Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. 'Almost every Apple device' vulnerable to CocoaPods supply chain attack

'Almost every Apple device' vulnerable to CocoaPods supply chain attack

Scheduled Pinned Locked Moved The Insider News
swiftioscomsecurityannouncement
2 Posts 2 Posters 1 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    The Register[^]:

    CocoaPods, an open-source dependency manager used in over three million applications coded in Swift and Objective-C, left thousands of packages exposed and ready for takeover for nearly a decade – thereby creating opportunities for supply chain attacks on iOS and macOS apps, according to security researchers.

    You're using the dependencies wrong (or something like that)

    At least a bit of good news, "EVA's researchers wrote that they haven't seen evidence of this mess having been exploited." Of course, with so many targets, I can't imagine they've looked at all of them to see if they're being attacked.

    N 1 Reply Last reply
    0
    • K Kent Sharkey

      The Register[^]:

      CocoaPods, an open-source dependency manager used in over three million applications coded in Swift and Objective-C, left thousands of packages exposed and ready for takeover for nearly a decade – thereby creating opportunities for supply chain attacks on iOS and macOS apps, according to security researchers.

      You're using the dependencies wrong (or something like that)

      At least a bit of good news, "EVA's researchers wrote that they haven't seen evidence of this mess having been exploited." Of course, with so many targets, I can't imagine they've looked at all of them to see if they're being attacked.

      N Offline
      N Offline
      Nelek
      wrote on last edited by
      #2

      And another one to Apple is safe as in Linux is safe.

      M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.

      1 Reply Last reply
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Don't have an account? Register

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups