SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
#iCloud
22 Mar 2017

Hackers: We will remotely wipe iPhones unless Apple pays ransom

A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts. The hackers, who identified themselves as 'Turkish Crime Family', demanded $75,000 in Bitcoin or Ethereum, another increasingly popular crypto-currency, or $100,000 worth of iTunes gift cards in exchange for deleting the alleged cache of data.

"I just want my money and thought this would be an interesting report that a lot of Apple customers would be interested in reading and hearing," one of the hackers told. The hackers provided screenshots of alleged emails between the group and members of Apple's security team.

Read more
Tags:
Apple hackers iCloud fraud
Source:
Motherboard
1740
28 Feb 2017

Paranoid spouses can spy on partners' iOS 10 devices with iCloud backups

Last week, experts demonstrated a piece of Android malware that can remotely turn on a smartphone's microphone, track the user's location, and intercept phone calls. When buying similar spyware for iPhones, attackers typically need to jailbreak the device first so they can then install unauthorized apps — a technical barrier that may take some time.

But companies do offer monitoring solutions for iPhones that apparently work on iOS 10 devices and don't require a jailbreak. Instead, they take advantage of another aspect of Apple products that some users may overlook — iCloud backups.

Read more
Tags:
iCloud iOS surveillance
Source:
Motherboard
1884
10 Feb 2017

iCloud was quietly storing years of cleared browsing histories

If you think clearing your web browsing history on your iPhone or Mac is going to make your online habits permanently disappear, you'd be wrong. Very wrong. Apple is storing Safari histories in the iCloud going back more than a year, possibly much longer, even where the user has asked for them to be wiped from memory.

Elcomsoft chief Vladimir Katalov told the iPhone maker kept a separate iCloud record, titled "tombstone," in which deleted web visits were stored, ostensibly for syncing across devices. Katalov told me he came across the issue "by accident" when he was looking through the Safari history on his own iPhone.

Read more
Tags:
iCloud Apple surveillance
Source:
Forbes
1774
21 Nov 2016

Apple keeps constant log of iPhone calls in iCloud, warns cop contractor

Apple has a hidden feature for you in its iPhones: call logs going back as far as four months are stored in near real-time in the iCloud. That’s the warning today from a Russian provider of iPhone hacking tools, Elcomsoft, which claimed the feature was automatic and there was no way to turn it off bar shutting down iCloud Drive altogether.

Whilst it was well-known that iCloud backups would store call logs, contacts and plenty of other valuable data, users should be concerned to learn that their communications records are consistently being sent to Apple servers without explicit permission, said Elcomsoft CEO Vladimir Katalov.

Read more
Tags:
iPhone iCloud surveillance Apple
Source:
Forbes
2014
27 Aug 2015

220,000 iCloud accounts breached due to jailbreak tweak backdoor

Some shady tweaks that you installed on their jailbroken devices are looking to steal your iCloud login credentials. The iCloud account details, including email addresses and passwords, of nearly 220,000 users have been breached.

The security breach was a result of 'backdoor privacy attack' caused by the installation of a malicious jailbreak tweak. It appears that hackers are using a variety of built-in backdoors that could be numerous of malicious jailbreak tweaks in an effort to acquire victim's iCloud account information. Once installed, these malicious tweaks transferred the iCloud login details of the jailbreak users to an unknown remote server.

Read more
Tags:
hackers Apple information leaks iCloud
Source:
The Hacker News
2982
11 Jun 2015

iOS Mail vulnerability lets hackers steal your passwords

A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email.

A security and forensic expert has developed a tool, the iOS 8.3 Mail.app inject kit, that could be used to create malicious iCloud password phishing emails. He explained that he exploits an unpatched bug affecting Apple iOS. The iOS 8.3 Mail.app inject kit exploits a vulnerability in the Apple operating system’s native email client that allows and attacker to display a realistic pop-up. 

Read more
Tags:
iOS information leaks iCloud password Apple
Source:
Security Affairs
2236
16 Jan 2015

Apple eyes way to leave fingerprints in the iCloud

A new patent filing describes using the cloud to transfer your Touch ID fingerprint data to other devices. Would such a system be safe and secure? Apple has envisioned a technology that would sync your Touch ID data with other mobile devices, as well as point-of-sale systems, via iCloud.

The sensor requires your fingerprint to access the device and to make purchases using the Apple Pay payments system. Setting up Touch ID is a matter of registering one or more fingerprints on your device. Why would Apple propose a cloud-based system for this process? How would this proposed syncing technology safeguard your Touch ID data?

Read more
Tags:
iCloud Apple surveillance information leaks
Source:
CNet
2183
21 Oct 2014

China intercepts iCloud logins

Chinese authorities are attacking users who are connecting to Apple's iCloud website in what appears to be a surveillance push to steal users' login credentials, according to a Chinese censorship monitoring group.

After the new iPhone 6 went on sale in China, connections to iCloud.com were hijacked and stripped of the usual encryption that prevents hackers and government spies from intercepting the username and password typed by someone connecting to the site. This is another example of what is technically known as a "man-in-the-middle" (MITM) attack. China has been accused of intercepting connections with a MITM attack against Github, Google, and, more recently, Yahoo.

Read more
Tags:
China Apple iCloud surveillance Microsoft
Source:
Mashable
2408
21 Sep 2014

Will iOS 8 be secure?

Apple said that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary. Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

Read more
Tags:
iOS Apple iCloud trends
Source:
The Washington Post
2221
16 Sep 2014

How to protect yourself from cloud leaks

Not so long ago these news were marked by an internet-wide newsbreak: anonymous hackers somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and publicized this material on the Internet.

Such leaks are not new, however, this one was on a massive scale. From the very beginning there was an assumption that perhaps some photos were stolen directly from celebrities’ accounts in the Apple’s iCloud. Is this possible? If so, what can be done to avoid the theft? At this time, there is no hard evidence in this case. Apple and the FBI are currently investigating and we look forward to reading the results.

Read more
Tags:
iCloud FBI information leaks Google Apple
Source:
Kaspersky Daily
Author:
Alex Savitsky
2792
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015