Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet.
The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month. The privilege-escalation bug was once used to circumvent security protections and gain full control of Mac computers. The vulnerability then allowed attackers to install malware and adware onto a target Mac, without requiring victims to enter system passwords.
Read moreSome shady tweaks that you installed on their jailbroken devices are looking to steal your iCloud login credentials. The iCloud account details, including email addresses and passwords, of nearly 220,000 users have been breached.
The security breach was a result of 'backdoor privacy attack' caused by the installation of a malicious jailbreak tweak. It appears that hackers are using a variety of built-in backdoors that could be numerous of malicious jailbreak tweaks in an effort to acquire victim's iCloud account information. Once installed, these malicious tweaks transferred the iCloud login details of the jailbreak users to an unknown remote server.
Read moreiPhone and iPad users have reported receiving pop-up notifications telling them that their software has crashed and that they must dial a support helpline to fix it. Scammers have targeted Safari, telling users in the US to ring the helpline and pay to fix it.
Users in the UK have also reported the issue, with one saying they had been asked for money to fix the crash. When browsing Safari, users receive a notification saying: "Warning!! iOS Crash Report!!. Due to a third party application in your device, iOS is crashed. Contact Support for Immediate Fix." Apple has directed users to a support page that explains how to fix it.
Read moreIf you're writing poetry, write it. Don't type it in just because you can. The classroom is changing, as new technologies dramatically alter the learning for both teachers and students. And at the heart of this change is the tablet.
You might not think of the classroom as a key market for big companies such as Apple and Google. That's indicative of a vast worldwide market. Manufacturers understandably want their share – and it comes with some significant benefits to education too. What's been clear from looking at how the tablet is currently used in the classroom is that it's had a transformational effect.
Read moreA security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email.
A security and forensic expert has developed a tool, the iOS 8.3 Mail.app inject kit, that could be used to create malicious iCloud password phishing emails. He explained that he exploits an unpatched bug affecting Apple iOS. The iOS 8.3 Mail.app inject kit exploits a vulnerability in the Apple operating system’s native email client that allows and attacker to display a realistic pop-up.
Read moreRecently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC.
The first time that EPIC, a nonprofit research center in Washington focused on emerging privacy and civil liberties issues, has given the honor to a person from the business world. The hosts of the event included cryptographer Bruce Schneier, EPIC president Marc Rotenberg, Lobbyist Hilary Rosen and Stanford Lecturer in Law Chip Pitts. Tim Cook was honored for ‘corporate leadership’. There are 10 best quotes from his speech on guarding customer privacy.
Read moreResearchers have revealed a zero-day vulnerability in iOS 8 that, when exploited by a malicious wireless hotspot, will repeatedly crash nearby Apple iPhones, iPads and iPods. The attack will render vulnerable iOS things within range unstable or even entirely unusable by triggering constant reboots.
Anyone can take any router and create a Wi-Fi hotspot that forces you to connect to their network, and then manipulate the traffic to cause apps and the operating system to crash. This is not a denial-of-service where you can't use your Wi-Fi – this is a denial-of-service so you can't use your device even in offline mode.
Read moreSteve Jobs's management style has been described in many ways, both positive and negative. Love him or hate him, there's no denying what he accomplished: Within a short time, he built the most successful company on the planet.
He founded another company. This startup was focused on producing high-powered computers for the higher education industry to provide. Moreover they wanted to provide the highest level of security. A talented team left secure positions at Apple and followed Jobs to his new endeavor – evidence of how much people believed in him. There are eight tips that are noteworthy.
Read moreA technology coalition headed by Apple, Microsoft, and Google urged President Barack Obama and other government officials to end the National Security Agency’s bulk collection of phone call metadata.
In a letter addressed to the President and other key figures, the coalition, made up of privacy advocates, technology firms, and trade companies, called the NSA program untenable, and urged the House to move forward with reforms. Critics say that the Patriot Act is being used to unjustly collect the phone records of innocent people that means people are not provided with personal and internet security.
Read moreThe average large global enterprise has about a lot of unsafe apps installed on the mobile devices in its environment.
The apps in question are publicly available apps popular among users, not enterprise ones. Many users are downloading these apps and installing them on devices, often the same one they are using to access enterprise applications and services. Enterprises have to manage what employees are installing on company-issued mobile devices while also managing employee-owned devices as part of a comprehensive bring-your-own-device program.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland