Security

Researchers sneak 'Jekyll app' malware into App Store, exploit their own code

Tielei Wang and his team of researchers at Georgia Tech have discovered a method for getting malicious iOS apps past Apple's App Store review process. The team created a "Jekyll app" that seemed harmless at first, but after making it into the App Store and onto devices, is able to have its code rearranged in order to perform potentially malicious tasks.

More →

13
loading...
0
loading...
27
loading...
0
loading...

Top 5 simple security tips: How to increase data protection and privacy!

Security is one of the most important, yet oft-neglected facets of modern mobile life. Whether you're using an iPhone, iPod touch, or iPad, your entire life, and a lot of your friends', families', and associates' lives, are right there on your device. From contact information to location data, messages to photos and video, website logins to payment methods, if someone gains access to your device, and your stuff, it can make that life, those lives, annoying at best, catastrophic at worst. Adding security does require more time and effort than going without, but nowhere nearly as much time and effort as it takes to recover after your stuff is spied, stolen, or otherwise violated. It's security week on Talk Mobile, so while you probably already know the basics, we're going to share the very best of the tough stuff!

More →

0
loading...
0
loading...
102
loading...
0
loading...

How we handle security at iMore: Our apps and approaches to keeping our data safe!

All this week on Talk Mobile we've been discussing security - how we keep our information, and the information of others safe. Each of us here at iMore have different approaches, different go-to apps and authentication methods, and generally different levels of paranoia we try to balance with the realities of time and convenience. So what do we do? What security apps and authentication approaches make up our personal arsenals? Here we go...

More →

6
loading...
0
loading...
31
loading...
0
loading...

Vector 3: Nick Arnott and security attacks

Nick Arnott of Neglected Potential talks to Rene about the state of modern electronic security, from Apple's developer center and Android's master keys, to social network hacks and engineering attacks.

More →

4
loading...
0
loading...
19
loading...
0
loading...

iOS 7 preview: iCloud Keychain aims to make security more convenient

iOS 7 adds an incredibly important set of new features to Apple's Safari web browser - the ability to generate, store, and fill passwords. Sure, there have been third-party apps that have done this, and more, for years. But when the functionality is baked into the OS, even when it's only the basest level of functionality, there's a greater chance that more people will use it. And more people really need to use a password manager, and the unique passwords they enable. Yes, it's security week on Talk Mobile, so there's no better time to talk about mobile security, and passwords.

More →

11
loading...
0
loading...
48
loading...
0
loading...

Apple closing security vulnerability that let fake chargers attack iOS devices

In June we heard about Mactans, a malicious iPhone charger created by three security researchers from the Georgia Institute of Technology. This week the researchers presented their findings at Black Hat, an annual hacker convention in Las Vegas, and Apple officially responded to them. Here's the deal...

More →

2
loading...
0
loading...
23
loading...
0
loading...

Kaspersky reports increase in Apple phishing attempts this year

So far this year, Apple customers have been exposed to an increased number of phishing attempts according to a study done by Kaspersky Labs. The study shows a greatly increased number of phishing emails purporting to come from Apple in the first five months of this year when compared to the number of Apple-related phishing attempts detected in 2011. More specifically, Kaspersky seems to be looking at the number of attempts to access phishing sites that have been blocked by their products.

More →

3
loading...
0
loading...
27
loading...
0
loading...

Ibrahim Balic on what he did, why he feels reponsible for Developer Center downtime, and what he's heard back from Apple since

Ibrahim Balic received a lot of attention recently after claiming he may be the person responsible for Apple's ongoing Developer Portal outage. With no further communication or corroboration from Apple, people are still trying to get a clear picture as to exactly what happened last Thursday that prompted Apple to take the site down, and if Balic's actions are truly the cause. In order to get a better handle on what may or may not have happened, and his potential role in it, I communicated with Balic yesterday and asked him a series of questions. Here's what I found out:

More →

5
loading...
0
loading...
44
loading...
0
loading...

Viber calling and messaging service hacked, 200 million phone numbers, IDs, IP addresses potentially compromised

Following just days after Tango's servers were compromised, the Syrian Electronic Army(SEA) has hacked another calling and messaging service, Viber. E Hacking News is reporting that this time SEA was able to acquire a partial database backup containing phone numbers, UDIDs (Viber generated, not Apple UDIDs) and IP addresses, among other user information for some of Viber's more than 200 million subscribers.

More →

2
loading...
0
loading...
39
loading...
0
loading...

SIM card hack announced... just enough to scare people

There's news from Security Research Labs making the rounds that a way to hack and clone SIM cards - the subscriber identification modules used in phones and tablets to connect them to voice and data networks - has been discovered and will be expounded upon at a later date. It involves an old DES-56 exploit - Jerry Hildenbrand provides the details over on Android Central - but that's about all that's been disclosed so far. No word on which SIMs, on which carriers.

More →

4
loading...
0
loading...
29
loading...
0
loading...

Pages