<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title type="text">iOS 6.16 and 7 (and OSX) on-line https security risk</title>
  <updated>2014-02-28T10:33:54+00:00</updated>
  <generator uri="http://framework.zend.com" version="1.12.20">Zend_Feed_Writer</generator>
  <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017"/>
  <link rel="self" type="application/atom+xml" href="https://www.augwessex.org.uk/discussions/view/1017/feed"/>
  <id>https://www.augwessex.org.uk/discussions/view/1017</id>
  <author>
    <name>AUGW</name>
    <email>info@augwessex.org.uk</email>
    <uri>https://www.augwessex.org.uk/</uri>
  </author>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[iOS 6.16 and 7 (and OSX) on-line https security risk]]></title>
    <updated>2014-02-23T09:22:36+00:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017#4490"/>
    <id>https://www.augwessex.org.uk/discussions/view/1017#4490</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Apple OSX and IOS Secure Socket Layer Bug...<xhtml:br/>
<xhtml:br/>
Apple announced a patch for iOS 6.1.6 and 7.0 on February 21st:<xhtml:br/>
<xhtml:a href="http://support.apple.com/kb/HT6147" target="blank">http://support.apple.com/kb/HT6147</xhtml:a><xhtml:br/>
<xhtml:br/>
about this bug: <xhtml:br/>
<xhtml:a href="https://www.imperialviolet.org/2014/02/22/applebug.html" target="blank">https://www.imperialviolet.org/2014/02/22/applebug.html</xhtml:a><xhtml:br/>
	<xhtml:br/>
how to avoid it in OSX until a patch for that is announced:<xhtml:br/>
<xhtml:a href="http://osxdaily.com/2014/02/22/protect-mac-ssl-tls-security-bug/" target="blank">http://osxdaily.com/2014/02/22/protect-mac-ssl-tls-security-bug/</xhtml:a>.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: iOS 6.16 and 7 (and OSX) on-line https security risk]]></title>
    <updated>2014-02-23T09:50:48+00:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017#4491"/>
    <id>https://www.augwessex.org.uk/discussions/view/1017#4491</id>
    <author>
      <name>Mick Burrell</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Euan, could you explain a little more for those of us who don't understand the code on the sites you've pointed us to?<xhtml:br/>
<xhtml:br/>
Unless I'm missing the point, as the last site says it's a danger "if the hacker is on the same network as you", for those of us using Macs in a home environment there's no real issue is there?</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: iOS 6.16 and 7 (and OSX) on-line https security risk]]></title>
    <updated>2014-02-23T18:19:54+00:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017#4492"/>
    <id>https://www.augwessex.org.uk/discussions/view/1017#4492</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Hi Mick, <xhtml:br/>
the sting is in the second part of the sentence:<xhtml:br/>
“…if the attacker is on the same network as you, — or is otherwise able to get between your computer and a remote server. This is why it is so important to avoid untrusted networks, it greatly mitigates risk.”<xhtml:br/>
<xhtml:br/>
Users of Adobe’s Flash Player have this month had no fewer than two emergency security updates — Steve Jobs was right to keep it off the iPhones and iPads!<xhtml:br/>
<xhtml:br/>
It’s also worth noting that Back Door flaws in some routers have recently been publicised:<xhtml:br/>
<xhtml:a href="http://www.bbc.co.uk/news/technology-26287517" target="blank">http://www.bbc.co.uk/news/technology-26287517</xhtml:a><xhtml:br/>
<xhtml:br/>
This is just to remind ourselves (should we need reminding?) that malefactors are lurking out there — even for Apple.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: iOS 6.16 and 7 (and OSX) on-line https security risk]]></title>
    <updated>2014-02-25T23:30:42+00:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017#4493"/>
    <id>https://www.augwessex.org.uk/discussions/view/1017#4493</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">OSX 10.9.2 Updater should now be available and the security patch is included.<xhtml:br/>
<xhtml:br/>
<xhtml:a href="http://osxdaily.com/2014/02/25/os-x-10-9-2-released-fix-mail-ssl/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A+osxdaily+%28OS+X+Daily%29" target="blank">Details here.</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: iOS 6.16 and 7 (and OSX) on-line https security risk]]></title>
    <updated>2014-02-28T10:33:54+00:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/1017#4495"/>
    <id>https://www.augwessex.org.uk/discussions/view/1017#4495</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">A short review of OSX security post the "fail" threat is <xhtml:a href="http://www.macworld.co.uk/how-to/mac-software/are-macs-safe-viruses-hackers-3454926/" target="blank">here.</xhtml:a></xhtml:div>
    </content>
  </entry>
</feed>
