By Timothy Reavis on Aug 24, 2015
The concept of privacy has shifted from the connoted right it once was to a fading dream. Where family discussions once never left the dinner table, what a person does and thinks are now plastered across social media in a way once deemed unthinkable because it simply “wasn’t anyone’s business” not that long ago. Now, everything is everyone’s business, and this change in culture has come about largely if not solely because of technology.
Sure, social media has played a large part in changing the way people share information, making what was once personal now more or less public domain. However, there are more subtle forces at work. One common instance many people overlook is the simple request of an app to access your phone’s contacts.
By Christian Zibreg on Jul 22, 2015
HomeKit, Apple’s platform for the connected home, sounds terrific on paper. In reality, HomeKit is like CarPlay, another Apple platform plagued with slower than expected rollout.
There are currently only five HomeKit-compatible accessories on the market: the Ecobee3, Elgato Eve, iHome iSP5 SmartPlug, Insteon Hub and Lutron Caseta Wireless Lighting Starter Kit.
A new report alleges that wider HomeKit adoption is being held back by Apple’s stringent encryption requirements. Apparently, Bluetooth chips currently available on the market and certified for HomeKit just can’t handle Apple’s super strong encryption without degrading the experience.
As Forbes reported Wednesday, Apple imposes a high level of encryption on HomeKit accessory makers in order to prevent eavesdropping and protect the privacy of its users. Apple’s focus on privacy, however, has created unacceptable levels of lag in prototype Bluetooth products whose chips have sub-par processing capability. Read More
By Cody Lee on Jun 24, 2015
Apple is quietly moving to prevent app developers from accessing app download data for ad targeting purposes, reports The Information. The move is part of the company’s recent, and very public, push for greater user privacy.
As most of you are probably aware, major apps like Facebook and Twitter will scan a user’s device for information on the app’s they have installed. This way, they can show users advertisements that better match their interests. Read More
By Christian Zibreg on Jun 22, 2015
A cross application resource attack (XARA) that researchers at Indiana University, Georgia Tech and China’s Peking University publicized last week seems to have been partially addressed as Apple issued a server-side fix on the Mac App Store to block malicious apps and secure app data.
Additional fixes are in the works for the XARA exploits on both iOS and OS X, a company spokesperson told iMore. XARA exploits allow malicious apps to steal iCloud credentials of a user, access private data in apps like 1Password and Evernote, hijack their iCloud Keychain passwords and more. Read More
By Christian Zibreg on Jun 17, 2015
Your confidential information ranging from web passwords in Chrome and other browsers to app passwords to banking credentials stored and synced between devices though Apple’s iCloud Keychain service—even data you thought was stored safely in password managers like 1Password and LastPass—can be easily compromised due to a trio of major vulnerabilities discovered in Apple’s desktop and mobile operating systems.
As discovered by a team of researchers at Indiana University, Georgia Tech and China’s Peking University and reported by The Register, Keychain’s access control lists, URL schemes and OS X’s app containers contain flaws creating serious attack vectors. Read More
By Christian Zibreg on Jun 10, 2015
A serious bug in Apple’s stock Mail application for iPhone, iPod touch and iPad permits attackers to fool users into providing their iCloud credentials.
Such phishing attacks can be devastating as iCloud increasingly becomes home for our digital life in the Apple universe, including our photo libraries, notes, contacts and other personal data.
The scam takes advantage of an exploit in the Mail application that makes it easy to deliver convincing-looking pop-ups resembling iCloud password prompts through a simple email message, The Register reported Wednesday.
While such emails look like they’re coming from a real company, they’re spoofed and once an unsuspecting user opens them on their iPhone, iPod touch or iPad running iOS 8.3, the operating system will execute malicious HTML content embedded inside. Read More
By Cody Lee on Jun 2, 2015
Tim Cook took time out of his busy schedule yesterday to talk about privacy with folks attending EPIC’s Champions of Freedom event in Washington. EPIC, a non-profit research center focused on emerging privacy issues, was honoring the CEO for his superior “corporate leadership.”
Cook addressed attendees via a remote video feed, and spoke about a number of topics regarding privacy, security and what they mean to Apple versus other Silicon Valley tech giants. TechCrunch has a transcription of the speech, and he takes quite a few jabs at Facebook and Google. Read More
By iDB Deals on May 19, 2015
An all-in-one solution for online privacy, Blur protects you from credit card fraud, identity theft, and third-party monitoring. Get a lifetime subscription to Blur from iDownloadBlog Deals today for just $49.99. Read More
By Christian Zibreg on May 14, 2015
In another showing of its commitment to protecting the privacy of its users, Apple has intervened in the sale of Radio Shack, which recently filed for bankruptcy, arguing that any information collected during the sale of its own products at RadioShack locations should be left out of the deal.
