Apple’s Unfixable Vulnerability - ThreatWire

preview_player
Показать описание
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali →

0:00 - Intro
0:13 - US Cyber Trust Mark is Now Official
2:24 - Apple’s Unfixable Vulnerability
4:23 - Another Python Supply Chain Attack
5:50 - Outro

LINKS
🔗 Story 1: US Cyber Trust Mark is Now Official
🔗 Story 2: Apple’s Unfixable Vulnerability
🔗 Story 3: Another Python Supply Chain Attack
____________________________________________

Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Рекомендации по теме
Комментарии
Автор

The "s" in IoT stands for security.

NewGolf
Автор

Why should toothbrush have internet access?

nicholastoo
Автор

Wonder what security features the Cyber Trust Mark would have, would become a joke if Temu starts selling the products "certified" with it.

lucretius
Автор

Keep up the good work Ali with an I, you're doing fine. I also liked how you and the pooch matched too.

russell
Автор

What should we expect from any apple? It might have a worm in it.

mont
Автор

The label is an interesting approach, but it should come with an expiration date. Nothing that was secure last year remains secure this year.

drewm
Автор

Good Video. Thanks for keeping us updated.

fazalhayat
Автор

I'm sure the attack you described is the same thing as another attack named like "ghost", "spirit" or similar.

artyk
Автор

That’s it! My next smartphone will be a rock 🪨

ceehacker
Автор

How smart do you need your toothbrush to be??

JonMurray
Автор

No. Bad. NOT “and etcetera..” JUST etcetera. NEVER put and in front of it when using it to mean “along with other items in the class.”

EverettVinzant
Автор

So GoFetch is like Spectre, but for Mac

jedcletis
Автор

Very informative, thank you. That Python attack is concerning. I’m starting to do some small scale website work and making sure I’m including valid secure outside code is giving me another ugh feeling.

stevenpugh
Автор

Was weird to have an episode without the background music

adfjasjhf
Автор

Ouuuu... "Hacking: The Art of Exploitation" is a great book!! I have both Vol. 1 + Vol. 2 of that series 😃

Now i wanna go back & reread them!

Mike.Kachar
Автор

toothbrush botnet lol we have gone too far

soundspoon
Автор

is the apple vulnerability not the same as we had with intel CPUs?

Shugoist
Автор

Heya, just wanted to say that while I love the information being delivered and I think you've definitely improved; I do think things can be improved from a flow point of view.

During the part where you're talking about the cyber trust mark there are several moments where there are unnecessarily long pauses that feel uncomfortable and Ideally need to be removed, or alternatively if you're looking to make it a one take they need to be re-shot and or full width on screen graphics to help remove the jump cut feel of the video if Hak5 as a whole want to avoid that feeling. 🙂

TheFatVeganOne
Автор

Maybe underwriters laboratory should create a certification.

deltonlomatai
Автор

There should be a public awareness in school about the dangers of vocal fry.

BlahBlahBlah
visit shbcf.ru