Goto Fail

An Apple iOS and OS x Secure Socket Layer (SSL) software vulnerability that allows a malicious user or hacker to intercept and alter communications including email and login credentials. The vulnerability allows anyone with a certificate signed by a “trusted CA” to do a man-in-the-middle attack and intercept communication between the user’s Apple hardware and the intended recipient or website.

Apple Security Patches

Apple released a patch for devices including the iPhone (4 and later), iPod touch (5th generation) and the iPad (2nd generation). The SSL vulnerability has also been patched for OS X Mavericks. Websites, including this goto fail test site will check if your system is vulnerable if you visit the URL using the Safari browser.

A Simple Programming Error?

As reported on Wired, the iOS 7 bug is the result of a simple programming error where two “goto fail” lines appear, one after the other. The second function is a duplicate entry (a typo) that diverts the program s execution past a critical authentication check.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...