Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
16.1K views | +0 today
Follow
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
November 17, 2014 8:28 AM
Scoop.it!

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/



Via Gust MEES
Gust MEES's insight:
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:21 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Gust MEES
September 24, 2014 3:35 PM
Scoop.it!

Apple pulls iOS 8 update after reports of dropped cellular service

Apple pulls iOS 8 update after reports of dropped cellular service | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

(Reuters) - Apple Inc has pulled an update to iOS 8, its latest mobile operating system, following reports of dropped cellular service.We have received reports of an issue with the iOS 8.0.1 update. 

Gust MEES's insight:

Apple Inc has pulled an update to iOS 8, its latest mobile operating system, following reports of dropped cellular service.We have received reports of an issue with the iOS 8.0.1 update.


No comment yet.
Scooped by Gust MEES
April 24, 2014 6:03 PM
Scoop.it!

Does Apple care more about securing Mac users than iPhone users?

Does Apple care more about securing Mac users than iPhone users? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey puck-shaped Apple TV. And I trust, as a regul...


A malicious hacker could have taken one of these patched OS X vulnerabilities, and weaponised it for exploitation in a zero-day attack against iPhone and iPad users.

.

Every time Apple treats its smartphone and tablet customers as poor relations when it comes to security, they are putting millions of users at risk.


Learn more:



Gust MEES's insight:

Every time Apple treats its smartphone and tablet customers as poor relations when it comes to security, they are putting millions of users at risk.

.

Learn more:


.


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 1, 2012 7:55 AM
Scoop.it!

Toronto study shows mobile spyware's long shadow

Toronto study shows mobile spyware's long shadow | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
(Phys.org)—Spyware sold legally can infect BlackBerrys, iPhones, and other mobile devices, according to a study from two security researchers at the University of Toronto Munk School of Global Affairs' Citizen Lab.

 

Gust MEES: NOBODY IS PERFECT!

 

Read more:

http://phys.org/news/2012-09-toronto-mobile-spyware-shadow.html

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
July 5, 2012 11:18 AM
Scoop.it!

Phonebook-slurping, spam-sending app found in App Store

Phonebook-slurping, spam-sending app found in App Store | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

 

 

 

 

A malicious app that slurps mobile users' phonebooks and uploads them to a remote server has been spotted being offered both on Google Play and Apple's App Store.

 

 

 

 

 

 

Read more:

http://www.net-security.org/malware_news.php?id=2174

 


Via Gust MEES
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
November 15, 2014 4:02 AM
Scoop.it!

iOS tombe et Windows Phone résiste lors d’une compétition de hackers

iOS tombe et Windows Phone résiste lors d’une compétition de hackers | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.
Gust MEES's insight:
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.


Gust MEES's curator insight, November 15, 2014 3:58 AM

L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Rescooped by Gust MEES from 21st Century Learning and Teaching
July 21, 2014 9:31 AM
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Rescooped by Gust MEES from 21st Century Learning and Teaching
July 7, 2013 5:04 AM
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.
Gust MEES's insight:

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
July 27, 2012 9:50 AM
Scoop.it!

Why Apple wanted AuthenTec: Thwart Samsung, Android in BYOD

Why Apple wanted AuthenTec: Thwart Samsung, Android in BYOD | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Summary: If Apple didn't buy AuthenTec, a cash strapped mobile security player, it's likely another rival would have. Apple's courtship of the enterprise via the bring your own device continues.

 

 

Gust MEES: Check also my free course about BYOD here http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.zdnet.com/why-apple-wanted-authentec-thwart-samsung-android-in-byod-7000001722/

 

No comment yet.
Scooped by Gust MEES
June 27, 2012 11:07 AM
Scoop.it!

Mac malware, be aware! Forewarned is Forearmed!

In the past, few viruses have targeted Apple operating systems -- but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience.

 

IT admins needs to educate their users about this growing threat and implement a business antivirus solution for Macs as they do for PCs.

 

Video here:

http://www.youtube.com/watch?v=MOflZBB4qGc

 

No comment yet.