Just In
- 1 hr ago Dell Introduces AI-Powered Laptops and Mobile Workstations for Enterprises in India
- 3 hrs ago Meta AI Powered by Llama 3 Takes Aim at ChatGPT and Gemini: All You Need to Know!
- 3 hrs ago OnePlus Ace 3 Pro Leak Hints at New Design; Expected Launch, Specifications We Know So Far
- 4 hrs ago Vivo V30e Launch Date in India set for May 2: Flipkart Availability Confirmed
Don't Miss
- Movies Exclusive! Shreyas Talpade On His Health After Heart Attack, "If Your Health Is Fine Then..."
- Finance Gold Prices In US: Yellow Metal Rates Surge Amid Escalating Tensions In Middle East; Hit Record High
- News There's No INDIA Alliance In West Bengal, Says Mamata Banerjee, Alleges Congress Joined Hands With BJP
- Sports PAK vs NZ 2nd T20I: Will Rain play spoilsport in Rawalpindi on Saturday?
- Automobiles Suzuki Swift Hatchback Scores 4 Star Safety Rating At JNCAP – ADAS, New Engine & More
- Education NLSIU Announces the Rajiv K. Luthra Foundation Grant
- Lifestyle Summer Fashion: Your Bollywood Style White Outfits Guide To Keep It Cool And Chic
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
Researchers spot vulnerabilities in Apple iOS
An international team of computer science researchers has identified serious security vulnerabilities in the iOS operating system used in Apple's iPhone and iPad devices.
The vulnerabilities make a variety of attacks possible in Apple devices.
"There's been a lot of research done on Android's operating systems, so we wanted to take a closer look at Apple's iOS," said William Enck, associate professor of computer science at North Carolina State University and co-author of a paper.
SEE ALSO: Reliance LYF: Top 15 Smartphones to Buy in India Right Now
The goal was to identify any potential problems before they became real-world problems, he added.
The researchers focused on the iOS's "sandbox" which serves as the interface between applications and the iOS.
The iOS sandbox uses a set "profile" for every third-party app.
This profile controls the information that the app has access to and governs which actions the app can execute.
To see whether the sandbox profile contained any vulnerabilities that could be exploited by third-party apps, the researchers first extracted the compiled binary code of the sandbox profile.
They then decompiled the code, so that it could be read by humans.
Next, they used the decompiled code to make a model of the profile, and ran series of automated tests in that model to identify potential vulnerabilities.
The team identified vulnerabilities that would allow them to launch different types of attacks via third-party apps.
Those attacks include methods of bypassing the iOS's privacy settings for contacts, of learning a user's location search history and of inferring sensitive information (such as when photos were taken) by accessing metadata of system files.
SEE ALSO: How to Stop Getting Reliance Jio 4G Tele-verification SMS after SIM Card Activation
It also includes methods of obtaining the user's name and media library and of consuming disk storage space that cannot be recovered by uninstalling the malicious app.
"We are already discussing these vulnerabilities with Apple. They're working on fixing the security flaws, and on policing any apps that might try to take advantage of them," Enck noted in a university statement.
Source IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599
-
8,893