Vulnerabilities

  • Notes From Crazytown, Day Three: Black Hat Breakdown

    Notes From Crazytown, Day Three: Black Hat Breakdown

    So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societies, and my sense of the ridiculous. You should mistrust all those too! Sorry. What follows is a summary of the most eyebrow-raising talks I attended or heard about: Read More

  • iPhone Vulnerabilities: The Password is "Dottie"

    Hackers and security researchers have already found a nice collection of vulnerabilities in the iPhone, including an overflow issue in Safari that could allow unsigned code to infect the phone. The best vulnerabilities, however, are the two passwords found in the firmware that let applications run as root: Among the advances made to date, hackers have discovered the password the iPhone requires… Read More

  • Apple WiFi Vulnerability was Fictitious

    I’m sure you remember all that fuss about those holes in the Apple WiFi drivers. Well as reality would have it, those claims were erroneous. TUAW reports that SecureWorks, the company sponsoring all this noise, didn’t find a flaw in Apple’s drivers at all. It turns out, the defects exist in a third party card and software that was used to facilitate these… Read More