Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
10.6K views | +0 today
Follow
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Apple: Aktivierungssperre des iPads lässt sich umgehen | #Privacy

Apple: Aktivierungssperre des iPads lässt sich umgehen | #Privacy | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Aktivierungssperre des iPads lässt sich umgehen
Ein Fehler in iOS 10.1.1 macht das iPad unsicher. Ein verlorenes oder gestohlenes iOS-Tablet kann ohne viel Aufwand in Betrieb genommen werden. Dabei wird die Aktivierungssperre umgangen, die genau das verhindern soll. Von Apple gibt es noch keine Reaktion darauf.


Ein gestohlenes oder verlorengegangenes iPad ist weniger sicher als vermutet. Sicherheitsforscher des Vulnerability Labs konnten ohne viel technischen Aufwand die Aktivierungssperre des Betriebssystems umgehen.

 

Apple hatte die Aktivierungssperre vor drei Jahren mit iOS 7 eingeführt. Damit soll verhindert werden, dass ein gestohlenes iPhone oder iPad wieder in Betrieb genommen werden kann, nachdem es in den Recovery-Modus versetzt oder vollständig zurückgesetzt wurde.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:
Aktivierungssperre des iPads lässt sich umgehen
Ein Fehler in iOS 10.1.1 macht das iPad unsicher. Ein verlorenes oder gestohlenes iOS-Tablet kann ohne viel Aufwand in Betrieb genommen werden. Dabei wird die Aktivierungssperre umgangen, die genau das verhindern soll. Von Apple gibt es noch keine Reaktion darauf.


Ein gestohlenes oder verlorengegangenes iPad ist weniger sicher als vermutet. Sicherheitsforscher des Vulnerability Labs konnten ohne viel technischen Aufwand die Aktivierungssperre des Betriebssystems umgehen.

 

Apple hatte die Aktivierungssperre vor drei Jahren mit iOS 7 eingeführt. Damit soll verhindert werden, dass ein gestohlenes iPhone oder iPad wieder in Betrieb genommen werden kann, nachdem es in den Recovery-Modus versetzt oder vollständig zurückgesetzt wurde.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Webcam bei MacBooks und iMacs kann gehackt werden | #Apple #CyberSecurity #NobodyIsPerfect #FSCD

Webcam bei MacBooks und iMacs kann gehackt werden | #Apple #CyberSecurity #NobodyIsPerfect #FSCD | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Der Sicherheitsforscher Patrick Wardle hat offenbar eine Möglichkeit gefunden, auf Apple-Rechner unbefugt Anrufe und Video-Chats via FaceTime und Skype aufzuzeichnen. Um Apples Sicherheitsmechanismen zu umgehen, wartet die Malware gezielt darauf, dass der Nutzer Webcam und Video benutzt.


Der Sicherheitsforscher Patrick Wardle hat auf der Konferenz Virus Bulletin eien Möglichkeit gezeigt, Nutzer von MacBooks und iMacs auszuspähen. Seiner Präsentation auf der Konferenz Virus Bulletin zufolge ist es möglich Malware zu entwickeln, die Telefongespräche und Video-Chats vom Nutzer unbemerkt aufzeichnet.

Anstat das Opfer direkt nach der Installation auszuspähen, wartet die Malware gezielt darauf, dass Webcam und Video benutzt werden, beispielsweise für die Kommunikation via FaceTime oder Skype. Sie zeichnet dann im Hintergrund Bild und Ton auf. Die von Apple in seine Macs integrierte LED, die über die Aktivität der Webcam informiert und damit vor unbefugten Zugriffen auf die Kamera warnen soll, ist in diesem Fall keine Hilfe: Da sie während des vom Nutzer ja absichtlich angestoßenen Anrufs eingeschaltet ist, fällt auch nicht auf, dass das Gespräch im Hintergrund mitgeschnitten wird.

Wardle hat zudem darauf hingewiesen, dass sich Cyberkriminelle und Geheimdienste gerade für Telefonate und Video-Chats interessieren. Unterhaltungen zwischen einem Journalisten und seiner Quelle oder eine Telefonkonferenz mit hochrangigen Managern lieferten unter Umständen Informationen von unschätzbarem Wert.

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=webcam

 

Gust MEES's insight:

Der Sicherheitsforscher Patrick Wardle hat offenbar eine Möglichkeit gefunden, auf Apple-Rechner unbefugt Anrufe und Video-Chats via FaceTime und Skype aufzuzeichnen. Um Apples Sicherheitsmechanismen zu umgehen, wartet die Malware gezielt darauf, dass der Nutzer Webcam und Video benutzt.


