{"id":156536,"date":"2018-01-05T16:32:00","date_gmt":"2018-01-05T16:32:00","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=156536"},"modified":"2018-01-05T16:32:00","modified_gmt":"2018-01-05T16:32:00","slug":"soc-pentru-posesorii-de-iphone-toate-dispozitivele-apple-in-risc-de-a-fi-compromise","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=156536","title":{"rendered":"\u015eOC pentru posesorii de iPhone: toate dispozitivele Apple, \u00een risc de a fi compromise"},"content":{"rendered":"<p>\nMai exact, eroarea las\u0103 dispozitivele vulnerabile \u00een fa\u0163a Meltdown \u015fi Spectre, por\u0163i de acces descoperite de c\u0103tre cercet\u0103torii \u00een securitate.<\/p>\n<p>Apple a transmis clien\u0163ilor s\u0103 descarce doar software autorizat de pe platforme precum App Store.<\/p>\n<p>Dezvoltatorii de browsere Google, Microsoft Corp \u015fi Mozilla au anun\u0163at c\u0103 update-urile lansate zilele trecute nu protejeaz\u0103 utilizatorii de iOS. Reprezentan\u0163ii Apple au transmis c\u0103 nu exist\u0103, p\u00e2n\u0103 \u00een prezent, situa\u0163ii \u00een care hackerii s\u0103 fi exploatat erorile \u00een cauz\u0103. &#8220;Toate sistemele Mac \u015fi dispozitivele iOS sunt afectate, dar nu am \u00eent\u00e2lnit p\u00e2n\u0103 acum vreun incident.&#8221;<\/p>\n<p>Companiile de tehnologie sunt familiare cu situa\u0163ia, Intel primind informa\u0163iile \u00eenc\u0103 din iunie 2017, dar utilizatorii au aflat recent de existen\u0163a erorilor.<\/p>\n<p>Ben Johnson, cofondator \u015fi strateg \u015fef la firma de securitate cibernetic\u0103 Carbon Black, a declarat celor de la Daily Mail c\u0103 decizia celor de la Apple de a nu-\u015fi informa \u00eenc\u0103 de la \u00eenceput clien\u0163ii ar putea afecta v\u00e2nz\u0103rile companiei pe termen mediu \u015fi lung.<\/p>\n<p>Din p\u0103cate, potrivit mai multor exper\u0163i \u00een securitate, patch-urile software pentru exploit-ul Meltdown nu fac dec\u00e2t s\u0103 mascheze simptomele unei probleme imposibil de rezolvat f\u0103r\u0103 \u00eenlocuirea fizic\u0103 a dispozitivelor vulnerabile, l\u0103s\u00e2nd hackerilor o \u0163int\u0103 sigur\u0103 pentru care s\u0103 dezvolte noi c\u0103i de atac. Nu este exclus ca \u00een s\u0103pt\u0103m\u00e2nile \u015fi lunile urm\u0103toare s\u0103 fie create noi variante ale atacului Meltdown care ocolesc patch-urile de securitate abia lansate.<\/p>\n<p>Pentru a \u00een\u0163elege mai bine situa\u0163ia \u00een care ne afl\u0103m, nu trebuie dec\u00e2t s\u0103 arunc\u0103m o privire asupra unei alte tehnologii care prezint\u0103 vulnerabilit\u0103\u0163i fundamentale de proiectare &#8211; Adobe Flash. Prin\u015fi \u00eentr-un joc nesf\u00e2r\u015fit de-a \u015foarecele \u015fi pisica, dezvoltatorii Adobe Flash lanseaz\u0103 periodic patch-uri de securitate care adreseaz\u0103 diverse vulnerabilit\u0103\u0163i, doar pentru ca tab\u0103ra advers\u0103 s\u0103 le contracareze \u00een scurt timp, scriu cei de la Go4IT.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fiecare iPhone, iPad sau Mac se afl\u0103 \u00een riscul de a fi atacat de hackeri. Conducerea Apple a confirmat c\u0103 majoritatea dispozitivelor produse de companie sunt afectate de eroarea de design din chip-urile produse de Intel \u015fi ARM.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[238,288,10653,16273,4126,272,339,295,32968,207,10541,19551,14785,9275,15474,290,430,7541,80,9184,219,31134],"class_list":["post-156536","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-acces","tag-apple","tag-atac","tag-cercetatori","tag-clienti","tag-companie","tag-conducere","tag-confirmare","tag-dailymail","tag-design","tag-dispozitive","tag-eroare","tag-hackeri","tag-intel","tag-ipad","tag-iphone","tag-majoritate","tag-produse","tag-refuz","tag-risc","tag-securitate","tag-soc"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/156536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=156536"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/156536\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=156536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=156536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=156536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}