Apple addresses Comodo hack with security patches

Powered by SC Magazine
 

Safari looks set to get do-not-follow system.

Apple has issued several security updates to its software, and revealed plans to include a do-not-follow system in Safari.

Apple updated iOS - the operating system for the iPad and iPhone - to 4.3.2, fixing a bug used by Charlie Miller to win at Pwn2Own last month.

The firm also fixed a vulnerability flagged by a Google researcher, which gave hackers a route into the system via a malicious web page.

Safari was updated to 5.0.5, fixing a pair of flaws in its WebKit engine.

Apple also addressed last month's security certificate hack, blacklisting the fake certificates doled out by a Comodo affiliate weeks after Microsoft did the same for Windows.

The certificate patches are for iOS and Mac OS X, as Safari relies on the "host operating system to determine if an SSL server certificate is trustworthy," Apple noted.

"You know how they say 'Better late than never'?" asked Sophos security advisor Chester Wisniewski in a blog post. "That appears to be Apple's approach to the Comodo SSL certificate scandal."

Safari also looks set to get a do-not-follow system similar to that in IE9 and Firefox 4, which asks behavioural advertising systems not to track users with cookies. The system is included in the browser in the test version of Apple's next OS, Lion, according to the Wall Street Journal.

This article originally appeared at pcpro.co.uk

Copyright © PC Pro, Dennis Publishing


Apple addresses Comodo hack with security patches
 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 471

Vote