All items tagged with "Security"

Jumpstart a new career in IT management and security with 4 essential exam trainings [Deals]

original_2033_UltimateIT_SecurityBundle_MF-Primary

Thinking about a new career in IT management and security, but not sure where to start? We’ve made it easy. This bundle from iCollege packages together four essential certification courses that train you exactly on what you need to know. Get it for $59 at Cult of Mac Deals today—at 94% off, a deal this good doesn’t come around often.

Read the rest of this post »

How to hide your location from Facebook stalkers

Facebook may be telling people where you are.

Facebook may be telling people where you are.

Anyone you exchange messages with via Facebook Messenger could know where you’ve been at any point. Chatted with your boss? He could use a newly discovered hack to figure out your sick days weren’t spent at home.

Facebook intern Aran Khanna found he could figure out where his friends were going daily with a bit of code, based solely on whether he had Facebook Messenger conversations with them. It even worked with people he wasn’t Facebook friends with if he had been in the same Facebook Messenger chat group.

He calls this code Marauders Map, and anyone can use it. Luckily, it’s fairly simple to hide your location from potential stalkers.

Read the rest of this post »

Yes, Google can wiretap your Hangouts for the government

This text isn't the only message that's insecure. Photo: Evan Killham/Cult of Mac

This text isn’t the only message that’s insecure. Photo: Evan Killham/Cult of Mac

If you’re looking to plan a heist, you’d probably best stay clear of Hangouts: Google has inadvertently confirmed that its chat platform is susceptible to police and government monitoring.

While the tech giant usually keeps quiet about Hangouts’ security features, the revelation (of sorts) came out of an “Ask Me Anything” session Friday on Reddit that included members of Google’s public policy department and legal team. Its proposed topic was “the current status of U.S. government surveillance law reform and how Google thinks about these issues,” but the questions were less about laws or reform and more about Google’s practices.

Read the rest of this post »

How to clear credit card info from a stolen Apple Watch

Let's hope you never have to worry about theft. Photo: Jim Merithew/Cult of Mac

Let’s hope you never have to worry about theft. Photo: Jim Merithew/Cult of Mac

So, you just got that shiny new Apple Watch. It’s amazing, right?

So amazing that someone may try to steal it from you. Sure, that sucks, but it could happen.

Here’s how to clear the credit card info from the stolen device if you no longer have physical possession of your Apple Watch.

Read the rest of this post »

Serious OS X vulnerability isn’t fixed after all

Tim Cook addresses the White House Summit on Cybersecurity and Consumer Protection. Photo: White House

Tim Cook addresses the White House Summit on Cybersecurity and Consumer Protection. Photo: White House

A significant security flaw affecting OS X Yosemite hasn’t been fixed as previously thought, according to a former NSA staffer.

The flaw, known as Rootpipe, is said to have existed since 2011, and could allow an attacker to gain full control of another user’s Mac without requiring authentication.

Read the rest of this post »

Slack has been hacked

Cult of Mac runs on Slack. Photo: Jim Merithew/Cult of Mac

Cult of Mac runs on Slack. Photo: Jim Merithew/Cult of Mac

Slack, the cool new communications app that many of the world’s top companies have flocked to, just revealed that it’s been hacked.

Attackers were able to access a Slack database, the company said Friday morning. There’s no indication the hackers were able to decrypt passwords stored on the server, but Slack is immediately ramping up security efforts in response.

Read the rest of this post »

This brute-force device can crack any iPhone’s PIN code

Photo: MDSec

It’s not exactly the Enigma Machine, but it’ll do the trick! Photo: Mobile App Hacker’s Handbook

Touch ID might be a more convenient and secure security implementation than PIN codes, but for now at least PINs are sticking around — which makes your iPhone vulnerable to anyone who gets their hands on it.

Of course, your iPhone only gives you a certain number of failed guesses, which means that unless the hacker somehow quickly guesses the correct code out of the 10,000 possible combinations, your iPhone’s contents remain safe.

A new video which has surfaced online, however, shows off a brute-force machine capable of trying every possible four-digit numerical combination in turn, while also resetting your iPhone to try again when it runs out of attempts. You can check it out below.

Read the rest of this post »

Yahoo aims to kill passwords with on-demand codes

Yahoo is stepping up its security game. Photo: Yahoo

Yahoo is stepping up its security game. Photo: Yahoo

Passwords are easy to forget. They’re even easier to steal. Now Yahoo has unveiled a new scheme to make permanent passwords as outdated as Morse code.

Yahoo is rolling out its “on-demand” email passwords that utilize phone notifications so you’ll never have to memorize a password again. It works kind of like two-factor authentication, except you don’t ever have to type in your primary password.

Read the rest of this post »

CIA spends years trying to break Apple’s security

The CIA is gunning for Apple's security. Photo: Spy vs. Spy

The CIA is gunning for Apple’s security. Photo: Spy vs. Spy

The CIA has been been involved in a multi-year effort to crack iOS security, according to new information provided to The Intercept by whistleblower Edward Snowden. The attempts have been the focal point of multiple yearly CIA conferences called “The Jamboree.”

Among the possible solutions proposed include a means of “whacking” Xcode, the software used to create apps for iOS and Macs. Researchers claimed they had discovered a means by which Xcode could be manipulated to allow devices to be infected, so as to allow for the extraction of private data — thereby creating a “remote backdoor” that would disable core security features and allow undetected access to Apple devices.

Read the rest of this post »

Your iPhone has been hacked by the NSA

The NSA has just hacked 2 billion SIM cards around the globe. Photo: Wikicommons

The NSA has just hacked 2 billion SIM cards around the globe. Photo: Wikicommons

That iPhone in your hands? It’s been compromised by the National Security Agency through its SIM card, and government spies can access your phone through a backdoor installed on it without even needing a court order.

Sound scary? It is, and it’s the latest bombshell to be dropped by American whistleblower Edward Snowden.

Read the rest of this post »