By Anthony Bouchard on Jan 21, 2017
Find My Friends is an app made by Apple that lets you track the location of your friends and family so you can find out their whereabouts at any time of the day, but it can also be a real privacy concern.
While some people enable this feature voluntarily so that their family members can keep tabs on them or so that friends can meet up with one another, others have the feature enabled on them behind their backs so their significant others can stalk them.
If you’re paranoid about whether or not you’re being tracked, then you need a new free jailbreak tweak called AntiTracker. Read More
By Anthony Bouchard on Jan 19, 2017
Whenever you make a Google search query while being logged in to any service from the company, your search is saved to your Google account’s activity. This is designed to help improve your search experience by increasing the amount of relevant things you’ll see.
For the most part, this depends on how you use your Google account, and if you’re more of an iOS user, then you might not tap into these features as much as, say, an Android user would.
In this tutorial, we’ll show you how to view and delete your Google search query history, a step you can take to increase your privacy by preventing others from seeing what you’ve searched for. Read More
By Anthony Bouchard on Jan 17, 2017
If you use Safari as your default web browser on your Mac, it’s possible to delete your browsing history for a just a specific date, while still leaving all the rest of your browsing history intact.
Not only will this appear less fishy when someone looks into your browsing history than deleting everything would, but it also lets you annihilate only a chosen portion of your web browsing history, which can be infinitely useful for protecting your privacy depending on how you use your machine to browse the web. Read More
By Christian Zibreg on Jan 13, 2017
In 2016, WhatsApp finally enabled complete end-to-end encryption for both chats and video calls to ensure that no one but the intended recipient can decipher contents of their communications. Unfortunately, it’s come to light that WhatsApp’s system has been plagued by a major vulnerability which was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley.
In an interview with the British newspaper The Guardian, Boelter said the backdoor could let Facebook read end-to-end encrypted content, meaning the social network could be complied with court orders to make decrypted messages available to law enforcement and other government agencies
UPDATE: We’ve received a response from WhatsApp regarding the alleged backdoor. Read More
By Christian Zibreg on Dec 23, 2016
Documents uncovered by ZDNet have revealed the true scope of technology from Israeli developer Cellebrite Mobile Synchronization, which specializes in smartphone data extraction, transfer and analysis.
The leaked documents show just how much private data its smartphone forensic tool UFED, used by law enforcement, is capable of extracting from iPhones.
In a single data-extraction session, investigators were able to collect a huge array of personal data from an iPhone 5 like messages, phone calls, voicemails, images and more, including some deleted content. UFED can pull similar data from other phones, too, including Wi-Fi hotspots and cellular towers the device’s was connected to. Read More
By Christian Zibreg on Dec 22, 2016
Andrei Karlov, the ambassador to Turkey, was killed while giving a speech at an art gallery in Ankara three days ago by 22-year-old off-duty police officer Mevlut Mert Altintas. According to MacReports, Turkish police approached Apple about unlocking an iPhone 4s that was recovered from the shooter.
The device is locked with a 4-digit passcode, but it’s unclear if it runs iOS 8.0+ or one of the earlier iOS editions that don’t enforce full disk encryption. Read More
By Anthony Bouchard on Dec 22, 2016
If you have a Facebook account, then chances are you access it on more than one device. You might forget from time to time to sign out of sessions on other machines you don’t intend to use again, such as those in schools or at the workplace, potentially handing over access to your Facebook account to the next person(s) who uses the machine.
Facebook fortunately comes with a feature that lets you sign out of all active sessions on your account with just a few taps. We’ll show you how you can do this in this tutorial. Read More
By Anthony Bouchard on Dec 20, 2016
Depending on the VPN you’re using, your iPhone or iPad might be able to take advantage of a feature called VPN on demand (VPoD).
Essentially what this does is it connects you to your VPN automatically when it’s needed so you don’t have to toggle it on manually before accessing the internet from your device. As a result, you can have peace of mind because your information is protected once you begin using the internet. Read More
By Anthony Bouchard on Dec 7, 2016
If you use Facebook, then you might have noticed there are people you aren’t friends with in your Facebook Messenger sidebar when using the desktop website or mobile app. Although this is meant to be a way for you and your potential friends to connect on Facebook, some people find this overbearing and an invasion of privacy.