Der Sicherheitsforscher Patrick Wardle hat auf der Konferenz Virus Bulletin eien Möglichkeit gezeigt, Nutzer von MacBooks und iMacs auszuspähen. Seiner Präsentation auf der Konferenz Virus Bulletin zufolge ist es möglich Malware zu entwickeln, die Telefongespräche und Video-Chats vom Nutzer unbemerkt aufzeichnet.

Anstat das Opfer direkt nach der Installation auszuspähen, wartet die Malware gezielt darauf, dass Webcam und Video benutzt werden, beispielsweise für die Kommunikation via FaceTime oder Skype. Sie zeichnet dann im Hintergrund Bild und Ton auf. Die von Apple in seine Macs integrierte LED, die über die Aktivität der Webcam informiert und damit vor unbefugten Zugriffen auf die Kamera warnen soll, ist in diesem Fall keine Hilfe: Da sie während des vom Nutzer ja absichtlich angestoßenen Anrufs eingeschaltet ist, fällt auch nicht auf, dass das Gespräch im Hintergrund mitgeschnitten wird.

Wardle hat zudem darauf hingewiesen, dass sich Cyberkriminelle und Geheimdienste gerade für Telefonate und Video-Chats interessieren. Unterhaltungen zwischen einem Journalisten und seiner Quelle oder eine Telefonkonferenz mit hochrangigen Managern lieferten unter Umständen Informationen von unschätzbarem Wert.

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=webcam

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS 10 comes with privacy trade-offs. Here's how to lock down your device | #Apple #Awareness #digcit

iOS 10 comes with privacy trade-offs. Here's how to lock down your device | #Apple #Awareness #digcit | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Find out what new steps you can take to better protect your privacy on iOS 10.

 

Learn more / En savoir plus / Mehr erfahren:

  

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

 

Gust MEES's insight:

Find out what new steps you can take to better protect your privacy on iOS 10.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple's Messages app isn't as private as you think | #Privacy #Apps #digcit #NobodyIsPerfect #EdTech

Apple's Messages app isn't as private as you think | #Privacy #Apps #digcit #NobodyIsPerfect #EdTech | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Although it has previously claimed otherwise, Apple stores Messages metadata and can be compelled by court orders to hand over such data logs.

 

It turns out that’s not entirely true: The Intercept has secured a document from the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, that details how Messages stores metadata about every phone number you try to contact through the app, and how police can get their hands on that data by filing a request.

 

Here’s how it works: When you enter a number into Messages on your iPhone, the app pings Apple servers to figure out whether it should send your message over SMS or over the company’s encrypted service (if the recipient also uses Messages).

 

Apple records those queries, in addition to the date and time when you entered that number, as well as your IP address – which could used to determine your approximate location. The company is compelled to hand over these logs when served with court orders in connection with investigations.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

Gust MEES's insight:
Although it has previously claimed otherwise, Apple stores Messages metadata and can be compelled by court orders to hand over such data logs.

 

It turns out that’s not entirely true: The Intercept has secured a document from the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, that details how Messages stores metadata about every phone number you try to contact through the app, and how police can get their hands on that data by filing a request.

 

Here’s how it works: When you enter a number into Messages on your iPhone, the app pings Apple servers to figure out whether it should send your message over SMS or over the company’s encrypted service (if the recipient also uses Messages).

 

Apple records those queries, in addition to the date and time when you entered that number, as well as your IP address – which could used to determine your approximate location. The company is compelled to hand over these logs when served with court orders in connection with investigations.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple pulls hundreds of apps that collected personal data

Apple pulls hundreds of apps that collected personal data | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it



A malicious advertising SDK was grabbing device serial numbers and Apple ID email addresses.





Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=App-Store-Malware


Gust MEES's insight:

A malicious advertising SDK was grabbing device serial numbers and Apple ID email addresses.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=App-Store-Malware



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Are you ready for ads to know your bank account balance? | Digital Privacy

Are you ready for ads to know your bank account balance? | Digital Privacy | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Well, knowing your name and how long you’ve been a card member seems only mildly invasive compared to what Apple may be up to.

As you know, Apple’s Tim Cook has been vigorous in defending users’ right to privacy. As the world’s biggest luxury brand, Apple has an advantage over companies like Google that rely on turning their customers into products. However, with the companies’ forays into new advertising-based ventures like streaming music, that ethic may be harder to enforce. And a new patent application aligned with the Apple Pay product suggests a dramatic new leap into users personal space.


Learn more:




Gust MEES's insight:

Well, knowing your name and how long you’ve been a card member seems only mildly invasive compared to what Apple may be up to.

As you know, Apple’s Tim Cook has been vigorous in defending users’ right to privacy. As the world’s biggest luxury brand, Apple has an advantage over companies like Google that rely on turning their customers into products. However, with the companies’ forays into new advertising-based ventures like streaming music, that ethic may be harder to enforce. And a new patent application aligned with the Apple Pay product suggests a dramatic new leap into users personal space.


Learn more:





more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

iTunes Connect Taken Offline, Bug Causes Wrong Logins | CyberSecurity

iTunes Connect Taken Offline, Bug Causes Wrong Logins | CyberSecurity | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Uh-oh, something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the…


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=iTunes-Vulnerabilities


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/


Gust MEES's insight:
Uh-oh, something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the…


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=iTunes-Vulnerabilities


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

After alleged iCloud breach, here's how to secure your personal cloud

After alleged iCloud breach, here's how to secure your personal cloud | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A hacker may have been responsible for leaking explicit photos of celebrities due to a weak link in their Apple iCloud accounts. Here's what you can do to keep your embarrassing selfies (and company secrets) out of the public eye.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud


Gust MEES's insight:
A hacker may have been responsible for leaking explicit photos of celebrities due to a weak link in their Apple iCloud accounts. Here's what you can do to keep your embarrassing selfies (and company secrets) out of the public eye.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud


more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud?

The Fappening is more than just nude celebrity pics -- Can we trust Apple's iCloud? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Sometimes I wish the internet could just be a place to exchange wholesome information, such as cooking recipes and tips on Linux, but sadly, there is a dark side. There are deviant people lurking on the web doing all sorts of horrible things. Yesterday, a hacker leaked the private pictures and videos (nude and semi-nude) of many celebrities, and they have spread across the net. For these celebrities, who are real people, I am sure it has been a very trying time; their privacy has been destroyed and I offer my sympathies. For the many people (if they can be called that) viewing and spreading the pictures, the occasion has been dubbed


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Gust MEES's curator insight, September 1, 2014 7:24 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=iCloud



Ammanda Daniher's curator insight, September 11, 2014 10:33 PM

It is pretty clear that iCloud has become a threat to most Apple users due to the recent "Celebrity nudes" scandal. I strongly believe that you shouldn't be worried about people being able to get a hold of photographs and videos of personal moments, such as family dinners and Christmas parties. This incident really makes you wonder just how easy it is to hack in to Apple's software systems, and how much Apple's developers have seen of our personal lives. Scandals such as thing will keep things talking, but will Apple release a statement regarding everything that has happened? 

Scooped by Gust MEES
Scoop.it!

"Open the iPhone door, Siri!" - Apple's digital helper coughs up another lock screen hole

"Open the iPhone door, Siri!" - Apple's digital helper coughs up another lock screen hole | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A hacker has found a way to bypass the iPhone 5 lock screen to get at your contacts. Ironically, he got in by asking Siri, Apple's voice-activated "helper."


The iPhone's lock screen is the easiest way to protect your phone from prying eyes in the event that it is lost or stolen - but activating Siri from the lock screen is like having no protection at all.

Siri caused other lock screen problems that needed fixing - it seems like déjà vu all over again - where holding down the home button allowed you to just ask nicely for your phone to bypass its own security.

The bug affects devices running iOS 7.1.1 - the latest Apple release.



Here's how to close the hole while...


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple releases iOS 7.0.2 - swiftly squashing two lockscreen bugs

Apple releases iOS 7.0.2 - swiftly squashing two lockscreen bugs | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple has quickly fixed two lockscreen bugs that it introduced with iOS 7.

Well done, Cupertino!

(To all hardcore Apple fans reading this: that's not irony. I really mean it.)
Gust MEES's insight:

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Shafali Anand's comment, September 27, 2013 9:31 PM
Glad they did. I've been worrying myself sick about the ugh-ly buttons...people say they grow on you...perhaps they do...like warts. You've got to live with you've got.
Scooped by Gust MEES
Scoop.it!

