What's worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod.
Yes, attackers can take over your vulnerable Apple's iOS device remotely – all they have to do is trick you to view a maliciously-crafted JPEG graphic or PDF file through a website or an email, which could allow them to execute malicious code on your system.
That's a terrible flaw (CVE-2016-4673), but the good news is that Apple has released the latest version of its mobile operating system, iOS 10.1, for iPhones and iPads to address this remote-code execution flaw, alongside an array of bug fixes.
And now that the company has rolled out a security patch, some hackers would surely find vulnerable Apple devices to exploit the vulnerability and take full control of them.
So, users running older versions of iOS are advised to update their mobile devices to iOS 10.1 as soon as possible.
Besides this remote code execution flaw, the newest iOS 10.1 includes security updates to address 11 security flaws in the firmware for the iPhone, iPad, and iPod Touch.
Those flaws include local code execution vulnerabilities, a remote code execution bug in WebKit (CVE-2016-4677), a flaw in contacts (CVE-2016-4686) that would allow an application to pull Address Book details even when access has been revoked.
To update your iOS device go to Settings → General → Software Update.
As it turns out, even when you opt to limit Google's ability to track your location when using its search function or apps, some of your time-stam
Tensorflow, the popular Machine Learning framework, just released its version 1.10 on 09/08/2018. As any data scientist worthy of this name, ignoring
WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicio
Twitter CEO Jack Dorsey has doubled down on defending his company's decision not to kick far-right conspiracy theorist Alex Jones off its platform
“Something’s wrong with your keyboard,” a friend borrowing my laptop would say. “When I type, all that comes out is gibberish!
This is the ultimate hardware conference. Hackers, designers, and engineers from all over the world converge — from the greenest beginners to th