It’s not exactly the Enigma Machine, but it’ll do the trick! Photo: Mobile App Hacker’s Handbook
Touch ID might be a more convenient and secure security implementation than PIN codes, but for now at least PINs are sticking around — which makes your iPhone vulnerable to anyone who gets their hands on it.
Of course, your iPhone only gives you a certain number of failed guesses, which means that unless the hacker somehow quickly guesses the correct code out of the 10,000 possible combinations, your iPhone’s contents remain safe.
A new video which has surfaced online, however, shows off a brute-force machine capable of trying every possible four-digit numerical combination in turn, while also resetting your iPhone to try again when it runs out of attempts. You can check it out below.
Yahoo is stepping up its security game. Photo: Yahoo
Passwords are easy to forget. They’re even easier to steal. Now Yahoo has unveiled a new scheme to make permanent passwords as outdated as Morse code.
Yahoo is rolling out its “on-demand” email passwords that utilize phone notifications so you’ll never have to memorize a password again. It works kind of like two-factor authentication, except you don’t ever have to type in your primary password.
The CIA is gunning for Apple’s security. Photo: Spy vs. Spy
The CIA has been been involved in a multi-year effort to crack iOS security, according to new information provided to The Intercept by whistleblower Edward Snowden. The attempts have been the focal point of multiple yearly CIA conferences called “The Jamboree.”
Among the possible solutions proposed include a means of “whacking” Xcode, the software used to create apps for iOS and Macs. Researchers claimed they had discovered a means by which Xcode could be manipulated to allow devices to be infected, so as to allow for the extraction of private data — thereby creating a “remote backdoor” that would disable core security features and allow undetected access to Apple devices.
The NSA has just hacked 2 billion SIM cards around the globe. Photo: Wikicommons
That iPhone in your hands? It’s been compromised by the National Security Agency through its SIM card, and government spies can access your phone through a backdoor installed on it without even needing a court order.
Sound scary? It is, and it’s the latest bombshell to be dropped by American whistleblower Edward Snowden.
Spotlight Search could also shine a light on your personal details. Photo: Jim Merithew/Cult of Mac
Apple is normally pretty hot on security, but a new glitch discovered in OS X Yosemite’s search threatens to expose the private details of Apple Mail users — including IP addresses, and more — to online spammers and phishers.
The privacy risk occurs when people use Spotlight Search, which also indexes emails received with the Apple Mail email client. When performing searches on a Mac, Spotlight shows previews of emails and automatically loads external images in the HTML email.
Don’t let online hackers get into your home … directory. Photo: Scott Schiller/Flickr CC Flickr
We all make compromises daily when it comes to online security. Everybody wants to be safe and secure when making purchases online, but practically none of us do everything necessary to keep our data secure.
“People, myself included, are basically lazy,” web developer Joe Tortuga told Cult of Mac, “and ease of use is inversely related to security. If it’s too difficult, then people just won’t do it.”
With all the recent hacks into private as well as corporate data — like the credit card grab from Home Depot and the hack into Sony’s files, there’s no better time to learn some of the things we all can do to protect ourselves. We spoke to some online security experts to get their advice.
This post is brought to you by IdeaSolutions, creator of KYMS.
What better way to keep your media safe than to encrypt your files and hide them behind an iOS app that appears to be nothing more than a stylish calculator? KYMS (Keep Your Media Safe) encrypts all your multimedia files, photos, documents, passwords and much more, then stashes them inside a military-grade vault that’s hiding in plain sight.
Google has launched a new online tool that allows users to see all the devices that have logged into their account in the last 28 days. If you have suspicions that someone may be logging into your Google account without your permission, you can log in and quickly identify any unauthorized access from computers and mobile devices.