Categories
iPhone News security

Security researchers locate additional iPhone security hole, publish findings

Even if you feel absolutely secure in entering your PIN every time you unlock your iPhone, there may still be some security shortfalls. Per a blog post by Bernd Marienfeldt, Marienfeldt and fellow security wonk Jim Herbeck have discovered that plugging even a fully up-to-date, non-jailbroken iPhone 3GS into a computer running Ubuntu Lucid Lynx […]

Categories
security Software

Apple releases Security Update 2010-003 for Mac OS X 10.5, 10.6 operating systems

Following up on a slew of recent software updates, Apple released Security Update 2010-003 on Wednesday. The update, which varies in size between 6.2 and 208 megabytes depending on the version used and fixes assorted security holes described here. The update, as usual, can be located, snagged and installed Mac OS X’s Software Update feature. […]

Categories
security Software

Apple releases Security Update 2010-002 for Mac OS X 10.5.x

Following yesterday’s release of the Mac OS X 10.6.3 update for Mac OS X 10.6 (Snow Leopard) users, Apple also released Security Update 2010-002, a 208 megabyte download that incorporates previous security updates have been incorporated into this security update and essentially brings Mac OS X 10.5.x to the same security standard as Mac OS […]

Categories
security Software

Apple Releases Security Update 2010-001

Late Tuesday, Apple released Security Update 2010-001 for its Mac OS X operating systems. The updates, which range between a 21 and 159 megabyte download (depending on operating system), address critical vulnerabilities in the system where hackers and malicious software can take advantage and either compromise the system or steal personal information. The update requires […]

Categories
iPhone security

Second iPhone Worm in the Wild

We told you not to jailbreak your iPhone, but you had to be super cool and rebellious. Per BBC News, jailbroken iPhones could be vulnerable to a new, malicious worm that can allow remote access and control without the owner’s knowledge or permission. It’s been estimated that hundreds of users are currently affected by a […]