An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.
from Threatpost | The first stop for security news http://ift.tt/2vrVGgQ
via https://ifttt.com/ IFTTT
No comments:
Post a Comment