WireLurker was only the beginning; there's now a new iOS vulnerability in town for hackers seeking access to your iOS files. It's called the "Masque Attack," according to the FireEye security team, and as with WireLurker, it focuses on getting users away from Apple's carefully curated App Store in the hopes that they'll download the latest malicious dish of the day. And just like WireLurker, it works with both secure iPhones and jailbroken devices.
It looks as though FBI Director James Comey, long a critic of the iPhone's security measures, may at last have something to cheer about. Today a circuit court judge in Virginia ruled that the fingerprints used to access an iPhone through Touch ID aren't protected by the Fifth Amendment, thus allowing law enforcement officials to access the devices of suspects.
We're back with another round of apps ready for iOS 8, including several new entries as well as updated titles that have been improved to make the most of Apple's new mobile operating system. This time includes a couple of camera extensions, a more robust alternative to Google Authenticator, a pair of iCloud Drive-friendly Readdle updates, and lots of manual camera tweaks made possible by iOS 8. Eight (technically nine!) of the best and brightest are just a click away!
Recent revelations about government snooping and security holes in software mean the safety of files and personal information is high on the agenda right now. For most, the chances of keeping government-level secret data on your Mac is slim. However, there’s still a lot of information and data to protect. Step forward Hider 2, which offers a secure and simple way to protect your files and folders.
Leaks from the iPhone supply line over in China have become so common in recent years that covering them is now routine, but at last Apple supplier Foxconn is taking steps to crack down on some of them. One of the alleged culprits behind the leaks of the shell of the iPhone 6 is now in custody for selling the shells on the black market.
Being robbed is incredibly stressful, especially if you lose your Mac, but with Orbicule’s Undercover installed you stand a decent chance of getting it back. Simply log in to your account at undercoverhq.com and report your computer as stolen, and this lightweight, invisible app will then begin gathering evidence as soon as it’s used or goes online.
Every Monday we show you how to do something quick and cool using built-in OS X utilities such as Terminal, Apple’s command line application. These easy hacks can make life better and simpler, and don’t require any knowledge of coding — all you need is a keyboard to type 'em out!
Securely storing certain information in the universal PDF format can be a good thing — after all, your bank, insurance, or other personal information could be contained within PDF documents. That information, if it got into the wrong hands, could compromise your personal security. Lock down your PDF documents using this simple trick in the Preview application.
We've got a little bit of iPhone 6 news coming your way, but if you've heard what they're saying in Thailand, you already know some of it. But what about those sapphire crystal displays? Who's going to get those? You? Your rich relatives? Well, let's see what the rumor mill is going on.
Closer ever closer we creep to a potential release date for the newest iPhone. Will it look like these mockups? Probably, as despite Tim Cook's promises, leaks are endemic up and down the supply chain. And have we seen what the newest iPad Air will look like too? Yeah, probably that too. Nevertheless, there are still some Cupertino surprises we haven't anticipated, but let's take a look at some that might not be surprising anymore, as well as some other news percolating out there in the wide, wide world.
When you first set up your Mac, the only security measure that’s enforced is that you add a password to your user account. The Setup Assistant makes no mention of extra measures you might want to enable, even though several are built into OS X. The features we’re about to look at are defenses against local attacks, rather than protection against online attacks. The measures are particularly important if you work in an open environment, such as a library, an office, or a café, and if your Mac is stolen, because they help to keep your data under lock and key.