Showing posts with label About. Show all posts
Showing posts with label About. Show all posts

About the security content of iOS 5.1.1 Software Update

var modelValue = 'SupportApple';var akamaiUrl = "http://km.support.apple.com"; var aiSearchServiceURL ="support.apple.com";var podLocaleValue="en_US"; var aiCrossDomainSearchServiceURL ="support-reporting.apple.com";About the security content of iOS 5.1.1 Software UpdateThis document describes the security content of iOS 5.1.1 Software Update, which can be downloaded and installed using iTunes.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see 'How to use the Apple Product Security PGP Key.'

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see 'Apple Security Updates'.

">ACUtil.setPOD('us~en'); var articleId = "HT5278"; var ACStaticText = { 'more': '…more', 'less': 'less' };KmLoader.akamaiUrl = 'http://km.support.apple.com';//function sendRead()var locale = 'en_US';Event.observe(window, 'load', function() {ACHistory.addKbView('HT5278', 'About the security content of iOS 5.1.1 Software Update', 'en_US', 'unknown');ACUtil.getMultipleOffers('PL133,PL220,PL113,PP23', 'HOWTO_ARTICLES', 'en_US', 'false');ACUtil.reportView('HT5278', 'en_US');// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){var store = new Persist.Store('FeedStats');if (store.get('resultActivity')=='true'){var time = new Date();// Fix for /*setReadTimer = setTimeout(function(){var feedStats = new ACFeedStatistics();feedStats.updateRead('HT5278', store.get('position'));store.remove('HT5278');store.remove('position');}, 3000);*///store.set('HT5278', time.getTime());store.set('timeStart', time.getTime());}} });Event.observe(window, 'beforeunload', function(){// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){ var store = new Persist.Store('FeedStats'); if (store.get('resultActivity')=='true' && store.get('timeStart') !== null){ var time = new Date();//var timeDiff = time.getTime() - store.get('HT5278');var timeDiff = time.getTime() - store.get('timeStart');var timeSpent = Math.floor(timeDiff/1000);var feedStats = new ACFeedStatistics();// Fix for if (timeDiff About the security content of iOS 5.1.1 Software Update Summary

This document describes the security content of iOS 5.1.1 Software Update, which can be downloaded and installed using iTunes.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates".

Products Affected

Product Security, iPad, iPhone, iPod touch

iOS 5.1.1 Software Update

Safari

Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2

Impact: A maliciously crafted website may be able to spoof the address in the location bar

Description: A URL spoofing issue existed in Safari. This could be used in a malicious web site to direct the user to a spoofed site that visually appeared to be a legitimate domain. This issue is addressed through improved URL handling. This issue does not affect OS X systems.

CVE-ID

CVE-2012-0674 : David Vieira-Kurz of MajorSecurity (majorsecurity.net)

WebKit

Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2

Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack

Description: Multiple cross-site scripting issues existed in WebKit.

CVE-ID

CVE-2011-3046 : Sergey Glazunov working with Google's Pwnium contest

CVE-2011-3056 : Sergey Glazunov

WebKit

Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2

Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

Description: A memory corruption issue existed in WebKit.

CVE-ID

CVE-2012-0672 : Adam Barth and Abhishek Arya of the Google Chrome Security Team

$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem Email this article Share this article Print this page Share this article Twitter Facebook Last Modified: May 07, 2012 Article: HT5278 Views: 439726 Rating: 3.0/5 Stars
(3948 Responses) LanguagesCeštinaDanskDeutschEnglishEspañolSuomiFrançaisMagyarItaliano??????NederlandsNorsk BokmålPolskiPortuguês (Brasil)PortuguêsP??????SvenskaTürkçe???????? KmLoader.isOmnitureSupported='true'; Event.observe(window, 'load', function() { new KmLoader('2', 0, 0, 'About the security content of iOS 5.1.1 Software Update', 0, 0, 'en_US', 0, 0, 'support_site.related_articles.HT5278',undefined,undefined,'HT5278');}); Event.observe(window, 'load', function() { new KmLoader('1', 0, 0, 'About the security content of iOS 5.1.1 Software Update', 0, 0, 'en_US', 0, 0, 'support_site.related_discussions.HT5278'); }); Related Discussions More discussions Related Articles Ask other users about this articlein Apple Support Communities Wait... Loading... See all questions on this article

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Twitter Ads Are About to Get More Relevant

If all goes according to plan, ads on Twitter are about to get a lot more relevant to the people that see them. That's the idea behind the interest-targeted ad system the company has been testing. Having presumably ironed out the kinks, Twitter has just rolled the feature out to all of its advertisers. 

Previously, when Twitter displayed a promoted tweet or trending topic, it didn't take into account whether or not that ad is relevant or useful to a given user.

For years, advertisers on Facebook have had the ability to target ads very granularly based not only on demographic data and life events, but on specific interests held by users. The result, is many cases, is advertising that's sometimes eerily accurate and relevant to users' lives. Twitter is now adopting similar functionality as part of its quest to monetize its growing microblogging service. 

But Twitter isn't Facebook. On the world's biggest social network, users explicitly declare their interests on their profiles and through clicking "like" buttons woven throughout the Web and apps everywhere. Twitter doesn't have the luxury of such detailed user data, so it must employ other means to target its ads. 

The concept of interest-based advertising isn't new, but it is evolving thanks to the social Web. From the outset, Google has monetized its search engine based on people's interests. Early on, users declared those interests on a case-by-case basis by typing in a search query, which Google used to display targeted text link ads. Over time, search advertising has evolved to become more targeted and personalized, as have the competing social advertising models that have cropped up since the early days of Google. 

Twitter offers 350 categories of interests from Bollywood movies to gardening. Since users don't specify their interests on their profile, those interests must be gleaned from such things as what they say, who they follow and other user activity. Twitter doesn't elaborate on how it all works, but we wouldn't be surprised if things like favorited tweets weren't factored into the algorithm it's using.

To get more granular, advertisers can specify @usernames of users. Rather than target these people specifically, Twitter will attempt to show ads to users who share interests with those who follow them. The example the company uses is an indie rock band that wants to promote its upcoming tour on Twitter. To do so, the band can use this feature to list similar acts on Twitter and target people with like-minded taste in music. Again, Twitter isn't forthcoming about how that will work, but hopefully it has a way of filtering out pornbots and ghost followers.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

 
I Phone © 2012 | Designed by LogosDatabase.com, in collaboration with Credit Card Machines, Corporate Headquarters and Motivational Quotes