hacking - page 2

Hackers try to extort Apple with threats of resetting iCloud accounts, wiping devices

By

Apple offers up to $1.5 million to anyone who spots a software flaw
Hackers claim they have access to up to 559 million Apple accounts.
Photo: Hackers, United Artists

Hackers who claim to have access to millions of iCloud and Apple email accounts are reportedly trying to extort Apple, threatening to remotely wipe individuals’ devices if their demands aren’t met.

Identifying themselves as the “Turkish Crime Family,” the attackers are demanding $75,000 in cryptocurrencies Bitcoin or Ethereum, or else $100,000 in iTunes gift cards. In exchange, they claim they will delete the data cache.

Apple hires renowned iPhone jailbreaker to help protect privacy

By

iPhone 7
If you can't beat 'em, hire 'em.
Photo: Ste Smith/Cult of Mac

One of the world’s top iPhone security experts and jailbreakers has decided to help Apple in its battle to keep iOS secure.

Jonathan Zdziarski, who was active in the iPhone jailbreaking community for years, revealed today that he has accepted an offer to join Apple’s Security Engineering and Architecture team.

Everything you need to know about WikiLeaks’ CIA document dump

By

The CIA has a team of more than 5,000 hackers.
The CIA has a team of more than 5,000 hackers.
Photo: Brian Klug/Flickr CC

The entire hacking arsenal of the CIA has been dumped online and the entire internet is freaking out.

WikiLeaks dropped a data bomb Tuesday with its massive document dump, which it claims is one of the biggest in history. Secrets on how the CIA hacked devices made by Apple, Google, Samsung and Microsoft are now available for all to see. But should you start freaking out just yet?

Cult of Mac talked to a number of iOS security experts to make sense of all the new info. While it’s tempting to panic, there’s a lot more you need to know first.

Cloudbleed bug may have exposed your passwords

By

Another nasty internet bug may have exposed your data.
Another nasty internet bug may have exposed your data.
Photo: Cloudflare

Get ready to change all your passwords again.

A huge new memory leak from web services company Cloudflare may have left data from thousands of domains exposed, including some very high-profile sites. Cloudflare says it fixed the problem, which was caused by a bug known as Cloudbleed, but not before users’ sensitive data got cached by search engines.

New York district attorney calls for federal law to unlock seized iPhones

By

iPhone 7 back
Law enforcement officials still want Apple to hack the iPhone.
Photo: Ste Smith/Cult of Mac

New York County District Attorney Cyrus Vance wants the Trump administration to help create federal legislation requiring Apple and Google to remove default encryption from their smartphones.

The recommendation comes from the DA office’s second report on Smartphone Encryption and Public Safety, presented by Vance at the opening of the Manhattan DA’s new cyberlab. New York County is currently sitting on 423 iPhones it can’t break into, even with a warrant, so the DA’s office is pushing for change.

Hackers can use this tiny $5 device to attack your locked Mac

By

PoisonTap is tiny but deadly.
PoisonTap is tiny but deadly.
Photo: Samy Kamkar

The next time you leave your Mac unattended, make sure to turn it off.

A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.

Ex-NSA staffer reveals way to hack Mac’s camera and mic

By

Mac App Store
You might want to put tape over your webcam.
Photo: Ste Smith/Cult of Mac

Security researchers discovered a new way to hack the Mac’s built-in webcam this week, and the method is undetectable by users.

Apple built a green LED light into every Mac with firmware-level protection that turns on anytime the sensor is tripped by unauthorized access. The security feature has become increasingly difficult for hackers to beat, but former NSA staffer Patrick Wardle found a way to piggyback on outgoing feeds and record them.

Hackers can make $1.5 million jailbreaking iOS 10

By

iPhone 7
You can make big bucks hacking the iPhone.
Photo: Ste Smith

Looking for a quick way to become a millionaire? Just try hacking the iPhone.

Software security firm Zerodium revealed today that it has raised the price of its permanent bounty on iOS zero-day exploits, giving hackers a chance to earn up to $1.5 million if their exploit meets all the requirements.

Apple is ready to pay hackers a big bounty for bugs

By

iOS 10
Apple needs help squashing bugs.
Photo: Ste Smith/Cult of Mac

Apple’s head of security and engineering architecture, Ivan Kritic, revealed yesterday that the iPhone maker is finally creating a bug bounty program that will offer rewards of up to $200,000 to security researchers who find vulnerabilities on the company’s various software platforms.

The news came during a keynote at the annual Black Hat Conference in Las Vegas where Kritic also gave attendees a behind-the-scenes look at iOS 10 security as part of Apple’s effort to become more open about its architecture in hopes of improving it.

