Apple warns of security flaw for iPhones, iPads and Macs - Todayville

2022-08-19 20:38:41 By : Ms. Denise Chen

S AN FRANCISCO (AP) — Apple disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices.

Apple released two securityreports about the issue on Wednesday, although they didn’t receive wide attention outside of tech publications.

Apple’s explanation of the vulnerability means a hacker could get “full admin access” to the device. That would allow intruders to impersonate the device’s owner and subsequently run any software in their name, said Rachel Tobac, CEO of SocialProof Security.

Security experts have advised users to update affected devices — the iPhone6S and later models; several models of the iPad, including the 5th generation and later, all iPad Pro models and the iPad Air 2; and Mac computers running MacOS Monterey. The flaw also affects some iPod models.

Apple did not say in the reports how, where or by whom the vulnerabilities were discovered. In all cases, it cited an anonymous researcher.

Commercial spyware companies such as Israel’s NSO Group are known for identifying and taking advantage of such flaws, exploiting them in malware that surreptitiously infects targets’ smartphones, siphons their contents and surveils the targets in real time.

NSO Group has been blacklisted by the U.S. Commerce Department. Its spyware is known to have been used in Europe, the Middle East, Africa and Latin America against journalists, dissidents and human rights activists.

Security researcher Will Strafach said he had seen no technical analysis of the vulnerabilities that Apple has just patched. The company has previously acknowledged similarly serious flaws and, in what Strafach estimated to be perhaps a dozen occasions, has noted that it was aware of reports that such security holes had being exploited.

CP NewsAlert: Bell Media to launch workplace review amid criticism of LaFlamme ouster

Flames sign Kadri to 7-year, $49-million deal, trade Monahan to Canadiens

Storytelling is in our DNA. We provide credible, compelling multimedia storytelling and services in English and French to help captivate your digital, broadcast and print audiences. As Canada’s national news agency for 100 years, we give Canadians an unbiased news source, driven by truth, accuracy and timeliness.

K YIV, Ukraine (AP) — On Ukraine’s battlefields, the simple act of powering up a cellphone can beckon a rain of deathly skyfall. Artillery radar and remote controls for unmanned aerial vehicles may also invite fiery shrapnel showers.

This is electronic warfare, a critical but largely invisible aspect of Russia’s war against Ukraine. Military commanders largely shun discussing it, fearing they’ll jeopardize operations by revealing secrets.

Electronic warfare technology targets communications, navigation and guidance systems to locate, blind and deceive the enemy and direct lethal blows. It is used against artillery, fighter jets, cruise missiles, drones and more. Militaries also use it to protect their forces.

It’s an area where Russia was thought to have a clear advantage going into the war. Yet, for reasons not entirely clear, its much-touted electronic warfare prowess was barely seen in the war’s early stages in the chaotic failure to seize the Ukrainian capital of Kyiv.

It has become far more of a factor in fierce fighting in eastern Ukraine, where shorter, easier-to-defend supply lines let Russia move electronic warfare gear closer to the battlefield.

“They are jamming everything their systems can reach,” said an official of Aerorozvidka, a reconnaissance team of Ukrainian unmanned aerial vehicle tinkerers, who spoke on the condition of anonymity because of safety concerns. “We can’t say they dominate, but they hinder us greatly.”

A Ukrainian intelligence official called the Russian threat “pretty severe” when it comes to disrupting reconnaissance efforts and commanders’ communications with troops. Russian jamming of GPS receivers on drones that Ukraine uses to locate the enemy and direct artillery fire is particularly intense “on the line of contact,” he said.

Ukraine has scored some successes in countering Russia’s electronic warfare efforts. It has captured important pieces of hardware — a significant intelligence coup — and destroyed at least two multi-vehicle mobile electronic warfare units.

Its own electronic warfare capability is hard to assess. Analysts say it has markedly improved since 2014, when Russia seized Crimea and instigated a separatist revolt in eastern Ukraine. But there are setbacks. Last week, Russia claimed it destroyed a Ukrainian electronic intelligence center in the southeastern town of Dniprovske. The claim could not be independently confirmed, and Ukrainian officials did not respond to a request for comment.

