Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Apple on Monday pushed out a security update for its iOS mobile operating system to patch four vulnerabilities.
Affected components are Safari and WebKit, the open-source engine used to render web pages. The most serious of the bugs is a "memory corruption" defect that can lead to the remote execution of malicious code.
Two of the WebKit flaws could result in cross-site scripting attacks, and both were discovered by researcher Sergey Glazunov.
One of those was uncovered at the MarchPwnium hacker competition at the CanSecWest security conference in whichhackers aimed to defeat the Chrome browser's sandbox architecture.
WebKit also powers Chrome, and Glazunov was awarded $60,000 for his discovery.
Google almost immediately patched the flaw, but despite plugging the hole in iOS, Apple has yet to fix the issue on its desktop browser.
The iOS update to version 5.1.1 covers iPhones and iPads.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.