Cops 3-D print murder victim’s finger to unlock iPhone

By

The iPhone 6's Touch ID sensor is greatly improved over the 5s &mdash for me, anyway.
At least they didn't cut his finger off.
Photo: Photo: Jim Merithew/Cult of Mac

Instead of running to Apple to unlock iPhones involved in criminal case, cops may have found a new path to get past Touch ID’s security: 3D printing fingers.

Police officers asked for aid from the lab of professor Anil Jain at the University of Michigan this year to help them recreate a murder victim’s fingerprints by 3D printing each digit so they can attempt to unlock the device, which they think may contain clues that would help solve the case.

FBI promises more litigation in its anti-encryption vendetta

By

iPhone hack
The FBI isn't backing down in its war on end-to-end encryption.
Photo: Ste Smith/Cult of Mac

Fighting Apple may, according to some, have been the FBI’s worst PR disaster in history, but even its failure to convince Congress of its goals isn’t stopping its war on encryption — with FBI director James Comey telling reporters this week that more litigation can be expected as the feds seek to hack devices.

iPhone hacking is easy, claims Indian telecom minister

By

Apple supplier is increasing its ability to build masses of iPhones in India
Has India come up with a fool-proof way to hack iPhones? Apparently so.
Photo: Ste Smith/Cult of Mac

So far this year, vulnerabilities have been exploited to help unlock the older-generation iPhone 5s and 5c, both as part of murder investigations. However, the newer iPhone 6, 6 Plus, 6s, and 6s Plus remain secure devices no government has been able to break into.

Although that record may have been broken in India, according to the country’s telecom minister.

Apple denies giving China its source code

By

Bruce Sewell
Apple's top lawyer went back to Congress today.
Photo: House Committee on the Judiciary Hearings

Chinese authorities have demanded Apple give the country complete access to its source code within the last two years, but Apple says it has refused to comply with the government’s demands.

Apple’s top lawyer, Bruce Sewell, defended the company’s position before U.S. lawmakers at a congressional hearing today, after the iPhone-maker was accused by law enforcement officials of refusing to help the U.S. government while at the same time freely giving information to China for business reasons.

Apple claims FBI hasn’t exhausted all options to hack Brooklyn iPhone

By

iPhone SE
Apple's hacking battle with FBI rages on.
Photo: Ste Smith/Cult of Mac

Apple is pushing back against the federal government’s demands to unlock another iPhone, this time related to a drug case in Brooklyn.

In a new filing posted on Friday, the iPhone-maker has asked a New York judge to dismiss the federal government’s appeal against Apple, claiming the DoJ has not proved that it has exhausted all resources to unlock the iPhone in question.

Feds can’t tell Apple how they cracked San Bernardino iPhone

By

iPhone 6s
The FBI may not legally own the process used to crack the iPhone 5c under investigation.
Photo: Ste Smith/Cult of Mac

We’ve heard plenty of bluster about how the FBI won’t tell Apple how it cracked the iPhone 5c at the heart of the San Bernardino shooting case, but there’s another possibility, too: that the Feds can’t tell Apple how it did it.

Why? Because according to a new report, citing Obama administration sources, it may not actually have legal ownership of the method in question.

Cellebrite probably wasn’t the brains behind FBI’s iPhone hack

By

iPhone hack
Israeli tech firm may not have been the ones who hacked San Bernardino iPhone.
Photo: Ste Smith/Cult of Mac

The FBI signed a $15,000 contract with Israeli-tech firm Cellebrite to crack the iPhone 5c at the heart of the San Bernardino shooting investigation. However, according to a new report, Cellebrite may not have been the ones who successfully hacked the smartphone, after all.

Instead, the Feds reportedly broke into the iPhone 5c with the aid of a group of professional hackers who discovered and brought to the bureau a previously unknown iOS flaw — letting them get around the iPhone’s four-digit pincode feature, without accidentally erasing the iPhone’s data in the process.

iPhone 5c hackers think they’re close to cracking iPhone 6

By

iPhone hack
The iPhone 6 is much tougher to hack than the iPhone 5c.
Photo: Ste Smith/Cult of Mac

Israeli tech firm Cellebrite, a.k.a. the mobile forensics firm which helped the FBI hack the iPhone 5c at the center of the San Bernardino shooting case, is reportedly “optimistic” about hacking the more secure iPhone 6.

The story in this instance involves an Italian father, Leonardo Fabbretti, wanting to access the iPhone photos, notes and messages belonging to his adopted son Dama, who passed away from bone cancer last September at the age of 13.

FBI: It’s ‘too early’ to tell if gunman’s iPhone contains useful evidence

By

iPhone hack
Was hacking the San Bernardino iPhone worth it?
Photo: Ste Smith/Cult of Mac

The FBI’s campaign against Apple has been called its biggest PR disaster in history, but were its efforts to hack the San Bernardino iPhone worth it? In the FBI’s own words, it’s still too soon to tell.

