By Cody Lee on Jun 17, 2013
Tonight the company posted an open letter to its website entitled ‘Apple’s Commitment to Customer Privacy.’ The letter reiterates that Apple knew nothing about the so-called PRISM program, and offers insight into its relationship with the government and what it means for users… Read More
By Ed Sutherland on Jun 13, 2013
While its no case of Elliot Ness against Chicago’s rum runners of Prohibition days, prosecutors in two major U.S. cities are teaming up with local police to fight a wave of violent smartphone thefts. Law enforcers Thursday issued an SOS of sorts, or ‘Save Our Smartphones’.
The announcement comes as Apple and other smartphone makers meet with the New York State Attorney General and San Francisco’s District Attorney. It’s unknown whether Apple’s new Activation Lock feature unveiled during Monday’s WWDC keynote as part of iOS 7 will be enough to satisfy calls for handset makers to create a kill switch to disable stolen smartphones… Read More
By Christian Zibreg on Jun 12, 2013
The controversy over National Security Agency data mining isn’t going away anytime soon. As you know, the scandal blew up when it was discovered that the government issued a secret order to Verizon Business Network Services to provide the NSA with logs for millions of calls on an ongoing daily basis.
Numerous lawsuits are being announced with each passing day and some have already been filed. For example, the American Civil Liberties Union has filed a lawsuit and Senator Rand Paul (R-KY) said he will sue the Obama administration over the “unconstitutional” PRISM surveillance programs.
And now, an activist group is suing Apple and Tim Cook, as well as Facebook, Google, YouTube, Skype, AT&T, Sprint, Yahoo, Microsoft, PalTalk, AOL, the NSA and its Director Keith Alexander, President Obama himself and Attorney General Eric Holder over participating in the government’s secret Big Brother initiative… Read More
By Cody Lee on Jun 10, 2013
For months we’ve been hearing reports of the US government calling on Apple to do something about the growing number of mobile phone thefts (particularly iPhones) in the country. And it has. Introducing one of the more interesting new features in iOS 7, Activation Lock… Read More
By Jeff Benjamin on Jun 10, 2013
1Password, look out. Apple has created a new feature in OS X Mavericks called iCloud Keychain, and as you would expect, it allows you to sync passwords, credit cards, and other personal information across multiple devices.
Just like 1Password, iCloud Keychain can generate secure passwords for you. The nice thing about iCloud Keychain is that it is tightly integrated throughout the OS. In total you can save website logins, credit card numbers, Wi-Fi networks, and account information… Read More
By Christian Zibreg on Jun 4, 2013
Yesterday, we highlighted a proof-of-concept iPhone charger by researchers at the Georgia Institute of Technology which can be used to install malware on your non-jailbroken iPhone, iPod touch or iPad in under a minute. It’s another example of the cat and mouse game played between hackers and Apple.
Today, we received word of an iOS security flaw which can be exploited to break the password required to restrict access to apps, content and features on your iPhone, iPod touch or iPad… Read More
By Christian Zibreg on Jun 3, 2013
Unlike the malware-infested Android, Apple’s mobile platform is mostly malware-free. Little wonder that Apple prides itself with reviewing apps “to guard against malware” while asserting that other mobile platforms pose a “security risk”.
But what if malicious users could hack your iPhone via a specially built charger – and in less than a minute? That’s exactly what three researchers at the Georgia Institute of Technology claim is possible as they prep to show off a proof-of-concept charger which can be used to invisibly install malware on non-jailbroken iOS devices… Read More
By Christian Zibreg on May 30, 2013
Following in the footsteps of Twitter, Apple, Dropbox, Google and others who recently ramped up security by rolling out two-step account verification, the note-taking platform Evernote today announced similar security features. Small wonder, given recent security exploits which prompted Evernote to issue a password reset across the board.
In a nutshell, two-step authentication makes your notes more secure by requiring a verification code sent to your phone whenever you’re asked to provide your username and password.
This will usually happen when logging into the web interface or installing Evernote apps on a new device, such as your iPhone, iPad or Mac. Additionally, Evernote is also launching Access History and Authorized Applications features. I’ve included more information right after the break… Read More
By Christian Zibreg on May 29, 2013
The online retail giant Amazon today launched a new sign-in service and an accompanying software development kit (SDK) for both Android and iOS app developers. The feature allows programmers to write apps letting folks login to apps, games, and web sites using their Amazon.com credentials. The Amazon sign-in taps the over 200 million active accounts hosted by “one of the most reputable companies in the United States,” as the promo clip puts it… Read More
By Christian Zibreg on May 22, 2013
Remember how Apple – after a major security hole let attackers reset your Apple ID password using only your email address and date of birth – has enabled two-step authentication for Apple ID accounts? You’d be forgiven for thinking that every popular web service out there has by now adopted heightened security features, but that’s not really the case.
Google, for example, last year enabled two-step process for Google Accounts, with Dropbox following suit a few months later. Today, micro-blogging platform Twitter joined the fray with its own version of two-step verification designed to keep the bad guys out of your account.
