Skip to main content

Apple iPhone, iPod touch Security Patch: What's Fixed

Apple iPhone, iPod touch Security Patch: What's Fixed 
 
Apple on Tuesday released an updated version of its iPhone OS software for the iPhone and iPod touch. The new version 3.1.3 patches several security holes, provides a few bug fixes and minor enhancements, and is available via iTunes download.

The five security fixes are related to CoreAudio, ImageIO, Recovery Mode, and WebKit.

The CoreAudio patch prevents "maliciously crafted" MP4 audio files from wreaking havoc, such as terminating programs or running rogue code. The ImageIO fix blocks malicious TIFF images from performing similar voodoo when users view them.

The Recovery Mode update prevents someone with physical access to a locked iPhone or iPod touch from bypassing the passcode and accessing your data. It corrects a memory corruption glitch in the handling of a USB control message that allowed the security breach.

WebKit gets two patches. One corrects an HTML 5-related problem that may cause mail to load remote audio and video files when remote image-loading is turned off. The second blocks WebKit from accessing a malicious FTP server.

The minor upgrades in iPhone OS version 3.1.3 correct a bug that causes apps to crash when using a Japanese Kana keyboard, and improve the accuracy of battery-level reporting on the iPhone 3GS.

The iPhone OS patch comes hot on the heels of Monday's iTunes 9.0.3 update, which remedies the problem of iTunes forgetting user passwords, and fixes glitches with iPod syncing. It also improves iTunes' stability and performance.
 
Source : www.pcworld.com

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                              B. Android Debug Bridge.            C. Android Destroy Bridge.                          D. Android Delete Bridge. 5. Is list data type supported by AIDL? a. Yes    b. No 6. Component which is NOT under the Android application. a. Content providers      b. Resource externalization         c. Applications d. Notifications 7. Language which is supported by Android for application dev

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.