{"id":49420,"date":"2016-01-21T10:16:05","date_gmt":"2016-01-21T18:16:05","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49420"},"modified":"2016-01-21T10:57:59","modified_gmt":"2016-01-21T18:57:59","slug":"update-your-ios-devices-your-cookies-may-be-at-risk","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/","title":{"rendered":"Update Your iOS Devices \u2013 Your Cookies May Be at Risk!"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49432\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600x300.jpeg\" alt=\"Captive Portal\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>If you own an iPhone or iPad chances are that you already know that there is an update to iOS available. With a few presses your device should be downloading iOS 9.2.1 which, according to Apple, includes a number of under-the-hood performance improvements and bug fixes.<\/p>\n<p>If you bothered to read the update dialog on your iDevice, you will have seen that iOS 9.2.1 addresses a <a title=\"Link to Apple advisory about MDM bug\" href=\"https:\/\/support.apple.com\/en-us\/HT205654\" target=\"_blank\" rel=\"nofollow\">bug<\/a> that was causing headaches for businesses using Mobile Device Management.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49423\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios921.jpeg\" alt=\"ioS 9.2.1\" width=\"600\" height=\"417\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios921.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios921-150x104.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios921-300x209.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>But, of course, that wasn&#8217;t the only issue that the new version of iOS aims to resolve. As researchers at Skycure <a title=\"Link to Skycure blog post\" href=\"https:\/\/www.skycure.com\/blog\/shared-cookie-stores-bug-fixed-in-ios-9-2-1\/\" target=\"_blank\" rel=\"nofollow\">explain<\/a>, iOS 9.2.1 tackles a vulnerability that has potentially left iPhones and iPads open to abuse for at least the last 2.5 years.<\/p>\n<p>The flaw, known as CVE-2016-1730, is described at the bottom of <a title=\"Link to Apple support advisory\" href=\"https:\/\/support.apple.com\/en-us\/HT205732\" target=\"_blank\" rel=\"nofollow\">Apple&#8217;s advisory<\/a> about the security content in the new version of iOS:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49426\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios-bug.jpeg\" alt=\"iOS bug\" width=\"600\" height=\"219\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios-bug.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios-bug-150x55.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/ios-bug-300x110.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<blockquote><p><strong>WebSheet<\/strong><\/p>\n<p>Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later<\/p>\n<p>Impact: A malicious captive portal may be able to access the user&#8217;s cookies<\/p>\n<p>Description: An issue existed that allowed some captive portals to read or write cookies. The issue was addressed through an isolated cookie store for all captive portals.<\/p>\n<p>CVE-ID<br \/>\nCVE-2016-1730 : Adi Sharabani and Yair Amit of Skycure<\/p><\/blockquote>\n<p>From that brief description it may be difficult to determine precisely what the problem was, so I&#8217;ll do my best to explain.<\/p>\n<p>When you connect to the Wi-Fi at your local coffee shop or in the airport departure lounge, you usually find that your iPhone or iPad is redirected to a special login page. This is known as a &#8220;captive portal,&#8221; and is triggered by your device making a request to the url <a title=\"Link to webpage saying 'Success'\" href=\"http:\/\/www.apple.com\/library\/test\/success.html\" target=\"_blank\" rel=\"nofollow\">http:\/\/www.apple.com\/library\/test\/success.html<\/a><\/p>\n<p>If the request is redirected to a third-party page then Apple knows that the providers of the wireless connectivity have put a portal in place, and a dialog box is displayed via an embedded browser giving you the opportunity to login.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49435\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600.jpeg\" alt=\"Captive portal\" width=\"600\" height=\"296\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600-150x74.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-600-300x148.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>So far, so good.<\/p>\n<p>But, back in June 2013, Skycure discovered that the embedded browser used to display captive portals had a vulnerability, which saw private cookies already stored in the user&#8217;s mobile Safari browser shared with the captive portal, and vice versa.<\/p>\n<p>As Skycure&#8217;s Yair Amit explains, the vulnerability opens opportunities for attackers to do a number of things:<\/p>\n<ul>\n<li>Steal users\u2019 (HTTP) cookies associated with a site of the attacker\u2019s choice. By doing so, the attacker can then impersonate the victim\u2019s identity on the chosen site.