All items tagged with "Security"

This brute-force device can crack any iPhone’s PIN code

Photo: MDSec

It’s not exactly the Enigma Machine, but it’ll do the trick! Photo: Mobile App Hacker’s Handbook

Touch ID might be a more convenient and secure security implementation than PIN codes, but for now at least PINs are sticking around — which makes your iPhone vulnerable to anyone who gets their hands on it.

Of course, your iPhone only gives you a certain number of failed guesses, which means that unless the hacker somehow quickly guesses the correct code out of the 10,000 possible combinations, your iPhone’s contents remain safe.

A new video which has surfaced online, however, shows off a brute-force machine capable of trying every possible four-digit numerical combination in turn, while also resetting your iPhone to try again when it runs out of attempts. You can check it out below.

Read the rest of this post »

Yahoo aims to kill passwords with on-demand codes

Yahoo is stepping up its security game. Photo: Yahoo

Yahoo is stepping up its security game. Photo: Yahoo

Passwords are easy to forget. They’re even easier to steal. Now Yahoo has unveiled a new scheme to make permanent passwords as outdated as Morse code.

Yahoo is rolling out its “on-demand” email passwords that utilize phone notifications so you’ll never have to memorize a password again. It works kind of like two-factor authentication, except you don’t ever have to type in your primary password.

Read the rest of this post »

CIA spends years trying to break Apple’s security

The CIA is gunning for Apple's security. Photo: Spy vs. Spy

The CIA is gunning for Apple’s security. Photo: Spy vs. Spy

The CIA has been been involved in a multi-year effort to crack iOS security, according to new information provided to The Intercept by whistleblower Edward Snowden. The attempts have been the focal point of multiple yearly CIA conferences called “The Jamboree.”

Among the possible solutions proposed include a means of “whacking” Xcode, the software used to create apps for iOS and Macs. Researchers claimed they had discovered a means by which Xcode could be manipulated to allow devices to be infected, so as to allow for the extraction of private data — thereby creating a “remote backdoor” that would disable core security features and allow undetected access to Apple devices.

Read the rest of this post »

Your iPhone has been hacked by the NSA

The NSA has just hacked 2 billion SIM cards around the globe. Photo: Wikicommons

The NSA has just hacked 2 billion SIM cards around the globe. Photo: Wikicommons

That iPhone in your hands? It’s been compromised by the National Security Agency through its SIM card, and government spies can access your phone through a backdoor installed on it without even needing a court order.

Sound scary? It is, and it’s the latest bombshell to be dropped by American whistleblower Edward Snowden.

Read the rest of this post »

iMessage and FaceTime just got a lot harder to hack

iMessages are safer from the NSA. Photo: Apple

Your iMessages are now safer from the hackers. Photo: Apple

Apple is making iMessage and FaceTime harder to hack by turning on two-step verification for both services in an effort to tighten security for iOS and Mac users.

The extra security goes into effect today and gives users an extra layer of protection against hackers or anyone else trying to log in to your iMessage account to either impersonate you or steal data.

Read the rest of this post »

If U.K. prime minister has his way, Apple will stop encrypting iMessage and FaceTime

Photo: Cult of Mac

Photo: Cult of Mac

One of the great things about iMessage and FaceTime is that it encrypts your messages automatically, making it very, very difficult for hackers to spy on the messages you send.

But guess what? If U.K. Prime Minister David Cameron gets his way, iMessage and FaceTime encryption might soon be a thing of the past.

Read the rest of this post »

Yosemite’s Spotlight glitch could reveal your details to online spammers

Spotlight Search. Photo: Jim Merithew/Cult of Mac

Spotlight Search could also shine a light on your personal details. Photo: Jim Merithew/Cult of Mac

Apple is normally pretty hot on security, but a new glitch discovered in OS X Yosemite’s search threatens to expose the private details of Apple Mail users — including IP addresses, and more —  to online spammers and phishers.

The privacy risk occurs when people use Spotlight Search, which also indexes emails received with the Apple Mail email client. When performing searches on a Mac, Spotlight shows previews of emails and automatically loads external images in the HTML email.

So why is this dangerous?

Read the rest of this post »

Your biggest online security mistakes (and how to avoid them)

Don't let online hackers get into your home...directory. Photo: Scott Schiller/Flickr CC

Don’t let online hackers get into your home … directory. Photo: Scott Schiller/Flickr CC Flickr

We all make compromises daily when it comes to online security. Everybody wants to be safe and secure when making purchases online, but practically none of us do everything necessary to keep our data secure.

“People, myself included, are basically lazy,” web developer Joe Tortuga told Cult of Mac, “and ease of use is inversely related to security. If it’s too difficult, then people just won’t do it.”

With all the recent hacks into private as well as corporate data — like the credit card grab from Home Depot and the hack into Sony’s files, there’s no better time to learn some of the things we all can do to protect ourselves. We spoke to some online security experts to get their advice.

Read the rest of this post »

Stash all your secret files in KYMS’ encrypted calculator app

Stash all your secret files in KYMS’ encrypted calculator app

This post is brought to you by IdeaSolutions, creator of KYMS.

What better way to keep your media safe than to encrypt your files and hide them behind an iOS app that appears to be nothing more than a stylish calculator? KYMS (Keep Your Media Safe) encrypts all your multimedia files, photos, documents, passwords and much more, then stashes them inside a military-grade vault that’s hiding in plain sight.

Read the rest of this post »

Here’s how to see all the devices logged into your Google account

Screenshot: Killian Bell/Cult of Android

Screenshot: Killian Bell/Cult of Android

Google has launched a new online tool that allows users to see all the devices that have logged into their account in the last 28 days. If you have suspicions that someone may be logging into your Google account without your permission, you can log in and quickly identify any unauthorized access from computers and mobile devices.

Read the rest of this post »