Apple fixes critical iOS bug for the second time: iPhone users need to patch the patch

Trusted Reviews | August 28, 2019

Apple fixes critical iOS bug for the second time: iPhone users need to patch the patch
Apple has released a second fix for an iOS vulnerability that could be used by hackers to install malicious code on iPhones and iPads. The second fix is available now as part of Apple’s latest iOS 12.4.1 update. The flaw was spotted back in March by Ned Williamson from Google’s Project Zero team. Google Project Zero is a security initiative designed to find security flaws in popular technologies. It gives companies a set amount of time to fix newly discovered flaws before publishing its research. Apple initially fixed the flaw as part of its iOS 12.3 update, but reports then broke the unc0ver jailbreak tool could successfully exploit it on iOS 12.4 appeared late last week. Apple doesn’t comment on security issues, but the appearance of a second fix for the vulnerability suggests the toolkit’s claim may be accurate. If so that would mean Apple unintentionally may have accidentally reopened the vulnerability after fixing it.

Spotlight

With all the groups and committees working on the Smart Grid’s security requirements, one might expect that there would now be a recipe for making an automation system secure. But we’re finding that building secure automation systems is more complex than we anticipated.

Related News

DATA SECURITY

Honeywell to Introduce Advanced Incident Response and Monitoring Service for Improving OT Cybersecurity and Operation

Honeywell | June 14, 2021

A global leader in industrial cybersecurity, Honeywell (NASDAQ: HON), has announced the introduction of the Honeywell Advanced Monitoring and Incident Response (AMIR) service. It provides rapid response for emerging and current cyber threats and 24/7 operational technology (OT) cybersecurity detection. AMIR is a easy to deploy, cost-effective, scalable cybersecurity service that is customized to help OT and IT security teams that is struggling to cope up with the emerging cyber threats that mainly target industrial operational technology networks and control systems (ICS), which happens due to budget constraints and lack of expertise. AMIR comes as part of Honeywell Forge Managed Security Services (MSS). MSS is an an end-to-end security as a service solution that helps protect control systems, operations, and OT environments. By "hunting" for various anomalous behaviors, including both emerging and known cybersecurity threats, AMIR constantly screens OT environments. It examines indicators of compromise and signals operators to possible problems before major damage can happen. Using proprietary technology, AMIR correlates, collects, prioritizes, and analyzes security proceedings and log data from numerous sources, giving a complete approach to better lessen cyber risk and maintain cybersecurity compliance. The offerings of the AMIR are already being installed at many sites globally to help companies increase their maturity of cybersecurity. AMIR is combined with the bigger Honeywell Forge Cybersecurity portfolio intended to help further support cyber defenses for functioning surroundings. About Honeywell A Fortune 100 technology company, Honeywell delivers industry specific solutions such as control technologies for buildings and industry, aerospace products and services, and performance materials globally. Technologies of Honeywell help buildings, aircraft, manufacturing plants, and supply chains.

Read More

DATA SECURITY

GetApp Annual Data Security Report Reveals Information Security a Top Concern for Businesses

GetApp | September 29, 2021

GetApp, a recommendation engine that helps SMBs make informed software purchasing decisions, released findings from its 2021 Data Security Report. The results reveal that, regardless of industry, information security incidents have become more of a targeted threat for businesses, increasing in amount and efficacy. Of all the security incidents identified by over 900 surveyed employees at U.S. businesses, the three most threatening incidents were: increasingly severe ransomware attacks, more effective phishing schemes, and rampant reusing of passwords. Respondents reported phishing emails have nearly tripled in effectiveness over the past two years. Phishing emails are rapidly becoming more difficult to spot and thus far more destructive. Over the past year, ransomware attacks have increased by 25%. Ransom demands were significantly higher than average for businesses in specific industries, such as banking and financial services and construction, with higher payouts. The report found that password reuse is strongly associated with higher incidences of security breaches. Reported account takeovers were three times as common among people who reuse passwords as those who don’t. Data security threats are becoming more targeted to individual victims, whether that’s a phishing scheme aimed at a specific person or ransomware attacks on a particular company.Companies must redouble security training efforts and fortify their networks to protect against today’s increasingly sophisticated cybercriminals. Zach Capers, senior analyst at GetApp. Alarmingly, 23% of the IT security managers surveyed say their company doesn’t have protocols in place to report a suspected cyberattack and 33% don’t have a formal cybersecurity incident response plan. Read the in-depth report for further insight regarding sensitive data, cyberattacks, and how your industry is keeping up with data security needs. About GetApp GetApp is the recommendation engine SMBs need to make the right software choice. GetApp enables SMBs to achieve their mission by delivering the tailored, data-driven recommendations and insights needed to make informed software purchasing decisions. GetApp is a Gartner company. For more information, visit www.getapp.com. Survey methodology GetApp’s 2021 Data Security Survey was conducted from August 20 to August 24 among 973 respondents to learn more about data security at U.S. businesses. Respondents were screened for full-time employment and 90 identified as their organization’s IT security manager.

