Apple

June 13, 2016

COLLABORATION

Seamless Enterprise Calling on iPhone and iPad

Our goal in working with Apple was to create a no-compromise business calling experience on iOS. And with today’s announcements at WWDC, we have taken a huge step forward in delivering that capability to end users and IT departments. So let’s get real, what did we announce? Well, we announced that C…

April 7, 2016

THREAT RESEARCH

Vulnerability Deep Dive: Exploiting the Apple Graphics Driver and Bypassing KASLR

Cisco Talos vulnerability researcher Piotr Bania recently discovered a vulnerability in the Apple Intel HD 3000 Graphics driver, which we blogged about here. In this post we are going to take a deeper dive into this research and look into the details of the vulnerability as well as the KASLR bypass…

March 22, 2016

THREAT RESEARCH

Vulnerability Spotlight: Apple OS X Graphics Kernel Driver Local Privilege Escalation Vulnerability

Piotr Bania of Cisco Talos is credited with the discovery of this vulnerability.   Cisco Talos, in conjunction with Apple’s security advisory issued on Mar 22, is disclosing the discovery of a local vulnerability in the communication functionality of the Apple Intel HD3000 Graphics kernel drive…

November 5, 2015

THREAT RESEARCH

Reverse Social Engineering Tech Support Scammers

This post is authored by Jaime Filson and Dave Liebenberg. Background The amount of fraudulent actors masquerading as legitimate tech support has been on the rise since 2008. According to David Finn, executive director at the Microsoft Cybercrime Center, tech support scammers have made nearly $1.5 b…

August 13, 2015

THREAT RESEARCH

Talos Identifies Multiple Memory Corruption Issues in Quicktime

Update 2015-08-21: This post has been updated to reflect an additional advisory released on August 20. Talos, in conjunction with Apple’s security advisories issued on August 13 and August 20, has released six advisories for vulnerabilities that Talos found in Apple Quicktime. In accordance with our…

June 30, 2015

THREAT RESEARCH

Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution

This post was authored by Rich Johnson, William Largent, and Ryan Pentney. Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th,  is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerab…

March 13, 2015

NETWORKING

Welcome to the Network: Wi-Fi Wearables

It’s no surprise that wearable devices are increasingly Wi-Fi enabled. With Apple’s recent announcement of Wi-Fi support for Apple Watch and rumors that Google will bring Wi-Fi capabilities to Android Wear, wireless connectivity will continue to drive changes in the way we work and play. As more em…

November 7, 2014

EXECUTIVE PLATFORM

“Brick by Brick”

Undoubtedly you heard the news last week of Apple CEO Tim Cook’s open letter in which he publicly acknowledges his sexuality and expresses deep pride in being gay.  While the headline alone is remarkable – the real treasure can be mined from exploring the letter in its entirety and inquiring how we…