Category Archives: Vulnerabilities
18-Year-old Apple macOS 0-Day kernel flaw disclosed and allows root access

A security researcher on New Year’s eve made public the details of an unpatched security vulnerability in Apple’s macOS operating system that can be exploited to take complete control of…

Flaw in major browsers allows 3rd-party scripts steals your saved passwords

Security researchers have uncovered how marketing companies have started exploiting an 11-year-old bug in browsers’ built-in password managers, which allow them to secretly steal your email address for targeted advertising…

Hackers Claim to Defeat iPhone X ‘Face ID’ Authentication

3D Printer Plus Handmade Nose Equals Bad Day for Apple Biometrics? The face-off between security researchers and biometric authentication continues, with a group from Vietnam claiming to have fooled the…

iPhone X’s Face ID Bypassed by a Mask

  Face ID, the facial biometric unlocking technology included in Apple’s recently launched iPhone X, can be bypassed using a mask, security researchers have discovered. Months of developing down the…

Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager

A highly critical vulnerability has been discovered in Oracle’s enterprise identity management system that can be easily exploited by remote, unauthenticated attackers to take full control over the affected systems….

October 2017

Updates fromthe Associate Vice President for IT and CIO October 2017   Mitigating risk for UChicago IT data centers and end user devices: The IT Core Initiatives working group, representing…

Apple phone owners watch out ! Difficult-to-Detect Phishing Attack Can Steal Your Apple ID Password

Can you detect which one of the above screens—asking an iPhone user for iCloud password—is original and which is fake? Well, you would agree that both screenshots are almost identical,…

Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack

You have now another good reason to update your iPhone to newly released iOS 11—a security vulnerability in iOS 10 and earlier now has a working exploit publicly available. Gal…

September 2017

Updates fromthe Associate Vice President for IT and CIO September 2017   Helping the SLATE grant to be part of a new national research platform: Robert Gardner, senior fellow at…

May 2017

Updates fromthe Associate Vice President for IT and CIO May 2017   Saving faculty time supporting students in undergraduate statistics: RStudio is a free, open-source development environment software used by…

April 2017

Updates fromthe Associate Vice President for IT and CIO April 2017   Online add/drop for Spring Quarter: On March 13, at 9 a.m., the Academic Information System (AIS) opened the…

March 2017

Updates fromthe Associate Vice President for IT and CIO March 2017   New reporting platform delivers student information dashboards to academic departments: In February, 250 faculty and staff in academic…

February 2017

Updates fromthe Associate Vice President for IT and CIO February 2017   IT Rationalization project drafting cost-savings business cases: With data collection from Updates from the Associate Vice President for…

Blueborne, the latest Bluetooth vulnerability

Because you need to know what’s up and what to do about it. We got to see something cool and terrible (yes, it’s possible to be both at the same…

Microsoft Patch Tuesday – August 2017

This month the vendor has patched 48 vulnerabilities, 26 of which are rated Critical.Read More Source: U Chicago Edu Microsoft Patch Tuesday – August 2017

Next Page