Apple enlists security team to bolster CareKit encryption

By

Screen Shot 2017-01-11 at 14.04.27
CareKit is Apple's most recent dive into mobile healthcare.
Photo: Apple

Apple has partnered with security firm Tresorit to offer CareKit developers extra privacy options. In doing so, it makes it more straightforward for hospitals to use Apple’s CareKit platform, by allowing it to more closely meet regulations about patient data.

Called ZeroKit, Tresorit’s security technology includes user authentication for patients and healthcare workers, end-to-end encryption of health data, and “zero knowledge” sharing of health data, meaning that data isn’t shared with any service as it transfers.

Floodlight Cam combines all-in-one security with simple setup

By

Ring Floodlight Cam
Floodlight Cam does it all.
Photo: Ring

CES2017 Step up your home security with the new Ring Floodlight Cam.

Making its debut at CES 2017 in Las Vegas this week, the Floodlight Cam keeps an eye on your property with 1080p video recording, motion detection and the loudest siren available on an outdoor camera. What’s more, it’s incredibly easy to install.

Europe rules U.K. ‘snooper’s charter’ is illegal

By

iPhone hack
It seems that European courts agree with Apple about government spying.
Photo: Ste Smith/Cult of Mac

The European Union’s highest court has ruled that the U.K.’s Investigatory Powers Act, aka the “snooper’s charter,” is illegal.

The EU objects to the government’s “general and indiscriminate” retention of emails and other electronic communications. While the EU acknowledges that this information can be helpful, they argue that it should only be gathered in specific targeted instances to stop terrorism or serious crime.

iOS bug exposes photos and messages on locked iPhones

By

photos in ios 10
It's shockingly easy to get into someone's photos.
Photo: Ste Smith/Cult of Mac

Hackers have discovered a new method to unlock photos and messages on any iPhone, thanks to an iOS security flaw that utilizes Siri and VoiceOver.

iPhones running iOS 8 software and newer are vulnerable to the flaw, which was discovered by EverythingApplePro and iDeviceHelp. The group revealed the hack in a new video that shows you don’t need any coding experience or special hardware to pull it off. All you need is a few minutes alone with a victims iPhone and some help from Siri.

Apple secretly logs iCloud users’ iPhone call history

By

Apple Security Jacket
Apple receives user call histories when iCloud is enabled, claims a new report.
Photo: Jim Merithew/Cult of Mac

Apple receives user call histories when iCloud is enabled, claims a new report from Russian digital forensics firm Elcomsoft.

The logs include information about calls made and received on an iOS device, along with phone numbers, dates, times, call duration, and even missed and bypassed calls — for both regular and FaceTime calls.

Hackers can use this tiny $5 device to attack your locked Mac

By

PoisonTap is tiny but deadly.
PoisonTap is tiny but deadly.
Photo: Samy Kamkar

The next time you leave your Mac unattended, make sure to turn it off.

A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.

Find My iPhone might soon work when your device is dead

By

iPhone 7 back
Apple is making it harder to steal iPhones.
Photo: Ste Smith/Cult of Mac.

Recovering your lost iPhone may get a lot easier soon, based on a patent Apple was recently awarded by the U.S. Patent and Trademark Office.

The new patent describes a method for determining an iPhone’s location after shutdown that would make Find My iPhone work even if a thief turns your device off.