With a special hacking tool, the Federal Bureau of Investigations not only took over operations of a child pornography site, but also located some 1,300 visitors. Now the computer code used to hunt down suspects must be released per a court order.
What the FBI has called "the largest remaining known child pornography hidden service in the world," Playpen operated in the part of cyberspace known as the Dark Web on the browser Tor where its IP address was hidden. That is, until the FBI managed to capture control of the site in February 2015 where it proceeded not to shut it down, but rather kept the illegal content up for two weeks to catch 1,300 visitors’ IP addresses.
Read moreDon’t Try this at Home! An interesting software bug has been discovered in Apple's iOS operating system that could kill your iPhone, iPad or iPod Dead Permanently. Yes, you heard me right.
An issue with the date and time system in iOS had emerged recently when Reddit users started warning people that changing your iPhone's or any iOS device's date will brick your iPhone forever. You can watch the whole process in the video given below. Even regular recovery tricks do not work. So, you are recommended to Not Try This Trick with your iOS device really – unless you book a trip to your local Apple Store.
Read moreExperts reported drop-dead simple exploit that completely bypassed an OS X security feature known as Gatekeeper. Apple shipped a fix, but now the security researcher who discovered the original vulnerability said he found an equally obvious work-around.
Patrick Wardle said the security fix consisted of blacklisting a small number of known files he privately reported to Apple that could be repackaged to install malicious software on Macs, even when Gatekeeper is set to its most restrictive setting. Wardle was able to revive his attack with little effort by finding a new Apple trusted file that hadn't been blocked by the Apple update.
Read moreMost of today's top mobile payment apps are not protected enough to handle the amount of scrutiny and effort cyber-criminals are normally willing to put into compromising payment systems.
The company studied ten of the most popular mobile payment apps, ranging from mobile wallet apps to one-click payment merchants, and from peer-to-peer payment apps to regular apps that link themselves to banking accounts. According to Bluebox, three big issues were identified. The first is related to improperly protected communication channels that would allow attackers to redirect payments to an attacker's desired location.
Read moreWhite House and congressional staffers have asked Silicon Valley executives for new talks in Washington, D.C., to resolve a standoff over encrypted communication tools in the wake of the Paris terrorist attacks.
The approaches are among the most concrete signs of how last week’s bombings and shootings have put a new spotlight on the debate about whether American companies should be allowed to offer ultrasecure messaging tools. There is no evidence the Paris attacks have changed technology companies’ view that strong encryption protects consumers, and that providing a way for police to eavesdrop would open the door to exploitation by criminals.
Read moreResearchers said they've found more than 250 iOS apps that violate Apple's App Store privacy policy forbidding the gathering of e-mail addresses, installed apps, serial numbers, and other personally identifying information that can be used to track users.
The apps, which at most recent count totaled 256, are significant because they expose a lapse in Apple's vetting process for admitting titles into its highly curated App Store. They also represent an invasion of privacy to the one million people estimated to have downloaded the apps. The data gathering is so surreptitious that even the individual developers of the affected apps are unlikely to know about it.
Read moreIf you have an iPhone running iOS 9, you should be aware that it may be possible to access your photos and contacts on a locked device, even with a passcode and/or Touch ID enabled.
I’ve always ignored reports on this sort of security flaw, because they always seem to pop up with every iOS iteration, and almost always require a user to jump through what seems like a million hoops. But for some reason — call it boredom, or call it poor judgement — I got curious, and decided to try this out for myself. As it turns out, it’s not that hard to do, and it certainly seems like a security flaw in iOS to me.
Read moreApple Inc said it is cleaning up its iOS App Store to remove malicious iPhone and iPad programs identified in the first large-scale attack on the popular mobile software outlet.
The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost that was embedded in hundreds of legitimate apps. It is the first reported case of large numbers of malicious software programs making their way past Apple's stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc.
Read moreThe "Hey Siri" feature lets you activate Siri just by saying, you guessed it, "Hey Siri," eliminating the need to hold down the Home button or raise the phone to your mouth to wake up the voice assistant.
We know Siri, its voice is one of the most recognizable in the world. Siri is the main voice assistant. Users can speak commands – and receive audible confirmation from Siri – to send messages, place calls, set reminders, operate iTunes and more. The US Internet service providers and human rights activists are concerned with the Apple application Siri. Siri intelligent personal assistant is suspected of distributing data to third party.
Read more"Hey Siri, it looks like I can activate you by voice whether or not my new iPhone 6S is plugged in." "Yes, that's right. Thank you for noticing." Well, that's not an actual conversation I had with Siri, but it could have been.
With the launch of the new iPhone 6S and 6S Plus, Apple's voice assistant has been beefed up with a helpful new feature, namely always-on voice activation. The "Hey Siri" feature lets you activate Siri just by saying, you guessed it, "Hey Siri," eliminating the need to hold down the Home button or raise the phone to your mouth to wake up the voice assistant. But "Hey Siri" has one limitation. Your current iPhone has to be connected to a power source for "Hey Siri" to work.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland