If you haven’t already installed Apple’s latest iOS 10.1 update, do it now. Thanks to a vulnerability in earlier release of its software, it’s possible for your iPhone, iPad, or iPod touch to be hacked using only a malicious JPEG image or PDF file.
A worrying flaw uncovered in Google Chrome makes it even easier for pirates to download movies and TV shows from the web. Google was made aware of the issue a month ago, but the company is yet to release an update that fixes it.
Sloppy coding in some popular iOS games allows hackers to give themselves and others thousands of dollars’ worth of in-app purchases for free.
The hole was discovered by developers at DigiDNA, creator of a backup tool called iMazing that allows iPhone and iPad users to access their devices’ hidden file systems. The developers found that the app backup/restore feature in iMazing 1.3 exposes weaknesses in the way games like Angry Birds 2 and Tetris Free handle in-app purchases.
To demonstrate how easy it is to hack in-app purchases using this method, the DigiDNA team tweaked Angry Birds 2 to start the game with 999,999,999 gems — the equivalent of $10,000 of in-game credits.
1Password by AgileBits is a an incredible tool for keeping your data safe. More than just a password manager, 1Password allows you to encrypt and organize a wide range of data (website passwords, non-web digital accounts, credit/debit card numbers and financial account details, software licenses, and files containing confidential information.
Those features are all well and good, but the biggest feature is 1Password’s ability to keep all that data secure in the face of brute force attacks – the kind of attacks where a piece of software simply tries combination after combination of possible passwords. Password cracking software that rely on such attacks can easily try thousands of potential passwords each second.
To find out whether or not 1Password can withstand such attacks, AgileBits tested one 1Password against John the Ripper, one of the most well-known password cracking tools.
AT&T is one of 48 carriers worldwide which have a network vulnerability that allows hackers to intercept cellular data and inject malicious content into the traffic that passes between smartphones and the websites they visit. The flaw can be used to transfer code to unencrypted pages which causes a user to perform unintended actions, like sending messages or friend requests from Facebook and Twitter. And your iPhone may be vulnerable.
Apple’s operating systems and its software are generally believed to be the best available in terms of security and stability, but a new report from Trend Micro reveals that’s a huge misconception… at least in recent months. In fact, the Cupertino company suffered more vulnerabilities during the last quarter than rivals like Oracle, Google, Adobe, and even Microsoft.