Apple ‘actively investigating’ alleged iCloud hack that led to celeb photo leak

By Cody Lee on Sep 1, 2014

After nearly 24 hours of silence, Apple has finally commented on the alleged iCloud hack that led to a massive leak yesterday of nude celebrity photos. The Cupertino-based company says that it is aware of the reports and is “actively investigating” the claim.

“We take user privacy very seriously and are actively investigating this report,” Apple spokeswoman Natalie Kerris told Recode in a statement. She did not, however, provide any additional details on the attack, or if iCloud was even the source of the photos. Read More

 

Apple reportedly patches Find My iPhone vulnerability to hack Apple ID accounts

By Christian Zibreg on Sep 1, 2014

According to The Next Web this morning, Apple has allegedly patched a security hole in the Find My iPhone service which allowed nefarious users to brute-force Apple ID passwords, according to Twitter user @hackappcom who posted a proof of concept titled ‘iBrute’ to GitHub on Saturday.

This should be good news for celebrities who reported their iCloud accounts being hacked and saw their nude pictures posted online.

As Cody told you yesterday, Academy Award winner Jennifer Lawrence and several other celebrities found themselves in the middle of a major nude photo leak after attackers apparently exploited a vulnerability in Apple’s Find My iPhone service. Read More

 

Hacker leaks dozens of nude celebrity pics in alleged iCloud hack

By Cody Lee on Aug 31, 2014

Twitter, Reddit and several other social networks are blowing up this evening with talk of a major nude celebrity photo leak. The trove first appeared on 4chan’s /b/ thread earlier today, and it includes Academy Award winner Jennifer Lawrence and several others.

The pictures were allegedly retrieved through a vulnerability in Apple’s iCloud service, which allowed the celebrities’ phones to be hacked. Thus far, no one has confirmed that iCloud was actually breached, and few details are known about the attack, or the attacker. Read More

 

How Apple can improve permission handling in iOS

By Jeff Benjamin on Aug 25, 2014

Every so often, it helps to take a step back and examine the way things are being done. This applies to our day-to-day routine, or perhaps our workout regimen. I’ve also found that it applies to software.

iOS is no exception to this. Here is a software product that has been through vast changes since its creation. A good majority of the changes have been for the better, and iOS 8, which is mere weeks away, promises to bring more awesome goodies to the table.

But, from time to time, it pays to look at the way things are being done. We have to ask ourselves, “Is this truly the best way?”

I feel that we’ve reached that fork in the road when it comes to the way iOS handles permission requests for apps. As more features are added to our devices, more permissions are required for apps that wish to use these features. It’s gotten to the point that some apps require you to go through a whole checklist of permissions before you can even begin using the app.

The permission handling in iOS has become a frustrating affair. Not only do the numerous pop-up alerts annoy me, but it irritates me even more when I accidentally decline a permission because of speeding through the app setup process.

As discussed on today’s episode of Let’s Talk iOS, I’m convinced that there’s a better way to handle permissions in iOS. There’s a less intrusive, less frustrating way to handle requests for access to the various features on your device. Check out our video inside for an explanation of the problem, and a demonstration of the solution. Read More

 

New service offers permanent Activation Lock bypass

By Sébastien Page on Aug 22, 2014

Chronic Unlocks has recently started offering a new service which claims to bypass Activation Lock on iOS devices that have been locked. Although the method used to get around the security measure has yet to be detailed, the service can be helpful for people who bought an iOS device that is still tied to its previous owner’s Apple ID. But don’t expect the company to help you bypass Activation Lock on a stolen device! Read More

 

AdThief malware found infecting 75,000 jailbroken devices

By Sébastien Page on Aug 15, 2014

Security researcher Axelle Apvrille recently published a paper about AdThief, a malware aimed at hijacking ad revenue from a reportedly 75,000 infected devices. First discovered in March 2014, and also known as “spad,” the malware, which comes disguised as a Cydia Substrate extension, was found to replace the publisher ID of publishers with the one of the malware creator, effectively attributing all ad revenue to him. Read More

 

Safari 7.0.6/6.1.6 with Mavericks/Mountain Lion security fixes now available

By Christian Zibreg on Aug 14, 2014

Late yesterday, Apple released Safari 7.0.6 for OS X Mavericks and Safari 6.1.6 for OS X Mountain Lion.

The releases contain improvements to security related to Apple’s desktop browser and are both recommended for all OS X Mavericks and OS X Mountain Lion users.

These updates follow the release of a new version of OS X Mavericks 10.9.5 (build 13F14) that Apple released to developers yesterday… Read More

 

How to check for Activation Lock before buying a used iPhone

By Sébastien Page on Aug 12, 2014

Activation Lock is a great feature coming with every iOS device that has Find My iPhone enabled. This security feature prevents anyone from activating your phone without having access to your Apple ID or password in case they found or stole your device.

Even though they might not be able to activate the lost or stolen device, they might still try to put it up for sale, and if you don’t know what to look for, you might very well be buying an iPhone that has been locked and cannot be activated.

In this post, we will show you what to check when buying a used iPhone or iPad from a third party. Read More

 

What to do if your iPhone is lost or stolen

By Sébastien Page on Aug 11, 2014

Better safe than sorry, they say. This is particularly true when it comes to expensive items that contain a considerable amount of private information, such as your iPhone or your iPad. If you can’t necessarily prevent losing your iPhone or even worse, having it stolen from you, there are however some steps you can make to ensure that in the eventuality such thing would happen, you will be completely ready to handle the situation.

While we hope you’ll never have to deal with this, we want to make sure you know your options and have been proactive in securing your iOS device, whether it is an iPhone, an iPad, or an iPod touch. In this post, we will share with you some of the actions you can take to prepare your iPhone or iPad, and to protect it in case it is lost or stolen. Read More

 

How to remotely erase an iPhone or iPad that was lost or stolen

By Sébastien Page on Aug 9, 2014

Continuing on our series of post about Find My iPhone and Activation Lock, we’re going to look at yet another feature that will ensure the data contained on your iPhone or iPad is safe in case someone gets ahold of it.

We previously saw how to protect, track, and activate Lost Mode for any iOS device with Find My iPhone. In this tutorial, we’re going to learn how to remotely erase an iPhone or iPad that might have been lost or stolen to make sure your data remains safe, no matter what happens. Read More

 

How to activate Lost Mode if your iPhone or iPad is lost or stolen

By Sébastien Page on Aug 8, 2014

Using Find My iPhone is the first step to protecting your iPhone or iPad in case it is lost or stolen. The feature lets you effectively track your device and even lock it, making it virtually useless to anyone who would find or steal it.

The most powerful feature of Find My iPhone is Activation Lock, a way for you to remotely lock your device by putting it in Lost Mode. Doing so, you will be able to remotely password protect the device, and add a custom message on its Lock screen so that if someone finds your phone, they can call you and arrange a meet up.

Also worth highlighting is that when put in Lost Mode, no one will be able to restore or reactivate your device without your Apple ID and password. If this might not prevent someone from stealing your device, it will at least prevent this person from doing anything with it.

In this post, we will show you how to enable Lost Mode of an iPhone or iPad that might have been lost or stolen. Read More

 

How to secure your iPhone or iPad with Find My iPhone Activation Lock

By Sébastien Page on Aug 6, 2014

Activation Lock is a new feature that was introduced alongside iOS 7 in 2013. On the surface, Activation Lock is nothing more than an extension of Find My iPhone, a service that allows you to track a lost or stolen iPhone as well as remotely erase it. In actuality, Activation Lock is more powerful than it would appear as it prevents anyone from erasing or activating your device without entering your Apple ID and password first.

Maybe the best part of Activation Lock is that it is deeply integrated in Find My iPhone. There is no special setting to turn on to take advantage of Activation Lock, and Apple itself doesn’t make a big deal out of the new feature, which has been praised by authorities for curbing iPhone thefts in certain metropolitan areas.

In this post, we will show you how to make sure you have Activation Lock turned on. If not, we will show you how to secure your iPhone or iPad with Find My iPhone Activation Lock.

Admittedly, the steps are pretty simple and straightforward, and chances are you already know how to do all this. If that’s the case, feel free to chime in in the comments section and tell us what other safeguards you have in place to secure your device. Otherwise, read on… Read More

 

Russia asks Apple for source code to alleviate espionage concerns

By Cody Lee on Jul 30, 2014

Russia’s Ministry of Communications and Mass Media has suggested that Apple, along with German tech giant SAP, open the source code for its software to ensure that it’s not enabling US intelligence agencies to spy on the country.

The request comes just a week after a security researcher accused Apple of building surveillance backdoors into iOS, and as the United States and Europe expand their sanctions on Moscow over Russia’s involvement in Ukraine affairs… Read More

 

Apple outlines diagnostic capabilities in response to iOS ‘backdoor’ concerns

By Cody Lee on Jul 23, 2014

Forensic expert, and former jailbreak hacker, Jonathan Zdziarski caused quite a stir earlier this week when he published a report accusing Apple of building backdoors into iOS that could be used for government surveillance.

Apple of course came out and denied the claim, saying that these so-called ‘backdoor services’ are actually used for troubleshooting. But this wasn’t a good enough explanation for a lot of users, so tonight it delved a little deeper… Read More

 

Former jailbreak hacker accuses Apple of building surveillance backdoors into iOS

By Cody Lee on Jul 21, 2014

Former iPhone jailbreak hacker Jonathan Zdziarski recently gave a presentation at the HOPE/X conference regarding iOS device security. He said that the platform is reasonably secure from attacks by malicious hackers, but noted there are several backdoors built-in for surveillance.

In the presentation, called ‘Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,’ Zdziarski detailed a number of undocumented high-value forensic services running on iOS devices, and suspicious design omissions in the OS, that appear to be for snooping…  Read More

 
Page 112345...