Touch ID from Apple is a great way to safeguard your device, and a newly filed patent suggests it will also be able to help catch thieves. The patent, named ‘biometric capture for unauthorized user identification,’ is pretty straightforward.
If Touch ID detects a fingerprint that isn’t yours, it’ll store an image of the scan as a means of catching who may have stolen your phone. It may also take their picture, or a video of them trying to hack your device. Here’s the abstract description of the patent: A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions.Read more
At least two smishing campaigns have hit iOS users in the past week, with over 7,500 users clicking the malicious links and ending up on phishing pages designed to con them out of their Apple login credentials.
Intel McAfee security experts first discovered something was wrong, when their security products started picking up suspicious SMS messages from a US number. These messages had the format of an email. Researchers say that users who clicked on this link ended up on a hacked website, where a message was displayed, telling them they had to verify their account as soon as possible, or Apple would lock it.Read more
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you to devote some time to adjusting the privacy settings in your new gadget.
Location tracking and data collection are powerful features that could place your personal information in the hands of people and services you’d rather shut out. Take advantage of these tips to keep your personal data to yourself. To be clear: experts do not recommend turning off all tracking — that would mean discarding a bunch of extremely useful features. But each of these useful features comes at a price.Read more
Apple has yet to patch a vulnerability disclosed during last week’s Hack in the Box hacker conference in Amsterdam that allows an attacker with physical access — even on the latest versions of iOS — to swap out legitimate apps with malicious versions undetected on the device.
Researcher of mobile security company Mi3 Security disclosed last week during his talk at the show that an iOS mitigation for a previous attack he’d developed was incomplete and with a modification, he could still infect non-jailbroken iOS devices with malicious or misbehaving apps.Read more
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s now see what each new iPad user should know before getting started.
There are a lot of articles on the Internet, but we are focusing on some basic settings that you can tweak to protect your device without any third-party apps — and what’s important, keeping it easy to use. What is the best password? Touch ID and Passcode settings let you change your password. Most commonly, users choose four or six digits combinations as they are the most comfortable for them.Read more
Apple products are coming under increased scrutiny in China as the state is starting to ask more questions about the company's products.
The Chinese government has reportedly started to increase the number of reviews it carries out into products being sold in the country. These investigations, which target other companies as well as Apple, look into the capability of electronic devices sold in the country, and examine things like encryption and data storage. The uptick in the number of reviews by the Chinese government will be a worry for Apple as the company is trying to ensure that it has a working relationship with the state.Read more
“The software is functioning as intended,” said Amber. “Wait,” I asked, “so it’s supposed to delete my personal files from my internal hard drive without asking my permission?” “Yes,” she replied.
I had just explained to Amber that 122 GB of music files were missing from my laptop. I’d already visited the online forum, I said, and they were no help. Although several people had described problems similar to mine, they were all dismissed by condescending “gurus” who simply said that we had mislocated our files (I had the free drive space to prove that wasn’t the case) or that we must have accidentally deleted the files ourselves (we hadn’t).Read more
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune to threats. Is it really that secure as Apple fans see it?
The answer is: no, it isn’t. In this article we will discuss several types of attacks which are as bad for the iPhones as they are for other devices. Phishing attacks target ‘what’s between a chair and a keyboard,’ meaning the users themselves. Phishers typically prey on human carelessness or a lack of overall awareness of security issues. It might seem as if the attributes of a phishing attack are known to everyone.Read more
When the FBI bought a hacking tool to break into an iPhone, it wasn’t sure what exactly it got for its $1.3m. The FBI confirmed it wouldn’t tell Apple about the security flaw it exploited to break inside the iPhone 5C, because the bureau says it didn’t buy the rights to the technical details of the hacking tool.
The unusual declaration likely will raise only more curiosity about the FBI’s last-minute abandonment of its high-stakes court battle with Apple. The day before the two were schedule to face off in court over whether the government could force Apple to unlock the phone, the government announced it no longer needed Apple’s help.Read more
US authorities asked for user data from Apple accounts 1,015 times during the second half of 2015, according to figures the iPhone maker released Tuesday. The requests pertain to information on services such as iMessages, emails, photos and device backups.
The number of requests is up from 971 during the first half of last year and 788 during the last six months of 2014. Apple provided at least some data in response to 82% of the requests, about average for the California technology company. The requests from various US government law enforcement agencies, which are only disclosed in broad ranges, also appeared to go up during that time.Read more