Skip to main content

Security

See All Stories

Massive security fail by Apple allowed total remote control of iPhones via WiFi

Total remote control of iPhones demonstrated

A massive security failing by Apple allowed an attacker to take total remote control of iPhones within WiFi range. They would be able to download all the data on the phone, and even activate the iPhone’s cameras and microphones to provide real-time spying capabilities.

The vulnerability was not just a theoretical risk: a noted Google security researcher was able to demonstrate the capabilities by taking full remote control of an iPhone in another room …

Expand Expanding Close

PSA: Don’t enable an Apple ID recovery key yet – or maybe ever

Apple ID recovery key

We explained way back in 2014 why you might want to have an Apple ID recovery key. In those days, it was an extra precaution you could take against getting locked out of your account.

Apple abandoned recovery keys when it switched to a smarter two-factor authentication process, before reintroducing them in a new form in iOS 14. However, they now work in a different way. You definitely won’t want to enable one now, and you may not want to do so ever …

Expand Expanding Close

[Update: Apple explains and addresses] Recent server outage reveals potential Mac privacy concerns

Mac M1 Apple Silicon privacy concerns

As Apple launched its new macOS operating system to the public yesterday, serious server outages occurred that saw widespread Big Sur download/install failures, iMessage and Apple Pay go down but more than that, even performance issues for users running macOS Catalina and earlier. We learned why that happened at a high-level yesterday, now security researcher Jeffry Paul has shared a deep-dive of his understanding along with his privacy and security concerns for Macs, especially Apple Silicon ones.

Update: Apple has shared a response to Paul’s concerns in an updated support document that includes what macOS does to protect your privacy and security, and three new steps it will take in the future for greater privacy and flexibility.

Expand Expanding Close

T2 exploit team demos a cable that hacks Mac without user intervention [U]

T2 exploit demo

Update at the bottom: Another team with another cable able to hijack a Mac, among other devices.

The T2 exploit team who found a way to take over the security chip in modern Macs has demonstrated a way to do so without user intervention — using nothing more than a modified USB-C cable.

The ad-hoc team, who call themselves Team t8012 after Apple’s internal name for the chip, believe that nation-states may already be using this approach.

Expand Expanding Close

T2 security chip on Macs can be hacked to plant malware; cannot be patched

T2 security chip can be hacked

Speculation that the T2 security chip on modern Macs can be hacked has been confirmed by the team behind the research. A combination of two different exploits would give a hacker the ability to modify the behavior of the chip, and even plant malware like a keylogger inside it.

All Macs sold since 2018 contain the T2 chip, and because the attack uses code in the read-only memory section of the chip, there is no way for Apple to patch it …

Expand Expanding Close
Twitter security includes physical security keys for staff

Twitter security: physical security keys for staff; election protection measures

Twitter security made the headlines for all the wrong reasons back in July, when a major hack saw many high-profile accounts taken over to post a cryptocurrency scam. Affected accounts included Apple, Elon Musk, Joe Biden, and Barack Obama.

The company has now implemented a range of security measures in response, including physical security keys for two-factor authentication of staff with access to accounts …

Expand Expanding Close

Feature Request: Allow our Apple Watch to unlock our iPhone and iPad

Apple Watch to unlock an iPhone or iPad

Update: Apple implemented this request in iOS 14.5 and watchOS 7.4.

Face ID is normally a completely seamless way to unlock an iPhone and iPad: just swipe up and it unlocks automatically. At a time when we’re frequently wearing masks, however, it’s rather less seamless.

So we’d like to see Apple allow an unlocked Apple Watch to automatically unlock an iPhone and iPad …

Expand Expanding Close

iOS 14 introduces privacy ‘nutrition labels’ for apps, here’s how developers can prepare

Apple app privacy details nutrition labels developer support document

After announcing new iOS privacy requirements back at WWDC in June, Apple has shared a new detailed document for developers as they prepare to create privacy “nutrition labels” for apps. The new iOS 14 feature will apply for all apps that are available in Apple’s App Stores with the goal to better inform consumers with a clear overview of an app’s privacy practices.

Expand Expanding Close

Apple battles Mac malware disguised as Adobe Flash after accidental notarization

While Apple’s devices are typically more secure than the competition, that doesn’t mean they’re immune to flaws. In the case of the Mac, a new report highlights how Apple accidentally approved one of the most common malware threats to run on recent versions of macOS. While the original flaw was quickly fixed, another similar one has popped up.

Read more

Can police demand you unlock your phone? NJ court says yes.

Can police demand you unlock your phone

Can police demand you unlock your phone if they want to examine it for evidence? Courts in different states have given different answers to this question, but New Jersey’s Supreme Court has ruled that the answer is yes. The court decided that a suspect can be forced to use his passcode to unlock his phone.

Despite the ruling coming from the state’s Supreme Court, however, that may not be the final, definitive answer …

Expand Expanding Close

New ‘unpatchable’ exploit allegedly found on Apple’s Secure Enclave chip, here’s what it could mean

One of the major security enhancements Apple has brought to its devices over the years is the Secure Enclave chip, which encrypts and protects all sensitive data stored on the devices. Last month, however, hackers claimed they found a permanent vulnerability in the Secure Enclave, which could put data from iPhone, iPad, and even Mac users at risk.

Expand Expanding Close