Ukraine has also made effective use of technology and intelligence from the United States and other NATO members. Such information helped Ukraine sink the battle cruiser Moskva. Allied satellites and surveillance aircraft help from nearby skies, as does billionaire Elon Musk’s Starlink satellite communications network.

Electronic war has three basic elements: probe, attack and protect. First, intelligence is gathered by locating enemy electronic signals. On attack, “white noise” jamming disables and degrades enemy systems, including radio and cellphone communications, air defense and artillery radars. Then there is spoofing, which confuses and deceives. When it works, munitions miss their targets.

“Operating on a modern battlefield without data is really hard,” said retired Col. Laurie Buckhout, a former U.S. Army electronic warfare chief. Jamming “can blind and deafen an aircraft very quickly and very dangerously, especially if you lose GPS and radar and you’re a jet flying at 600 miles an hour.”

All of which explains the secrecy around electronic warfare.

“It is an incredibly classified field because it is highly dependent on evolving, bleeding-edge technologies where gains can be copied and erased very quickly,” said James Stidham, a communications security expert who has consulted for the U.S. State and Homeland Security departments.

Ukraine learned hard lessons about electronic warfare in 2014 and 2015, when Russia overwhelmed its forces with it. The Russians knocked drones out of the sky and disabled warheads, penetrated cellphone networks for psychological ops and zeroed in on Ukrainian armor.

One Ukrainian officer told Christian Brose, an aide to the late U.S. Sen. John McCain, R-Ariz., how Russian info warriors tricked a commander into returning a wireless call from his mother. When he did, they geolocated him in mid-call and killed him with precision rockets, Brose wrote in the book “The Kill Chain.”

The U.S. also experienced Russia’s electronic warfare in action in Syria, where the adversaries have backed opposing sides in the civil war. In 2018, U.S. Special Operations chief Gen. Raymond Thomas  described how U.S. pilots’ communications were regularly “knocked down” in Syria in the “most aggressive” electronic warfare environment on the planet. Russia’s advanced systems are designed to blind U.S. Airborne Warning and Control Systems, or AWACS, aircraft — the eyes and ears of battlefield commanders — as well as cruise missiles and spy satellites.

In the current war, electronic warfare has become a furious theater of contention.

Aerorozvidka has modified camera-equipped drones to pinpoint enemy positions and drop mortars and grenades. Hacking is also used to poison or disable enemy electronics and collect intelligence.

Ukrainian officials say their electronic warfare capabilities have improved radically since 2015. They include the use of encrypted U.S and Turkish communications gear for a tactical edge. Ukraine has advanced so much it exports some of its technology.

Russia has engaged in GPS jamming in areas from Finland to the Black Sea, said Lt. Col. Tyson Wetzel, an Air Force fellow at the Atlantic Council. One regional Finnish carrier, Transaviabaltica, had to cancel flights on one route for a week as a result. Russian jamming has also disrupted Ukrainian television broadcasting, said Frank Backes, an executive with California-based Kratos Defense, which has satellite ground stations in the region.

Yet in the war’s early days, Russia’s use of electronic warfare was less effective and extensive than anticipated. That may have contributed to its failure to destroy enough radar and anti-aircraft units to gain air superiority.

Russia’s defense ministry did not respond to a request for comment for this article.

Some analysts believe Russian commanders held back units fearing the units would be captured. At least two were seized. One was a Krasukha-4, which a U.S. Army database says is designed to jam satellite signals as well as surveillance radar and radar-guided weapons from more than 100 miles (160 kilometers) away. The other: the more advanced Borisoglebsk-2, which can jam drone guidance systems and radio-controlled land mines.

Russia may have also limited the use of electronic warfare early in the conflict because of concerns that ill-trained or poorly motivated technicians might not operate it properly.

“What we’re learning now is that the Russians eventually turned it off because it was interfering with their own communications so much,” said retired Lt. Gen. Ben Hodges, a former U.S. Army commander for Europe.

