Modernizing Authentication — What It Takes to Transform Secure Access
According to the New York Times, a recently uncovered iOS vulnerability can allow third party app developers to access photos on a user's device.
"The loophole lies in the way that applications use certain photo location data," writes Threatpost's Christopher Brook.
"Assuming an iPhone user approves any app that accesses the location data of photos, the app’s developers will be able to capture any of the users’ images while that app is open," Brook writes.
Go to "Loophole in iOS Allows Developers Access to Users’ Photos" to read the details.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
For regular security news updates, follow eSecurityPlanet on Twitter: @eSecurityP.