As expected, the Pentagon has finally approved Apple’s iPhone and iPad devices for use on the United States military networks, Bloomberg learned Friday. The clearance sets the stage for Apple to compete with Samsung and BlackBerry for military sales. According to the report, the Defense Department today approved the use of Apple’s portable products running the iOS 6 software… Read More
1Password is something of a hit with some members of the iDB team. Though I can obviously speak for myself only, I happen to know Jeff is a fan so it goes without saying we’re both pretty excited about today’s update.
The new 1Password version 4.2, now available as a free download to registered users, comes with a whole bunch of changes. For starters, it’s got an optimized in-app web browser that on iPad includes the Strong Password Generator capability.
The improved browser can automatically submit passwords after using AutoFill for login items and now also recognizes a URL in the clipboard and offers to open it for you. That’s just scratching the surface, go past the fold for the full changelog… Read More
Apparently, the law enforcement community needs to hire a few 13-year-olds able to crack the passcode on Apple’s iPhone. There is such demand to help unlocking iPhones that one federal agency had to wait nearly two months for Apple, which even manages a waiting list, to unlock the smartphone. One “flaw” in Apple’s otherwise tight mobile security could worry privacy advocates: the company reportedly does not inform iPhone owners when it bypasses the device’s security measures… Read More
Kwikset, the lockset maker owned by Black & Decker’s Hardware and Home Improvement Group, today announced an interesting smartphone-friendly wireless lock accessory that inches us closer to a fully connected home.
And I meant touching it with your finger – you don’t ever need to remove an iPhone from your pocket or purse. That’s what Kēvo, a UniKey-powered wireless deadbolt door lock, does for you by connecting with your iPhone, iPod or iPad through wireless Bluetooth Smart technology. Say goodbye to fumbling with or looking for your keys – your Phone is now your key… Read More
There’s been a lot of talk lately regarding Apple and its efforts to broaden the use of iOS in government agencies. The latest report says the US Department of Defense is close to granting both the iPhone and iPad approval for secure use.
Today comes word that the DoD might have just received the green-light it needed to move forward. The National Institute of Standards and Technology (or NIST) just announced that iOS 6 has achieved FIPS 140-2 certification (Level 1)… Read More
As Samsung and Apple are bringing the smartphone wars to the Pentagon, the Galaxy maker has drawn first blood as its Galaxy S4 flagship smartphone gets cleared for government use ahead of the iPhone. A security approval from the US Department of Defense (DoD) is a major recognition for Samsung and its new Knox security software as the S4 becomes the first Android smartphone to win a DoD approval.
It wasn’t immediately clear what’s up with the holdup concerning Apple, but the iPhone and iPad devices should get cleared later this month… Read More
A new report is out this afternoon, claiming the US Department of Defense is going to grant security approvals for Samsung’s Galaxy smartphones, as well as Apple’s iPhones and iPads running iOS 6 in the coming weeks.
The move is separate from the mobile device implementation plan that the Pentagon announced back in February, and could pave the way for Apple to gain more notable influence in the hard-to-reach government sector… Read More
Orchestra’s Mailbox has quickly become my default iPhone email application. As you know, Mailbox offloads backend email management to the cloud so the thin client running on your device can let you zip through your inbox at a rapid pace while rethinking the workflow with abilities such as snoozing individual messages as if they were reminders and more. So is there anything not to like about Mailbox?
Apparently there is. According to one app developer, a database Mailbox maintains on your device is unsecured, potentially exposing your contacts, attachments and message contents to anyone who has physical access to your device, using just a simple file transfer tool like iExplorer or DiskAid… Read More
A pair of reports issued yesterday really put the growth of mobile in perspective. Currently, the mobile landscape is dominated by two players – Apple’s iOS and Google’s Android.
While Apple is increasingly favored by companies big and small, Android has become the go-to vector for mobile malware, it seems.
Attacks involving mobile devices has risen dramatically in the space of just one year, skyrocketing to more than 36,000 instances in 2012, up from only 792 cases, according to a security research firm.
Meanwhile, large companies are adopting Apple devices at a faster clip than Android, according to another report… Read More
Yesterday we linked you to the slide presentation from the evad3rs’ appearance at the HITB 2013 security conference in Amsterdam. Today, we’re bringing you video from their Q&A session.
