Dutch group of hackers named doulCi can activate blocked by means of Activation Lock function iPhones, using false iCloud servers.
Team DoulCi published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Then the device is enough to be connected to iTunes and to dump Activation Lock regularly. DoulCi system works only partially: in attempt to unblock iPhone by their method, GSM module remains disconnected because hackers have no corresponding activation keys, however they promise to correct a problem shortly. The user gets access only to device operating system and Wi-Fi.Read more
Apple has the technical ability to disclose a wide range of information about a user upon the request of the authorities – from the person’s name and contact information to their photos and e-mail content.
This refers to the new company policy of cooperation with the law enforcement agencies. If there is a valid search warrant and the serial number of the iPhone, iPod touch or iPad the Cupertino-based company may extract some types of data, even if the device has a password.
In particular, this refers to the user files created with proprietary applications. These include SMS-messages, photos, videos, contacts, and call history records. In case if the iOS-device is password-protected, the Apple cannot disclose the contents of the e-mail, calendar plans or the data of the third party applications.Read more
Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot to the right invoking the FBI, for instance, is the notice that's displayed on infected phones connecting from a US-based IP address. People in Romania and other countries will see slightly different warnings. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone.Read more
Apple's Mail app in iOS 7 is failing to encrypt email attachments, leaving user data vulnerable to hackers, a security researcher claims. Andreas Kurtz posted his findings online, saying Apple's email app in the latest version of its iPhone and iPad software is not securing files that are attached to emails.
This makes the files readily available to anyone with the proper software. The researcher said he confirmed this by trying out a method on email stored in an iPhone 4 running the latest version of iOS 7. He said he was able to find the device's email attachments unprotected, and he said he later confirmed the process on an iPhone 5s and an iPad 2. Advertisement "I found all attachments accessible without any encryption/restriction," Kurtz wrote.Read more
Now your TV could be infected by computer viruses. Technology security expert warns cyber criminals could infect millions of devices. Televisions could soon be infected by computer viruses, one of the world's top technology security experts has warned.
Eugene Kaspersky is co-founder and chief executive of Russia’s Kaspersky Lab, the world’s fourth largest computer antivirus company. He said threats will spread to the 'home environment' and televisions as internet connections make technology more vulnerable.Televisions could soon be infected by computer viruses, one of the world's top technology security experts has warned In an interview with The Telegraph he said his company's headquarters in Moscow receives 315,000 suspicious activity reports every day.Read more
Apple founder Steve Jobs was planning to wage a "Holy War" against Google a year before he died, a higly confidential email has revealed.
Jobs sent the email in 2010 to his top 100 most senior executives, in which he outlined the company's strategy for the following year.
In it, he announced that 2011 would see a 'Holy War' between Apple and Google, and outlined all the ways in which the two companies would compete – from cloud services to mobile operating systems.Read more
The first round of results are in, and so far TrueCrypt, the popular open-source encryption program, has a relatively clean bill of health. Security firm iSec Partners recently carried out the first phase of the TrueCrypt audit on behalf of the Open Crypto Audit Project (OCAP).
OCAP is the official name for the group behind istruecryptauditedyet.com, a project inspired by the revelations about the National Security Agency’s surveillance activities. OCAP was created by Matthew Green, a cryptographer and research professor at Johns Hopkins University, and Kenneth White, Principal Scientist at Social & Scientific Systems. For its report, which was released on Monday, iSec took a look at TrueCrypt’s latest Windows edition (version 7.1a).Read more
The fingerprint sensor on Samsung's Galaxy S5 handset has been hacked less than a week after the device went on sale.
Berlin-based Security Research Labs fooled the equipment using a mould it had previously created to spoof the sensor on Apple's iPhone 5S.
The researchers said they were concerned that thieves could exploit the flaw in Samsung's device to trigger money transfers via PayPal. The payments firm played down the risk. "While we take the findings from Security Research Labs [SRL] very seriously, we are still confident that fingerprint authentication offers an easier and more secure way to pay on mobile devices than passwords or credit cards," it said.Read more
Government of Russia has refused iPad in favor superseding tablets Samsung, said the head of the Ministry of communications of Russia Nikolay Nikiforov.
"It is protected in a special way devices that can be used for handling of confidential information.
Some information in the government sessions are confidential, and these devices (Samsung) fully meet these requirements and have passed the most stringent certification system" - quoted Mr. Nikiforov Agency ITAR-TASS. The Official reason "replacement" called a purely technical nature, that is, supposedly, the policy is not satisfied exclusively by the technical capabilities of equipmentRead more
Apple has released a massive update to its “iOS Security” white paper for IT professionals. It contains more information on iOS security than Apple has ever shared publicly before, including extensive details on Touch ID, Data Protection, network security, application security, and nearly all security-related features, options, and protective controls.
For the first time, we have extensive details on iCloud security. For security professionals like myself, this is like waking up and finding a pot of gold sitting on my keyboard. Along with some of the most impressive security I’ve ever seen, Apple has provided a way to make it impossible for agencies like the NSA to obtain your iCloud Keychain passwords.Read more