Apple, Mac, iOS4,...
Follow
Find "privacy"
8.2K views | +11 today
Apple, Mac, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/



Via Gust MEES
Gust MEES's insight:
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


more...
Gust MEES's curator insight, November 17, 2014 8:21 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


more...
Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Scooped by Gust MEES
Scoop.it!

Update your iPhones and iPads now to iOS 7.06. But Mac OS X still at risk from critical security hole

Update your iPhones and iPads now to iOS 7.06. But Mac OS X still at risk from critical security hole | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Apple has quietly pushed out a security update to iOS, the operating system used by its flagship iPhone and iPad products.

And it's really important for your privacy that you update your iPhones and iPads as quickly as possible.




===> A shame then that Mac OS X doesn't yet have a patch... <===




Gust MEES's insight:


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Four privacy settings you should enable in iOS 7 immediately

Four privacy settings you should enable in iOS 7 immediately | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
If you downloaded and installed iOS 7, there are a few privacy settings that are turned off by default that you should enable right away.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, June 26, 2013 5:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Apple's iOS and Android are new favorite malware victims

Apple's iOS and Android are new favorite malware victims | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Cybercriminals are working on more complex schemes to wage attacks on PCs, laptops, and smartphones.

 

 

 

A new report shows that:

===> every single device that connects to the Internet is in danger. <===

 

Read this blog post by Dara Kerr on Security & Privacy:

http://news.cnet.com/8301-1009_3-57506159-83/apples-ios-and-android-are-new-favorite-malware-victims/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

New Mac OS X Trojan unearthed. Call it SabPub

New Mac OS X Trojan unearthed. Call it SabPub | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
The folks at Kaspersky Lab report that there's new Mac malware in the wild, called Backdoor.OSX.SabPub.a.

 

There are at least two variants being spread through Java exploits. Read this blog post by Don Reisinger on Security & Privacy.

 

Read more...

 

more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud?

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Sometimes I wish the internet could just be a place to exchange wholesome information, such as cooking recipes and tips on Linux, but sadly, there is a dark side. There are deviant people lurking on the web doing all sorts of horrible things. Yesterday, a hacker leaked the private pictures and videos (nude and semi-nude) of many celebrities, and they have spread across the net. For these celebrities, who are real people, I am sure it has been a very trying time; their privacy has been destroyed and I offer my sympathies. For the many people (if they can be called that) viewing and spreading the pictures, the occasion has been dubbed


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Gust MEES's curator insight, September 1, 2014 7:24 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud



Ammanda Daniher's curator insight, September 11, 2014 10:33 PM

It is pretty clear that iCloud has become a threat to most Apple users due to the recent "Celebrity nudes" scandal. I strongly believe that you shouldn't be worried about people being able to get a hold of photographs and videos of personal moments, such as family dinners and Christmas parties. This incident really makes you wonder just how easy it is to hack in to Apple's software systems, and how much Apple's developers have seen of our personal lives. Scandals such as thing will keep things talking, but will Apple release a statement regarding everything that has happened? 

Scooped by Gust MEES
Scoop.it!

Apple's iOS 8 will help keep out Wi-Fi marketers and snoops, but not totally

Apple's iOS 8 will help keep out Wi-Fi marketers and snoops, but not totally | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
A small change in iOS 8 will make privacy advocates happy, although it's going to be a tough pill to swallow for mobile marketers










Check the video ===> Busting wireless security myths <===


Learn more:


https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/


Gust MEES's insight:

Check the video ===> Busting wireless security myths <===


Learn more:


https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO]

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO] | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Another day, another privacy vulnerability found in iOS.

When will Apple learn that a lockscreen should really, properly, lock the phone?
Gust MEES's insight:

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, September 30, 2013 12:37 PM

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 30, 2013 12:51 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#Privacy: Apple Reveals How Long it Retains Siri Data (2 years)!

#Privacy: Apple Reveals How Long it Retains Siri Data (2 years)! | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple's Siri has become known as one of the iPhone's most powerful tools, but now the length of time that system holds user data has come under the spotlight.

 

Amidst inquiries from the American Civil Liberties Union, an Apple spokeswoman told Wired that

 

===> Apple keeps "anonymized Siri data for up to two years, <===

 

[and] if a user turns Siri off, both identifiers are deleted immediately along with any associated data."

Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Scooped by Gust MEES
Scoop.it!

Hackers Allegedly Leak 1 Million Apple Device IDs

Hackers Allegedly Leak 1 Million Apple Device IDs | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

AntiSec hacker group has in its possession over 12,000,000 Apple iOS device IDs. To prove it, it has released 1,000,001 IDs to the public.

 

Though they haven’t released them, hackers also claim the real names, addresses and cell phones in some cases accompany the UDIDs on the list, making this leak an even bigger privacy concern.

Developing…

 

“During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of “NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc,” claims Antisec.

 

Read more:

http://mashable.com/2012/09/04/hackers-apple-device-id/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Mashable+%28Mashable%29

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft denounces Google for bypassing Safari privacy settings

Microsoft denounces Google for bypassing Safari privacy settings | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
The company is jumping on a Wall Street Journal story accusing Google of sneaking past Safari's privacy settings to lash out at its rival. Read this blog post by Lance Whitney on Microsoft.
more...
No comment yet.