Skip to main content

Security

See All Stories

Bug in iOS 13.3.1 and later keeps VPNs from encrypting traffic, but there’s a simple workaround

iPhone X status bar

A bug in Apple’s recent iOS releases, including this week’s iOS 13.4 is keeping VPNs from being able to fully encrypt user traffic and data. Apple is aware of the issue and is currently working on a fix. In the meantime, there’s an easy workaround you can use to keep your VPN connection working as intended.


Expand
Expanding
Close

iOS 13 sees 68% drop in background location tracking

[Update: $200M fine proposed] FCC investigation finds wireless carriers broke federal law by selling user location data

Just about a year ago, it came to light just how easy it was to buy the real-time location data of US wireless customers via lax carrier standards, shady third-parties, and bounty hunters. Now after an “extensive investigation” the FCC has declared that “one or more wireless carriers apparently violated federal law.”


Expand
Expanding
Close

Governments don't understand how end-to-end encryption works

Comment: It’s time for governments to learn how end-to-end encryption works

There’s an emerging health crisis at the moment, besides coronavirus: the head injuries caused by techies banging their heads on their desks at each piece of evidence that governments don’t understand how end-to-end encryption works.

The latest example of this, reported in the Guardian, was the head of Britain’s domestic counterintelligence and security agency, MI5, calling on tech companies like Apple and Facebook to continue to offer end-to-end encryption, but to provide MI5 access “on an exceptional basis”… 


Expand
Expanding
Close

Security demo reminds iOS users that any app (or widget) can read the clipboard silently

A new demo from researchers at Mysk shines a light on the free, unrestricted, access all apps have to the iOS clipboard.

In the video, the developers create a dummy app that simply prints out the information gleaned from the clipboard. When the user copies an image, the app can immediately see the image content and the metadata like the location of where the photo was taken. This becomes a little more sinister when the demo shows that installed widgets can also silently collect all data copied to the clipboard, without user knowledge.


Expand
Expanding
Close

Comment: Mac malware is growing, but there are three important riders

Mac malware is growing but

Malwarebytes is out with a new report in which it states that Mac malware is growing faster than that for Windows.

For the first time ever, Macs outpaced Windows PCs in number of threats detected per endpoint […]

In total, we saw approximately 24 million Windows adware detections and 30 million Mac detections.

That’s getting a lot of headlines today, but there are three key things that need to be understood…


Expand
Expanding
Close

Apple joins Fido Alliance, wants to replace passwords with trusted devices

Fido Alliance wants trusted devices to replace passwords

The Fido Alliance, an organization committed to eliminating the need for passwords, received a big boost last week when Apple signed up as a board member. Fido stands for Fast IDentity Online.

Apple apparently wasn’t ready to announce its support immediately, as tweets from a Fido Alliance conference were quickly deleted, but as of today, the news is official…


Expand
Expanding
Close

Despite known methods, FBI claims it still can’t unlock iPhones in Pensacola case

FBI Apple Pensacola iPhone case

In early January, the FBI asked Apple to unlock two iPhones as part of the Pensacola case. Apple stood its ground and said it wouldn’t create a backdoor for iOS but would help as much as it could without crossing that line. Even though the FBI has the ability to unlock the iPhone 7 and iPhone 5 with the help of third-parties, today it said it still hasn’t been able to get to the data on the devices.


Expand
Expanding
Close

Philips Hue vulnerability lets hacker control bulbs, could escalate to network

Philips Hue vulnerability lets hacker control bulbs

A Philips Hue vulnerability allows a hacker to take control of individual bulbs, switching them on or off at will, as well as changing both color and brightness. This can be done remotely using a laptop with radio transmitter. You can watch a demonstration video below.

While that risk remains, the company has acted to block an escalation vulnerability that previously allowed the attacker to compromise the Hue bridge and from there the rest of the network, including any PCs connected to it…


Expand
Expanding
Close

Iowa caucus app

Iowa caucus app: no security vetting, no testing, no training – NYT [U]

Update: The Iowa Democratic Party has issued a statement, below, saying that data was correctly logged but not properly reported due to a bug in the app. It also claims that it did put the app through independent security testing, contradicting the claim made by the NYT.

Failures surrounding the use of a new Iowa caucus app have seen the Iowa Democratic Party unable to promptly report the results of the first party member vote for its 2020 presidential candidates. A report on the debacle describes it as a ‘systematic disaster’…


Expand
Expanding
Close

Jeff Bezos iPhone hack: Evidence not conclusive, say other security experts

Jeff Bezos iPhone hack questioned

Doubt is today being cast on a reported Jeff Bezos iPhone hack, which was said to have given attackers full access to the photos and messages stored on his iPhone X.

The report was based on analysis by a cybersecurity firm commissioned by the Amazon founder to find out how private messages and photos were obtained by the National Enquirer


Expand
Expanding
Close

Jeff Bezos iPhone X hack gave full access to his photos and messages

Jeff Bezos iPhone X hack

A forensic analysis shows that a sophisticated attack on Jeff Bezos’ iPhone X gave full access to both his photos and messages.

The attack, and the alleged attempted blackmail that followed, led to the famous “No thank you, Mr Pecker” blog post in which the Amazon founder decided to go public about the existence of embarrassing texts and photos…


Expand
Expanding
Close

Google researchers disclose multiple privacy flaws in Safari’s Intelligent Tracking Prevention feature

Google researchers have discovered “multiple security flaws” in Apple’s Safari browser, a new report from the Financial TImes says. The flaws were found in Safari’s Intelligent Tracking Prevention feature, which is designed to protect users from cross-site tracking and other online privacy concerns, and have since been fixed.


Expand
Expanding
Close

Here’s what a $10 million lab dedicated to cracking iPhones looks like

10 million dollar iPhone cracking lab

Kicking off 2020, security and privacy is a hot topic between the latest standoff between Apple and the FBI over the Pensacola incident as well as Apple reportedly abandoning its plan to bring end-to-end encryption to iCloud backups. With an in-depth report on what a robust iPhone cracking operation looks like from the inside, Fast Company shares some fascinating details and photos of NYC’s $10 million cyber lab.


Expand
Expanding
Close