Third Gutenberg Moment: Dr. Drasko Acimovic on the Importance of Securing a Seat at the New Global Table
Section: Business
Recent findings by researchers from Microsoft have uncovered a significant vulnerability within Apple's TCC (Transparency, Consent, and Control) framework, specifically related to the Spotlight search functionality. This vulnerability, dubbed 'Sploitlight,' poses a risk of sensitive data exposure, including location information, metadata, and facial recognition data.
The TCC framework is designed to protect macOS users by regulating app access to personal information, requiring user consent before any data retrieval. However, flaws within this system have been consistently reported, and the latest exploit highlights how attackers could bypass these safeguards. Utilizing the built-in Spotlight search, attackers can manipulate Spotlight plugins to exploit weaknesses, enabling unauthorized access to cached data managed by Apple's AI system, Apple Intelligence.
Microsoft's investigation revealed that with the right knowledge, it is possible to access various file types through typical Spotlight functions, such as the command-line tool 'mdfind.' The vulnerability is exacerbated by the fact that the plugins involved are unsanctioned, making them easier to deploy than standard applications.
Additionally, the researchers demonstrated the ability to extract information from photo albums and shared albums, track user activities related to photos, and identify which photos and videos had been deleted. The misuse of the image classifier, which determines the content of images, further complicates the issue.
Some of the data leaks identified by Microsoft appear to necessitate active engagement from Apple Intelligence, while others do not. The researchers have indicated that it may also be feasible to access other cache files, including those associated with integrated services like ChatGPT or email summaries.
Furthermore, the vulnerability reportedly impacts not just macOS systems but may also extend to iPhones. Microsoft suggested that it is conceivable for data synchronized from a Mac to be intercepted. Apple has addressed several vulnerabilities in iOS 18.4, which are pertinent to this issue, and it is crucial for users to update their systems promptly. The latest versions available are macOS 15.5 and iOS 18.5.
In a recent blog post, Microsoft refrained from specifying which particular Apple Intelligence caches were compromised. The examples provided by the company indicate that the accessed data could be available even without Apple Intelligence being active. Further inquiries with one of the security researchers are underway, and updates will be provided as more information becomes available.
Section: Business
Section: Politics
Section: politics
Section: Business
Section: Health Insurance
Section: News
Section: Arts
Section: Travel
Section: Arts
Section: Arts
Both private Health Insurance in Germany and public insurance, is often complicated to navigate, not to mention expensive. As an expat, you are required to navigate this landscape within weeks of arriving, so check our FAQ on PKV. For our guide on resources and access to agents who can give you a competitive quote, try our PKV Cost comparison tool.
Germany is famous for its medical expertise and extensive number of hospitals and clinics. See this comprehensive directory of hospitals and clinics across the country, complete with links to their websites, addresses, contact info, and specializations/services.
,,Isithunzi" bedeutet auf Zulu ,,Würde" - zugleich kann es aber auch als ,,Geist des Todes und der Erneuerung" übersetzt werden. Die Idee: In jedem von uns steckt eine Verbindung zu unseren Vorfahren und zu einer universellen Energie, die alles Leben hervorbringt. Auf Grundlage eines Texts der...
No comments yet. Be the first to comment!