Wednesday, June 17, 2015

Vulnerability – Vulnerabilities in Apple software – Süddeutsche.de

Scientists have loaded in Apple’s official store even infected malware.



Six IT security researchers have succeeded, basic protections of Apple to override. Passwords on a Macbook? Are vulnerable. Data that is stored in Apps? Unauthorized access by third parties is possible. The hedge AppStores deal to upload an app that contains malicious software? Also, researchers have hinbekommen, the news page The Register . In short, the gaps are catastrophic. The researchers describe their discovery in a scientific paper and they leave no doubt: “Through our research we have discovered a number of vulnerabilities with a big impact.”

Researchers have claims to Apple in October 2014 their findings confronted. Apple had then requested a period of six months to correct the error. This is common in the industry. Companies should be given the opportunity to protect their products, so they can not be attacked by criminals. Apple but unresponsive after six months – so the researchers are now going public. But that also means that the Apple software is still vulnerable

The problem, according to researchers in the way Apps communicate with each other: In most cases, check the operating system and more error-prone app, who demand as well for information or data. We have investigated and found that almost 89 percent of the applications have been prone to error 1612 Apps for Mac OS and 200 apps for iOS. The researchers have succeeded by its own account to access photos that were taken with the messaging app WeChat. Also, it should have been possible to save notes, used to make the user an app called Evernote

They have shown in several videos as they were able to exploit the gaps:. You it is also managed several apps , infected with malicious code, upload in the Apple AppStore – the security precautions were therefore bypassed. A total of six researchers at the Indiana University, Peking University and the Georgia Institute of Technology were involved. For users, there is currently no way of knowing whether they are affected by the attack.

© SZ from 18/06/2015 Home
  • discussion on this article at:
  • Rivva
{“Theme name”: “Süddeutsche Zeitung Wirtschaft”,”themeUrl”:”http://www.sueddeutsche.de/thema/S%C3%BCddeutsche%20Zeitung%20Wirtschaft”,”teasers”:[{“id”:”sz.1.2525095″,”external_id”:”1.2525095″,”external_system”:”sz”,”types”:["article"],”title”:”Abwärts”,”overline”:”Kommentar”,”teaserPrefix”:””,”suffixLabel”:””,”targetUrl”:”http://www.sueddeutsche.de/wirtschaft/kommentar-abwaerts-1.2525095″},{“id”:”sz.1.2525117″,”external_id”:”1.2525117″,”external_system”:”sz”,”types”:["article"],”title”:”Arme Private patients “,” overline “:” Private Krankenversicherung”,”image”:{“imageUrl”:”http://media-cdn.sueddeutsche.de/image/sz.1.2526102/140×79″,”imageAltText”:”Zwei Billion from Health Fund Bundeshaushalt”},”teaserPrefix”:””,”suffixLabel”:””,”targetUrl”:”http://www.sueddeutsche.de/wirtschaft/private-krankenversicherung-arme-privatpatienten-1.2525117″},{“id”:”sz.1.2525107″,”external_id”:”1.2525107″,”external_system”:”sz”,”types”:["article"],”title”:”Schwere Search for better Schutz”,”overline”:”Versicherung”,”teaserPrefix”:””,”suffixLabel”:””,”targetUrl”:”http://www.sueddeutsche.de/wirtschaft/versicherung-schwere-suche-nach-besserem-schutz-1.2525107″},{“id”:”sz.1.2525111″,”external_id”:”1.2525111″,”external_system”:”sz”,”types”:["article"],”title”:”Wer non Pfennig ehrt”,”overline”:”Kleinmünzen”,”teaserPrefix”:””,”suffixLabel”:””,”targetUrl”:”http://www.sueddeutsche.de/wirtschaft/kleinmuenzen-wer-den-pfennig-nicht-ehrt-1.2525111″}]}

Jobs

 SZ Logo

LikeTweet

No comments:

Post a Comment