Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    September 13, 2025

    Why Former NFL All-Pros Are Turning to Psychedelics

    September 13, 2025

    Elon Musk is trying to silence Microsoft employees who criticize Charlie Kirk

    September 12, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities
    Security

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    News RoomBy News RoomSeptember 13, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Apple launched a slate of new iPhones on Tuesday loaded with the company’s new A19 and A19 Pro chips. Along with an ultrathin iPhone Air and other redesigns, the new phones come with a less flashy upgrade that could turn out to be the true killer feature. A security improvement called Memory Integrity Enforcement combines always-on, chip-level protections with software defenses in an effort to harden iPhones against the most common—and commonly exploited—software vulnerabilities.

    In recent years, a movement has been steadily growing across the global tech industry to address a ubiquitous and insidious type of bugs known as memory-safety vulnerabilities. A computer’s memory is a shared resource among all programs, and memory safety issues crop up when software can pull data that should be off limits from a computer’s memory or manipulate data in memory that shouldn’t be accessible to the program. When developers—even experienced and security-conscious developers—write software in ubiquitous, historic programming languages, like C and C++, it’s easy to make mistakes that lead to memory safety vulnerabilities. That’s why proactive tools like special programming languages have been proliferating with the goal of making it structurally impossible for software to contain these vulnerabilities, rather than attempting to avoid introducing them or catch all of them.

    “The importance of memory safety cannot be overstated,” the US National Security Agency and Cybersecurity and Infrastructure Security Agency wrote in a June report. “The consequences of memory safety vulnerabilities can be severe, ranging from data breaches to system crashes and operational disruptions.”

    Apple’s Swift programming language, released in 2014, is memory-safe. The company says it has been writing new code in Swift for years as well as attempting to strategically overhaul and rewrite existing code in the memory-safe language to make its systems more secure. This reflects the challenge of memory safety across the industry, because even if new code is written more securely, the world’s software was all written in memory-unsafe languages for decades. And while, in general, Apple’s locked down ecosystem has so far succeeded at preventing widespread malware attacks against iPhones, motivated attackers, particularly spyware makers, do still develop complex iOS exploit chains at high cost to target specific victims’ iPhones.

    Even with the work Apple has done to begin overhauling its code for memory safety, the company has found that these rarefied attack chains virtually always still include exploitation of memory bugs.

    “Known mercenary spyware chains used against iOS share a common denominator with those targeting Windows and Android: they exploit memory safety vulnerabilities, which are interchangeable, powerful, and exist throughout the industry,” Apple wrote in its Memory Integrity Enforcement announcement on Wednesday.

    Apple has increasingly invested in memory safety with Swift and secure memory allocators that manage which regions of memory are “allocated” and “deallocated” for which data—a major factor in, and source of, memory safety vulnerabilities. But Memory Integrity Enforcement itself was originally inspired by work at the hardware level to protect code integrity even when a system has suffered memory corruption.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhy Former NFL All-Pros Are Turning to Psychedelics

    Related Posts

    Defense Department Scrambles to Pretend It’s Called the War Department

    September 12, 2025

    US Investment in Spyware Is Skyrocketing

    September 11, 2025

    Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

    September 11, 2025

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    September 10, 2025

    ICE Has Spyware Now

    September 9, 2025

    US Congressman’s Brother Lands No-Bid Contract to Train DHS Snipers

    September 9, 2025
    Our Picks

    Why Former NFL All-Pros Are Turning to Psychedelics

    September 13, 2025

    Elon Musk is trying to silence Microsoft employees who criticize Charlie Kirk

    September 12, 2025

    Tucker Carlson asks Sam Altman if an OpenAI employee was murdered ‘on your orders’

    September 12, 2025

    Nvidia’s GeForce Now Update Feels Like Someone Put an RTX 5080 in My MacBook

    September 12, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Discord is distancing itself from the Charlie Kirk shooting suspect

    By News RoomSeptember 12, 2025

    Discord denies that the suspect accused of killing Charlie Kirk used the messaging platform to…

    A new Astro Bot-themed PS5 controller is now available for preorder

    September 12, 2025

    Ultraloq adds Android tap-to-unlock to its Apple Home Key smart lock

    September 12, 2025

    It’s time for Meta to add a display to its smart glasses

    September 12, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.