Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Apple Beefs Up iOS 8 Privacy, Fixes 56 Security Vulnerabilities

    Written by

    Sean Michael Kerner
    Published September 18, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Apple’s new iOS 8 mobile operating system, released Sept. 17, is designed to provide users with new features as well as a renewed focus on security and privacy from Apple.

      In a new section of Apple’s Website, the mobile giant details its commitment to user privacy. “At Apple, your trust means everything to us,” Apple CEO Tim Cook stated in a letter posted on the new Apple privacy site. “That’s why we respect your privacy and protect it with strong encryption, plus strict policies that govern how all data is handled.”

      Apple’s security and privacy policies have been under scrutiny in a number of different instances this year. Security researchers have questioned whether Apple works with governments to provide backdoor access and earlier this month dozens of celebrities were victimized by an attack.

      “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services,” Cook stated. “We have also never allowed access to our servers. And we never will.”

      Going a step further, as part of the iOS 8 update, Apple’s new privacy Website reveals that even if Apple receives a legal government request for access to a user’s iOS data, Apple will not be able to comply. Apple noted that user data—including email, call history and photos—are protected by the user’s passcode.

      “Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple states. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

      Security Patches

      In addition to Apple’s privacy site and commitments to user security, iOS 8 also includes patches for 56 vulnerabilities that span the mobile operating system’s feature set.

      By volume, the largest number of patches affects the WebKit browser-rendering technology that is used inside the Safari browser. Thirteen common vulnerabilities and exposures (CVEs) are fixed in iOS 8, and 12 of them were identified as being memory-corruption issues that could lead to arbitrary code execution.

      The other WebKit issue fixed in iOS 8 is identified as CVE-2014-4409 and could have enabled an attacker to track a user, even when the user is running Safari in private browsing mode. Private browsing mode is not supposed to store user data, cookies or history in a bid to improve privacy.

      “A Web application could store HTML 5 application cache data during normal browsing and then read the data during private browsing,” Apple’s advisory states. “This was addressed by disabling access to the application cache when in private-browsing mode.”

      iCloud Accounts

      One noteworthy security vulnerability is CVE-2014-4423, an issue that could enable a malicious application to identify a user’s AppleID. The AppleID is a user’s primary username on an iOS system.

      “A sandboxed application could get information about the currently active iCloud account, including the name of the account,” Apple stated. “This issue was addressed by restricting access to certain account types from unauthorized applications.”

      There is also a pair of fixes (CVE-2014-4384 and CVE-2014-4386) for vulnerabilities that could have an enabled malicious app installation on an iOS device.

      “A local attacker could have retargeted code signature validation to a bundle different from the one being installed and cause installation of an unverified app,” Apple warned.

      Another noteworthy flaw fixed in iOS 8 has to do with making sure that the system and apps are up-to-date. Users are often advised to make sure that their devices and apps are up-to-date in order to be secure. The CVE-2014-4383 vulnerability, however, could have enabled an attacker to trick a user device into accepting that it was up-to-date, when in fact it was not.

      “A validation issue existed in the handling of update check responses,” Apple stated. “Spoofed dates from ‘Last-Modified’ response headers set to future dates were used for ‘If-Modified-Since’ checks in subsequent update requests. This issue was addressed by validation of the ‘Last-Modified’ header.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×