<\/li>\n<li>Perform a session fixation attack, logging the user into an account controlled by the attacker\u2013because of the shared Cookie Store, when the victims browse to the affected website via Mobile Safari, they will be logged into the attacker\u2019s account instead of their own.<\/li>\n<li>Perform a cache-poisoning attack on a website of the attacker\u2019s choice (by returning an HTTP response with caching headers). This way, the attacker\u2019s malicious JavaScript would be executed every time the victim connects to that website in the future via Mobile Safari.<\/li>\n<\/ul>\n<p>If abused, the consequences clearly could have been serious.<\/p>\n<p>Apple has apparently taken 2.5 years to roll out a fix for this problem, as Skycure first informed them in June 2013. According to the researchers &#8220;this is the longest it has taken Apple to fix a security issue reported by us,&#8221; but they do acknowledge that the fix was &#8220;more complicated than one would imagine&#8221; and that Apple was receptive and responsive to the issue.<\/p>\n<p>I guess we all have to be grateful that Skycure was patient, and wasn&#8217;t tempted to go public about the flaw before Apple had rolled out a fix \u2014 even though it must have been frustrating quite so long.<\/p>\n<p>Because, if Skycure had acted like some other vulnerability researchers have in the past, there is no doubt in my mind that this flaw might have been more widely exploited by malicious hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims&#8217; identities online.<\/p>\n","protected":false},"author":34,"featured_media":49438,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[3151,41,2653,69,2650,106,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims&#039; identities online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Update Your iOS Devices \u2013 Your Cookies May Be at Risk! - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims&#039; identities online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-21T18:16:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-21T18:57:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/\",\"name\":\"Update Your iOS Devices \\u2013 Your Cookies May Be at Risk! - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage\"},\"datePublished\":\"2016-01-21T18:16:05+00:00\",\"dateModified\":\"2016-01-21T18:57:59+00:00\",\"description\":\"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims' identities online.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Update Your iOS Devices \\u2013 Your Cookies May Be at Risk!\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Update Your iOS Devices \\u2013 Your Cookies May Be at Risk!\",\"datePublished\":\"2016-01-21T18:16:05+00:00\",\"dateModified\":\"2016-01-21T18:57:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage\"},\"wordCount\":660,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg\",\"keywords\":[\"Apple\",\"Cookies\",\"CVE-2016-1730\",\"iOS\",\"iOS 9.2.1\",\"Privacy\",\"Vulnerability\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims' identities online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Update Your iOS Devices \u2013 Your Cookies May Be at Risk! - The Mac Security Blog","og_description":"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims' identities online.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-01-21T18:16:05+00:00","article_modified_time":"2016-01-21T18:57:59+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/","name":"Update Your iOS Devices \u2013 Your Cookies May Be at Risk! - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage"},"datePublished":"2016-01-21T18:16:05+00:00","dateModified":"2016-01-21T18:57:59+00:00","description":"It took Apple 2.5 years to roll out a fix for a serious problem in iOS, that could have seen hackers impersonating victims' identities online.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Update Your iOS Devices \u2013 Your Cookies May Be at Risk!"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Update Your iOS Devices \u2013 Your Cookies May Be at Risk!","datePublished":"2016-01-21T18:16:05+00:00","dateModified":"2016-01-21T18:57:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#webpage"},"wordCount":660,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg","keywords":["Apple","Cookies","CVE-2016-1730","iOS","iOS 9.2.1","Privacy","Vulnerability"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/update-your-ios-devices-your-cookies-may-be-at-risk\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/captiveportal-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cR6","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49420"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49420"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49420\/revisions"}],"predecessor-version":[{"id":49480,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49420\/revisions\/49480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/49438"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}