According to a senior FBI official, the organization won’t reveal what — if anything — it’s learned until it’s finished examining all the data on the handset.

Justice Department may be forced to disclose iPhone hacking secrets

By

iPhone 6 Plus_8
Your move, Justice Department!
Photo: Ste Smith/Cult of Mac

The U.S. Department of Justice briefly gained the upper hand over Apple this week when it made it clear that it was in no rush to reveal how it hacked the iPhone at the center of the San Bernardino shooting case — thereby stopping Apple from plugging that particular vulnerability.

However, it seems that Apple’s back in the driving seat after a new report reveals that the Justice Department may be compelled to reveal its hacking methods if it wants to continue with a case asking a New York court to force Apple to unlock a different iPhone handset.

Apple’s privacy policy could earn it massive fines in France

By

euros2
That's a lot of euros!
Photo: Godzimama

Although most of the attention on Apple’s privacy standoff with the government has so far focused on the United States, the U.S. isn’t the only place where Apple’s fighting with the authorities over iPhone encryption.

In France, politician Yann Galut, a member of the country’s Socialist Party, has submitted an amendment to a bill designed to strengthen the French government’s fight against terror — by arguing that Apple should pay €1 million per smartphone if it does not “promptly” agree to unlock devices when asked to by law enforcement.

John McAfee offers to hack shooter’s iPhone for FBI

By

John McAfee at DefCon 2014.
John McAfee at DefCon 2014.
Photo: NullSession/Flickr CC

Cybersecurity legend John McAfee has sided with Apple in the company’s fight against the FBI over creating a backdoor to access the San Bernardino shooter’s locked iPhone 5c.

But just because McAfee thinks Apple shouldn’t unlock the smartphone doesn’t mean he thinks he shouldn’t do it.

In an open letter regarding Tim Cook’s decision to deny the FBI request, McAfee has offered up the services of his team of superhero hackers to unlock the iPhone — and he says it will only take them three weeks.

How Apple could hack terrorist’s iPhone for FBI (if it wanted to)

By

This tool can unlock any iPhone's PIN.
Open up! The FBI wants in.
Photo: Jim Merithew/Cult of Mac

A federal judge has ordered Apple to comply with the FBI’s demands to unlock the San Bernardino terrorist’s iPhone 5c. Apple CEO Tim Cook has boldly and politely refused. However, his reason has nothing to do with whether Apple has the ability to hack the iPhone.

It simply doesn’t want to.

Apple has spent the past few years making its devices more secure by adding Touch ID and a secure element. The iPhone 5c doesn’t have Touch ID, though, so the FBI wants to brute-force unlock it by guessing the terrorist’s PIN. The problem is, iOS will automatically wipe the device after too many unsuccessful attempts — and iOS also delays how often you can guess a passcode. So the FBI created a plan for how Apple can help the bureau get around it.

Thunderstrike 2 worm can infect your Mac without detection

By

12-inch MacBook
Get yours for just $999.
Photo: Jim Merithew/Cult of Mac

Apple has touted the Mac’s resistance to viruses for decades as a selling point over Windows PCs, but a team of researchers have created a new firmware worm for Mac that might just make you want to go back to doing work on good old pencil and paper.

Two white-hat hackers discovered that several vulnerabilities affecting PC makers can also bypass Apple’s renowned security to wreak havoc on Mac firmware. The two created a proof-of-concept of the worm called Thunderstrike 2 that allows firmware attacks to be spread automatically from Mac to Mac. Devices don’t even need to be networked for the worm to spread, and once it’s infected your machine the only way to remove it is to open up your Mac and manually reflash the chip.

Here’s a preview of Thunderstrike 2 in action:

The naked truth about iCloud safety

By

Backup everything to iCloud.
Photo: Jim Merithew/Cult of Mac
Photo: Jim Merithew/Cult of Mac

By now you’ve probably heard about the avalanche of celebrity nude photos that slammed the Web on Labor Day. But amid the chaos of FBI investigations, celeb denials and Apple PR releases that say basically nothing, understanding how the attackers executed the hack — and how to prevent it from happening to you — hasn’t been so clear.

Apple recommended that all users enable two-step verification “to protect against this type of attack,” but the truth about iCloud’s two-step security is a little more complicated than Apple’s letting on, and turning it on probably wouldn’t have prevented the celebrities’ pics from getting hacked in the first place.

To help sort through the confusing mess, we’ve broken down everything you need to know about iCloud’s security and how you can use two-factor authentication and other security steps to keep some perv named 4chan from blasting your nips all over the Internet.