Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    The Dreame X40 Ultra robovac is about 0 off, nearly matching its best price

    The Dreame X40 Ultra robovac is about $700 off, nearly matching its best price

    December 31, 2025
    Leaked video shows the Galaxy S26 Ultra’s new camera island

    Leaked video shows the Galaxy S26 Ultra’s new camera island

    December 31, 2025
    Net neutrality was back, until it wasn’t

    Net neutrality was back, until it wasn’t

    December 31, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities
    Security

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    News RoomBy News RoomSeptember 13, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    Apple launched a slate of new iPhones on Tuesday loaded with the company’s new A19 and A19 Pro chips. Along with an ultrathin iPhone Air and other redesigns, the new phones come with a less flashy upgrade that could turn out to be the true killer feature. A security improvement called Memory Integrity Enforcement combines always-on, chip-level protections with software defenses in an effort to harden iPhones against the most common—and commonly exploited—software vulnerabilities.

    In recent years, a movement has been steadily growing across the global tech industry to address a ubiquitous and insidious type of bugs known as memory-safety vulnerabilities. A computer’s memory is a shared resource among all programs, and memory safety issues crop up when software can pull data that should be off limits from a computer’s memory or manipulate data in memory that shouldn’t be accessible to the program. When developers—even experienced and security-conscious developers—write software in ubiquitous, historic programming languages, like C and C++, it’s easy to make mistakes that lead to memory safety vulnerabilities. That’s why proactive tools like special programming languages have been proliferating with the goal of making it structurally impossible for software to contain these vulnerabilities, rather than attempting to avoid introducing them or catch all of them.

    “The importance of memory safety cannot be overstated,” the US National Security Agency and Cybersecurity and Infrastructure Security Agency wrote in a June report. “The consequences of memory safety vulnerabilities can be severe, ranging from data breaches to system crashes and operational disruptions.”

    Apple’s Swift programming language, released in 2014, is memory-safe. The company says it has been writing new code in Swift for years as well as attempting to strategically overhaul and rewrite existing code in the memory-safe language to make its systems more secure. This reflects the challenge of memory safety across the industry, because even if new code is written more securely, the world’s software was all written in memory-unsafe languages for decades. And while, in general, Apple’s locked down ecosystem has so far succeeded at preventing widespread malware attacks against iPhones, motivated attackers, particularly spyware makers, do still develop complex iOS exploit chains at high cost to target specific victims’ iPhones.

    Even with the work Apple has done to begin overhauling its code for memory safety, the company has found that these rarefied attack chains virtually always still include exploitation of memory bugs.

    “Known mercenary spyware chains used against iOS share a common denominator with those targeting Windows and Android: they exploit memory safety vulnerabilities, which are interchangeable, powerful, and exist throughout the industry,” Apple wrote in its Memory Integrity Enforcement announcement on Wednesday.

    Apple has increasingly invested in memory safety with Swift and secure memory allocators that manage which regions of memory are “allocated” and “deallocated” for which data—a major factor in, and source of, memory safety vulnerabilities. But Memory Integrity Enforcement itself was originally inspired by work at the hardware level to protect code integrity even when a system has suffered memory corruption.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhy Former NFL All-Pros Are Turning to Psychedelics
    Next Article Spotify Lossless is an inconvenient improvement

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Leaked video shows the Galaxy S26 Ultra’s new camera island

    Leaked video shows the Galaxy S26 Ultra’s new camera island

    December 31, 2025
    Net neutrality was back, until it wasn’t

    Net neutrality was back, until it wasn’t

    December 31, 2025
    Two cybersecurity employees plead guilty to carrying out ransomware attacks

    Two cybersecurity employees plead guilty to carrying out ransomware attacks

    December 30, 2025
    The Biden administration’s Cyber Trust Mark is a likely casualty of Trump’s FCC

    The Biden administration’s Cyber Trust Mark is a likely casualty of Trump’s FCC

    December 30, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    This smart garden turned my black thumb green Reviews

    This smart garden turned my black thumb green

    By News RoomDecember 30, 2025

    I can’t grow anything. Multiple attempts to create a cottage garden, first in Idaho and…

    GameSir put a tiny force feedback steering wheel on its new Swift Drive controller

    GameSir put a tiny force feedback steering wheel on its new Swift Drive controller

    December 30, 2025
    Anker’s portable backup battery is an even better investment now it’s nearly half off

    Anker’s portable backup battery is an even better investment now it’s nearly half off

    December 30, 2025
    The Canon EOS R6 Mark III is great, but this lens is amazing

    The Canon EOS R6 Mark III is great, but this lens is amazing

    December 30, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.