Skip to main content

Security

See All Stories

Apple’s head of security speaks out against iPhone app sideloading in new interview

A new report from The Independent this weekend offers an interesting look at why and how Apple is “working hard to break into its own iPhones.” Ivan Krstić, Apple’s head of security engineering and architecture, spoke to The Independent for the report and explained why Apple feels the need to invest so heavily in security.

Notably, Krstić also addressed the possibility of Apple opening up the iPhone to third-party app stores and sideloading due to impending regulation in the European Union.

Expand Expanding Close

Apple sends iPhone hack warning to Indian opposition leader; walks tricky line

iPhone hack warning | A copy of the alert message from Apple

Apple has sent iPhone hack warnings to the leader of India’s main opposition party, alongside other politicians opposing Narendra Modi’s government – placing Apple in a potentially delicate position.

A security researcher was also alerted, and shared a copy of the alert message he was sent, in which Apple advised enabling Lockdown Mode …

Expand Expanding Close

iMessage Contact Key Verification blocks the ‘ghost proposal’ plan by government spy agency

iMessage Contact Key Verification blocks the 'ghost proposal' | Robed figure holds an object with a ghost in it

Apple’s new iMessage Contact Key Verification at first glance seems to be a rather niche security feature, likely to be of interest only to the most paranoid or highly-targeted individuals. But it could turn out to be a privacy feature which protects us all from government spying.

That’s because it seems almost custom-designed to prevent a plan developed by the UK’s equivalent to the NSA – GCHQ …

Expand Expanding Close

Apple reveals technical details behind how iMessage Contact Key Verification works

Apple launched a new iMessage security feature yesterday in beta called Contact Key Verification. We learned the basics of how it works yesterday but now Apple has published technical details of how the next-level iMessage security feature operates – including a unique solution to a problem that other messaging services face.

Expand Expanding Close

iLeakage flaw could force iPhones and Macs to divulge passwords and more

Site default logo image

A vulnerability in A-series and M-series chips could force iPhones, Macs, and iPads to divulge passwords and other sensitive information to an attacker. Security researchers have dubbed the flaw – which affects Safari on the Mac, and any browser on iOS devices – iLeakage.

In a proof of concept attack, researchers were able to obtain access to the contents of a Gmail inbox, YouTube history, and passwords auto-filled by Safari …

Expand Expanding Close

iOS 17.0.3 fixes security breach that had been actively exploited

apple zero-day exploit spyware security iOS macOS patches fixes

Apple on Wednesday released iOS 17.0.3 for iPhone users. Although the update doesn’t bring any new features, it fixes a bug that had been causing some iPhone models (especially the iPhone 15 Pro) to overheat more than usual. However, iOS 17.0.3 also comes with two important security fixes, including a fix for a breach that had been actively exploited.

Expand Expanding Close

IDC survey reports that 76% of IT decision makers believe Macs are more secure than other computers

IDC survey reports that 76% of IT Decision Makers believe Macs are more secure than other computers

Apple is constantly promoting its devices as secure due to their unique combination of hardware and software. Because of this, many companies have been opting for the Mac for their IT departments over other platforms – and a new IDC survey endorsed by Apple reveals that 76% of IT decision makers believe that the Mac is more secure than other computers.

Expand Expanding Close

Eufy security cameras can track individuals across cameras, send you one video alert

Eufy security cameras | Dual floodlight camera shown

Eufy security cameras are getting an update that allows them to track a visitor across multiple cameras, and send you a single video alert which follows the visitor between views.

A demo video shows a delivery driver dropping off a package, and one view shows them placing the package in a yard, combined with a view from a second camera which shows the driver getting back into their van at the front of the home …

Expand Expanding Close

T-Mobile reportedly suffers from its third data breach in 12 months [Update: T-Mobile retailer]

T-Mobile third major leaked data breach hacked hacker

In more T-Mobile news surely to give you déjà, déjà, déjà vu, the company has reportedly fallen victim to its third data breach this year, with over 90GB of employee and customer information stolen. And if you aren’t keeping track, it’s the company’s eighth major breach since 2018…

Update: New information suggests the data breach doesn’t affect T-Mobile itself, but an independent T-Mobile retailer called ConnectivitySource. The data from the leak “is related to an independently owned authorized retailer,” T-Mobile told 9to5Mac. “T-Mobile’s employee data was not exposed.”

ConnectivitySource is one of the company’s largest authorized retailers and operates in 38 states across the US. Around 146,109 audio recordings of customers calling stores were also collected by the hackers, claims vx-underground.

Expand Expanding Close

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing