Twitter users will be alerted to a change in the type of data the social network is collecting on them, and will be offered the option to opt-out by adjusting their settings. The data in question is a list of the apps you have installed on your mobile device.
The company says it’s using the app data to help “build a more tailored experience for you on Twitter,” which includes things like improving your “who to follow” recommendations by connecting you with those who have similar interests; showing your relevant promoted content; and adding content to your timeline like tweets and accounts that Twitter thinks you’ll find interesting.Read more
Researchers said they discovered and disclosed to Apple, the vulnerability exploited by the WireLurker malware, which targeted iOS mobile devices. Some experts claim that now WireLurker is the only existing malware, which uses the bug in iOS.
Although Apple tried to annul the certificates used by the malware quickly, but the problem is that the flaw relates to an iOS enterprise provisioning failure to double check the identity of a given app against its digital certificate when the developer does not upload the application to the App Store. It gives attackers the ability to replace legitimate iOS apps with malicious ones without notification.Read more
Apple Inc was ordered to face a federal lawsuit of the USA claiming it failed to tell consumers that its messaging system would block them from receiving text messages if they switched to Android-based smartphones from iPhones.
Apple must face plaintiff's claim that the message blocking interfered with her contract with Verizon Wireless for wireless service, which she kept after switching in April to a Samsung Galaxy S5 from an iPhone 4. Plaintiff, who seeks class-action status and unspecified damages, claimed that Apple failed to disclose how its iOS 5 software operating system would obstruct the delivery of messages from other Apple device users if iPhone users switched to non-Apple devices.Read more
A new kind of malicious software strikes at Mac OS X and iPhone users in China. Apple users in China have an active, new threat to contend with that attacks iPhones and iPads through Apple's Mac OS X operating system, a US security firm reported.
The malicious software waits for a device running iOS mobile operating system to connect via USB to a Mac laptop or desktop. The software stores adds malicious code to legitimate iOS apps. The malware attack is limited to China. The threat is new to Apple, though this sort of attack has been around since about 2003, said intelligence director. Apple did not return a request for comment.Read more
FBI Director has been on a media tour lately, making an anti-encryption pitch to the public. Apple's new encryption standards are an unnecessary hurdle to law enforcement — and the FBI needs an easy way to bypass them.
Now Comey is bringing the argument straight to Congress, asking them to update a law to allow backdoors in smartphones. CALEA required telephone providers to make it possible for law enforcement to wiretap phones. Newer forms of communication aren't explicitly mentioned in the law, and Apple's new encryption standards don't leave room for any government access. Even if government officials ask for data, Apple says, the company can't comply.Read more
Hackers know how to hack a bank account with the help of MITM. About 23% percent of applications, based on Android by means of which people use banking services were hacked. Everything is a bit better with iOS, there are only 14 percent of apps.
According to the research, hackers use such attack as Man-in-the-Middle in order to steal money. Theft happens during the information transfer from the sender to the recipient. A client will be redirected to fake Wi-Fi knot. Everything will happen very quickly and unexpectedly. To achieve their insidious purposes, hackers set network equipment and create their own Wi-Fi. The difference in wireless network does not matter for you.Read more
Normal people spend their nights watching movies, reading articles, socializing or (yes, I know it's odd) sleeping. I spend my nights reading RFCs and pentesting various applications/services.
One night I was randomly reading the tel URI scheme RFC as I am fascinated by old relics that are still used today, their flaws and the way people never read the RFC which leads to RTFM pwnage as I call it. As I finished reading the tel RFC I looked at my iPhone and said: Cool, let's try it out!. I instacoded a small html page and loaded it in Safari. As I clicked the click me link I was prompted with a nice dialog asking me if I really want to call 0000.Read more
Security researchers from MetaIntell have discovered security vulnerability in the new version of Facebook SDK that put millions of Facebook user's Authentication Tokens at risk.
With help of Facebook SDK for Android and iOS it is easy to integrate mobile apps with Facebook platform. The set of program tools gives creators a chance to simplify process of reading and writing to Facebook APIs and other. “Login as Facebook” function is a secure and personalized way for users to sign, because sharing passwords is not needed.Read more
Both mobile operating systems pose risks to the enterprise. A new report about mobile threats in 2014 from Marble Security maintains that neither iOS nor Android is inherently more secure than the other OS.
In spite of the level of protection in iOS is higher, than in Android, none of these platforms are absolutely safe. The risks to enterprises allowing employees to bring in their own devices, whether iOS or Android-based, are not that dissimilar. But iOS has its own advantages, for example, non-jailbroken iOS devices can only download apps from Apple’s App Store which is strictly checked on existence of malicious software by Apple.Read more
Facebok has recently launched a new feature that tries to identify television or music content while using the device's microphone to listen to the environment when posting a status update.
To utilize this option, the user has to click the “mood” icon when starting to create a status update and the app will start listening to identify a song, a movie or a TV show. It is possible to turn off the feature by tapping the microphone icon at the top right of the screen. Facebook assures that none of the sound data is saved and the user is given the choice whether to add it to the post or not, but adding will only be possible if the program identifies the content.Read more
110 Reykjavik, Iceland