The communications problems were evident with many Russian troops talking on insecure open radio channels, easily monitored by outsiders.

It’s unclear how much of an edge Russia’s electronic assets may now offer. Ukraine’s forces are now more concentrated than early in the war, which could make them easier to target.

Much depends on whether Russia’s battalion tactical groups “are configured in reality as they are on paper,” said James Rands, of the Jane’s military intelligence think tank. Each group, comprised of roughly 1,000 troops, is supposed to have an electronic warfare unit. The Pentagon says 110 such groups are in Ukraine.

The Kremlin also claims to have more than 1,000 small, versatile Orlan-10 unmanned aerial vehicles it uses for reconnaissance, targeting, jamming and cellphone interception.

Russia has lost about 50 of its Orlan-10s in the war, but “whatever they lost could be a small portion of what’s flying,” said researcher Samuel Bendett, of the Center for Naval Analyses think tank.

Ukraine’s relative UAV strength is unclear, but Ukrainians have adapted such technologies as software-defined radio and 3D printing to stay nimble.

The U.S. and Britain also supply jamming gear, but how much it helps is unclear. Neither country has offered details. The ability of both sides to disable the other’s drones is crucial with the artillery they scout now so decisive in battles.

Musk’s Starlink is a proven asset. Its more than 2,200 low-orbiting satellites provide broadband internet to more than 150,000 Ukrainian ground stations. Severing those connections is a challenge for Russia. It is far more difficult to jam low-earth orbiting satellites than geostationary ones.

Musk has won plaudits from the Pentagon for at least temporarily defeating Russian jamming of Ukrainian satellite uplinks with a quick software fix. But he has warned Ukrainians to keep those terminals powered down when possible — they are vulnerable to geolocation — and recently worried on Twitter about redoubled Russian interference efforts.

“I’m sure that the Russians are getting smarter about that now,” said Wetzel, the Air Force lieutenant colonel.

Bajak reported from Boston. AP correspondent Lolita C. Baldor contributed from Washington.

Oleksandr Stashevskyi And Frank Bajak, The Associated Press

TORONTO — Ontario’s right to disconnect policy came into effect Friday. Here’s what you need to know:

Late last year, the province enacted Bill 27: Working for Workers Act, 2021, that requires employers with 25 or more people on staff as of Jan. 1, 2022 to have a policy as of Thursday that outlines how they will ensure workers are able to disconnect from the workplace after hours.

What does it mean to disconnect from work?

The Act defines disconnecting from work as “not engaging in work-related communications, including emails, telephone calls, video calls or sending or reviewing other messages, to be free from the performance of work.”

What does this policy mean for employers and employees?

Employers must provide staff with a written copy of the policy.

The policy applies to all employees, including management and executives.

Starting in 2023, employers with 25 workers or more will need to have a written policy on disconnecting from work in place before March 1 of that year.

For employers with multiple locations, all workers across locations must be included in the count.

How did we get here?

Inspired by a 2016 law giving workers in France the right to turn off electronic work devices outside of business hours, Canada’s federal government started reviewing labour standards and mulling whether to give workers the right to ignore work-related messages when at home in 2018.

A committee convened last October was expected to analyze the issue and provide then-labour minister Filomena Tassi with recommendations in the spring.

But the province opted not to wait for federal regulations.

This report by The Canadian Press was first published June 2, 2022.

Stankoven scores twice, Canada doubles up Swiss 6-3 at world juniors

CDC director announces shake-up, citing COVID mistakes

CTV: Thanks For Everything, Lisa. Not Really. Just Leave

G’day for Canada Little Leaguers in beating Australia 7-0 at World Series

LeBron James inks 2-year, $97.1 million deal with Lakers

‘Sorry’: Crown calls for harsh sentence for Calgary man in multimillion-dollar fraud

A look at the world’s skinniest skyscraper: Steinway Tower

MPs plan visit to Taiwan this fall if trip budget approved

Copyright © 2022. Created by Todayville Inc.