Mobile menu toggle

security - page 23

How To Keep Apps Like Path From Accessing Your Contacts Data [Jailbreak]

By

Screen shot 2012-02-08 at 12.47.49 PM

We told you yesterday that Path was secretly uploading your iPhone’s entire address book to its servers. Users of the inclusive social network voiced concern, and many decided to remove the app entirely until Path addresses the issue in an upcoming update.

It’s common practice for third-party apps to access and even store your contacts elsewhere. The problem with Path is that there was no indication that this activity was taking place. Path’s CEO stated that the app would make the activity opt-in when the next update is pushed out.

Thanks to a brand new jailbreak tweak, you’ll never have to worry about an app silently stealing your personal contacts data again.

Path Uploads And Stores Your iPhone’s Entire Address Book On Its Servers

By

Screen shot 2012-02-07 at 4.28.03 PM

In what can only be considered the very definition of irony, it has been discovered that Path 2 for iPhone secretly uploads and stores your entire address book to its servers. In case you didn’t know, Path is a hot iOS app that offers an exclusive, confined social network experience with a limited number of people. Unlike Facebook, Path only lets you accept 150 friends, indicating the intimate, safe environment that the app creators want users to feel at home in.

Developer Arun Thampi has uncovered that Path’s current iPhone app sends all of your contacts to its servers without notifying you. Oops.

iOS Security: One Big Reason Haliburton Chose The iPhone Over Android

By

blackberry-storm-rim3

Haliburton’s decision to choose iOS as its new mobile platform was made after “significant research” indicated that iOS “offered the best capabilities, controls and security for application development,” according to a leaked memo published by AppleInsider.  These capabilities, collectively known as mobile device management (MDM) features offer a solid framework that can be used to apply a number of security policies like complex passcode requirements and that a device’s data be encrypted.  MDM features also include the ability to IT departments to restrict access to iOS features (say installing apps or taking photos) and to monitor devices remotely.  Of course, they also include the ability to remotely wipe a device if it’s lost or stolen.

 

One excellent facet of MDM in iOS 4 and iOS 5 is the ability to monitor a device.  There are a wide range of states that management software, including the Profile Manager service in Lion Server, can collect about managed devices.  This includes seeing what apps have been installed, ensuring OS updates are rolled out, and being able to tell if a device has been jailbroken.

 

While all this may sound a bit like big brother, if you’re a major energy company with operations in dozens of countries, security can be a major issue.  Of course, I could say the same thing about a medical practice needing to maintain privacy compliance.

Energy Giant Haliburton Dumps BlackBerry For iPhone

By

iphoneblackberry

In what appears to be a watershed moment for Apple’s iOS, a leaked memo published at AppleInsider indicates the one of the world’s largest energy companies, Haliburton, will be transitioning to the iPhone as its exclusive smartphone of choice. That comes as a huge opportunity for Apple and iOS, and a huge blow to RIM.

According to the memo, the move will take place over the course of the next two years, but will be a complete transition from one platform to another with no plans to continues to support BlackBerry devices once the transition has been completed.

Get Started With Your New iPad — The Right Way [Setup Guide]

By

ipad

Just got an iPad for the holidays? You lucky sod! You scored the crown jewel, the Big Tamale — the most marvelous gadget Apple has ever made. Yes, go ahead, pick up its slim aluminum frame and dive right in — Steve knew that’s what you wanted to do, and he designed the iPad so you could do just that.

We want to make sure you get everything right though, and we know there are a few key setup tricks along the way that new (and even some not-so-new) iPad users miss. So take a look at the short list of steps we’ve lined up here. They won’t take long, and they’ll make sure you get the best out of your iPad 2. Ready? Here we go.

See Forgotten Passwords [OS X Tips]

By

keychain

OS X remembers and autocompletes passwords for you, but what if you forget them? And then what if your hard disk should suddenly shake itself apart and you have to start with a fresh installation? Here’s how to view any password that OS X stores for you, for applications and websites.

Amazon’s Kindle Fire May Also Ignite Kiddie Buying Sprees

By

fire

Remember those sneaky Smurfs? The in-app iPad purchases from the free game Smurf’s Village – and dozens of games like it – had parents seeing red as their toddlers accidentally ran up credit card bills.

The Kindle Fire also has a similar problem. Kids who play about with the 7-inch tablet are just a few swipes away from Amazon’s famous 1-Click Ordering, a feature that cannot be disabled on the device. (If you haven’t disabled in-app purchases on your iPad, here’s how.)

Reuters reports that Jason Rosenfeld’s 3-year-old daughter basically bought her own Christmas presents after seeing Dad’s shopping history on the tablet.

The Passcode Lock On Your iPad 2 Is Useless If You Use a Smart Cover

By

A Colorado man believes Apple's Smart Cover infringes his patent for a portable computer case.
A Colorado man believes Apple's Smart Cover infringes his patent for a portable computer case.

I’ve got a passcode lock on my iPad 2 so that it cannot be accessed by individuals who weren’t given permission to play with it. However, I also use an Apple Smart Cover, and thanks to a security flaw in the iPad’s iOS software, my passcode lock is now useless, because anyone can use my Smart Cover to gain entry to my iPad.

Lookout Unveils Free iOS Security App

By

lookoutdashboard

How do you sell a security product to owners of devices that have no real security problem? You get into hand-holding business. That’s what it’s like for Lookout Mobile Security, a San Francisco, Calif. firm unveiling Tuesday the free Lookout for iPhone app. Kevin Mahaffey, co-Founder and CTO, Lookout Mobile Security, says his new app is all about positive reinforcement.

Any Mac With a FireWire port running OS X Lion can be hacked in minutes [Report]

By

FireWire_gniazdo

OS X Lion is being hailed by many as the most secure operating system yet, not just from Apple, but in total. In particular, its FileVault encryption rewrite is being widely hailed as one of the most secure, low-overhead ways yet to keep your data safe.

But behind all the talk, there’s a huge security hole in OS X Lion that has been present at least since Snow Leopard. Any Mac with a Firewire port is vulnerable to it, and it’s so easy to exploit that any hacker with physical access to your computer can get your password within minutes.

The FBI Has Stolen All Of Instapaper’s User Data And Some Of Its Codebase

By

fbipuertoricoraida060210

On Tuesday, the FBI seized a number of servers from DigitalOne, a Swiss hosting company that leases blade servers from a Virginia datacenter. The FBI had a warrant for only one particular server, used by a fraudulent “scareware” distributor, but the FBI ended up taking a lot more servers than the one they were actually looking for, knocking several web sites offline in the process… and making off with nearly all of popular offline reading platform Instapaper‘s user data, some of its codebase and some password encryption keys in the process.