Siri umgeht Fingerabdruck-Scanner des iPhone 5S

Siri umgeht Fingerabdruck-Scanner des iPhone 5S | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Die Sprachassistenz Siri kann den Fingerabdrucksensor des iPhone 5S bei falschen Einstellungen umgehen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA: Steve Jobs was ‘Big Brother,’ iPhone users ‘zombies,’: report | SmartPlanet

NSA: Steve Jobs was ‘Big Brother,’ iPhone users ‘zombies,’: report | SmartPlanet | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
The U.S. National Security Agency (NSA) surveillance scandal keeps reaching new heights, and now a new set of leaked documents hits out at consumers t
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=PRISM

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple Keeps Constant Log Of iPhone Calls In iCloud, Warns Cop Contractor | #Privacy #Datenschutz

Apple Keeps Constant Log Of iPhone Calls In iCloud, Warns Cop Contractor | #Privacy #Datenschutz | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple has a hidden feature for you in its iPhones: call logs going back as far as four months are stored in near real-time in the iCloud. That’s the warning today from a Russian provider of iPhone hacking tools, Elcomsoft, which claimed the feature was automatic and there was no way to turn it off bar shutting down iCloud Drive altogether.

Whilst it was well-known that iCloud backups would store call logs, contacts and plenty of other valuable data, users should be concerned to learn that their communications records are consistently being sent to Apple servers without explicit permission, said Elcomsoft CEO Vladimir Katalov. Even if those backups are disabled, he added, the call logs continue making their way to the iCloud, Katalov said.

“Syncing call logs happens almost in real time, though sometimes only in a few hours,” he added. “But all you need to have is just iCloud Drive enabled, and there is no way to turn that syncing off, apart from just disabling iCloud Drive completely. In that case many applications will stop working or lose iCloud-related features completely.”

All FaceTime calls are logged in the iCloud too, whilst as of iOS 10 incoming missed calls from apps like WhatsApp and Skype are uploaded, said Elcomsoft, which provides phone forensics tools to police. Its tools were also linked to the iCloud leaks of celebrity nude pictures, as anyone can purchase Elcomsoft kit. Last month, it revealed Apple had failed to properly secure its iTunes backups, making it much easier for its tools (and cybercriminals) to access users’ information. Apple subsequently updated iOS 10 to improve backup security.

 

Learn more / En savoir plus / Mehr erfahren:

 

  

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

Gust MEES's insight:
Apple has a hidden feature for you in its iPhones: call logs going back as far as four months are stored in near real-time in the iCloud. That’s the warning today from a Russian provider of iPhone hacking tools, Elcomsoft, which claimed the feature was automatic and there was no way to turn it off bar shutting down iCloud Drive altogether.

Whilst it was well-known that iCloud backups would store call logs, contacts and plenty of other valuable data, users should be concerned to learn that their communications records are consistently being sent to Apple servers without explicit permission, said Elcomsoft CEO Vladimir Katalov. Even if those backups are disabled, he added, the call logs continue making their way to the iCloud, Katalov said.

“Syncing call logs happens almost in real time, though sometimes only in a few hours,” he added. “But all you need to have is just iCloud Drive enabled, and there is no way to turn that syncing off, apart from just disabling iCloud Drive completely. In that case many applications will stop working or lose iCloud-related features completely.”

All FaceTime calls are logged in the iCloud too, whilst as of iOS 10 incoming missed calls from apps like WhatsApp and Skype are uploaded, said Elcomsoft, which provides phone forensics tools to police. Its tools were also linked to the iCloud leaks of celebrity nude pictures, as anyone can purchase Elcomsoft kit. Last month, it revealed Apple had failed to properly secure its iTunes backups, making it much easier for its tools (and cybercriminals) to access users’ information. Apple subsequently updated iOS 10 to improve backup security.

 

Learn more / En savoir plus / Mehr erfahren:

 

  

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple Messages could be exposing your privacy when it previews a link | #iMessage

Apple Messages could be exposing your privacy when it previews a link | #iMessage | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple's iMessage isn't doing all it can to protect users' information when it previews a link in a conversation.

 

Learn more / En savoir plus / Mehr erfahren:

  

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

 

Gust MEES's insight:
Apple's iMessage isn't doing all it can to protect users' information when it previews a link in a conversation.

