iOS 17.5 and macOS Sonoma 14.5 update adds anti-tracking feature, offline support for
#1
Information 
Quote:Apple has released the iOS 17.5, macOS Sonoma 14.5 and iPadOS 17.5 updates. The new software comes with a cross-platform anti-tracker feature, and improves the capabilities of the News app.

What's new in iOS 17.5, iPadOS 17.5 and macOS Sonoma 14.5

Apple has improved its Find My app to add support for cross-platform Tracking Detection. The company has published an article, where it says the feature was developed in partnership with Google, to detect unwanted location trackers that may be used to stalk people. The anti-stalking feature will notify users when a Bluetooth tracker that they do not own is moving with them. The phone will detect the tracker regardless of the operating system that was used to pair with the tracker. Users can locate the tracker by playing a sound, and access instructions to disable it.

The new anti-tracking feature works on iPhones running on iOS 17.5 or above, and Android devices with Android 6.0 or above. It supports AirTag and third-party Find My network devices, along with Bluetooth trackers made by Chipolo, eufy, Jio, Motorola, and Pebblebee.

Security fixes

iOS 17.5 ships with 15 security fixes, while macOS Sonoma 14.5 has about 22 patches, none of which were related to any known exploited vulnerabilities. The macOS Ventura 13.6.7 and macOS Monterey 12.7.5 updates are also available now with 3 security fixes and 2 patches respectively. The Safari 17.5 update addresses a WebKit issue that could have allowed an attacker with arbitrary read and write capability to bypass Pointer Authentication. The update for the browser is available for Ventura and Monterey users.

iOS 16.7.8 and iPadOS 16.7.8 is now available for the iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation. The updates fix a couple of security issues related to Foundation and RTKit. Apple says that it was aware that the RTKit issue, tracked as CVE-2024-23296, may have been exploited by attackers who had arbitrary kernel read and write capability, to bypass kernel memory protections. The exploit which has been described as a memory corruption issue was addressed with improved validation
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Malwarebytes 5.1.11.139
  Malwarebytes 5....Mohammad.Poorya — 16:42
Thunderbird Nebula Version 128.3.2 (esr)
Thunderbird Nebula...harlan4096 — 08:27
Bitdefender 27.0.41.210
Bitdefender’s most...harlan4096 — 08:26
CCleaner 6.29.11342 (16 Oct 2024)
CCleaner 6.29.1134...harlan4096 — 08:24
Intel releases Extreme Tuning Utility 10...
Intel XTU 10 relea...harlan4096 — 08:23

[-]
Birthdays
Today's Birthdays
avatar (46)maggiebz16
Upcoming Birthdays
avatar (46)Michaelaceve
avatar (36)QuadirLigh
avatar (37)Mblippek
avatar (40)guerigGep
avatar (43)viecontAceve
avatar (46)vikgoMam
avatar (39)Michaelcrini

[-]
Online Staff
There are no staff members currently online.

>