Read More

NETWORK THREAT DETECTION

Solvo ReInvents Cloud Identity and Access Management with IAMagnifier

Solvo | November 30, 2021

Solvo, a security automation enabler for cloud development and production environments", announced today the availability of its "IAMagnifier" – a cloud SaaS security platform, enabling developers, DevOps and cybersecurity stakeholders working in cloud development environments to reduce potential cybersecurity threats caused by misconfigured access permissions to cloud assets. To truly enable a secured, yet productive development environment, a "least-privileged" permission mechanism should be employed – by using this methodology, the access level for each asset is defined by answering the question "How can I prevent access to that asset from anyone or anything other than anyone or anything that is supposed to access it to perform their intended task?". Today, security-minded developers and security stakeholders within the organization had to manually inspect security permissions configurations for each asset, compare the permission levels found within the specific asset's configuration to the permission level stated by the relevant organizational policies, and if the actual permission level is too lenient – rectify the situation by updating the asset's permission configuration. In addition to the need to perform these set of activities for each individual asset, a task which might entail an enormous waste of time and effort, the permission level to which the "wrong" configuration should be updated to may not be the best one according to the specific characteristics of each individual asset. "Solvo's IAMagnifier turns this cumbersome, lengthy, inefficient, and error-prone process of managing cloud assets' access permissions, into an automated, centralized, fast and decision-assisted experience,It does so by constantly inspecting the assets' access permissions configurations, analyzing gaps between the current and desired permission level, suggests the needed changes to the configuration, and performs these changes if approved by the user." Solvo's Co-founder and CEO, Shira Shamban To present the most relevant and updated data about permission levels and potential risks derived from permission level gaps, Solvo's IAMagnifier offers visual experience, which turns boring tables and records into easy to comprehend mapping of connections and dependencies between Roles, Policies, assets and users. The IAMagnifier also highlights what its analyzer has declared as "excessive permissions", and suggests an alternative, least-privileged permission policy, which can then be enforced by the user just by approving the suggestion. Unlike traditional infrastructure default definitions or human-set definitions, the "excessive" permission status definition and the alternative permission suggestion the IAMagnifier highlights and suggests are derived from analyzing actual real behaviour of the application and finding the balance between preventing unrequired access by irrelevant stakeholders, and keeping an uninterrupted workflow for relevant stakeholders (i.e least-privileged). Sylvie Veilluex, Solvo's advisor and former CIO of Dropbox, added: "The team has been offering early access to the IAM Magnifier to selected customers, and the feedback has been nothing short of amazing. One of the CEO whose company was using the IAMagnifier went on to declare the ability to easily see the company's security posture, and effortlessly enhance it, made scaling the company's cloud and business infrastructure frictionless and even enjoyable." Solvo's team will present IAM Magnifier during AWS' Re:Invent conference, which takes place in Las Vegas, NV, between November 29th and December 3rd, 2021. Solvo will also be providing a free AWS S3 Bucket policy auditing during the conference, and visitors can schedule a meeting with the team for a chance to get back from Vegas with a win. About Solvo Solvo allows security teams to empower software developers and accelerate their cloud delivery. The developer-centric security platform creates and maintains a least-privilege security policy for cloud native applications. It adapts the security configuration to every environment, creates it from scratch and monitors for changes, integrating with existing workflows seamlessly and automatically.

Read More

Spotlight

With all the groups and committees working on the Smart Grid’s security requirements, one might expect that there would now be a recipe for making an automation system secure. But we’re finding that building secure automation systems is more complex than we anticipated.