The Chaos Computer Club, Europe’s largest collective of hackers, claims that Apple rejected the group’s streaming video app — which would allow users to watch talks from its Chaos Communications Congress event.
Why? Because members of the conference had previously hacked iOS, and Apple doesn’t want to help spread the hacking word.
The Chinese are so good at cloning Apple’s upcoming products that they regularly release fully functional doppelgangers of the next iPhone before Apple has even officially announced it. But these are ‘clones’ in only the vaguest sense, because they always have one major problem: they run Android, not iOS.
But that’s not true with this iPhone 6 clone. Although it looks exactly like an iPhone 6, it appears to be running iOS 7, not Android.
The Federal Bureau of Investigation needs to hire more hackers — and that means changing the rules about how much pot you can smoke on the job.
“I have to hire a great work force to compete with those cybercriminals, and some of those kids want to smoke weed on the way to the interview,” FBI Director James B. Comey told the Wall Street Journal.
The security expert quoted in the piece, Kyle Wilhoit, has just written a blog post that calls out the report, essentially saying that the hacks shown in the video can happen anywhere, and require some risky user behavior to even happen.
That’s a long way from “if [tourists] fire up their phones at baggage claim, it’s probably too late to save the integrity of their electronics,” as Brian Williams claims in the clip above.
If you’re particularly concerned about the security of your passwords, you might want to stay away from Starbucks’ official iOS app: the Seattle-based coffee maker has just confirmed that passwords, credentials and location in the company’s app are stored in plain text, and are not hashed or encrypted at all.
Last month, security researchers figured out there was a Trojan horse built into an iOS device: the charger. If a hacker wanted to, they could use a modified charger (which costs less than $45) that would install malware onto any device running iOS.
True, the hack required physical proximity — not to mention specialized hardware — to work. But it was a universal hack that worked on any device, and it could make a victim out of anyone doing something as simple as asking to borrow someone’s iPhone charger at the local Starbucks.
iOS 6.1 had not one, but two security exploits that allowed an attacker to bypass an iPhone’s lockscreen to gain access to a users’ data. Apple finally patched up those two holes yesterday with the iOS 6.1.3 update, yet the new version of iOS contains another passcode security flaw.
Using the iPhone’s Control feature, attackers can still bypass your lockscreen. The good news is that the new lockscreen exploit only works on iPhone 4 units right now.