As noted by Law360 earlier this week, Apple, AT&T and others have objected to the potential sale of their customers’ data. The iPhone maker reportedly said that the fallen electronics retailer “doesn’t have the right to sell Apple customer information.” Read More
By Oliver Haslam on Feb 28, 2015
Apple CEO Tim Cook is on the final leg of his tour of Isreal and Europe and has been speaking to UK publication The Telegraph about a range of things including Apple customers’ privacy and of all things, terrorism.
Known for his unusual stance on privacy – one which doesn’t jive with other high profile tech executives who are happy to share everything about you – Cook told the publication during an interview that he feels people’s information is being “trafficked around” in ways that they just don’t yet understand. Read More
By Sébastien Page on Feb 13, 2015
As Apple CEO Tim Cook spoke at the President Obama’s Summit on Cybersecurity on Friday, the White House announced that Apple Pay will be enabled for federal payment cards, including Social Security and veterans benefits that are issued via debit cards.
The news represents a major vote of confidence for Apple Pay and Apple in general. While it shouldn’t be considered a proper endorsement from the White House, it is still a major win for Apple. Read More
By Christian Zibreg on Jan 21, 2015
Yesterday, I stumbled upon an intriguing post over at The Loop which I felt raised a valid point about multi-user access in iOS, or the lack of.
It’s especially relevant in light of the fact that Android Lollipop enables multi-user support on phones.
Tablets, of course, have had this for nearly three years with Jelly Bean and up. Now, adding the ability to share your iPhone or iPad with someone else isn’t as trivial as it may appear at first sight as there are many technical hurdles to overcome.
On the other hand, can anyone imagine Apple not working on solving this pain point for its users? I mean, OS X supports multiple user accounts by design and iOS is basically a slimmed down version of OS X.
Anyways, is multi-user access one of those features the company should prioritize for the next major refresh of iOS, do you think? Read More
By Christian Zibreg on Jan 9, 2015
An unusual oversight in how OS X’s Spotlight feature handles privacy settings in Apple Mail leaves the door open to spammers, phishers and online tracking companies who can obtain private data such as your IP address, current operating system version, browser details and more, whenever an email message is previewed in Spotlight.
First discovered by German technology news site Heise, the bug takes advantage of a common information harvesting technique and a Mail setting which determines whether or not the program loads remote content in emails. Read More
By Christian Zibreg on Dec 29, 2014
Admittedly, Touch ID has popularized and mainstreamed biometric security on mobile devices using an impression made on a surface by the inner part of the top joint of a finger.
Having debuted on the iPhone 5s, Apple’s in-house sensor built into the Home button is based on a sophisticated technology by Israeli smart sensor maker AuthenTec, which the Cupertino firm snapped up in July of 2012 for a reported $356 million.
However, existing fingerprint-based security solutions could be easily bypassed by generating a fingerprint image from a series of photos of someone’s finger, no physical print necessary whatsoever, according to claims by Chaos Computer Club, Europe’s largest association of hackers.
As relayed by VentureBeat, the hackers have now successfully demonstrated a proof-of-concept by copying the thumbprint of German Defense Minister Ursula von der Leyen.
They used a close-up photograph of von der Leyen’s thumb, obtained during a news conference in October, along with photographs taken from different angles, said Jan Krissler aka “Starbug” at the 31st annual Chaos Computer Club convention in Hamburg, Germany. Read More
By Cody Lee on Nov 15, 2014
AT&T told the Associated Press on Friday that it is no longer using permanent cookies to track its subscribers. In late October, security researchers discovered that the carrier, along with its competitor Verizon, were using unique identifying numbers or “perma-cookies” to track their customers online habits.
A spokesperson for AT&T said that the tracking practice was part of a pilot program to improve targeted marketing called “Relevant Advertising.” But it says that the experiment is over, and it has pulled the identifying numbers from their customers’ accounts, although it may still sell the data it’s collected. Read More
By Cody Lee on Nov 13, 2014
The US Federal Trade Commission is seeking assurances from Apple that it will prevent sensitive health data from being used without the users’ consent, reports Reuters. The outlet says Apple representatives have met with FTC officials multiple times in recent months to discuss the matter.
More specifically, the FTC wants to be sure that Apple will not sell health data collected by its upcoming smartwatch and other devices to third party marketers, or allow app developers to do so. It also wants to be sure proper measures are being taken to protect the data against malicious attacks. Read More
By Christian Zibreg on Oct 22, 2014
Apple’s boss Tim Cook went to China to meet with a top Chinese government official in Beijing amid allegations of government-backed phishing attempts on users’ iCloud accounts, according to a report by the state-run Xinhua news agency, relayed by Reuters Wednesday.
The meeting coincides with reports by GreatFire.org, a Chinese web monitoring group, alleging that the Chinese government sponsored man-in-the-middle attacks that redirected local users to a fake iCloud.com login page in an effort to harvest Apple ID user names and passwords. Read More