By Jeff Benjamin on Aug 25, 2014
Every so often, it helps to take a step back and examine the way things are being done. This applies to our day-to-day routine, or perhaps our workout regimen. I’ve also found that it applies to software.
iOS is no exception to this. Here is a software product that has been through vast changes since its creation. A good majority of the changes have been for the better, and iOS 8, which is mere weeks away, promises to bring more awesome goodies to the table.
But, from time to time, it pays to look at the way things are being done. We have to ask ourselves, “Is this truly the best way?”
I feel that we’ve reached that fork in the road when it comes to the way iOS handles permission requests for apps. As more features are added to our devices, more permissions are required for apps that wish to use these features. It’s gotten to the point that some apps require you to go through a whole checklist of permissions before you can even begin using the app.
The permission handling in iOS has become a frustrating affair. Not only do the numerous pop-up alerts annoy me, but it irritates me even more when I accidentally decline a permission because of speeding through the app setup process.
As discussed on today’s episode of Let’s Talk iOS, I’m convinced that there’s a better way to handle permissions in iOS. There’s a less intrusive, less frustrating way to handle requests for access to the various features on your device. Check out our video inside for an explanation of the problem, and a demonstration of the solution. Read More
By Sébastien Page on Aug 22, 2014
Chronic Unlocks has recently started offering a new service which claims to bypass Activation Lock on iOS devices that have been locked. Although the method used to get around the security measure has yet to be detailed, the service can be helpful for people who bought an iOS device that is still tied to its previous owner’s Apple ID. But don’t expect the company to help you bypass Activation Lock on a stolen device! Read More
By Sébastien Page on Aug 15, 2014
Security researcher Axelle Apvrille recently published a paper about AdThief, a malware aimed at hijacking ad revenue from a reportedly 75,000 infected devices. First discovered in March 2014, and also known as “spad,” the malware, which comes disguised as a Cydia Substrate extension, was found to replace the publisher ID of publishers with the one of the malware creator, effectively attributing all ad revenue to him. Read More
By Christian Zibreg on Aug 14, 2014
Late yesterday, Apple released Safari 7.0.6 for OS X Mavericks and Safari 6.1.6 for OS X Mountain Lion.
The releases contain improvements to security related to Apple’s desktop browser and are both recommended for all OS X Mavericks and OS X Mountain Lion users.
These updates follow the release of a new version of OS X Mavericks 10.9.5 (build 13F14) that Apple released to developers yesterday… Read More
By Sébastien Page on Aug 12, 2014
Activation Lock is a great feature coming with every iOS device that has Find My iPhone enabled. This security feature prevents anyone from activating your phone without having access to your Apple ID or password in case they found or stole your device.
Even though they might not be able to activate the lost or stolen device, they might still try to put it up for sale, and if you don’t know what to look for, you might very well be buying an iPhone that has been locked and cannot be activated.
In this post, we will show you what to check when buying a used iPhone or iPad from a third party. Read More
By Sébastien Page on Aug 11, 2014
Better safe than sorry, they say. This is particularly true when it comes to expensive items that contain a considerable amount of private information, such as your iPhone or your iPad. If you can’t necessarily prevent losing your iPhone or even worse, having it stolen from you, there are however some steps you can make to ensure that in the eventuality such thing would happen, you will be completely ready to handle the situation.
While we hope you’ll never have to deal with this, we want to make sure you know your options and have been proactive in securing your iOS device, whether it is an iPhone, an iPad, or an iPod touch. In this post, we will share with you some of the actions you can take to prepare your iPhone or iPad, and to protect it in case it is lost or stolen. Read More
By Sébastien Page on Aug 9, 2014
Continuing on our series of post about Find My iPhone and Activation Lock, we’re going to look at yet another feature that will ensure the data contained on your iPhone or iPad is safe in case someone gets ahold of it.
We previously saw how to protect, track, and activate Lost Mode for any iOS device with Find My iPhone. In this tutorial, we’re going to learn how to remotely erase an iPhone or iPad that might have been lost or stolen to make sure your data remains safe, no matter what happens. Read More
By Sébastien Page on Aug 8, 2014
Using Find My iPhone is the first step to protecting your iPhone or iPad in case it is lost or stolen. The feature lets you effectively track your device and even lock it, making it virtually useless to anyone who would find or steal it.
The most powerful feature of Find My iPhone is Activation Lock, a way for you to remotely lock your device by putting it in Lost Mode. Doing so, you will be able to remotely password protect the device, and add a custom message on its Lock screen so that if someone finds your phone, they can call you and arrange a meet up.
Also worth highlighting is that when put in Lost Mode, no one will be able to restore or reactivate your device without your Apple ID and password. If this might not prevent someone from stealing your device, it will at least prevent this person from doing anything with it.
In this post, we will show you how to enable Lost Mode of an iPhone or iPad that might have been lost or stolen. Read More
By Sébastien Page on Aug 6, 2014
Activation Lock is a new feature that was introduced alongside iOS 7 in 2013. On the surface, Activation Lock is nothing more than an extension of Find My iPhone, a service that allows you to track a lost or stolen iPhone as well as remotely erase it. In actuality, Activation Lock is more powerful than it would appear as it prevents anyone from erasing or activating your device without entering your Apple ID and password first.
Maybe the best part of Activation Lock is that it is deeply integrated in Find My iPhone. There is no special setting to turn on to take advantage of Activation Lock, and Apple itself doesn’t make a big deal out of the new feature, which has been praised by authorities for curbing iPhone thefts in certain metropolitan areas.
In this post, we will show you how to make sure you have Activation Lock turned on. If not, we will show you how to secure your iPhone or iPad with Find My iPhone Activation Lock.
Admittedly, the steps are pretty simple and straightforward, and chances are you already know how to do all this. If that’s the case, feel free to chime in in the comments section and tell us what other safeguards you have in place to secure your device. Otherwise, read on… Read More
By Cody Lee on Jul 30, 2014
Russia’s Ministry of Communications and Mass Media has suggested that Apple, along with German tech giant SAP, open the source code for its software to ensure that it’s not enabling US intelligence agencies to spy on the country.
The request comes just a week after a security researcher accused Apple of building surveillance backdoors into iOS, and as the United States and Europe expand their sanctions on Moscow over Russia’s involvement in Ukraine affairs… Read More
By Cody Lee on Jul 23, 2014
Forensic expert, and former jailbreak hacker, Jonathan Zdziarski caused quite a stir earlier this week when he published a report accusing Apple of building backdoors into iOS that could be used for government surveillance.
Apple of course came out and denied the claim, saying that these so-called ‘backdoor services’ are actually used for troubleshooting. But this wasn’t a good enough explanation for a lot of users, so tonight it delved a little deeper… Read More
By Cody Lee on Jul 21, 2014
Former iPhone jailbreak hacker Jonathan Zdziarski recently gave a presentation at the HOPE/X conference regarding iOS device security. He said that the platform is reasonably secure from attacks by malicious hackers, but noted there are several backdoors built-in for surveillance.
In the presentation, called ‘Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,’ Zdziarski detailed a number of undocumented high-value forensic services running on iOS devices, and suspicious design omissions in the OS, that appear to be for snooping… Read More
By Cody Lee on Jul 17, 2014
Since wunderkind George Hotz, better known as Geohot, first made a name for himself by hacking the iPhone at age 17, he’s bounced around to several projects. He hacked the PlayStation, did some work for Facebook, and more recently popped up in Android land.
His latest gig is an internship for Google’s Project Zero—a team of elite hackers tasked with finding and eradicating serious software vulnerabilities. Back in March Geohot won $150K for exposing Chrome exploits, and it seems the Mountain View company took notice… Read More
By Christian Zibreg on Jul 17, 2014
Apple is researching new methods of securing data on your iPhone by sending an alert to another device or locking it altogether to protect against theft should it detect a pattern of unusual behavior.
The United States Patent and Trademark Office today published an Apple patent for “Generating notifications based on user behavior”.
The document outlines a method by which an iPhone could automatically lock itself or set off an alert in case it detects unusual changes in user behavior. Read on for more… Read More
By Christian Zibreg on Jul 17, 2014
It appears that Apple has rolled out its two-factor authentication feature for Apple ID accounts in an additional 48 markets, bringing the total number of countries which support this security-minded feature to a cool 59.
Two-factor authentication bolsters up your security when logging in to your Apple ID account on the web by combining something you know – your Apple ID username and password or a Recovery Key – with something you own – a four-digit authorization code sent to your iPhone, iPod touch or iPad device… Read More