug bounty program, doubling maximum payouts, adding new research categories, and introducing a more transparent reward structure. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apple-now-offers-2-million-for-zero-click-rce-vulnerabilities/
-
Sicherheitslücken finden: Apple schreibt zwei Millionen Dollar an Bug-Bounties aus
Tags: appleInsgesamt hat Apple laut eigenen Aussagen bereits mehr als 800 Bug-Bounties ausgezahlt – jeweils im Wert von fast 40.000 Euro. First seen on golem.de Jump to article: www.golem.de/news/sicherheitsluecken-finden-apple-schreibt-zwei-millionen-dollar-an-bug-bounties-aus-2510-201050.html