There is a way to prevent people you aren’t friends with from appearing in your Facebook Messenger sidebar, and we’ll show you how you can do it in this tutorial. Read More
By Anthony Bouchard on Dec 2, 2016
If you use Parental Controls on your Mac, it’s possible to see a list of websites visited in Safari or another web browser by any of your controlled users and see the date and time those websites were accessed.
This comes in handy in a number of scenarios, but perhaps the most obvious is when you’re a parent and you want to make sure your kids aren’t doing things they shouldn’t be while online. Read More
By Christian Zibreg on Nov 23, 2016
Touch ID debuted more than three years ago with the iPhone 5s release in September 2013, which filed filed as Apple’s very first device with fingerprint scanning embedded into the Home button. Of course, it didn’t take long for Touch ID to become an important security technology on iPhones and iPads.
Since October 2016, Touch ID has been available on select Mac models, such as the late-2016 MacBook Pro with Touch Bar. If you use Touch ID on your iPhone, you’ll feel right at home on your Mac.
In this step-by-step tutorial, you’re going to learn how to set up Touch ID and Apple Pay on a Mac, enroll your fingerprints in the system and use Touch ID to quickly unlock your computer, make purchases on websites with Apple Pay and much more. Read More
By Christian Zibreg on Nov 17, 2016
Apple likes to pride itself with strong security in iOS, but for all the platitudes the fact remains that the iPhone’s Lock screen is one of iOS’s weakest links. And now, YouTuber iDeviceHelp has discovered a new Lock screen vulnerability that lets anyone in possession of your iPhone bypass the passcode and get to your contacts and photos. The bug has been reported to Apple and should be fixed in a future update. Read More
By Christian Zibreg on Nov 17, 2016
iOS 10’s been found to upload missed call logs from apps like WhatsApp and Skype to servers, as well as near-real time FaceTime call logs—even if iCloud backup has been turned off, according to a Russian company called Elcomsoft which makes iPhone forensic tools aimed at law enforcement agencies.
Elcomsoft CEO Vladimir Katalov suspects in an interview with Forbes that this is most likely a result of iOS 10’s expanded scope of call logging due to the new CallKit framework which was designed to make VoIP calls from apps like Viber, WhatsApp and Skype behave like cellular calls and integrate with Phone’s Recents and Favorites.
According to Apple itself, call log syncing through iCloud is a convenient feature that elevates user experience by allowing customers to easily return calls from VoIP apps. Read More
By Sébastien Page on Nov 16, 2016
Security firm Kryptowire recently discovered that some Android smartphones have a backdoor that secretly sends data to China, reports the NY Times. Maybe even more concerning, American phone maker BLU Products said that 120,000 of its phones were found to have the backdoor installed in its software, which has since been updated to remove all track of that secret backdoor. Read More
By Christian Zibreg on Nov 15, 2016
Facebook-owned WhatsApp announced yesterday that it had begun rolling out video calling to the more than one billion users it claims across iOS, Android and Windows Phone platforms around the world.
According to TechCrunch, video calls on WhatsApp are end-to-end encrypted just like with FaceTime in order to prevent rogue parties from eavesdropping on your communications.
WhatsApp previously rolled out end-to-end encryption for chats. “We obviously try to be in tune with what our users want,” WhatsApp co-founder Jan Koum told Reuters. “We’re obsessed with making sure that voice and video work well even on low-end phones.” Read More
By Anthony Bouchard on Nov 3, 2016
If you’re an avid Amazon user like me, then you probably check the site for deals before you buy from other online sources and before driving to your local stores.
Amazon keeps a history of everything you look at on the website, so in this tutorial, we’ll show you how you can hide or remove items from your browsing history. Read More
By Christian Zibreg on Oct 17, 2016
California’s top cops seem to have obtained a questionable warrant request to enter a residence and force anyone inside to use biometric information to open their fingerprint-locked iPhones purely on the assumption they’ll learn more after they access the phones, Forbes reported this morning.
Deemed as “an unprecedented attempt to bypass the security of Apple’s iPhones,” Forbes found a court filing in which the Department of Justice sought to search a Lancaster, California, property. Read More