Apple
Seamless Enterprise Calling on iPhone and iPad
Our goal in working with Apple was to create a no-compromise business calling experience on iOS. And with today’s announcements at WWDC, we have taken a huge step forward in delivering that capability to end users and IT departments. So let’s get real, what did we announce? Well, we announced that C…
Vulnerability Deep Dive: Exploiting the Apple Graphics Driver and Bypassing KASLR
Cisco Talos vulnerability researcher Piotr Bania recently discovered a vulnerability in the Apple Intel HD 3000 Graphics driver, which we blogged about here. In this post we are going to take a deeper dive into this research and look into the details of the vulnerability as well as the KASLR bypass…
Vulnerability Spotlight: Apple OS X Graphics Kernel Driver Local Privilege Escalation Vulnerability
Piotr Bania of Cisco Talos is credited with the discovery of this vulnerability. Cisco Talos, in conjunction with Apple’s security advisory issued on Mar 22, is disclosing the discovery of a local vulnerability in the communication functionality of the Apple Intel HD3000 Graphics kernel drive…
Reverse Social Engineering Tech Support Scammers
This post is authored by Jaime Filson and Dave Liebenberg. Background The amount of fraudulent actors masquerading as legitimate tech support has been on the rise since 2008. According to David Finn, executive director at the Microsoft Cybercrime Center, tech support scammers have made nearly $1.5 b…
Talos Identifies Multiple Memory Corruption Issues in Quicktime
Update 2015-08-21: This post has been updated to reflect an additional advisory released on August 20. Talos, in conjunction with Apple’s security advisories issued on August 13 and August 20, has released six advisories for vulnerabilities that Talos found in Apple Quicktime. In accordance with our…
Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution
This post was authored by Rich Johnson, William Largent, and Ryan Pentney. Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th, is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerab…
Welcome to the Network: Wi-Fi Wearables
It’s no surprise that wearable devices are increasingly Wi-Fi enabled. With Apple’s recent announcement of Wi-Fi support for Apple Watch and rumors that Google will bring Wi-Fi capabilities to Android Wear, wireless connectivity will continue to drive changes in the way we work and play. As more em…
“Brick by Brick”
Undoubtedly you heard the news last week of Apple CEO Tim Cook’s open letter in which he publicly acknowledges his sexuality and expresses deep pride in being gay. While the headline alone is remarkable – the real treasure can be mined from exploring the letter in its entirety and inquiring how we…
Cloudburst: iOS 8 Generates 50% Increase in Network Traffic
Many network engineers recall the iOS7 update on September 18, 2013 as one of the most historic download days of their network’s history. All the more reason for us in the wireless world who anxiously anticipated the September 17 release of iOS8. We asked a few of our customers to monitor the effect…
18