 

Learn more / En savoir plus / Mehr erfahren:

  

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple zeichnet iMessage-Metadaten für 30 Tage auf | #Privacy #digcit #Apps 

Apple zeichnet iMessage-Metadaten für 30 Tage auf | #Privacy #digcit #Apps  | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Wie aus einem geleakten Dokument hervor geht, zeichnet Apple Metadaten zu iMessages-Konversationen auf und kann diese auch auf richterliche Anordnung der Polizei aushändigen. Die Konversation selbst bleibt verschlüsselt, doch speichert Apple für 30 Tage auf seinen Servern Daten über die Kontaktaufnahme. In dem Moment, in dem man in die Nachrichten-App eine Nummer oder einen Namen eintippt, richtet das iPhone eine Anfrage an den Server bei Apple, ob der Kontakt mit iMessages verknüpft ist oder eine unverschlüsselte SMS versandt werden soll. Diese Daten bleiben dann einen Monat bestehen, es geht aber aus ihnen nicht hervor, ob tatsächlich eine Konversation stattgefunden hat oder nicht.

Die ursprüngliche Meldung ist gestern auf " The Intercept " erschienen, die Autoren bekamen jede Menge Unterlagen zugespielt, die wohl einst im internen Umlauf beim Support-Team der Abteilung für elektronische Überwaschung der Staatsanwaltschaft in Florida war. Darunter fand sich ein Dokument mit dem Namen "iMessage FAQ für Strafverfolgungsbehörden". Bis zu der letzten Frage liest sich das Dokument wie eine Einführung zur iMessage-Nutzung, erst als Antwort auf die letzte Frage "Was bekomme ich von Apple, wenn ich eine Gerichtsverfügung für ein iMessage-Konto habe?" eine detaillierte Liste der Meta-Daten. Darunter sind die Kontaktdaten wie die Telefonnummer des Gesprächspartners in iMessage, das Datum und die Uhrzeit, wann das iPhone versucht hat, den Kontakt per iMessage zu erreichen, die IP-Adresse des nächsten WLANs, über die die Verbindung zum Apple-Server stattgefunden hat. Die Apple-Sprecherin hat gegenüber "The Intercept" bestätigt, dass das geleakte Dokument den tatsächlichen Stand der Dinge beschreibt, allerdings speichert Apple nach deren Angaben solche Logs nur einen Monat lang, danach werden sie gelöscht.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

Gust MEES's insight:
Wie aus einem geleakten Dokument hervor geht, zeichnet Apple Metadaten zu iMessages-Konversationen auf und kann diese auch auf richterliche Anordnung der Polizei aushändigen. Die Konversation selbst bleibt verschlüsselt, doch speichert Apple für 30 Tage auf seinen Servern Daten über die Kontaktaufnahme. In dem Moment, in dem man in die Nachrichten-App eine Nummer oder einen Namen eintippt, richtet das iPhone eine Anfrage an den Server bei Apple, ob der Kontakt mit iMessages verknüpft ist oder eine unverschlüsselte SMS versandt werden soll. Diese Daten bleiben dann einen Monat bestehen, es geht aber aus ihnen nicht hervor, ob tatsächlich eine Konversation stattgefunden hat oder nicht.

Die ursprüngliche Meldung ist gestern auf " The Intercept " erschienen, die Autoren bekamen jede Menge Unterlagen zugespielt, die wohl einst im internen Umlauf beim Support-Team der Abteilung für elektronische Überwaschung der Staatsanwaltschaft in Florida war. Darunter fand sich ein Dokument mit dem Namen "iMessage FAQ für Strafverfolgungsbehörden". Bis zu der letzten Frage liest sich das Dokument wie eine Einführung zur iMessage-Nutzung, erst als Antwort auf die letzte Frage "Was bekomme ich von Apple, wenn ich eine Gerichtsverfügung für ein iMessage-Konto habe?" eine detaillierte Liste der Meta-Daten. Darunter sind die Kontaktdaten wie die Telefonnummer des Gesprächspartners in iMessage, das Datum und die Uhrzeit, wann das iPhone versucht hat, den Kontakt per iMessage zu erreichen, die IP-Adresse des nächsten WLANs, über die die Verbindung zum Apple-Server stattgefunden hat. Die Apple-Sprecherin hat gegenüber "The Intercept" bestätigt, dass das geleakte Dokument den tatsächlichen Stand der Dinge beschreibt, allerdings speichert Apple nach deren Angaben solche Logs nur einen Monat lang, danach werden sie gelöscht.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Privacy

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple promises “differential privacy” at Worldwide Developers Conference | #Privacy #Hypocrisy #Naivety

Apple promises “differential privacy” at Worldwide Developers Conference | #Privacy #Hypocrisy #Naivety | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
At its Worldwide Developer Conference (WWDC) yesterday, Apple unveiled iOS 10, macOS, and "differential privacy."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:
At its Worldwide Developer Conference (WWDC) yesterday, Apple unveiled iOS 10, macOS, and "differential privacy."

