OS X Mountain Lion added some new security features to an already fairly secure operating system (not perfect, we know!). One of these features is an alert you get when you use an app that wants to access your Contact information from the Contacts app on your Mac. When you see this, you’re able to allow or deny that app access to your contacts – this is there to help make things a bit more transparent, and hopefully more secure.
Once you’ve given that access, however, that app gets tracked as one that can always access your Contacts info. If you want to change that access, today’s tip will help.
The release of iOS 6 just weeks away. The new release includes a range of new features. Some seem tailor-made for business use like the new VIP contacts feature in Mail. Others are clearly designed for a mass-market consumer audience. Even those consumer-oriented additions have a lot of potential for use in the office, however.
Yesterday, Instagram launched version 3.0 of their iOS and Android app. Along with some new UI improvements, the coolest thing about the update is the new Photo Maps feature which allows users to organize photos via geo-location data to provide more interesting narratives for their followers.
The new Photo Maps feature is great, but it comes with some privacy concerns. Private user photos that are added to a Photo Map are viewable to any Android Instagram user thanks to a bug in the 3.0 update.
School technology policies are often restrictive, but circumventing them can be dangerous for teachers and students alike.
One of the challenges of 21st century education is determining the appropriate ways to use technology in the classroom. That’s a challenge that each school or district needs to confront in its own way. One thing that is universal, however, is that the policies and processes put into place around technology need to come from an ongoing dialog between teachers, school administrators, and IT professionals.
While some schools may have restrictive policies, those policies are emblematic of the community to which the schools belongs. They are the policies that the school itself and the parents of its students feel are needed to protect its students. Those policies also teach students what is acceptable behavior and how to protect themselves in the online world.
Cloud computing has great potential for schools, but isn't without some pitfalls.
The summer break is winding up and many teachers are getting ready to head back to work for another school year (and many IT staffers in those schools are trying to make sure everything’s ready when those teachers return). Over the past several months, many schools and their IT departments have been struggling to keep spending down while also delivering a 21st century learning environment. That discussion has largely focused on how to most cost effectively deploy iPads, new MacBooks, and other technology systems.
One approach to that dilemma is moving away from traditional software purchasing and towards enterprise cloud solutions. That approach may give schools more control over expenditures and offer other advantages, but it also has downsides including the potential to raise costs and degrade the education experience.
So, there’s a new app out there for the iPhone that will let you create a temproary number that routes to your real phone number, and can be set to stop working, or “burn,” after a set amount of time. Basically, the free Burner app comes with enough credits to create a temporary phone number called a mini-burner that expires after 20 minutes of talk time and/or 60 text messages, or after 7 days. Or you can burn it sooner.
Inbound and outbound calls use up your actual phone plan minutes and/or texts, but the actual identity of the caller and callee are kept private. You can then buy more credits, in various tiers starting at 3 for $1.99. These can be used to buy burner numbers of different lengths, or to extend burners you’re currently using.
Yeah, we all want to think we’re James Bond, but the reality is probably more mundane. Or, you know, way to hook up anonymously (possible NSFW link). As the iTunes description says, “** What will you use Burner for? **”
Has this happened to you? You’re out and about with friends, and a text message (or iMessage) hits your iPhone. Being a serious iPhone user and Tweeter, of course, you’ve left your iPhone out on the tabletop. Unfortunately, the text message that shows up on your screen isn’t very flattering to the friend sitting immediately to your left. She sees it, gets upset, storms off. Nobody wins.
With a quick trip to Settings, however, you can prevent this tale of tears and keep your iMessages for your eyes only. Here’s how.
Clueful helped identify "misdemeanant apps on your iPhone," but now it's gone.
Clueful, from antivirus experts Bitdefender, is a great little app for iOS that tells you which of your apps are accessing your personal data, and exactly what data they may be interested in. We wrote about it back in May when it first hit the App Store, and I liked it so much that I included it in one of my must-have apps roundups.
But it seems Apple wasn’t so keen, because it has now yanked Clueful from the App Store, and no one knows why.
Do you know which apps are accessing your personal data?
Antivirus software specialist Bitdefender has found that nearly 19% of iOS apps access your address book without your knowledge — or your consent — when you’re using them, and 41% track your location. What’s most concerning is over 40% of them don’t encrypt your data once it has been collected.
That’s all going to change when iOS 6 makes its debut later this year, however.
No matter how careful you think you are, there’s always a chance that when you send an e-mail, text message, or make a call on your iPhone, someone could intercept it. For those who are concerned about security on their phones, a new suite of applications called Silent Circle will provide just the peace of mind you need to use your iPhone without worry.
The iOS6 beta brings much finer-grained controls to the privacy settings, letting you specify just what services any app will have access to. Previously you’d get an alert whenever an app wanted to know your location. Now you’ll see the same kind of alert when apps ask to use data from your calendars, contacts, reminders and photos.
