Skip to main content

Security

See All Stories

US Army iOS app among thousands that unknowingly used Russian code

US Army iOS app | US Army soldiers

A potentially sensitive US Army iOS app is among thousands of iOS and Android apps to include user-profiling code from a Russian company that pretended to be an American one – raising both privacy and security concerns.

The Centers for Disease Control and Prevention (CDC) also used the code in seven of its apps. Both organizations have now removed the code, but it remains present in thousands of other apps

Expand Expanding Close

Apple Security Research launches with website, blog, applications open for Research Device Program

Apple Security Research

Along with announcing its new Lockdown Mode feature this past summer, the company mentioned an upgraded bounty program, a donation to fund ethical security research, and more. Now Apple Security Research has officially launched with a dedicated website, blog, details on the bounty changes, applications open for the Research Device Programs, and more.

Expand Expanding Close

iOS VPN apps have another flaw, shows new research: excluding many Apple apps

iOS VPN apps | Apple Health data could be at risk

A security researcher back in August found a significant flaw in iOS VPN apps, and a second researcher has now demonstrated another major issue.

The first problem was that opening a VPN app should close all existing connections, but didn’t. The second is that many Apple apps send private data outside the VPN tunnel, including Health (above) and Wallet …

Expand Expanding Close

Facebook security warning: Scam apps stole login credentials [U: List of apps]

Facebook security warning | Using app in dark room

Update: The names of the apps are now known. Apple has removed them from the App Store, but the apps also need to be removed from devices – see the list added to the end of the piece.

Meta has issued a Facebook security warning to around one million users that their login credentials may have been stolen by scam apps. While most of the apps were Android ones, 47 of them were iOS apps found in Apple’s App Store

Expand Expanding Close

Pegasus spyware used against anti-corruption journalists in Mexico, despite government promises

Pegasus spyware used | iPhone shown in red lighting

A new report reveals that Pegasus spyware was used in Mexico after the president expressly said that the government no longer used the malware.

It was used to capture data from the phones of two journalists specialising in reporting on government corruption, as well as a prominent human rights defender …

Expand Expanding Close

Safety Check for iPhone: How to immediately stop sharing location and more

Safety Check for iPhone

One of the important new features in iOS 16 is Safety Check. Designed as a tool for those at risk for domestic abuse or similar situations, Safety Check for iPhone lets users immediately revoke location access others have – including apps – and also walks through a security review.

Brought to you by Mosyle, the only Apple Unified Platform. Mosyle fully integrates 5 different applications on a single Apple-only platform. Businesses can automatically deploy, manage & protect all their Apple devices. Request a FREE account to learn how to put your Apple fleet on auto-pilot at a price point that is hard to believe.

Expand Expanding Close

Uber hacker claims to have full control of company’s cloud-based servers

Uber hacker | Abstract image

An Uber hacker who has gained access to a number of the company’s internal systems, including its Slack channels, claims to have full control of the company’s cloud-based servers and more. This includes the company’s servers on both Amazon Web Services and Google’s GSuite.

Incredibly, the attack appears to have mimicked the one back in 2016, which compromised the personal data of 57 million. This suggests that Uber failed to fix a massive security hole, enabling the same attack to be made six years later …

Expand Expanding Close

PSA: Update your iPhone and Mac asap, to fix an active zero-day security vulnerability

Update your iPhone | Abstract image

Even if you like to wait for new iOS and macOS updates to settle down before you take the plunge, you will want to update your iPhone and Mac asap, even if you opt to remain on iOS 15 for now. On iPhones, Apple is offering a choice between iOS 15.7 and iOS 16 when you update.

An update is urgent because iOS 15.7 (and iOS 16) and macOS Monterey 12.6 fix zero-day security vulnerabilities, which Apple says may currently be in active use by attackers …

Expand Expanding Close

Ring doorbell security gets boost as company expands end-to-end encryption

Ring doorbell security boost | Woman pressing bell

Ring doorbell security has been a source of controversy for some time, but the company finally appears to be taking privacy issues seriously. It is now supporting end-to-end encryption of video footage for wireless as well as wired products.

The change will finally address security flaws which have been highlighted as far back as 2019 …

Expand Expanding Close

Apple reportedly introduced major under-the-hood security updates to macOS this year

Apple Security Mac

Apple is frequently releasing new updates to its operating systems with bug fixes and security improvements. In addition, macOS also has a system that lets Apple silently deliver anti-malware protections to Mac computers. And according to a recent research, the company this year introduced major under-the-hood security updates to macOS.

Expand Expanding Close

iPhone Lockdown Mode can be easily detected, could make you a target

iPhone Lockdown Mode

iPhone Lockdown Mode is an extreme form of security designed to protect people who might find themselves targets of state-sponsored spyware, like Pegasus. However, a privacy activist says it also makes it easy for a website to detect when someone is using it – and has demonstrated this.

So what is designed to be protection against rogue governments could actually end up helping them identify people who may be of interest …

Expand Expanding Close

O.MG Elite Cable has power of a $20,000 hacking tool; can compromise iPhone, Android, Mac, PC

Shown off at this year’s Def Con is an unassuming and powerful hacking tool, the O.MG Elite cable. With the physical appearance of a standard Lightning or USB-C cable, the hidden modifications mean this cable can log keystrokes, perform attacks, and even transmit data stealthily from air-gapped devices with its own WiFi network.

Expand Expanding Close

Twitter investigation instigated by Senate following claims by former head of security

Site default logo image

A Twitter investigation has been announced by the Senate Judiciary Committee, following claims of “extreme” security failings at the social network. The claims were made in an 84-page report by the company’s former head of security, Peiter Zatko.

Concerns have been expressed about the national security risks of bad actors being able to fake tweets from the accounts of world leaders and major media organizations …

Expand Expanding Close

Plex data breach exposed email addresses and encrypted passwords

Plex data breach | Logo and movies

A Plex data breach has exposed usernames, email addresses, and encrypted passwords. The scale of the security failure is not yet known, but the company is requiring all users to change their passwords.

The issue was compounded by Plex servers not having sufficient capacity to cope with the number of users attempting to do so, and a series of other problems …

Expand Expanding Close

Former Twitter security head says company’s systems have ‘extreme, egregious deficiencies’

Site default logo image

Update: Elon Musk’s lawyers have now issued a subpoena to speak to Zatko about the claims.

Former Twitter security head Peiter Zatko has filed a formal complaint that the company has “extreme, egregious deficiencies” in its protections against hackers, and has done little to defeat spam.

He accuses the company of deceiving the Federal Trade Commission (FTC), following promises made back in 2011 after hackers twice took full control of Twitter …

Expand Expanding Close

Apple’s CSAM approach is the right one, says British government, as it attacks Facebook

Apple's CSAM approach | Pile of photos on a table

The British government has backed a call by the country’s security services for client-side scanning for child sexual abuse material – aka Apple’s CSAM approach.

Home Secretary Priti Patel has written an op-ed in which she indicates government support for the stance, while also attacking Facebook’s plans to make all Messenger chats end-to-end encrypted by default …

Expand Expanding Close