Safari's WebKit rendering engine has a flaw that could crash the browser and enable malicious code execution, and Apple hasn't yet patched it even though a fix's been available for weeks.
Apple's refreshed code for the WebKit layout engine used by Safari and other web browsers includes references to the major iOS 15 and macOS 12 software updates launching this fall.
When you’re browsing websites in Safari, do you ever wonder which of those sites have trackers, what those trackers are, and which other sites you visit have them? With attention to privacy on iOS 14, iPadOS 14, and macOS Big Sur, you can now view these details with a tap.
Apple introduced an easy-to-access website Privacy Report in the updated Safari browser. And the details you’ll find in the Privacy Report are more informative than you might expect. Here, we’ll show you how to view the website Privacy Report and the information you’ll find.
Before the days of Electra and unc0ver dawned upon us, there was Yalu, an iOS 10-centric jailbreak too by the talented hacker Luca Todesco (@qwertoruiopz); but apart from a few teasers here and there, the jailbreak community hasn’t heard much him since the Yalu days – that is, until now.
In a bombshell Tweet shared this week, Todesco released what appears to be a WebKit-based exploit that allows remote code execution (RCE) in web browsers with JIT. What’s more is that the exploit was only just fixed three days ago, which means it should be viable on all versions of iOS up to Apple’s latest release – 12.1.4:
It was only a few days ago that we learned about a sandbox escape PoC for iOS 12.0-12.0.1, and while it was just a proof of concept, there’s always the potential that a talented hacker could make use of it for future endeavors; perhaps even jailbreak development.
Fortunately, that’s not the only iOS 12-centric vulnerability floating around in the wild these days. As it would seem, a Safari-based exploit targeting iOS 12.1 and below (and macOS 10.14.1 and below) was also released this week by iOS tinkerer Linus Henze.
Thanks to modern web technologies like HTML5, Progressive Web Apps run in a browser, don't require separate distribution, combine features of native apps with the benefits of a mobile experience and let you keep them on the Home screen without the hassle of an app store.
Apple Watch doesn't have its own Safari browser but limited WebKit engine integration in the watchOS software lets you easily open website links embedded in messages.
Apple may be working to expand its Dark Mode-like feature for macOS.
iOS 12 is not expected to phase out older hardware such as iPhone 5s.
The iPhone X's new Super Retina display looks pretty stunning. Users have started to note how some websites don't work exceptionally well on the edge-to-edge display because of the notch, and the Home indicator. Apple has now shared some tools for developers that will be coming soon to help them optimize their websites.
Safari 10.1.1, pushed out as part of today's minor macOS Sierra 10.12.5 software update, fixes yet another instance of address bar spoofing. This is good news because the browser can now protect you from phishing attacks that would typically attempt to fool you into believing you were visiting a genuine website rather than a maliciously crafted webpage.
According to the company's security document, the software fixes a flaw where visiting a malicious website may lead to address bar spoofing. “An inconsistent user interface issue was addressed with improved state management,” states Apple.
Even folks who are extremely mindful of phishing are susceptible to address bar spoofing.
The sophistication of today's phishing attacks came to light when Chinese security researcher Xudong Zheng demonstrated how easily users could be fooled into visiting a fake website that seemingly shows the correct URL in the address bar.
To protect yourself from such attacks in the future, manually type in the URL of the website you want to visit or choose your favorite website from Safari's Bookmarks menu. Of course, you should avoid clicking any suspicious links in an email message, even if they appear to originate from a contact you personally know.
The patched vulnerability was discovered in Safari for macOS, not for iOS.
Apple credits Zhiyang Zeng and Yuyang Zhou of Tencent Security Platform Department with the discovery of the vulnerability CVE-2017-2500 and Zhiyang Zeng of Tencent Security Platform Department with the discovery of the vulnerability CVE-2017-2511.
Moreover, Safari 10.1.1 fixed an issue in Safari's history menu that could lead to an application denial of service after visiting a maliciously crafted webpage. The issue was addressed through improved memory handling.
Lastly, Safari 10.1.1 also includes patches for as many as seven vulnerabilities that were discovered in the WebKit rendering engine, five of which dealing with universal cross site scripting, while fixing an issue with WebKit's Web Inspector where an app could execute unsigned code.
Safari 10.1.1 is available for OS X Yosemite 10.10.5, OS X El Capitan 10.11.6 and macOS Sierra 10.12.5. Apple also released a minor update to iTunes for Mac and Windows today.
iTunes 12.6.1 contains unspecified app and performance improvements and a fix for a WebKit exploit on Windows 7 and later which could result in arbitrary code execution after processing maliciously crafted web content.