Find My iPhone was first released in June 2010 initially for the iPhone. Now, Find My iPhone allows you to track the location of your device, be it an iPhone, iPad or iPod Touch, in case it gets lost or stolen. This is a great benefit because when you locate your device using Find My iPhone, the device makes noise until it is found and will show you were it is located using Apple Maps. Recently, the police used Find My iPhone to track and save a woman’s life. However, Find My iPhone did require the device to be turned on and connected to the internet in order for it to work completely. New with iOS 8, you have the option to automatically send the location of the device to Apple when the battery is critically low. In this how-to I will discuss how to set up Find My iPhone, and how to use Find My iPhone.
Apple appears to be aiming to tempt Android and Windows users to try out its iWork apps, making Pages, Numbers and Keynote for iCloud available to anyone, with no requirement to own an Apple device. A new banner promoting the offer was last night added to the iCloud beta site, beta.icloud.com … Read more
More than four months after Tim Cook promised emailed login alerts and the reintroduction of two-factor authentication in the wake of the high-profile celebrity iCloud hacks, five Apple logins remain unprotected by the system. Hackers of NY founder Dani Grant used videos to demonstrate each of the vulnerabilities in a blog post.
Grant showed that two-factor authentication isn’t needed when using an unknown Mac to login to iMessage, iTunes, FaceTime, the App Store or Apple’s website. According to Grant, only one of the five services sent an email notification advising that an unknown device was used to log in … Read more
Password managers are a great way to have strong, unique passwords for each website you access – but vital as it is these days, there’s no denying that it’s a chore to change them. Dashlane, a Mac and Windows password manager app, aims to take away the pain by doing it for you automatically across 50 top US websites like Apple, Amazon, Dropbox, Facebook, PayPal, WordPress and Twitter.
Importantly, the app can even cope with sites that employ two-factor authentication to login or change a password, prompting you for the code when required … Read more
Before Family Sharing, there was Home Sharing, which allowed you to share apps and media with your family by having an Apple ID that contained the purchases to be used on up to five computers and an unlimited number of iOS devices. For your family to make purchases with that Apple ID, they either know the password to that Apple ID (which also means they can access your passwords, credit card information, documents), or they have to go to the account holder every time they want to purchase an app or music.
Now with iOS 8 there is Family Sharing and it does not require sharing an Apple ID. Instead your family of five (six including yourself) each have their own Apple ID with the same credit card and can download apps and iTunes. Your family does have to have their Apple ID based in the same country. Also, parents can approve their kids’ purchases right from their device. Besides managing the App Store and iTunes purchases, Family Sharing can help you track where your children are using Find My Friends and can help find their lost devices using Find my iPhone.
Family Sharing also allows you to easily create a shared family calendar and shared family reminder list that anyone in the family can view and edit. It also creates a shared family photo album. In this how to, I will discuss how to set up Family Sharing and how to use it.
Last night we reported that several Mac and iOS users were finding their devices remotely locked by hackers who had gained access to the users’ Find My iPhone accounts and demanded a ransom to return the devices to a working state.
Today Apple issued a statement on the problem, noting that—as suspected—the iCloud service itself was not actually breached, but individual user accounts may have been compromised through password reuse or social engineering:
The Sydney Morning Herald reports that several Australian Mac, iPhone, and iPad users are finding that their devices have been locked remotely through Apple’s Find My iPhone service by someone using the name “Oleg Pliss.” The hacker (or hackers) then demand payments of around $50 to $100 to an anonymous PayPal account in order to restore the devices to their owners.
An active thread on Apple’s support forum was started yesterday as users started to discover that they had been targeted by the attack. According to that discussion, users are finding all of their devices locked at once rather than a single device per user. Based on that report and the fact that Find My iPhone is being used to hold the devices hostage, it seems likely that the perpetrator has gained access to these users’ iCloud accounts—possibly through password reuse by those users—rather than some device-specific malware or hack.
At the onset of its mobile-ad business, Apple extended olive branches to a select group of brands, promising premier reach. But advertisers pushed back against its pricey offerings. Now, it appears Apple has concluded money in mobile ads comes from a wide net; in short, it’ll look more like Google.
Previously, iAd Workbench users had to at least be enrolled in Apple’s $99/year registered developers program, but now opening an iAd Workbench account will only require an Apple ID which is free to create with any Apple service or device. Ad Age reports that customers using iAd Workbench can choose between payment based on cost-per-click or cost-per-thousand impressions, although rates are currently not clear. Read more
Update: EA said in a statement that it’s investigating the reports (via TheVerge):
“Privacy and security are of the utmost importance to us, and we are currently investigating this report… We’ve taken immediate steps to disable any attempts to misuse EA domains…”
According to a report from internet security and research company Netcraft, hackers have compromised an EA Games server and are currently using it to host a phishing site that steals Apple IDs and more from unsuspecting users. The company published its report today and says it contacted EA yesterday to report the discovery, but as of publishing the compromised server and the phishing site stealing Apple IDs were still online.
Netcraft claims the phishing site being hosted on EA’s servers not only asks for an Apple ID and password but also the user’s “full name, card number, expiration date, verification code, date of birth, phone number, mother’s maiden name, plus other details that would be useful to a fraudster.” Netcraft also reports that EA Games is being targeted in other phishing attacks that are attempting to steal user data from its Origin game distribution service: Read more
Back in May of last year, a long list of readers in countries around the world reported having access to Apple’s two-step verification security feature for their Apple ID. Shortly after the news broke, the feature disappeared in many countries signaling it had been launched prematurely. The only officially supported countries listed on Apple’s website included the “U.S., UK, Australia, Ireland, and New Zealand.” However, today the feature has appeared in several new countries including Canada, France, Germany, Japan, Italy, & Spain. Apple has also updated its support pages for two-step verification here and here to list the new countries.
The German hacker who successfully defeated Touch ID using a fingerprint lifted from the back of an iPhone has posted a video showing exactly how it was done.
While the hacker – who goes by the nickname Starbug – described the attack as “very straightforward and trivial,” he revealed in an email interview with arsTechnica that it required 30 hours of work using a scanner, high-res laserprinter and a printed circuit board etching kit.
It took me nearly 30 hours from unpacking the iPhone to a [bypass] that worked reliably. With better preparation it would have taken approximately half an hour. I spent significantly more time trying to find out information on the technical specification of the sensor than I actually spent bypassing it.
I was very disappointed, as I hoped to hack on it for a week or two. There was no challenge at all; the attack was very straightforward and trivial.
Should 5s owners worry that, now that the technique is known, it could be replicated in 30 mins? The answer is ‘it depends, but probably not’ … Read more