Apple Inc said it is cleaning up its iOS App Store to remove malicious iPhone and iPad programs identified in the first large-scale attack on the popular mobile software outlet.
The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost that was embedded in hundreds of legitimate apps. It is the first reported case of large numbers of malicious software programs making their way past Apple's stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc.
Read moreThe "Hey Siri" feature lets you activate Siri just by saying, you guessed it, "Hey Siri," eliminating the need to hold down the Home button or raise the phone to your mouth to wake up the voice assistant.
We know Siri, its voice is one of the most recognizable in the world. Siri is the main voice assistant. Users can speak commands – and receive audible confirmation from Siri – to send messages, place calls, set reminders, operate iTunes and more. The US Internet service providers and human rights activists are concerned with the Apple application Siri. Siri intelligent personal assistant is suspected of distributing data to third party.
Read more"Hey Siri, it looks like I can activate you by voice whether or not my new iPhone 6S is plugged in." "Yes, that's right. Thank you for noticing." Well, that's not an actual conversation I had with Siri, but it could have been.
With the launch of the new iPhone 6S and 6S Plus, Apple's voice assistant has been beefed up with a helpful new feature, namely always-on voice activation. The "Hey Siri" feature lets you activate Siri just by saying, you guessed it, "Hey Siri," eliminating the need to hold down the Home button or raise the phone to your mouth to wake up the voice assistant. But "Hey Siri" has one limitation. Your current iPhone has to be connected to a power source for "Hey Siri" to work.
Read moreBack in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet.
The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month. The privilege-escalation bug was once used to circumvent security protections and gain full control of Mac computers. The vulnerability then allowed attackers to install malware and adware onto a target Mac, without requiring victims to enter system passwords.
Read moreSome shady tweaks that you installed on their jailbroken devices are looking to steal your iCloud login credentials. The iCloud account details, including email addresses and passwords, of nearly 220,000 users have been breached.
The security breach was a result of 'backdoor privacy attack' caused by the installation of a malicious jailbreak tweak. It appears that hackers are using a variety of built-in backdoors that could be numerous of malicious jailbreak tweaks in an effort to acquire victim's iCloud account information. Once installed, these malicious tweaks transferred the iCloud login details of the jailbreak users to an unknown remote server.
Read moreiPhone and iPad users have reported receiving pop-up notifications telling them that their software has crashed and that they must dial a support helpline to fix it. Scammers have targeted Safari, telling users in the US to ring the helpline and pay to fix it.
Users in the UK have also reported the issue, with one saying they had been asked for money to fix the crash. When browsing Safari, users receive a notification saying: "Warning!! iOS Crash Report!!. Due to a third party application in your device, iOS is crashed. Contact Support for Immediate Fix." Apple has directed users to a support page that explains how to fix it.
Read moreIf you're writing poetry, write it. Don't type it in just because you can. The classroom is changing, as new technologies dramatically alter the learning for both teachers and students. And at the heart of this change is the tablet.
You might not think of the classroom as a key market for big companies such as Apple and Google. That's indicative of a vast worldwide market. Manufacturers understandably want their share – and it comes with some significant benefits to education too. What's been clear from looking at how the tablet is currently used in the classroom is that it's had a transformational effect.
Read moreA security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email.
A security and forensic expert has developed a tool, the iOS 8.3 Mail.app inject kit, that could be used to create malicious iCloud password phishing emails. He explained that he exploits an unpatched bug affecting Apple iOS. The iOS 8.3 Mail.app inject kit exploits a vulnerability in the Apple operating system’s native email client that allows and attacker to display a realistic pop-up.
Read moreRecently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC.
The first time that EPIC, a nonprofit research center in Washington focused on emerging privacy and civil liberties issues, has given the honor to a person from the business world. The hosts of the event included cryptographer Bruce Schneier, EPIC president Marc Rotenberg, Lobbyist Hilary Rosen and Stanford Lecturer in Law Chip Pitts. Tim Cook was honored for ‘corporate leadership’. There are 10 best quotes from his speech on guarding customer privacy.
Read moreResearchers have revealed a zero-day vulnerability in iOS 8 that, when exploited by a malicious wireless hotspot, will repeatedly crash nearby Apple iPhones, iPads and iPods. The attack will render vulnerable iOS things within range unstable or even entirely unusable by triggering constant reboots.
Anyone can take any router and create a Wi-Fi hotspot that forces you to connect to their network, and then manipulate the traffic to cause apps and the operating system to crash. This is not a denial-of-service where you can't use your Wi-Fi – this is a denial-of-service so you can't use your device even in offline mode.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland