New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. The exploit works by running a fraudulent process on the same CPU cluster as the targeted process on the targeted machine. No easy mitigation currently exists for this vulnerability, as it resides in the hardware. What is the GoFetch vulnerability? GoFetch is a cache side-channel vulnerability. This type of vulnerability…

Read More

OpenAI's Sora Generates Photorealistic Videos

OpenAI's Sora Generates Photorealistic Videos

OpenAI released on Feb. 15 an impressive new text-to-video model called Sora that can create photorealistic or cartoony moving images from natural language text prompts. Sora isn’t available to the public yet; instead, OpenAI released Sora to red teamers — security researchers who mimic techniques used by threat actors — to assess possible harms or risks. OpenAI also offered Sora to selected designers and audio and visual artists to get feedback on how Sora can…

Read More

NIST Establishes AI Safety Consortium

NIST Establishes AI Safety Consortium

Image: Adobe/Grandbrothers The National Institute of Standards and Technology established the AI Safety Institute on Feb. 7 to determine guidelines and standards for AI measurement and policy. U.S. AI companies and companies that do business in the U.S. will be affected by those guidelines and standards and may have the opportunity to have input about them. What is the U.S. AI Safety Institute consortium? The U.S. AI Safety Institute is a joint public and private…

Read More

How Cisco, together with Apple, is tackling the next frontier of hybrid work — spatial computing

How Cisco, together with Apple, is tackling the next frontier of hybrid work — spatial computing

Apple is the marquee example of a great company that disrupts itself and others in the market. Two weeks ago marked the 40th anniversary of the Mac. Consider how the launch of the original Mac not only reinvented how we work with computers, but changed how software was written. Now, with the launch of Apple Vision Pro, Apple is on the brink of reinventing personal electronics yet again, marking the next frontier of collaboration with…

Read More

What Do Apple’s EU App Store Changes Mean for App Developers?

What Do Apple’s EU App Store Changes Mean for App Developers?

In order to comply with the European Union’s Digital Markets Act, Apple announced on Jan. 25 changes to its payment system for app sellers in the EU, and that it was letting go of the hold its App Store has over iOS app distribution in the EU. As well as the App Store changes, Apple will prompt iOS users in the EU to select a preferred browser instead of defaulting to Safari in accordance with…

Read More

Attackers Could Eavesdrop on AI Conversations on GPUs

Attackers Could Eavesdrop on AI Conversations on GPUs

Researchers at cybersecurity research and consulting firm Trail of Bits have discovered a vulnerability that could allow attackers to read GPU local memory from affected Apple, Qualcomm, AMD and Imagination GPUs. In particular, the vulnerability—which the researchers named LeftoverLocals—can access conversations performed with large language models and machine learning models on affected GPUs. Which GPUs are affected by the LeftoverLocals vulnerability, and what has been patched? Apple, Qualcomm, AMD and Imagination GPUs are affected. All…

Read More

12 Essential Steps Mac Users Need To Take At Year End

12 Essential Steps Mac Users Need To Take At Year End

Business users often experience a year-end slowdown that presents a timely opportunity to catch up on a few overdue tasks. As meetings slow and work schedules and to-do lists often ease, forward-thinking professionals can use the brief lull to ensure the computer powering their daily activities is ready for the coming year. Such diligence isn’t just for Windows users, but those using Macs, too. Here are the year-end steps you should take to ensure your…

Read More

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple recommends users update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Google’s Threat Analysis Group discovered these security bugs. Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS and macOS; users are advised to update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. The vulnerabilities were discovered by Google’s Threat Analysis group, which has been working on fixes for active Chrome vulnerabilities this week as well. Jump to: What are these Apple OS vulnerabilities?…

Read More

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums. Jump to: More exploitation…

Read More

How to Associate an Apple ID with a Second New or Reset iPhone

How to Associate an Apple ID with a Second New or Reset iPhone

The steps in this guide describe the process of associating an iPhone with an Apple ID when using iOS 17 on both your first iPhone and a second iPhone. There are many reasons you might associate your Apple ID with a second brand new iPhone or even an older iPhone that has been restored to the default factory settings. You might wish to connect your Apple account to the second smartphone to permit sharing your…

Read More
1 2 3