Massive data breach exposes 6.5 million LinkedIn passwords
Professional social network giant LinkedIn has acknowledged that it is looking into a massive data breach. As a result of the breach as many as 6.5 million user accounts may have been compromised. Account data including login information and passwords have been leaked and posted to a Russian hacker site. Although LinkedIn hasn’t confirmed the breach or detailed which accounts might have been impacted, the fact that the company is acknowledging the potential threat and investigating it is a big cause for concern.
At this time, it’s better to err on the side of caution.
If you use LinkedIn, you should consider that your account data has been compromised and change your password immediately.
Does Siri belong in the workplace? If so, is it worth potential security and privacy issues?
The news that IBM bans Siri for every employee that has an iPhone 4S and participates the company’s BYOD program unleashed a lot of discussion about whether the company was being paranoid or prudent. One of the bigger questions to come out of all that discussion was a reframing of the issue itself – does Siri have a place in the business world to begin with?
Setting aside the security and privacy issues that led IBM to ban Siri, are there compelling use cases for Siri in the workplace? If there are, do they outweigh the privacy and security concerns? Could Apple do more to make Siri business-friendly?
Personal clouds can cause professional headaches in the workplace
One of the challenges that the BYOD and consumerization trends are creating for IT departments is employee use of public and/or personal cloud services. We’ve covered some of the big challenges this presents in terms of data security and ownership as well as the potential business continuity problems stemming from multiple versions of documents stored across different cloud services by multiple employees.
IT concerns may be more common and well-known, but there are cloud-related issues that employees need to consider as well – particularly if they use a work email address to register for a service, access a service from work, or use a service to store or transfer work-related files.
Executives and senior managers are the most likely to ignore security guidelines
The biggest challenge for many business when dealing with the consumerization of IT and BYOD trends is often cultural. IT needs to cede control of devices, app choices, and where/when employees and executives actually interact with corporate data. That’s a cultural shift for IT. There’s an equal cultural shift that needs to happen when it comes to users and executives who must take at least partial responsibility for keeping their iPhones, iPads, or other devices secure along with the business data on them.
This requires user education and solid communication between users and IT. To be truly effective, security policies need to be endorsed by senior management and adoption and understanding of them needs to follow from the top down through the organization.
Unfortunately, that isn’t what’s happening in many businesses. In fact, the people most likely to ignore or violate such policies are C-level executives, members of the board of directors, and even IT.
Apple has gotten a fair amount of flack over Siri – most of it relating to Siri not recognizing words or phrases, misinterpreting requests, or providing incomplete or inaccurate answers. Apple is even facing a class action lawsuit over Siri not working as promised by iPhone 4S ads.
For IBM, however, the concern isn’t that Siri won’t work as advertised. Big blue is worried that Siri will work exactly as advertised and that confidential and sensitive information will leak outside IBM’s network as a result. For those reasons, the company disables Siri on the iPhones of its employees.
So I don’t know if you have kids or not. Or a wife, or husband. Or a boyfriend or girlfriend. If you do, you might share your iPhone, or at least your iPad. I know I pass my iPad to my kids often. They’re usually more interested in the games I have downloaded on it, but my son has been known to occasionally drop into Safari to look for Minecraft videos.
Anyone using your iOS device has the same access to the browsing you’ve done on the web via mobile Safari as you do. You may not want to share all your browsing history with your children or significant other, am I right?
Here’s a private web browsing app for today’s tip, then.
iPhones and iPads increasingly subjects of forensic investigations
When most of us here words like forensics, we picture an episode of CSI or NCIS. We think of ballistics results form a murder scene or fingerprints on a gun. An iPhone or iPad isn’t the first automatic visual that comes to mind. Yet more and more iPhones and iPads are becoming the subjects of forensic investigations according to warrants issued via the U.S. federal court system.
Discarded hard drives often have residual personal data on them.
Many of us pass our Macs and some external devices on to others when we upgrade. Family and friends may get our hand-me-downs, but quite frequently we’ll sell an old Mac, printer, or external drive on eBay or some other venue. Regardless of where our computers and related technology end up when we outgrow them, it’s important to make sure we scrub any personal data from them.
The importance of securely erasing personal and/or business data from hardware that is being passed on, sold, or even recycled was highlighted in a recent study by Britain’s Information Commissioner’s Office, which discovered that half of all used hard drives contained information from their previous owners.
Google could easily amass a good deal of data on users of its expected cloud storage service
There have been rumors circulating for some time about Google releasing its own cloud storage service. According to reports, the service is on the verge of release a launch expected next week. Google’s service will enter a crowded market of cloud providers that includes Apple’s iCloud, Box with its new OneCloud feature, and the popular Dropbox.
Public cloud services like these tend to concern business and IT leaders because of the ease with which data migrates out of the office when they’re widely used. A Google service is likely to engender even more privacy and confidentiality issues on the part of businesses – and for good reasons that should concern anyone considering using it.
This unique string of alphanumeric text attached to every iPhone and iPad is the source of a lot of privacy concerns.
Many of us feel a deep personal connection with our iPhones, and small wonder: the average person’s smartphone knows more about them than their spouse or significant other. Our iPhones hold our contacts, photos, videos, music, banking data, texts, emails, voicemails, web logins, apps and more. We use our phones to pay our bills, send texts to our girlfriends, check-in to our favorite club, play games with friends, and much more besides.
That makes our iOS devices a juicy target for tracking, and what most people aren’t aware of is that, historically, Apple has made it very easy to anyone to tell what you do with your iPhone. It’s called a Unique Device Identifier or UDID. Every iOS device has one, and using it, third-parties have been able to put together vast databases tracking almost everything you do with your iPhone, iPod touch or iPad.
The good news for privacy advocates is that the days of UDID are numbered. Following the recent stink the U.S. Congress raised over how iOS apps handle a user’s personal information without permission, Apple has given an ultimatum to third-party App Store developers: either stop tracking UDIDs or get kicked out of the App Store. Now ad networks and developers are scrambling to agree on a way to track your device in the future.
But are these replacements any good, or do they pose even bigger privacy concerns than UDIDs did?
Cult of Mac interviews Girls Around Me developer i-Free about the controversy surrounding their app.
Last week, we stirred up a maelstrom of controversy when we posted about Girls Around Me, an iOS app that allowed you to locate and view publicly available information on women in any area.
Since we posted the story, over half a million people have come to our site to read about the app, over 65,000 people have shared it on Facebook, and leading publications at home and abroad have followed our lead in reporting on the app, which we described as not just as a potential tool for rapists and stalkers that was putting thousands of women at risk without their knowledge, but a wake-up called about privacy.
Girls Around Me has since been pulled from the iTunes App Store, but considering we were the ones who stirred up so much trouble for the app’s Russian-based developer, i-Free, I thought we would reach out and give them the opportunity to set the record straight. What was i-Free thinking when they released this app? What do they make of the controversy surrounding it? Do they have any regrets? And will Girls Around Me come back?
i-Free’s responses to these questions might prove to be just as controversial as the app itself. The company denies having done anything wrong. They say it is “impossible” to stalk or track someone with their app. They say that the point of the app is just as much about avoiding ugly women on a night out as it is about looking for love. And they’re not sorry.
Foursquare doesn't ever want you thinking about not doing this. That's why you definitely should.
When we broke the story on Friday about Girls Around Me — an iOS app by Russian-based app developer i-Free that allowed users to stalk women in thee neighborhood without those women’s knowledge, right down to their most personal details — Foursquare was quick to respond within hours, cutting off the API access that the app relied upon to function.
Foursquare’s swift response to the issue effectively killed Girls Around Me, and i-Free quickly yanked the app from the App Store in the aftermath until they could figure out a way to restore service. And for a lot of people, the story ended there. The app’s gone. Why keep talking about it?
That’s exactly the way Foursquare (and Facebook) wants things.
Creepy stalking apps aren't going anywhere, but you can cut off their sources
Thanks to a great article by our own John Brownlee, we now know how easy it is for apps and people to stalk you using location-sharing services like FourSquare and Facebook. And now the more paranoid among you might be wondering, just how do I turn these things off?
Theoretically, you would have already checked the privacy settings when you signed up. But that’s like reading the manual before you switch on a new gadget: Almost nobody ever does it. So here’s a quick guide to locking down FourSquare, and a rather more involved guide to shutting down Facebook.
This app is meant to all be in good fun, but it's potentially a weapon in the hands of stalkers.
“Boy, you sure have a lot of apps on your phone.”
“Well, it’s my job.”
“What’s your favorite?”
“Oh, I love Daisy Slots, with so many casino games options, I couldn’t choose. But hey, want to see one to set your skin crawling?”
It was the flush end of a pleasurably hot day — 85 degrees in March — and we were all sipping bitter cocktails out in my friend’s backyard, which was both his smoking room, beer garden, viticetum, opossum parlor and barbecue pit. I was enjoying the warm dusk with a group of six of my best friends, all of whom seemed interested, except for my girlfriend… who immediately grimaced.
“Girls Around Me? Again?” she scolded. “Don’t show them that.”
She turned to our friends, apologetically.
“He’s become obsessed with this app. It’s creepy.”
I sputtered, I nevered, and I denied it, but it was true. I had become obsessed with Girls Around Me, an app that perfectly distills many of the most worrying issues related to social networking, privacy and the rise of the smartphone into a perfect case study that anyone can understand.
It’s an app that can be interpreted many ways. It is as innocent as it is insidious; it is just as likely to be reacted to with laughter as it is with tears; it is as much of a novelty as it has the potential to be used a tool for rapists and stalkers.
And more than anything, it’s a wake-up call about privacy.