More Featured Articles

In-depth look at CurrentC and the personal data they want to collect

In-depth look at CurrentC and the personal data they want to collect

Just as quickly as CurrentC popped into the limelight, questions arose around the companies intentions. Even though I don't have an invite for CurrentC's invite-only mobile payments and loyalty rewards system, I decided to take a look. I posted some initial findings on Twitter and a brief summary...
Why is the CurrentC app collecting your device information?

Why is the CurrentC app collecting your device information?

Over the last few days, CVS and Rite Aid have disabled NFC technology at their retail outlets to prevent customers from using Apple Pay. It's been reported that this is due to an existing deal in place with a system called CurrentC, which involves the use of an app, QR codes, your bank account,...
Apple 'actively investigating' alleged celebrity iCloud account hacks

Apple 'actively investigating' alleged celebrity iCloud account hacks

Yesterday a massive theft of photo data from celebrities made its way onto the internet. iCloud was named as the source of the data, though no information was provided as to how it was exploited. Regardless, it made headlines. Apple is aware and investigating. According to Re/code: Apple said...
Security RSS Feed
'Thunderstrike' attack also fixed in OS X 10.10.2

'Thunderstrike' attack also fixed in OS X 10.10.2

"Thunderstrike" is the name for an attack that can target Mac hardware via the Thunderbolt port. Apple had previously updated the Retina 5K iMac and 2014 Mac mini to partially secure them against Thunderstrike. Now, the upcoming OS X Yosemite 10.10.2 will fix the problem for all recent Macs...
How to control what iOS apps can access your Twitter and Facebook accounts

How to control which iPhone and iPad apps can access your Twitter and Facebook accounts

We use Facebook and Twitter for more than just talking with our virtual social communities these days. We use them to login to other sites, to comment, to register — to host our digital identity. That's why it's a good idea to check and control which iPhone and iPad apps have access to your...
Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Google's Project Zero research program has disclosed and released proof-of-concept code for a series of 0day — previously unknown — vulnerabilities found in Apple's OS X operating system for the Mac. These exploits are all fixed in OS X Yosemite 10.10.2, now in beta. Here's a report on the...
Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

There's a story going around that quotes NSA whistleblower Edward Snowden's lawyer as saying Snowden won't use an iPhone because it has "special software" that could gather information about him. Instead, the lawyer says, Snowden has a simple phone". There's no first-hand account from Snowden and...
Yosemite Spotlight, spam email, tracking pixels, and what you need to know

Yosemite Spotlight, spam email, tracking pixels, and what you need to know

By default, OS X Yosemite's Mail app won't "load remote content" such as the types of images typically requested by marketing emails and spam. You can change that in preferences if you really want to see remote images in your emails — such as the products being advertised by Apple, Best Buy, or...
Cellular voice and SMS can reportedly be listened in on, FaceTime and iMessage safe

Cellular voice and SMS can reportedly be listened in on, FaceTime and iMessage safe

Security researchers in Germany have reportedly discovered two ways to both capture and decrypt voice and SMS communications that travel over SS7, a set of protocols used by phone systems. The Washington Post The flaws discovered by the German researchers are actually functions built into...
How to open apps from an unidentified developer in Yosemite

How to open apps from an unidentified developer in Yosemite

Mac OS X has a couple of great safeguards in place to prevent you from accidentally running malicious applications that might infect or otherwise damage your computer. But that can occasionally also prevent perfectly legitimate applications from running. Here's how to keep your computer safe and...
Apple entering era of security fear-mongering... from security vendors

Apple entering era of security fear-mongering... from security vendors

Apple is "entering a whack-a-mole era" when it comes to enterprise security, according to Marble Security, a company that — wait for it! — wants to sell enterprise on additional security products. Sadly, their marketing-masquerading-as-threat-assessment is being passed along as reporting, and...
How Apple keeps AirDrop files private and secure

How Apple keeps AirDrop files private and secure

AirDrop, part of Apple's Continuity features, makes it easy to share files between your iPhone, iPad, and/or Mac. It's especially useful for files that are larger than Messages or Mail can comfortably handle, and for situations where you want to transfer directly, without any information going...
How Apple keeps your SMS/MMS and call relays private and secure

How Apple keeps your SMS/MMS and call relays private and secure

With Continuity you can relay your SMS/MMS and calls from your iPhone to your iPad or Mac. That means, if your iPhone isn't close by, you don't have to go running for it just to take or make a text or call. As long as you have an iPhone and are logged into the same Apple ID on all your devices,...

Pages