Address Book Stories December 7, 2013
Address Book Stories April 30, 2013
Address Book Stories July 26, 2012
Morcut/Crisis Mac malware capable of monitoring location, webcam, address book, more
We told you yesterday about the Trojan named “Crisis“, also being referred to as “OSX/Morcut-A”, discovered for OS X, but it is considered low risk for users. Today, we get some more details about the trojan with security company Sophos explaining the Morcut Malware features code for controlling the following:
- mouse coordinates
- instant messengers (for instance, Skype [including call data], Adium and MSN Messenger)
- internal webcam
- clipboard contents
- key presses
- running applications
- web URLs
- internal microphone
- calendar data & alerts
- device information
- address book contents
The malware appears to have been specifically created with spying on the user as its goal. There have not been any reported cases of infected users, though, so the threat is still considered low risk.
Address Book Stories July 19, 2012
“It is worrying stored data encryption on iOS apps is low and location tracking is so prevalent. Without notification of what an app accesses, it is difficult to control what information users give up… “We see a worrying landscape of poor user data encryption, prevalent location tracking and silent, unjustified, Address Book access.”
Address Book Stories February 16, 2012
Apple’s merging of iOS with OS X continues today with our first glimpse at 10.8 Mountain Lion, the next major OS release for Macs. Of course, in the process of bringing the best of both worlds together, some things win out. In the case of Mountain Lion, several apps and features were replaced with their iOS counterparts. Here is everything from past OS X releases that died today at the hand of Apple’s iOS-ifying of Mountain Lion:
Address Book Stories February 15, 2012
The app development world went into a frenzy when social network app Path was caught uploading users’ address book information without asking for permission last week. We already gave our view on the matter, but Forbes reported on a study by University of California at Santa Barbara yesterday that found Cydia apps leaked private data less than apps available on the iTunes App Store.
The group built a tool called PiOS that analyzes iOS apps for private data leaks. It looked at 1,407 free apps: 825 apps from the App Store; and, 526 apps from Cydia’s repository the BigBoss.
The findings indicated 21 percent of the App Store apps tested uploaded a users’ iOS device’s UDID, 4 percent uploaded location information, and .5-percent uploaded users’ address book—like Path did. When it came to the 526 apps tested on the BigBoss repo, only 4 percent leaked users’ UDID, and only one app leaked location and address book data.
Many people are under the impression that third-party apps do the majority of the uploading, but that might not be the case. Perhaps Apple’s new restriction on uploading address book information without permission will help remedy the situation.
You can view the study’s full graph after the break: