iOS 17.5 and macOS Sonoma 14.5 update adds anti-tracking feature, offline support for
#1
Information 
Quote:Apple has released the iOS 17.5, macOS Sonoma 14.5 and iPadOS 17.5 updates. The new software comes with a cross-platform anti-tracker feature, and improves the capabilities of the News app.

What's new in iOS 17.5, iPadOS 17.5 and macOS Sonoma 14.5

Apple has improved its Find My app to add support for cross-platform Tracking Detection. The company has published an article, where it says the feature was developed in partnership with Google, to detect unwanted location trackers that may be used to stalk people. The anti-stalking feature will notify users when a Bluetooth tracker that they do not own is moving with them. The phone will detect the tracker regardless of the operating system that was used to pair with the tracker. Users can locate the tracker by playing a sound, and access instructions to disable it.

The new anti-tracking feature works on iPhones running on iOS 17.5 or above, and Android devices with Android 6.0 or above. It supports AirTag and third-party Find My network devices, along with Bluetooth trackers made by Chipolo, eufy, Jio, Motorola, and Pebblebee.

Security fixes

iOS 17.5 ships with 15 security fixes, while macOS Sonoma 14.5 has about 22 patches, none of which were related to any known exploited vulnerabilities. The macOS Ventura 13.6.7 and macOS Monterey 12.7.5 updates are also available now with 3 security fixes and 2 patches respectively. The Safari 17.5 update addresses a WebKit issue that could have allowed an attacker with arbitrary read and write capability to bypass Pointer Authentication. The update for the browser is available for Ventura and Monterey users.

iOS 16.7.8 and iPadOS 16.7.8 is now available for the iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation. The updates fix a couple of security issues related to Foundation and RTKit. Apple says that it was aware that the RTKit issue, tracked as CVE-2024-23296, may have been exploited by attackers who had arbitrary kernel read and write capability, to bypass kernel memory protections. The exploit which has been described as a memory corruption issue was addressed with improved validation
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes
26.4.4  Fixed a d...Kool — 10:40
Traffic Violation Scam Texts Now Use QR ...
A phishing campaig...harlan4096 — 09:34
Microsoft Begins Warning Users Ahead of ...
Microsoft has star...harlan4096 — 09:07
K-Lite Codec Pack 19.6.6/ 19.6.6 Update
Changes in 19.6.6 ...harlan4096 — 07:40
Intel shows Texture Set Neural Compressi...
TSNC Variant A del...harlan4096 — 07:39

[-]
Birthdays
Today's Birthdays
avatar (46)JamesZic
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (47)creatralGuelm
avatar (38)procnipsut
avatar (44)accenwibly
avatar (41)ahyvily
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)burntLaw
avatar (41)MrDoorsskibheeds
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (39)vemedProkbior
avatar (38)RobertUtelt
avatar (36)Kiran78

[-]
Online Staff
There are no staff members currently online.

>