Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you to devote some time to adjusting the privacy settings in your new gadget.
Location tracking and data collection are powerful features that could place your personal information in the hands of people and services you’d rather shut out. Take advantage of these tips to keep your personal data to yourself. To be clear: experts do not recommend turning off all tracking — that would mean discarding a bunch of extremely useful features. But each of these useful features comes at a price.Read more
Gamers who have downloaded the Pokémon Go augmented reality game were given a scare on Monday, after noticing that the app had apparently been granted “full access” to their Google accounts.
Taken at face value, the permissions would have represented a major security vulnerability, albeit one that only appeared to affect players who signed up to play the game using their Google account on Apple devices. The discovery sparked a wave of fear that playing the game might allow its developers, Niantic Labs, to read and send email, access, edit and delete documents in Google Drive and Google Photos, and access browser and maps histories.Read more
Federal Bureau of Investigation Director James Comey said on Thursday the agency paid more to get into the iPhone of one of the San Bernardino shooters than he will make in the remaining seven years and four months he has in his job.
According to figures from the FBI and the U.S. Office of Management and Budget, Comey's annual salary as of January 2015 was $183,300. Without a raise or bonus, Comey will make $1.34 million over the remainder of his job. That suggests the FBI paid the largest ever publicized fee for a hacking job, easily surpassing the $1 million paid by U.S. information security company Zerodium to break into phones.Read more
Computer security researchers warn security shortcomings in Android/Playstore undermine the security offered by all SMS-based two-factor authentication. The issue - first reported to Google more than a year ago - revolves around an alleged security weakness rather than a straightforward software vulnerability.
In the BAndroid microsite, the Dutch researchers explain the cause and scope of the alleged vulnerability. If attackers have control over the browser on the PC of a user using Google services, they can push any app with any permission on any of the user's Android devices, and activate it - allowing one to bypass 2-factor authentication via the phone.Read more
A security flaw with the iPhone 6S and 6S Plus will let anyone bypass the phone lock and access personal information without having to know the passcode. The bug, discovered by Jose Rodriguez, who found a similar security hole last year, requires Siri but unlike many other iPhone hacks is relatively easy to execute.
All an attacker needs to do is fire up Siri from the lockscreen and prompt it to search Twitter for any email address. Once one is found, 3D Touching the email address will bring up a context menu from which you can create a new contact or add to an existing contact. That gives the attacker complete access to your contacts.Read more
A researcher discovered an unprotected database storing the details of 198,000 users who had signed up for a now-defunct iOS application. A misconfigured MongoDB database associated with the iPhone app Kinotopic was discovered by a researcher who currently works at Kromtech, the company behind MacKeeper.
Kinotopic, which allowed users to create and share animated pictures and cinemagraphs, was discontinued sometime in 2013. However, the database storing the accounts of people who used the app has not been deleted. The database stores the details of 198,000 former Kinotopic users, including their username, email address and password hash.Read more
Apple CEO Tim Cook denounced a federal judge's order to crack open an iPhone used by a terrorist, calling the situation "chilling" and saying it would deal a major setback to online privacy for all.
To hack the phone, the FBI wants Apple to build a new version of its iOS software that Cook claims bypasses the iPhone's security features and creates "the potential to unlock any iPhone in someone's physical possession." "The US government has asked us for something we simply do not have, and something we consider too dangerous to create," Cook wrote in an open letter posted on Apple's website. "They have asked us to build a backdoor to the iPhone."Read more
A new prank circulating on Twitter, Facebook and other social media platform could crash your iPhone or iPad completely. If you come across a link to crashsafari.com, you are advised not to open it on your iPhone, iPad or even Macs.
Doing so will cause Safari application to crash, potentially causing your Apple device to restart. In case, you want to try this out, just click here to visit the website and watch what happens. Currently, people are spreading the link to CrashSafari.com via Twitter using a URL shortener, and users are tricked into visiting the site without being knowing. How does this Prank Work?Read more
Cybercriminals are increasingly targeting Apple devices and 2016 will see a rise in attacks on its operating systems, security experts suggest. According to security firm Symantec, the amount of malware aimed at Apple's mobile operating system has more than doubled this year, while threats to Mac computers also rose.
Security firm FireEye also expects 2016 to be a bumper year for Apple malware. Systems such as Apple Pay could be targeted, it predicts. Apple is an obvious target for cybercriminals because its products are so popular. While the total number of threats targeting Apple devices remains low compared with Windows and Android.Read more
Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as attackers move to application-based threat vectors.
According to a new report from mobile application security vendors Checkmarx and AppSec Labs, the average mobile app has nine vulnerabilities. Of the iOS vulnerabilities, 40 percent were critical or high severity, compared to 36 percent of the Android vulnerabilities, said Amit Ashbel, product marketing manager at Checkmarx. Researchers tested hundreds of applications of all types, including banking, utilities, retail, gaming and security.Read more