A recent patent proves Apple is working on an often-requested feature for iPad and iPhone: multiple user accounts. It’s not proof that this will be part of the next version of iOS or iPadOS, but it’s a promising sign.
Google is finally letting iPhone owners use their device as a physical two-factor authorization security key for Google services thanks to a new update to the Google Smart Lock app for iOS.
The new feature uses the iPhone’s Secure Enclave to store private keys. Now, instead of having a 2FA code texted to you, Google can send it over Bluetooth, making your accounts less vulnerable to phishing attempts and other hacks.
Apple’s refreshed Privacy website is live, giving U.S. users the ability to download all of their data from Apple. The website explains how and why Apple products are “designed to protect your privacy.”
Apple stresses that “your data belongs to you” and insists that it never sells users’ info to advertisers or other organizations.
The website even gives users the ability to delete an Apple account — and all associated data — if desired.
Over the last five years, biometrics has evolved from the stuff of crime scene investigation and science fiction movies to a broad set of technologies that make our lives easier, more personal, and more secure. Starting with the Touch ID sensor in the iPhone 5s, Apple led the way in the acceptance and adoption of biometrics.
The latest indications are that Apple is embracing a face-recognition approach that goes beyond a standard 2D, visible-light sensor. When used in a situation where there are only a handful of approved users, like a consumer mobile device, the promise is great.
Apple’s supposedly impenetrable security chip found inside iOS devices has been penetrated.
A hacker has released what is claimed to be a decryption key for the Secure Enclave Processor (SEP) that handles things like Touch ID and password verification. But we shouldn’t worry about the security of our Apple devices being compromised… yet.
In an unprecedented talk, Apple plans to give the world an in-depth look at the security features on iOS 10 at the Black Hat USA 2016 conference where hundreds of the top computer security professionals from around the world will gather.
The keynote will be given by Apple Engineer Ivan Krstic who will give technical details about three iOS security mechanisms, including the new Auto Unlock feature that is brand new in iOS 10.
Do you know how many times a day you unlock your iPhone? Every time you do, you’re participating in Apple’s user-friendly encryption scheme.
Friday, the company hosted a security “deep dive” at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we’re less concerned with how Apple’s standards work than the fact that they do and will continue to. But that’s kind of the point behind the whole system — Apple designed its encryption system so that we don’t even have to think about it.
Apple is in the midst of an all-new controversy, thanks to the mysterious “Error 53” message that is bricking iPhones without warning.
The problem can hit DIY types or anybody who has ever had a Touch ID sensor (or other iPhone hardware) replaced by a repair shop not authorized by Apple. When they update iOS, the device locks down, displaying the cryptic Error 53 message and rendering the iPhone virtually worthless.
Apple says Error 53 is actually a security feature of iOS 9 that keeps your personal information secure, but customers aren’t convinced. Cult of Mac talked to iPhone repair and and parts experts to find out what exactly is going on. The truth is that Error 53 has plagued many iPhone owners, not just those who have replaced Touch ID — and it’s not totally clear why.