Address Book Stories December 7, 2013
Address Book Stories April 30, 2013
Today a number of reports are flowing in claiming that social network app Path is sending spam messages to people listed in the user’s address book. The issue apparently isn’t new with some Android users on Reddit experiencing the spam a few months back, while a growing number of users on Twitter today have complained of their contacts receiving both spam text messages and calls. The messages, as pictured right, say the user has photos to share on Path and urges the recipient to downed the free Path app.
Ecobee HomeKit Thermostat
Address Book Stories July 26, 2012
Morcut/Crisis Mac malware capable of monitoring location, webcam, address book, more
We told you yesterday about the Trojan named “Crisis“, also being referred to as “OSX/Morcut-A”, discovered for OS X, but it is considered low risk for users. Today, we get some more details about the trojan with security company Sophos explaining the Morcut Malware features code for controlling the following:
- mouse coordinates
- instant messengers (for instance, Skype [including call data], Adium and MSN Messenger)
- internal webcam
- clipboard contents
- key presses
- running applications
- web URLs
- internal microphone
- calendar data & alerts
- device information
- address book contents
The malware appears to have been specifically created with spying on the user as its goal. There have not been any reported cases of infected users, though, so the threat is still considered low risk.
Address Book Stories July 19, 2012
Although we are often skeptical of reports from security companies, a new report today from BitDefender highlighted just how important Apple’s new data isolation privacy initiative is in iOS. Starting with the public release of iOS 6 this fall, users will now be prompted to allow access to apps that want personal data such as contacts, calendars, reminders, and photos. However, until then, BitDefender claimed approximately 18.6-percent of the 65,000 iPhone apps included in its study can still access a user’s address book data, while 41 percent can track location.
“It is worrying stored data encryption on iOS apps is low and location tracking is so prevalent. Without notification of what an app accesses, it is difficult to control what information users give up… “We see a worrying landscape of poor user data encryption, prevalent location tracking and silent, unjustified, Address Book access.”
Address Book Stories February 16, 2012
Apple’s merging of iOS with OS X continues today with our first glimpse at 10.8 Mountain Lion, the next major OS release for Macs. Of course, in the process of bringing the best of both worlds together, some things win out. In the case of Mountain Lion, several apps and features were replaced with their iOS counterparts. Here is everything from past OS X releases that died today at the hand of Apple’s iOS-ifying of Mountain Lion:
Address Book Stories February 15, 2012
The app development world went into a frenzy when social network app Path was caught uploading users’ address book information without asking for permission last week. We already gave our view on the matter, but Forbes reported on a study by University of California at Santa Barbara yesterday that found Cydia apps leaked private data less than apps available on the iTunes App Store.
The group built a tool called PiOS that analyzes iOS apps for private data leaks. It looked at 1,407 free apps: 825 apps from the App Store; and, 526 apps from Cydia’s repository the BigBoss.
The findings indicated 21 percent of the App Store apps tested uploaded a users’ iOS device’s UDID, 4 percent uploaded location information, and .5-percent uploaded users’ address book—like Path did. When it came to the 526 apps tested on the BigBoss repo, only 4 percent leaked users’ UDID, and only one app leaked location and address book data.
Many people are under the impression that third-party apps do the majority of the uploading, but that might not be the case. Perhaps Apple’s new restriction on uploading address book information without permission will help remedy the situation.
You can view the study’s full graph after the break: