Connect with us
Apple Asks iOS 1531 to be Updated to Fix Serious Apple Asks iOS 1531 to be Updated to Fix Serious

Security

Apple Asks iOS 15.3.1 to be Updated to Fix Serious Safari Vulnerability and Other Issues

Published

on

Apple has released iOS 15.3.1 and iPadOS 15.3.1 firmware, which are required for installation. Apple says they contain “important security updates for your iPhone and iPad.” In addition, the firmware also fixes an issue that could cause braille displays to stop working. To download and install the update, go to Settings > General > Software Update. The update size is 862.7 MB.

It’s worth remembering that iOS 15.3 and iPadOS 15.3 included a fix for a Safari vulnerability that allowed attackers to track user visits on the Internet. The bug “allowed any website to track your internet activity and even reveal your identity,” according to FingerprintJS. The latest update strengthens protection against this exploit.

Apple Asks iOS 15.3.1 to be Updated to Fix Serious Safari Vulnerability and Other Issues

The patch is listed under the heading WebKit and reads: “Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch ( 7th generation). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware that this issue may have been actively exploited.”

As for the upcoming iOS 15.4 update, the most anticipated feature is the ability to unlock your iPhone with Face ID while wearing a mask without using your Apple Watch. Apple is going to “use unique features in the eye area for authentication” instead of using full facial recognition. There’s also a setting that will allow Face ID to recognize the user’s facial features even if they’re wearing glasses.

iOS 15.4 will be released on March 8: the most interesting innovations are listed in our previous note.

.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

It turned out that even a turned off iPhone can be hacked

Published

on

It turned out that even a turned off iPhone can

Researchers at the Technical University of Darmstadt in Germany have found that the iPhone can be at risk even when turned off.

When iPhone is turned off, most wireless chips, including Bluetooth, NFC, and Ultra-Wideband (UWB), continue to work for up to 24 hours. So the phone can still be found through Find My and you can still access credit cards and digital keys. These wireless chips have direct access to the secure element and can be used to install malware on the iPhone even when iOS is down.

Wireless chips operate in low power mode (Low-Power Mode, LPM). This is not to be confused with Power Saving Mode, which extends battery life. LPM support is implemented in hardware, which means that this issue cannot be fixed with a software-side fix.

It turned out that even a turned off iPhone can be hacked

Researchers conducted a security analysis of the LPM features introduced in iOS 15 and found that the Bluetooth LPM firmware could be modified to run malware on the iPhone. These loopholes have not been previously considered and could allow hackers with system-level access to track someone’s location or trigger new features on the phone. The problem seems to stem from the fact that LPM features were designed with functionality in mind, and there seemed to be little attention given to possible threats outside of the intended applications.

Disabling Find My turns turned off iPhones into tracking devices, and the implementation in the Bluetooth firmware is not immune to manipulation. Tracking properties can be surreptitiously modified by attackers with system-level access.

Ars Technica notes that most iPhone users have nothing to worry about, since a jailbroken iPhone is required to infect third-party software. However, the security hole can be exploited by spyware such as Pegasus.

The results of the research were transferred to Apple, which did not comment on the situation.

Continue Reading

Components

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining. Nvidia LHR v3 security cracked 90%

Published

on

The GeForce RTX 3050 can now also be almost fully

A couple of weeks ago, the LHR protection in Nvidia graphics cards was cracked, which allowed everyone to use accelerators for Ethereum mining at full capacity again. But in fact, then the protection of LHR v2 was cracked, but not LHR v3.

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining.  Nvidia LHR v3 security cracked 90%

The LHR v3 version is present in Nvidia’s latest releases: RTX 3050 and RTX 3080 12GB. And it is still not completely hacked, but now the NiceHash miner is able to use 90% of the performance of these cards when mining cryptocurrency. It’s not a complete hack yet, but it’s getting very close.

Fortunately, at the moment the cryptocurrency market is in a state of decline, so it hardly makes any sense to buy the same RTX 3050 for mining, which means that gamers need not worry for now.

By the way, a large article has been published on our website with an analysis of methods for cracking Nvidia protection.

Continue Reading

Security

Nvidia lost. LHR mining protection is also hacked under Linux. This was done by NBMiner developers

Published

on

Nvidia lost LHR mining protection is also hacked under

Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux.

Nvidia lost.  LHR mining protection is also hacked under Linux.  This was done by NBMiner developers

Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed source, so it’s not clear what mechanisms the developers used to hack.

Whether the loss of Nvidia will affect the availability and prices of video cards is still difficult to say. At the moment, the cryptocurrency market continues to fall, but sooner or later it will turn around, and gamers may again face shortages and overpriced graphics cards.

Continue Reading

Most Popular