You should enable it immediately and iDB, as always, has you covered with a handy tutorial on that… Read More
By Christian Zibreg on May 17, 2013
As expected, the Pentagon has finally approved Apple’s iPhone and iPad devices for use on the United States military networks, Bloomberg learned Friday. The clearance sets the stage for Apple to compete with Samsung and BlackBerry for military sales. According to the report, the Defense Department today approved the use of Apple’s portable products running the iOS 6 software… Read More
By Christian Zibreg on May 13, 2013
1Password is something of a hit with some members of the iDB team. Though I can obviously speak for myself only, I happen to know Jeff is a fan so it goes without saying we’re both pretty excited about today’s update.
The new 1Password version 4.2, now available as a free download to registered users, comes with a whole bunch of changes. For starters, it’s got an optimized in-app web browser that on iPad includes the Strong Password Generator capability.
The improved browser can automatically submit passwords after using AutoFill for login items and now also recognizes a URL in the clipboard and offers to open it for you. That’s just scratching the surface, go past the fold for the full changelog… Read More
By Ed Sutherland on May 10, 2013
Apparently, the law enforcement community needs to hire a few 13-year-olds able to crack the passcode on Apple’s iPhone. There is such demand to help unlocking iPhones that one federal agency had to wait nearly two months for Apple, which even manages a waiting list, to unlock the smartphone. One “flaw” in Apple’s otherwise tight mobile security could worry privacy advocates: the company reportedly does not inform iPhone owners when it bypasses the device’s security measures… Read More
By Christian Zibreg on May 8, 2013
Kwikset, the lockset maker owned by Black & Decker’s Hardware and Home Improvement Group, today announced an interesting smartphone-friendly wireless lock accessory that inches us closer to a fully connected home.
If you’re a fan of the app-enabled wireless lightbub from Philips, how about locking or unlocking your door by simply touching the deadbolt?
And I meant touching it with your finger – you don’t ever need to remove an iPhone from your pocket or purse. That’s what Kēvo, a UniKey-powered wireless deadbolt door lock, does for you by connecting with your iPhone, iPod or iPad through wireless Bluetooth Smart technology. Say goodbye to fumbling with or looking for your keys – your Phone is now your key… Read More
By Cody Lee on May 7, 2013
There’s been a lot of talk lately regarding Apple and its efforts to broaden the use of iOS in government agencies. The latest report says the US Department of Defense is close to granting both the iPhone and iPad approval for secure use.
Today comes word that the DoD might have just received the green-light it needed to move forward. The National Institute of Standards and Technology (or NIST) just announced that iOS 6 has achieved FIPS 140-2 certification (Level 1)… Read More
By Christian Zibreg on May 3, 2013
As Samsung and Apple are bringing the smartphone wars to the Pentagon, the Galaxy maker has drawn first blood as its Galaxy S4 flagship smartphone gets cleared for government use ahead of the iPhone. A security approval from the US Department of Defense (DoD) is a major recognition for Samsung and its new Knox security software as the S4 becomes the first Android smartphone to win a DoD approval.
It wasn’t immediately clear what’s up with the holdup concerning Apple, but the iPhone and iPad devices should get cleared later this month… Read More
By Cody Lee on May 1, 2013
A new report is out this afternoon, claiming the US Department of Defense is going to grant security approvals for Samsung’s Galaxy smartphones, as well as Apple’s iPhones and iPads running iOS 6 in the coming weeks.
The move is separate from the mobile device implementation plan that the Pentagon announced back in February, and could pave the way for Apple to gain more notable influence in the hard-to-reach government sector… Read More
By Christian Zibreg on Apr 24, 2013
Orchestra’s Mailbox has quickly become my default iPhone email application. As you know, Mailbox offloads backend email management to the cloud so the thin client running on your device can let you zip through your inbox at a rapid pace while rethinking the workflow with abilities such as snoozing individual messages as if they were reminders and more. So is there anything not to like about Mailbox?
Apparently there is. According to one app developer, a database Mailbox maintains on your device is unsecured, potentially exposing your contacts, attachments and message contents to anyone who has physical access to your device, using just a simple file transfer tool like iExplorer or DiskAid… Read More
By Ed Sutherland on Apr 17, 2013
A pair of reports issued yesterday really put the growth of mobile in perspective. Currently, the mobile landscape is dominated by two players – Apple’s iOS and Google’s Android.
While Apple is increasingly favored by companies big and small, Android has become the go-to vector for mobile malware, it seems.
Attacks involving mobile devices has risen dramatically in the space of just one year, skyrocketing to more than 36,000 instances in 2012, up from only 792 cases, according to a security research firm.
Meanwhile, large companies are adopting Apple devices at a faster clip than Android, according to another report… Read More
By Jeff Benjamin on Apr 12, 2013
Yesterday we linked you to the slide presentation from the evad3rs’ appearance at the HITB 2013 security conference in Amsterdam. Today, we’re bringing you video from their Q&A session.
In the video, which comes in at less than half an hour — and can probably be watched faster than it would take you to read their entire slide presentation — the evad3rs talk about exploits (obviously), iOS 6.1.3, Apple, downgrading, and more. Read More