Earlier this week, forensic data scientist Jonathan Zdziarski made a bold claim: iOS may be vulnerable to government snooping by design. According to Zdziarski, iOS had multiple backdoors installed that made any device running the OS “almost always at risk of spilling all data,” which in turn made for some “tasty attack points for .gov and criminals.”
Apple, of course, denied having ever worked with the government to install any backdoors. But that didn’t change the fact that these unsecured services do exist, and worse, have gone entirely undocumented. But thankfully, Apple has rectified at least that last problem, penning a new support document that explains what each of Zdziarski’s snoopsome services actually does.
If you’re flying into or out of the United Kingdom, you’d better make sure your Android or iOS handset is fully charged. With the U.S. government recently announcing that all airline passengers with personal electronics devices will now be required to turn them on to prove that they work, the U.K.’s Department for Transport has announced that the same rules will now apply in the United Kingdom.
The new ruling follows reports that terrorists may be able to use phones and electronic devices as a conveyor of explosives that can get around current security checks.
Future Apple devices may be able to dynamically modify user interface elements, security levels, and other types of behavior based on location, according to a new patent application published Thursday.
Referred to as “Location-sensitive security levels and setting profiles based on detected location,” Apple’s application describes a setup in which both the hardware and software of your iPhone, iPad, and whatever other mobile devices Apple releases in future can seamlessly work together to automatically adjust various UI and device behavior settings.
Despite Apple’s claims that email attachments are safely locked away with data encryption in iOS 7, a new report has found that all your email attachments have been vulnerable and unencrypted for months.
For the second time in around one month, a major flaw has been found in popular open-source security software. The hole, which exists in the login tools OAuth and OpenID, affects many websites including Google, Facebook, Microsoft, LinkedIn, Yahoo, GitHub and others.
The flaw was discovered by Wang Jing, a Ph.D student at the Nanyang Technological University in Singapore. Jing notes that the serious “Covert Redirect” flaw can act as a login popup based on an affected site’s domain. Exploited by an attacker, affected sites may result in users losing control of their login information and personal data — including email addresses, birth dates, and contact lists.
For years Macs have had the reputation of being less susceptible to malware than PCs. According to a new report, that also holds true when it comes to iPhones.
Research by Finnish security firm F-Secure looked at reports of mobile malware detected in the first quarter of 2014. Of the 277 new threats detected, they found that 275 were aimed at the Android platform — while only one targeted iPhones. (The other was for Nokia’s defunct Symbian software.)
Ever lose something? Of course you have. How would like to keep your belongings found, not lost? With StickR TrackR you can do just that.
StickR TrackR is a coin-sized device that can be attached onto or stuck to any item – keys, remotes, bikes, luggage, etc – and works with the corresponding TrackR app to help you locate your missing goods. And Cult of Mac Deals has StickR TrackR available for a limited time for only $19.95!