Skip to main content

Security

See All Stories

Facebook tried to buy controversial tool to spy on iPhone users, court filing reveals

Mark Zuckerberg announces Meta lay

Over the last few years, Facebook has had a slew of privacy and security blunders and more details about one of them have come to light through a new court filing as the social media company is suing the spyware company NSO Group. It turns out Facebook tried to buy controversial government spyware to monitor iPhone and iPad users.


Expand
Expanding
Close

White-hat hacker able to hijack iPhone camera; Apple has now fixed

Hacker managed to hijack iPhone cameras

A white-hat hacker was able to hijack iPhone cameras using a chain of three vulnerabilities he discovered. The same approach would also work with the cameras on Macs.

Ryan Pickren disclosed the vulnerabilities to Apple in December of last year. The company fixed the most serious of them in January, and the rest last month.

The approach relied on an exception to the normal privacy requirement for apps to seek permission for camera or microphone access…


Expand
Expanding
Close

[Update: Zoom patches and responds] Ex-NSA hacker finds new Zoom flaws to takeover Macs again, including webcam, mic, and root access

zoom vulnerability

Zoom, the popular video call service has had a number of privacy and security issues over the years and we’ve seen several very recently as Zoom has seen usage skyrocket during the coronavirus pandemic. Now two new bugs have been discovered that allow hackers to take control of Macs including the webcam, microphone, and even full root access.


Expand
Expanding
Close

Zoom video calls are not actually end-to-end encrypted

As reported by The Intercept, the Zoom video conferencing app offers options for end to end encryption in its UI (and in its marketing materials) but the calls are not actually end-to-end encrypted at all.

The Zoom video app is bursting into the public consciousness this year as the coronavirus causes most people to work from home. However, the security of the app has come under fire in many ways. In this instance, it turns out Zoom calls are only encrypted in transmission. This means the central Zoom servers could decrypt the incoming calls and see all participants if the company wanted to.


Expand
Expanding
Close

Bug in iOS 13.3.1 and later keeps VPNs from encrypting traffic, but there’s a simple workaround

iPhone X status bar

A bug in Apple’s recent iOS releases, including this week’s iOS 13.4 is keeping VPNs from being able to fully encrypt user traffic and data. Apple is aware of the issue and is currently working on a fix. In the meantime, there’s an easy workaround you can use to keep your VPN connection working as intended.


Expand
Expanding
Close

iOS 13 sees 68% drop in background location tracking

[Update: $200M fine proposed] FCC investigation finds wireless carriers broke federal law by selling user location data

Just about a year ago, it came to light just how easy it was to buy the real-time location data of US wireless customers via lax carrier standards, shady third-parties, and bounty hunters. Now after an “extensive investigation” the FCC has declared that “one or more wireless carriers apparently violated federal law.”


Expand
Expanding
Close

Governments don't understand how end-to-end encryption works

Comment: It’s time for governments to learn how end-to-end encryption works

There’s an emerging health crisis at the moment, besides coronavirus: the head injuries caused by techies banging their heads on their desks at each piece of evidence that governments don’t understand how end-to-end encryption works.

The latest example of this, reported in the Guardian, was the head of Britain’s domestic counterintelligence and security agency, MI5, calling on tech companies like Apple and Facebook to continue to offer end-to-end encryption, but to provide MI5 access “on an exceptional basis”… 


Expand
Expanding
Close

Security demo reminds iOS users that any app (or widget) can read the clipboard silently

A new demo from researchers at Mysk shines a light on the free, unrestricted, access all apps have to the iOS clipboard.

In the video, the developers create a dummy app that simply prints out the information gleaned from the clipboard. When the user copies an image, the app can immediately see the image content and the metadata like the location of where the photo was taken. This becomes a little more sinister when the demo shows that installed widgets can also silently collect all data copied to the clipboard, without user knowledge.


Expand
Expanding
Close