In the video, which comes in at less than half an hour — and can probably be watched faster than it would take you to read their entire slide presentation — the evad3rs talk about exploits (obviously), iOS 6.1.3, Apple, downgrading, and more. Read More
When it comes to government surveillance, however, iMessage is bullet proof and the agile government, of course, has only recently become aware of this. According to an internal document from the Drug Enforcement Administration (DEA), instant messages exchanged between iOS users through the iMessage platform are “impossible to intercept” due to strong iCloud encryption… Read More
That was fast. Earlier today, Christian told you that a major security hole had been discovered involving Apple’s iForgot page that allowed someone to reset your Apple ID password with just your birthdate and email address.
Unsurprisingly, Apple immediately took the password page down after getting word of the vulnerability. And after just a few hours of ‘maintenance,’ the page is back up and—we’re happy to report—once again safe to use… Read More
Yesterday, a Strategy Analytics report came out that showed iCloud as the top cloud media service in the US. People use it to store things like music and videos, but they also use it to store more personal stuff like contacts, photos and other data.
So you can see why users were relieved to hear that Apple beefed up its account security yesterday by adding a new two-step verification option. And for those having trouble getting it setup, we’ve put together this easy-to-follow 6-step tutorial… Read More
The Verge claims to have discovered a major security hole which allows attackers to reset your Apple ID password using only your email address and date of birth. Yes, you read that right. The scary part is that it doesn’t take a genius to harvest these two pieces of information from Google and your social media accounts or by analyzing your online identity per se.
Exploiting the vulnerability basically lets attackers take over your Apple ID account, and with it all your purchases, iTunes credits, email messages, contacts, your Photo Stream and pretty much any personal data residing up in the Apple cloud.
Apple’s iForgot page went down “due to maintenance” shortly after the incident, presumably to prevent exploits until Apple plugs the security hole. Conveniently enough, the company just recently rolled out a new (and way overdue) two-step verification process to protect your Apple ID using not only your password, but also by tapping your trusted devices and a recovery key.
With this exploit making the headlines, you should enable two-step verification now (Cody has a timely tutorial on that)… Read More
It feels like every day we hear a new story about a major internet company like Evernote, Twitter or Facebook getting hacked. And when it happens, user passwords, personal information and uploaded content are all compromised.
With this in mind, it’s nice to hear that Apple has given its account security a boost today with a new two-step verification process. The safeguard requires users to verify their identity on a trusted device before making any changes… Read More
Apple yesterday let iOS 6.1.3 out of the gate, fixing the widely reported Lock screen vulnerability. As you’re probably aware, the glitch was first detailed a month ago and lets people with access to your iPhone, iPad or iPod touch easily bypass your passcode and mess with your private data on the device. But as is often the case, new software releases fix old bugs and introduce new ones to be squashed in the future.
A report Wednesday claims an all-new Lock screen vulnerability has been discovered in iOS 6.1.3, one making it easy to – you guessed right – bypass one’s passcode and gain access to an unsuspecting user’s contacts and photos kept on the device. Luckily, this one can be avoided easily by disabling the Voice Dial feature… Read More
Last week, Apple’s Marketing SVP Phil Schiller tweeted out a link to a mobile malware report that showed Android devices accounted for a staggering 79% of new mobile threats last year, while iOS devices accounted for just 0.7%.
Of course, the fact that he tweeted the link was far more surprising than the report’s data. After all, we’ve known for years that Android is far more susceptible to mobile malware than iOS. Right? Security experts say not so fast… Read More
Phil Schiller, although probably the most active Twitter user of the Apple executive team, doesn’t tweet much. And when he does, it’s usually generic things like “new Flipboard app for iPhone is very nice,” or “way to go Giants!!!”
But the Worldwide Marketing SVP switched things up a bit this morning, tweeting out a very deliberate link to a new mobile malware report by F-Labs that slams Android for its malware issues, telling folks to “be safe out there…” Read More
So what’s up with Apple and the iPhone’s Lock screen? I mean, the various Lock screen vulnerabilities have persisted in iOS since the first passcode flaw was discovered in iOS 2.0 – and that was way back in July of 2008. And now, in addition to a simple passcode bypass trick a YouTube user detailed on Valentine’s Day, another method of circumventing the Lock screen passcode has been discovered and highlighted in a video above… Read More
Investigators now believe a group of sophisticated Eastern European criminal hackers are responsible for a cyberattack on Apple and other U.S. technology and media firms. Until today, those probing the computer break-ins thought China was behind the electronic assaults. In Apple’s case, malware placed on an iPhone developer website may have been used to ‘bait’ visitors, according to one report Wednesday.
According to Bloomberg, which anonymously cited people close to law enforcement, malware which other victims described as “sophisticated,” was placed on the popular developer forum to potentially gain access to data stored on corporate computers… Read More