Security | Page 5 | iMore

Order iPhone 7: AT&T | Verizon | T-Mobile | Sprint | Apple

Security

No, OS X is NOT the 'most vulnerable OS' despite shoddy reporting

Security, as we take great pains to repeatedly point out, is something that deeply affects people. It affects their stress and trust levels when dealing with technology. When it's misreported it turns what should be an empowering experience into one of fear, uncertainty, and doubt. And it's far too frequently done just to get the worst kind of attention. The latest case in point is a — I don't want to call it a report — from GFI which claims OS X and iOS were the "most vulnerable operating systems of 2014. And, frankly, it's bullshit.

More →


Gemalto denies 'massive theft' of SIM card encryption keys by NSA and GCHQ [updated]

Update: A new report in The Intercept claims that Gemalto is drastically downplaying the effects of this attack. In the report, several security researchers came to the conclusion that "the company made sweeping, overly-optimistic statements about the security and stability of Gemalto's networks, and dramatically underplayed the significance of the NSA-GCHQ targeting of the company and its employees."

Original story: Digital security vendor Gemalto revealed its findings today following last week's report of an incursion by the NSA and the GCHQ into the vendor's SIM card encryption keys. While Gemalto noted that an operation by NSA and GCHQ "probably happened" in 2010 and 2011, the intrusion could not have resulted in a "massive theft" of SIM card encryption keys as the breach affected the company's office network and not its secure networks.

More →


SIM card manufacturer Gemalto says its products are secure following NSA hack

Digital security vendor Gemalto has announced that its products are "secure" following a report last week stating that the NSA and its UK counterpart, the Government Communications Headquarters (GCHQ), hacked into the vendor's SIM cards.

More →


The NSA and GCHQ gave themselves a direct line into your phone

According to new documents leaked by Edward Snowden, the NSA and its UK counterpart, Government Communications Headquarters (GCHQ), hacked into the computers of Gemalto, a company that manufactures SIM cards for a large number of carriers around the world. In doing so, the intelligence agencies acquired encryption keys that would allow them to intercept communications from customers of all four major U.S. carriers, along with 450 others around the world.

More →


Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Google's Project Zero research program has disclosed and released proof-of-concept code for a series of 0day — previously unknown — vulnerabilities found in Apple's OS X operating system for the Mac. These exploits are all fixed in OS X Yosemite 10.10.2, now in beta.

More →


Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

There's a story going around that quotes NSA whistleblower Edward Snowden's lawyer as saying Snowden won't use an iPhone because it has "special software" that could gather information about him. Instead, the lawyer says, Snowden has a simple phone". There's no first-hand account from Snowden and no details about what the "special software" might be — a web cookie? who knows! — but that hasn't stopped the quote from making its way across the sensationalism-over-security parts of the internet. So, what's really going?

More →


Best Touch ID compatible apps for iPhone and iPad

When Apple first introduced Touch ID in 2013, the company initially only allowed using it for unlocking your iPhone and confirming App Store purchases. Now, thanks to iOS 8, app developers can securely take advantage of Touch ID to protect and secure purchases, notes, passwords, and other kinds of app data. These are currently our picks for best iPhone apps and best iPad apps that take advantage of Touch ID in ways that make your life easier and more secure!

More →


FCC credits Apple's iOS Activation Lock for declining iPhone thefts

As a result of Apple implementing Activation Lock on its iOS software, iPhone theft cases are on the decline. The Federal Communications Commission published a report in December detailing that iPhone thefts are down by a significant margin in major cities, such as in San Francisco, CA and New York, NY in the U.S. and London in the U.K.

More →


CurrentC notifies users of breach, only email addresses were taken

Members of the CurrentC pilot program are receiving a notice today that the service has been breached, with an unspecified number of user email addresses having been compromised. MCX says that no other information was taken. The group reminds to avoid phishing scams, saying that they will never be contacted by CurrentC or MCX for their financial information over email.

More →


T-Mobile quietly upgrades 2G network security

T-Mobile is quietly upgrading the security of their older 2G network, moving to more advanced encryption that prevents eavedropping. The new, more secure network has already been deployed in at least three locations, New York, Washington, and Boulder, Colorado. The T-Mobile 2G network has previously relied on older A5/1 encryption, with the new security standard known as A5/3.

More →


Pages