Apple Patches Bug in Swift Programming Language

Apple Patches Bug in Swift Programming Language

Apple’s Swift programming language is a useful tool for developers on Mac and iOS platforms due to its versatility and wide-reaching application. Occasionally, though, Apple uncovers issues within Swift that could unintentionally allow bad actors to make inroads towards attack execution. A new Swift module…

July 2, 2018 • 2 min read
Hackers Could Bypass macOS Signature Checks for A Decade

Hackers Could Bypass macOS Signature Checks for A Decade

Code signing is one of the most important lines of defense against malware. It allows a user to know that the software they intend to install or run came from a trusted source, such as Apple, or another trusted developer. While code signing is not…

June 26, 2018 • 2 min read
Apple Patches Xcode to Correct Serious Git Security Flaw

Apple Patches Xcode to Correct Serious Git Security Flaw

How can programmers keep track of all the changes that get made to a piece of software during its development while keeping everyone else on the project in the loop? Answering that challenge is the purpose of what is known as a “version control system.”…

June 25, 2018 • 2 min read
Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

Police Can Now Access iPhone Data Using a Secretive Piece of Hardware

For several years now, a fierce debate has raged over how much access law enforcement organizations (LEOs) should be able to have to the mobile devices of those suspected of a crime. The issue made nationwide headlines after the San Bernardino attacks in 2015, when the FBI grappled with how to break into an iPhone used by one of the perpetrators. While the FBI did eventually retrieve device data by utilizing an unknown group to gain access to the phone’s encrypted contents, law enforcement agencies, in general, have maintained that they must have a “backdoor” to access info secured by your iPhone passcode. Apple has steadfastly refused to give in to such demands, but it appears that for now, those refusals don’t matter: LEOs can now use a pricey piece of hardware called GrayKey.

March 22, 2018 • 3 min read
Some Apps on the Mac App Store Are Mining Cryptocurrency

Some Apps on the Mac App Store Are Mining Cryptocurrency

The wave of cryptocurrency miners taking the place of common malware continues in 2018 unabated, and it appears every week we encounter another story about a website running surreptitious miners or a company looking for ways to use your CPU resources. As Mac users, we…

March 19, 2018 • 3 min read
iPhone Source Code Leak Could Open the Floodgates for Hackers

iPhone Source Code Leak Could Open the Floodgates for Hackers

A key piece of Apple’s iPhone source code may be out in the wild. On February 7, someone posted something called “iBoot” on GitHub. GitHub is a popular site for sharing computer code. This time, though, it appears the code in question was not the…

February 20, 2018 • 3 min read
Apple Patches Potentially Serious Vulnerability in HomeKit with iOS 11.2.1

Apple Patches Potentially Serious Vulnerability in HomeKit with iOS 11.2.1

In a world filled with “Internet of Things” (IoT) devices, there are security holes everywhere. Apple works hard on the hardened nature of its HomeKit system and the way these third-party devices interface with Apple products. So when news broke in early December that someone…

December 20, 2017 • 2 min read