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Datenklau: Apple schmeißt 256 Schnüffel-Apps aus dem App Store

Datenklau: Apple schmeißt 256 Schnüffel-Apps aus dem App Store | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple: Prüfprozess überlistet

Die Analysefirma SourceDNA hat nach eigenen Angaben Hunderte Apps gefunden, die unerlaubterweise persönliche Daten von Nutzern gesammelt und weitergegeben haben sollen. Den Experten zufolge sei das das erste Mal, dass iOS-Apps trotz dieser Funktionen erfolgreich Apples Prüfprozess für den Zugang zum App Store überlistet hätten – und dabei entdeckt wurden. Die 256 identifizierten Apps sollen insgesamt rund eine Million Mal heruntergeladen worden sein.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=App-Store-Malware


Gust MEES's insight:

Apple: Prüfprozess überlistet

Die Analysefirma SourceDNA hat nach eigenen Angaben Hunderte Apps gefunden, die unerlaubterweise persönliche Daten von Nutzern gesammelt und weitergegeben haben sollen. Den Experten zufolge sei das das erste Mal, dass iOS-Apps trotz dieser Funktionen erfolgreich Apples Prüfprozess für den Zugang zum App Store überlistet hätten – und dabei entdeckt wurden. Die 256 identifizierten Apps sollen insgesamt rund eine Million Mal heruntergeladen worden sein.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=App-Store-Malware




more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Threat Intelligence: Reduce the Gap | CyberSecurity | Privacy

Threat Intelligence: Reduce the Gap | CyberSecurity | Privacy | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with Target, JPMogan Chase, Home Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.
Gust MEES's insight:

Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with TargetJPMogan ChaseHome Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.


more...
Gust MEES's curator insight, February 12, 2015 4:01 AM

Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches.

Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with TargetJPMogan ChaseHome Depot and Sony Pictures suffering the painful sting of data breaches. Even celebrities were targeted, with compromised iCloud accounts.

It really isn’t surprising that almost everyone anticipates the need to prepare for security challenges in the coming months. According to a recent survey by Tech Pro Research, 84 percent of IT professionals are more concerned about security and privacy in 2015.


Scooped by Gust MEES
Scoop.it!

Siri plaudert Kontaktdaten des iPhone-Besitzers aus

Siri plaudert Kontaktdaten des iPhone-Besitzers aus | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Auf höfliche Nachfrage rückt Apples Sprachassistentin bereitwillig sämtliche Angaben zum Besitzer eines iOS-Gerätes aus dem Adressbuch – auch im Lockscreen.
Gust MEES's insight:

Auf höfliche Nachfrage rückt Apples Sprachassistentin bereitwillig sämtliche Angaben zum Besitzer eines iOS-Gerätes aus dem Adressbuch – auch im Lockscreen.


more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Vedettes nues sur Internet : la faute d’iCloud d'Apple ?

Vedettes nues sur Internet : la faute d’iCloud d'Apple ? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Des photos de stars nues publiées sur Internet et les réseaux sociaux s’emballent. Les victimes auraient en commun d’avoir hébergé ces photos sur iCloud. Le service d’Apple a-t-il été piraté ou seuls les comptes visés l’ont-ils été ?




Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Jean-Pierre Blanger, Gust MEES
Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


more...
Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Scooped by Gust MEES
Scoop.it!

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO]

Yet another iPhone lockscreen vulnerability. This time in iOS 7.02 [VIDEO] | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Another day, another privacy vulnerability found in iOS.

When will Apple learn that a lockscreen should really, properly, lock the phone?
Gust MEES's insight:

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===


Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, September 30, 2013 12:37 PM

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 30, 2013 12:51 PM

 

Israeli researcher Dany Lisiansky uncovered the flaw, and made a video to demonstrate a way to take a victim’s locked iPhone running iOS 7.02, and ===> access their call history, voicemails and entire list of contacts. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Nobody-is-perfect

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Scooped by Gust MEES
Scoop.it!

iOS 7 lock screen bypass flaw discovered, and how to fix it

iOS 7 lock screen bypass flaw discovered, and how to fix it | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
UPDATED: The iOS 7 lock screen can be bypassed with a series of gesture techniques, despite the passcode. While apps are blurred out, a major Camera app bug exists, which can allow photos to be edited, deleted, and shared with others.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Four privacy settings you should enable in iOS 7 immediately

Four privacy settings you should enable in iOS 7 immediately | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
If you downloaded and installed iOS 7, there are a few privacy settings that are turned off by default that you should enable right away.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
No comment yet.