Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root. Continue reading Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root. Continue reading Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root

Mac OS X Zero-Day Exploit Can Bypass Apple’s Latest Protection Feature

A critical zero-day vulnerability has been discovered in all versions of Apple’s OS X operating system that allows hackers to exploit the company’s newest protection feature and steal sensitive data from affected devices.

With the release of OS X El Capitan, Apple introduced a security protection feature to the OS X kernel called System Integrity Protection (SIP). The feature is designed

Continue reading Mac OS X Zero-Day Exploit Can Bypass Apple’s Latest Protection Feature