Apple addresses Comodo hack with security patches

Powered by SC Magazine
 

Safari looks set to get do-not-follow system.

Apple has issued several security updates to its software, and revealed plans to include a do-not-follow system in Safari.

Apple updated iOS - the operating system for the iPad and iPhone - to 4.3.2, fixing a bug used by Charlie Miller to win at Pwn2Own last month.

The firm also fixed a vulnerability flagged by a Google researcher, which gave hackers a route into the system via a malicious web page.

Safari was updated to 5.0.5, fixing a pair of flaws in its WebKit engine.

Apple also addressed last month's security certificate hack, blacklisting the fake certificates doled out by a Comodo affiliate weeks after Microsoft did the same for Windows.

The certificate patches are for iOS and Mac OS X, as Safari relies on the "host operating system to determine if an SSL server certificate is trustworthy," Apple noted.

"You know how they say 'Better late than never'?" asked Sophos security advisor Chester Wisniewski in a blog post. "That appears to be Apple's approach to the Comodo SSL certificate scandal."

Safari also looks set to get a do-not-follow system similar to that in IE9 and Firefox 4, which asks behavioural advertising systems not to track users with cookies. The system is included in the browser in the test version of Apple's next OS, Lion, according to the Wall Street Journal.

This article originally appeared at pcpro.co.uk

Copyright © PC Pro, Dennis Publishing


Apple addresses Comodo hack with security patches
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote