In the continuing dribble of leaked emails from John Podesta's inbox, WikiLeaks has revealed an interesting exchange between Apple and the Clinton campaign manager where the Cupertino firm talks about giving governments its customer data.
Following Apple's firm stance on encryption surrounding the shooter's iPhone, where US authorities unsuccessfully demanded Apple provide a "backdoor" to the handset, this may come as somewhat of a shock. However, refrain from throwing your arms in the air just yet. In the email Apple VP Lisa Jackson is actually reaching out to John Podesta to thank Clinton's "principled and nuanced stance" on encryption in the tech sector.
Read moreAt least two smishing campaigns have hit iOS users in the past week, with over 7,500 users clicking the malicious links and ending up on phishing pages designed to con them out of their Apple login credentials.
Intel McAfee security experts first discovered something was wrong, when their security products started picking up suspicious SMS messages from a US number. These messages had the format of an email. Researchers say that users who clicked on this link ended up on a hacked website, where a message was displayed, telling them they had to verify their account as soon as possible, or Apple would lock it.
Read moreApple has yet to patch a vulnerability disclosed during last week’s Hack in the Box hacker conference in Amsterdam that allows an attacker with physical access — even on the latest versions of iOS — to swap out legitimate apps with malicious versions undetected on the device.
Researcher of mobile security company Mi3 Security disclosed last week during his talk at the show that an iOS mitigation for a previous attack he’d developed was incomplete and with a modification, he could still infect non-jailbroken iOS devices with malicious or misbehaving apps.
Read moreApple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune to threats. Is it really that secure as Apple fans see it?
The answer is: no, it isn’t. In this article we will discuss several types of attacks which are as bad for the iPhones as they are for other devices. Phishing attacks target ‘what’s between a chair and a keyboard,’ meaning the users themselves. Phishers typically prey on human carelessness or a lack of overall awareness of security issues. It might seem as if the attributes of a phishing attack are known to everyone.
Read moreWhen the FBI bought a hacking tool to break into an iPhone, it wasn’t sure what exactly it got for its $1.3m. The FBI confirmed it wouldn’t tell Apple about the security flaw it exploited to break inside the iPhone 5C, because the bureau says it didn’t buy the rights to the technical details of the hacking tool.
The unusual declaration likely will raise only more curiosity about the FBI’s last-minute abandonment of its high-stakes court battle with Apple. The day before the two were schedule to face off in court over whether the government could force Apple to unlock the phone, the government announced it no longer needed Apple’s help.
Read moreA couple of security experts demonstrated that iOS date bug was still present in iOS devices and it was exploitable by spoofing an Apple NTP server. Do you remember the Apple iOS date bug?
In February, the security community highlighted the existence of the embarrassing problem for Apple iOS mobile devices running 64-bit iOS 8 or higher, the issue affects the Apple iOS date and time system and could be triggered by setting the date to January 1, 1970. The news appeared in Reddit discussions warning users about a flaw that could brick iPhone forever. When connected to public Wi-Fi, iPhone calibrates its time settings with an NTP server.
Read moreThe FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.
The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said. The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.
Read moreThe mobile forensics firm Cellebrite of Israel is reportedly assisting the Federal Bureau of Investigation in unlocking a seized iPhone that has become the center of a legal dispute between the bureau and Apple.
The revelation comes two days after the US government tentatively withdrew its demands that Apple write code and assist the authorities to unlock a seized iPhone used by one of the San Bernardino County shooters. The FBI told a federal judge that an "outside party demonstrated to the FBI a possible method for unlocking Farook's iPhone." A federal magistrate then tentatively stayed her order demanding that Apple assist the authorities in unlocking the phone.
Read moreThe Justice Department said that it might no longer need Apple’s assistance in opening an iPhone used by a gunman in the San Bernardino, Calif., rampage last year.
The disclosure led a judge to postpone a court hearing over the issue and temporarily sidesteps what has become a bitter clash with the world’s most valuable company. In a new court filing, the government said an outside party had demonstrated a way for the F.B.I. to possibly unlock the phone used by the gunman. The hearing in the contentious case — Apple has loudly opposed opening the iPhone, citing privacy concerns and igniting a heated debate — was originally set for Tuesday.
Read moreApple CEO declared that his company wouldn’t comply with a government search warrant to unlock an iPhone used by one of the San Bernardino killers, a significant escalation in a long-running debate between technology companies and the government over access to people’s electronically-stored private information.
But in a similar case in New York last year, Apple acknowledged that it could extract such data if it wanted to. And according to prosecutors in that case, Apple has unlocked phones for authorities at least 70 times since 2008. In other words, Apple’s stance in the San Bernardino case may not be quite the principled defense that Cook claims it is.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland