If you’re a user of iTunes on the Windows platform, you need to pay attention to this rather serious bug that is being reported by a Dutch researcher. According to this website (Google Translated), iTunes users on Windows are vulnerable to a serious SSL certificate flaw that allows hackers to intercept their passwords which are transmitted via plain text. If this sounds familiar, there was a similar bug on iOS and OS X that was fixed by Apple. This is a major #fail as Apple really has not done any of the basic things it has to do to make iTunes for Windows secure. Now Apple is aware of this apparently, but no word when a fix is coming. After all, Apple isn’t exactly the most open company.
Perhaps Apple should start taking security more seriously. Just like Kristen Paget suggests that they should.
Related
This entry was posted on May 21, 2014 at 9:51 am and is filed under Commentary with tags Apple, Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
iTunes For Windows Users Have A Serious Password Bug
If you’re a user of iTunes on the Windows platform, you need to pay attention to this rather serious bug that is being reported by a Dutch researcher. According to this website (Google Translated), iTunes users on Windows are vulnerable to a serious SSL certificate flaw that allows hackers to intercept their passwords which are transmitted via plain text. If this sounds familiar, there was a similar bug on iOS and OS X that was fixed by Apple. This is a major #fail as Apple really has not done any of the basic things it has to do to make iTunes for Windows secure. Now Apple is aware of this apparently, but no word when a fix is coming. After all, Apple isn’t exactly the most open company.
Perhaps Apple should start taking security more seriously. Just like Kristen Paget suggests that they should.
Share this:
Like this:
Related
This entry was posted on May 21, 2014 at 9:51 am and is filed under Commentary with tags Apple, Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.