Security

Apple says theoretical exploits be damned, they can't read your iMessages

Earlier this week security researchers presented their paper highlighting how a man-in-the-middle attack could let Apple, or an agency compelling Apple, read our iMessage despite the end-to-end encryption. Not so says Apple spokesperson Trudy Muller. AllThingsD:

More →

-
loading...
-
loading...
-
loading...
-
loading...

Android is 'more secure than the iPhone' claims - wait for it - Google's chairman

Eric Schmidt, former Apple board member, former CEO of Google, and one of the all-around wackiest public speakers in modern technology has reportedly once again taken stage to flabbergast and confuse proponents of logic, reason, and truthiness everywhere. John Fontana, ZDNet:

More →

-
loading...
-
loading...
-
loading...
-
loading...

5 ways to increase security and privacy of your iPhone or iPad

With iOS 7 - see our complete iOS 7 review - Apple has made the iPhone, iPod touch, and iPad more convenient than ever, but also more secure. How is that possible? Well, in most cases you - the owner of the device - have to choose which one is more important to you - the owner of the device. You can set things up so that every major setting and notification is available at the glance of an eye, the swipe of a finger, or the sound of a voice. Or you can make it so that every bit on the box is locked away behind a strong password. There's no "security flaw" that can be taken advantage of, only tools that you can choose to use, or not, to provide the right balance on your device. Now, adding security does require more time and effort than going without, but nowhere nearly as much time and effort as it takes to recover after your stuff is spied, stolen, or otherwise violated. So, weigh the options and make your choice in the eternal battle between security and convenience. Here's what you need know!

More →

25
loading...
0
loading...
2
loading...
0
loading...

iOS 7 Security: The good, the bad, and the controversy

As with nearly all software updates from Apple, iOS 7 brought with it a large number of security updates for users. Ranging from entirely new features all the way down to minor tweaks and enhancements, there's a lot to discuss when it comes to iOS 7 security. iMore's editor-in-chief Rene Ritchie briefly touched on most of the changes in his iOS 7 review, but I thought it would be fun to take a closer look.

More →

18
loading...
0
loading...
81
loading...
0
loading...

Adobe confirms huge security breach, source code, user accounts affected

Adobe Systems on Thursday announced via its blog that hackers have infiltrated the company's systems and have accessed both Adobe application source code and customer records. The breach affects 2.9 million user accounts and includes encrypted credit card information, according to Adobe Chief Security Officer Brad Arkin.

More →

-
loading...
-
loading...
-
loading...
-
loading...

Another lockscreen bug found in iOS 7 but here's how you can avoid it

Over the course of the existence of iOS there has been several lockscreen bugs found and ultimately fixed by Apple. With the release of iOS 7 even though there was a ton of security improvements, yet another has been found as reported by Forbes

This one is essentially the same as several others found in the past wherein a not so nice individual can gain access to your devices photos app, email, social networks and more through the Control Centre.

More →

-
loading...
-
loading...
-
loading...
-
loading...

Apple details security fixes in iOS 7. And there's a ton of them!

Apple has distributed a list of security fixes in the just-released iOS 7 software update. And it's as long and encompassing as you'd imagine any major platform update would be. I haven't seen them online yet, so I'm reproducing it here for anyone who's urgently interested. When/if Apple posts it to their knowledge base, we'll update and link out.

More →

-
loading...
-
loading...
-
loading...
-
loading...

Security and identity as a service, and how Apple could lead the way

As rumors keep swirling about the finger print scanner Apple will be introducing with the iPhone 5s, the subjects of mobile security and identity keep getting raised. Passwords are an absolute pain in the ass on mobile, and identity is a problem that not only hasn't been solved, but that some companies either lack interest in solving, or lack the trust necessary for us to want them to solve. Industry analyst Ben Bajarin - listen to him on the latest Vector podcast - think that leaves the door wide open for Apple. From Tech.pinions:

More →

-
loading...
-
loading...
-
loading...
-
loading...

Apple discloses bug that was likely responsible for developer center downtime

Apple recently updated their Web Server notifications page with several new acknowledgements to people who discovered and reported security vulnerabilities in Apple's servers. Among the discoveries acknowledged seems to be the vulnerability that was responsible for Apple's Developer Portal's eight-day outage. The notifications page shows a remote code execution vulnerability being reported on July 18th, the same day that Apple took the developer site down.

More →

2
loading...
0
loading...
46
loading...
0
loading...

Jekyll apps: How they attack iOS security and what you need to know about them

Today researchers Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from Georgia Tech gave a talk at the 22nd USENIX Security Symposium and revealed the details of how they got a so-called "Jekyll app" through the App Store approval process and into a position where it could perform malicious tasks. Their methods highlight several challenges to the effectiveness of the Apple's App Store review process as well as security in iOS. The researchers immediately pulled their app from the App Store after downloading it to their test devices, but demonstrated techniques that could be used by others to also sneak malware past Apple's reviewers.

The details of Apple's app review process are not publicly known, but aside from a few notable exceptions it has been largely successful in keeping malware away from iOS devices. The basic premise of a Jekyll app is to submit a seemingly harmless app to Apple for approval that, once published to the App Store, can be exploited to exhibit malicious behavior. The concept is fairly straightforward, but let's dig in to the details.

More →

14
loading...
0
loading...
125
loading...
0
loading...

Pages