Apple, Mac, iOS4,...
Follow
Find tag "Government"
9.0K views | +3 today
Apple, Mac, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Researchers reveal how to hack an iPhone in 60 seconds

Researchers reveal how to hack an iPhone in 60 seconds | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Three Georgia Tech hackers have disclosed how to hack iPhones and iPads with malware in under sixty seconds using a "malicious charger."
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Once more into the breach: How hackers compromise websites like Apple's | Macworld

Once more into the breach: How hackers compromise websites like Apple's | Macworld | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
These days, it seems that websites are hacked with alarming frequency. While even companies of Apple's sophistication and size aren't immune from successful attacks, it's not quite time to start wearing your tin foil hat--yet.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple's OS X FBI ransomware going global

Apple's OS X FBI ransomware going global | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

 

Gust MEES's insight:

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

more...
Gust MEES's curator insight, July 22, 2013 2:48 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Gust MEES's curator insight, July 22, 2013 3:03 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple's Development Center Breached by Hackers

Apple's Development Center Breached by Hackers | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple's Dev Center went down on Thursday causing issues for developers around the world. The system remained down for three days and is still currently unavailable.

 

This brings up an interesting question regarding single points of failure in the mobile application distribution system. When one component goes down, or is breached in this case it affects the entire ecosystem.

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

What is the point of hacking one person’s phone when there are entire app store infrastructures to target?

Gust MEES's insight:

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, July 21, 2013 8:17 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 8:22 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Vivalist's curator insight, July 22, 2013 4:28 AM

going up the network, identify the bottle neck and get at it - pretty simple, but they probably had to sweat a little to do it.

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple explains extended developer portal outage | Macworld

Apple explains extended developer portal outage | Macworld | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple's developer portal has been offline since the middle of last week. On Sunday, Apple explained the outage.
Gust MEES's insight:

 

Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, July 21, 2013 7:02 PM

 

Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 7:10 PM


Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

Learn more:

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

These German Guys Can Crack Your iOS Hotspot Password in a Minute

These German Guys Can Crack Your iOS Hotspot Password in a Minute | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
You may want to think twice about using your iPhone as a wireless hotspot. A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany deve...
Gust MEES's insight:

 

===> You may want to think twice about using your iPhone as a wireless hotspot. <===

 

A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing them to crack the Apple’s personal hotspot passwords in less than a minute.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 
more...
Gust MEES's curator insight, July 21, 2013 4:22 PM

 

===> You may want to think twice about using your iPhone as a wireless hotspot. <===


A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing them to crack the Apple’s personal hotspot passwords in less than a minute.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, July 21, 2013 4:27 PM

 

===> You may want to think twice about using your iPhone as a wireless hotspot. <===

 

A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing them to crack the Apple’s personal hotspot passwords in less than a minute.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Sharla Shults's curator insight, July 25, 2013 1:15 PM

Think twice! Better to be safe than sorry!

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Tumblr security lapse - iPhone and iPad users update your passwords now!

Tumblr security lapse - iPhone and iPad users update your passwords now! | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 

Gust MEES's insight:

 

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Passwords

 

 

 

more...
Sharla Shults's curator insight, July 17, 2013 7:20 PM

It is always a good idea to update passwords: too many people out there with nothing better to do than mess with other peoples' lives!

midnight's curator insight, April 7, 2014 5:54 AM

This article contains information about the  security of the iphone and ipad users. This is very useful, because users wil be secured from any harm that could be done with their gadets. passwords were being sent over the internet unencrypted this could cause alot of problems because hackers would easily be able to access your password.

shirlyshabo's curator insight, April 22, 2014 8:03 AM

האם באמת יש דבר כזה  אתר מאובטח?????

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

FBI Ransomware Now Targeting Apple's Mac OS X Users

FBI Ransomware Now Targeting Apple's Mac OS X Users | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers. Now there's a growing market to target Macs.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, June 26, 2013 5:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Apple of discord

Apple of discord | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices.
Gust MEES's insight:

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, June 23, 2013 7:26 AM

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 23, 2013 7:28 AM

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

Researchers able to predict Apple iOS-generated hotspot passwords

Researchers able to predict Apple iOS-generated hotspot passwords | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

 

 

 

Although iOS generates seemingly random passwords for its hotspots to eliminate the use of 'default' passwords, researchers at a German university have found that

 

 

 

===> they are able to break these passwords in under a minute. <===

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Passwords

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’

Researchers claim they’ve built a modified charger that can hack your iPhone ‘within one minute’ | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Forget obscure apps, unexpected emails and suspicious links. A group of researchers from the Georgia Institute of Technology claim to have developed a new smartphone charger that can ...
Gust MEES's insight:

 

Nobody is perfect ;)

 

more...
Gust MEES's curator insight, June 3, 2013 11:53 AM

 

Nobody is perfect ;)

AnnC's curator insight, June 4, 2013 9:15 PM

beware unknown chargers !

Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Immune No More: An Apple Story

Immune No More: An Apple Story | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the early winner...
Gust MEES's insight:

 

A MUST read!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Scooped by Gust MEES
Scoop.it!

Sicherheit: Angriff auf Apples Entwickler-Community

Sicherheit: Angriff auf Apples Entwickler-Community | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Unbekannte haben am vergangenen Donnerstag Apples Server angegriffen. Das ist der Grund für die lange Auszeit, über die sich Entwickler mangels Informationen bereits beschwerten. Apple ist nun dabei, den Schaden zu beheben und beruhigt die Entwickler.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple developer site undergoing rebuild after intrusion | ZDNet

Apple developer site undergoing rebuild after intrusion | ZDNet | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Cupertino finally gives an explanation for the extended downtime of its developer website.

 

After a weekend of outage and mysterious password reset emails, Apple has revealed the cause of the extended downtime of its developer website.

 

===> "Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website," Apple said in an email sent to developers. <===

 

While Apple claimed that the site's information was encrypted, and thus unable to be accessed, the company could not rule out that developer names, mailing addresses, or email addresses were not accessed during the incident.

 

Gust MEES's insight:

 

===> "Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website," Apple said in an email sent to developers. <===

 

While Apple claimed that the site's information was encrypted, and thus unable to be accessed, the company could not rule out that developer names, mailing addresses, or email addresses were not accessed during the incident.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, July 21, 2013 7:48 PM

 

===> "Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website," Apple said in an email sent to developers. <===

 

While Apple claimed that the site's information was encrypted, and thus unable to be accessed, the company could not rule out that developer names, mailing addresses, or email addresses were not accessed during the incident.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 7:52 PM

 

===> "Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website," Apple said in an email sent to developers. <===

 

While Apple claimed that the site's information was encrypted, and thus unable to be accessed, the company could not rule out that developer names, mailing addresses, or email addresses were not accessed during the incident.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple: Developer site targeted in security attack, still down

Apple: Developer site targeted in security attack, still down | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted. The site remains down. Read this article by Josh Lowensohn on CNET News.
Gust MEES's insight:

 

Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, July 21, 2013 6:53 PM

 

Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 6:57 PM

 

Apple says its developer site was targeted in an attack, and that any information that was taken was encrypted.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

FBI Warns of Mac OS X Ransomware

FBI Warns of Mac OS X Ransomware | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
The FBI has become aware of the recent news regarding the ransomware that’s designed to target Mac OS X users. The agency’s Internet Crime...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Scooped by Gust MEES
Scoop.it!

New back-to-front Mac malware records audio and grabs screenshots

New back-to-front Mac malware records audio and grabs screenshots | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Mac backdoor Trojan takes advantage of Unicode's Right-to-Left marker to hide its true nature, steals screenshots and audio from infected computers.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Scooped by Gust MEES
Scoop.it!

Signed Mac Malware Using Right-to-Left Override Trick

Signed Mac Malware Using Right-to-Left Override Trick | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Right-to-left override (RLO) is a special character used in bi-directional text encoding system to mark the start of text that are to be displayed from right to left. It is commonly used by Windows malware such as Bredolab and the high-profile Mahdi trojan from last year to hide the real extension of executable files. Check out this Krebs on Security post for more details on the trick.

We've spotted a malware for Mac using the RLO trick. It was submitted to VirusTotal last Friday.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Quicktime-Lücken: Sicherheitsupdate für die letzten drei Mac-OS-X-Versionen

Quicktime-Lücken: Sicherheitsupdate für die letzten drei Mac-OS-X-Versionen | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple hat ein Sicherheitsupdate für Snow Leopard, Lion und Mountain Lion veröffentlicht. Über HPs Zero Day Initiative wurden in den Mac-OS-X-Versionen gefährliche Sicherheitslücken in der
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Scooped by Gust MEES
Scoop.it!

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.

A posse of German computer scientists has found that Apple's iOS passphrase generator may give yo...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

more...
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybercriminals Increasingly Target Apple ID Data, Kaspersky Warns

Cybercriminals Increasingly Target Apple ID Data, Kaspersky Warns | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Cybercriminals Increasingly Target Apple ID Data, Kaspersky Warns

 

In addition, in some cases, crooks that attempt to phish out Apple IDs also try to gain access to payment card details.

 

===> As Apple’s popularity grows, it becomes a more and more tempting target for malicious cyber schemes. <===

 

Gust MEES's insight:

 

===> As Apple’s popularity grows, it becomes a more and more tempting target for malicious cyber schemes. <===

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
Gust MEES's curator insight, June 21, 2013 8:32 AM

 

===> As Apple’s popularity grows, it becomes a more and more tempting target for malicious cyber schemes. <===

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple's OS X and Safari get biggish security fixes

Apple's OS X and Safari get biggish security fixes | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Apple has published updates for all supported versions of OS X and for Safari version 6.

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

Gust MEES's insight:

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, June 5, 2013 1:21 PM

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 5, 2013 1:30 PM

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security