A new kind of malicious software strikes at Mac OS X and iPhone users in China. Apple users in China have an active, new threat to contend with that attacks iPhones and iPads through Apple's Mac OS X operating system, a US security firm reported.
The malicious software waits for a device running iOS mobile operating system to connect via USB to a Mac laptop or desktop. The software stores adds malicious code to legitimate iOS apps. The malware attack is limited to China. The threat is new to Apple, though this sort of attack has been around since about 2003, said intelligence director. Apple did not return a request for comment.
Read moreText message spam is best ignored, but when a security researcher followed a trail of deception laid out on Apple's iMessage he became the proud owner of cheap designer accessories from China.
If you haven't gotten spam on your Apple iMessage, count yourself lucky. Spam has been ballooning on the tech giant's mobile messaging service, security researchers at CloudMark say. In May, iMessage spam made up more than 40 percent of all mobile spam. Landesman, anti-spam researcher, confirmed his suspicion that the spam came from China after buying the advertised designer-label knock-offs. They were all shipped from China.
Read moreApple issues a statement describing the restrictions it places on the collection of customer data. Responding to concerns that Apple was automatically collecting user location and search query data through its latest Mac operating system, the company issued a statement clarifying its customer data collection policies.
Customers began expressing privacy concerns about the revamped version of Spotlight search that was included in the release. The tool, which offers Google search suggestions, as well as its own Spotlight suggestions, raised the suspicion of users when Apple issued a warning on a support page.
Read moreChinese authorities are attacking users who are connecting to Apple's iCloud website in what appears to be a surveillance push to steal users' login credentials, according to a Chinese censorship monitoring group.
After the new iPhone 6 went on sale in China, connections to iCloud.com were hijacked and stripped of the usual encryption that prevents hackers and government spies from intercepting the username and password typed by someone connecting to the site. This is another example of what is technically known as a "man-in-the-middle" (MITM) attack. China has been accused of intercepting connections with a MITM attack against Github, Google, and, more recently, Yahoo.
Read moreFBI Director warned in stark terms Thursday against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.
Privacy advocates and technology experts called the concerns exaggerated and little more than recycled arguments the government has raised against encryption since the early 1990s. Likening encrypted data to a safe that cannot be cracked or a closet door that won't open, the move by tech companies to protect user communications in the name of privacy is certain to impede a wide range of criminal investigations.
Read moreA lot of people can be surprised that Steve Jobs forbid his kids from using new devices, including those that he created. During the interview Steve said: "My children haven't used it. We limit how much technology our kids use at home." It is strange to hear from the person who made devices that dictate fashion and identify trends.
It turns out that many other leaders of technology firms strictly limit the amount of time their children can spend in front of a screen. Many people didn’t know what to say about Jobs‘ answer. They somehow thought that his house is full of touch screens, but iPads and iPhones are given to guests instead of candies. But it was not so. At all.
Read moreThe word “wearable” was once merely an adjective describing an article of clothing that was easy to wear. Now “wearable” refers to a mobile device that users wear on their body, and this latter wearable was a major topic of discussion last week.
The reason for this topicality is, like last September and the September before that and so on and so forth since the dawn of iPhone, Apple held one of its special look-at-all-of-our-new-things event. This year, the centerpiece of that event was perhaps the most eagerly anticipated wearable since Google Glass: the Apple Watch. Summing up the types of people that anticipate these devices can be classified into these four groups.
Read moreApple said that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.
The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary. Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.
Read moreThe attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch’s handling of consumers’ health information. In a letter to Apple CEO Tim Cook, George Jepsen has asked for a meeting with company representatives to discuss his concerns about how personal consumer information collected through the Apple Watch will be stored.
Apple unveiled earlier this month a digital watch that will double as a fitness tracker and run a variety of apps. The company said the watches will be available next year. Jepsen wants to know whether personal and health information will be stored on the Apple Watch itself and/or on its servers.
Read moreNot so long ago these news were marked by an internet-wide newsbreak: anonymous hackers somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and publicized this material on the Internet.
Such leaks are not new, however, this one was on a massive scale. From the very beginning there was an assumption that perhaps some photos were stolen directly from celebrities’ accounts in the Apple’s iCloud. Is this possible? If so, what can be done to avoid the theft? At this time, there is no hard evidence in this case. Apple and the FBI are currently investigating and we look forward to reading the results.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland