By Cody Lee on May 24, 2016
Apple this month brought back software engineer and top expert in practical cryptography Jon Callas, reports Reuters. The move follows Apple’s high-profile battle with the FBI, and amidst a growing war between governments and tech firms over encryption.
Callas worked at Apple in the ’90s, and again between 2009 and 2011, when he designed encryption to protect data stored on Mac computers. He rejoined the company in May, to help add more powerful security features to its wide range of consumer products. Read More
By Christian Zibreg on May 19, 2016
Earlier in the week, Apple’s boss Tim Cook embarked on a charm offensive in China in an attempt to appease the government and its agencies, which have already forced the iPhone maker to shut down the iBooks and iTunes Movie stores in the massive 1.35 billion people market.
As noted by Reuters, in meeting with Cook in Beijing, head of China’s Ministry of Industry and Information Technology (MIIT) underscored the importance of strong security of Apple’s products for the Chinese consumer. Read More
By Christian Zibreg on May 19, 2016
Has your iPhone or iPad been asking you to enter your passcode after you wake up, even though you normally used to unlock it with Touch ID?
You’re not alone. As first discovered by MacWorld’s Glenn Fleishman, this is the result of a new Touch ID rule which Apple quietly implemented since iOS 9 was released. Read More
By Christian Zibreg on May 18, 2016
Ride-sharing service Uber today announced an interesting new feature for its mobile application on the App Store, introducing a Find My Friends-like feature that permits you to track family members on the map. Called Trip Tracker, this new feature provides automatic notifications and the ability to follow along on the map whenever someone is riding under your Family Profile. Trip Tracker and Family Profile features are available worldwide starting today. Read More
By Sébastien Page on May 18, 2016
Newer iPhones come with a chip called a motion coprocessor which gathers data from the accelerometers, gyroscopes and compasses of the device to precisely measure motion and fitness data such as body motion, step count, stairs climbed, and more. Most people, including yours truly, do appreciate the data collected as it’s particularly helpful if you want to use your iPhone as a step counter and pedometer, for instance. Others are creeped out by this feature.
If you belong to the latter group of people, then I will show you a quick and easy way to stop your iPhone from tracking your steps and other fitness activity. Read More
By Christian Zibreg on May 16, 2016
Stefan Esser’s iPhone app, called System and Security Info, can no longer be downloaded from the App Store, as first noted by The Next Web. Esser’s software let iPhone users know if their device had malware that could be used to spy on them, and could detect a jailbreak, too.
The app was removed from the App Store earlier this morning. Esser was basically told that detecting weaknesses in a user’s device could lead to “potentially inaccurate and misleading diagnostic functionality for iOS devices.” Read More
By Anthony Bouchard on May 12, 2016
Apple Music, which is Apple’s own answer to the music-streaming industry, is a great place to easily search for a song you want to listen to and then play it on demand.
The only problem is, Apple Music keeps a running history of the songs you search for.
So now when you have your co-pilot in the passenger seat of your car choose a new song for you (because we know you don’t use your iPhone and drive at the same time!) he’s going to laugh at you because of the last time you felt like jamming out to some really embarrassing music.
Well fret not; in this tutorial, we’ll show you how you can delete recent searches from the Apple Music app on your iOS device. Read More
By Christian Zibreg on May 10, 2016
Among the plethora of built-in OS X features that help keep your Mac secure is something called File Quarantine, a download validation technology that checks any downloads for known malware when you try to open them.
File Quarantine is also available in compatible applications like Safari, Messages, iChat and Mail that download files from the Internet or receive files from external sources, such as email attachments.
Additionally, OS X blocks compromised versions of web plug-ins from functioning, including Java web apps and Adobe Flash content, to further limit your Mac’s exposure to potential zero day exploits.
In this tutorial, we’ll discuss how you can make sure that File Quarantine updates are turned on, which will allow your Mac to receive latest malware definitions and information about compromised web plug-ins from Apple. Read More
By Anthony Bouchard on May 3, 2016
You probably use the App Switcher a lot throughout your day-to-day iPhone usage. It’s an essential part of multitasking because it lets you easily get back to the apps you’ve used recently.
On the other hand, it also takes a screenshot of your last activity in the apps you closed recently, so it’s a privacy hazard because anyone can peek over your shoulder to see what you’ve done recently when you’re switching between recently-used apps.
ASBlur is a new free jailbreak tweak that helps solve this problem by blurring the contents of your App Switcher app previews. Read More
By Anthony Bouchard on May 2, 2016
LogDog, a service originally made popular on the Android platform for keeping your various online accounts safe from unauthorized activity, is now launching for iOS.
With LogDog, you can actively monitor your online accounts and keep an eye on where the most recent logins came from, what operating system and web browser was used, and more.
If you’re always worried about your security, or even your privacy, this is an app you’ll want to check out. Read More
By Anthony Bouchard on Apr 24, 2016
Facebook and Facebook Messenger users who have a jailbroken iOS device are going to love the benefits of using a new jailbreak tweak called SilentMessenger.
This tweak is going to provide these users with additional steps to protect their privacy and keep their footprint in the Facebook apps as minimal as possible from the perspective of other users who are online. Moreover, it also supercharges some other features of the apps.
In this review, we’ll talk about what SilentMessenger can do for your Facebook experience, and walk you through all of the tweak’s options. Read More
By Sébastien Page on Apr 22, 2016
Instagram, like many other apps, lets you tag your photos with the location of where they were taken. It’s a neat feature that can leave a trail of your whereabouts, and can also be used in the photo map of your profile to have a visual representation of where all your photos have been taken.
But sometimes, having your location out there can raise privacy concerns. I personally recently realized that a large number of my Instagram photos were showing on my photo map as being sent from my house. Although I had never manually geotagged these photos, a bug (or maybe more accurately, an “oversight”) in the Instagram app had pinned all my uploaded photos to the location where I uploaded them from (mostly from my house). This bug has been fixed since August of 2015, but still, all photos uploaded until then showed up on my photo map, even though I had never geotagged them to begin with.
Long story short, I really got a scary moment when I realized that any stalker could easily figure out the location of my house just by looking at my photo map. This led me to remove a lot of photos from my photo map, and made me realize that I should probably share this tip and make sure you also do a privacy check of your Instagram uploads.
In this post, I will show you how to delete the location from individual photos you have previously geotagged. I will also show you how to remove location data from photos appearing in your photo map. Read More
By Christian Zibreg on Apr 18, 2016
Apple collects anonymous information about how you use your iPhone, iPad, iPod touch and other devices so that it can improve its products in future releases. End users can easily opt in and out of diagnostic collection in the Settings → Privacy → Diagnostics & Usage section.
I have this enabled to help Apple improve their products, but privacy-minded people might opt out of diagnostic collection on the grounds that the logs include their approximate location.
In this tutorial, we’ll explore increasing your privacy on iOS by having your location excluded from diagnostic data that iOS creates. Read More
By Cody Lee on Apr 14, 2016
Canadian police have been in possession of a BlackBerry’s global decryption key since 2010, reports Vice. The site says recently released court documents reveal that the key was used in a criminal investigation to intercept over 1 million BBM messages.
The documents were made public after members of a Montreal crime syndicate pleaded guilty to their role in a 2011 murder, and they shine some light on the extent that BlackBerry, as well as telco giant Rogers, is willing to cooperate with investigators. Read More
By Christian Zibreg on Apr 11, 2016
Mobile forensics firm Cellebrite that helped the United States Federal Bureau of Investigation bypass the passcode protection on the San Bernardino shooter’s iPhone 5c is adamant that it can also work around Apple’s security protections and hack into an iPhone 6, CNN reports.
Italian father Leonardo Fabbretti, who wanted to see the photos stored on his dead son Dama’s iPhone but was told by Apple that it was impossible to get into the device without a passcode, has now met with Cellebrite executives who have been working on accessing the files. Read More
By Christian Zibreg on Apr 7, 2016
James Comey, Director of the Federal Bureau of iPhones—that is, Investigation—confirmed in an interview with CNN yesterday that a tool that the agency had purchased from a third-party to unlock San Bernardino shooter Syed Farook’s iPhone 5c cannot be used to bypass security protections on newer models, from the iPhone 5s onward.
This implies the tool relies on the fact that the iPhone 5c and earlier models lack hardware features like the Secure Enclave embedded in Apple’s mobile processors (from the iPhone 5s’s A7 chip and onward) which keeps encrypted sensitive information and stuff like the number of passcode attempts isolated from the rest of the system. Read More
By Cody Lee on Mar 28, 2016
The Department of Justice filed a request on Monday, asking the court to vacate its order to compel Apple to assist agents in unlocking an iPhone. As expected, the FBI was able to crack the handset without the company’s assistance.
The filing comes a week after the DOJ asked the court to postpone its hearing with Apple, claiming it had found a possible method for accessing the data stored on an iPhone 5c, which belonged to San Bernardino shooter Syed Farook. Read More
By Christian Zibreg on Mar 24, 2016
According to Apple, Notes is one of the most popular and most-frequently used stock applications on the iPhone, iPod touch and iPad.
People use Notes for everything from memorizing recipes to keeping track of errands, creating shopping lists, storing inspirational quotes and even passwords, codes and medical data.
Not all notes contain sensitive information, but many do. Beginning with iOS 9.3 and OS X El Capitan 10.11.4, you can protect your notes with a password or Touch ID.
In this tutorial, you’ll learn how to set up Notes protection, secure items on a note-by-note basis so no one can view their contents and more. Read More
By Christian Zibreg on Mar 23, 2016
Amid reports that it’s shifting some of the iCloud services to Google’s Cloud Platform, The Information is reporting that Apple has a total of six projects underway related to boosting its cloud infrastructure. One of them, code-named Project McQueen, calls for custom data storage systems.
Apple suspects that third-party servers that power iCloud might have been intercepted during shipping and that someone may have added additional chips and firmware to them “in order to make them vulnerable to infiltration,” as per the report. Read More