Skip to main content

Security

See All Stories

Comment: Mac malware is growing, but there are three important riders

Mac malware is growing but

Malwarebytes is out with a new report in which it states that Mac malware is growing faster than that for Windows.

For the first time ever, Macs outpaced Windows PCs in number of threats detected per endpoint […]

In total, we saw approximately 24 million Windows adware detections and 30 million Mac detections.

That’s getting a lot of headlines today, but there are three key things that need to be understood…


Expand
Expanding
Close

Apple joins Fido Alliance, wants to replace passwords with trusted devices

Fido Alliance wants trusted devices to replace passwords

The Fido Alliance, an organization committed to eliminating the need for passwords, received a big boost last week when Apple signed up as a board member. Fido stands for Fast IDentity Online.

Apple apparently wasn’t ready to announce its support immediately, as tweets from a Fido Alliance conference were quickly deleted, but as of today, the news is official…


Expand
Expanding
Close

Despite known methods, FBI claims it still can’t unlock iPhones in Pensacola case

FBI Apple Pensacola iPhone case

In early January, the FBI asked Apple to unlock two iPhones as part of the Pensacola case. Apple stood its ground and said it wouldn’t create a backdoor for iOS but would help as much as it could without crossing that line. Even though the FBI has the ability to unlock the iPhone 7 and iPhone 5 with the help of third-parties, today it said it still hasn’t been able to get to the data on the devices.


Expand
Expanding
Close

Philips Hue vulnerability lets hacker control bulbs, could escalate to network

Philips Hue vulnerability lets hacker control bulbs

A Philips Hue vulnerability allows a hacker to take control of individual bulbs, switching them on or off at will, as well as changing both color and brightness. This can be done remotely using a laptop with radio transmitter. You can watch a demonstration video below.

While that risk remains, the company has acted to block an escalation vulnerability that previously allowed the attacker to compromise the Hue bridge and from there the rest of the network, including any PCs connected to it…


Expand
Expanding
Close

Iowa caucus app

Iowa caucus app: no security vetting, no testing, no training – NYT [U]

Update: The Iowa Democratic Party has issued a statement, below, saying that data was correctly logged but not properly reported due to a bug in the app. It also claims that it did put the app through independent security testing, contradicting the claim made by the NYT.

Failures surrounding the use of a new Iowa caucus app have seen the Iowa Democratic Party unable to promptly report the results of the first party member vote for its 2020 presidential candidates. A report on the debacle describes it as a ‘systematic disaster’…


Expand
Expanding
Close

Jeff Bezos iPhone hack: Evidence not conclusive, say other security experts

Jeff Bezos iPhone hack questioned

Doubt is today being cast on a reported Jeff Bezos iPhone hack, which was said to have given attackers full access to the photos and messages stored on his iPhone X.

The report was based on analysis by a cybersecurity firm commissioned by the Amazon founder to find out how private messages and photos were obtained by the National Enquirer


Expand
Expanding
Close

Jeff Bezos iPhone X hack gave full access to his photos and messages

Jeff Bezos iPhone X hack

A forensic analysis shows that a sophisticated attack on Jeff Bezos’ iPhone X gave full access to both his photos and messages.

The attack, and the alleged attempted blackmail that followed, led to the famous “No thank you, Mr Pecker” blog post in which the Amazon founder decided to go public about the existence of embarrassing texts and photos…


Expand
Expanding
Close

Google researchers disclose multiple privacy flaws in Safari’s Intelligent Tracking Prevention feature

Google researchers have discovered “multiple security flaws” in Apple’s Safari browser, a new report from the Financial TImes says. The flaws were found in Safari’s Intelligent Tracking Prevention feature, which is designed to protect users from cross-site tracking and other online privacy concerns, and have since been fixed.


Expand
Expanding
Close

Here’s what a $10 million lab dedicated to cracking iPhones looks like

10 million dollar iPhone cracking lab

Kicking off 2020, security and privacy is a hot topic between the latest standoff between Apple and the FBI over the Pensacola incident as well as Apple reportedly abandoning its plan to bring end-to-end encryption to iCloud backups. With an in-depth report on what a robust iPhone cracking operation looks like from the inside, Fast Company shares some fascinating details and photos of NYC’s $10 million cyber lab.


Expand
Expanding
Close

Review: SecureDrive BT, the encrypted external SSD you can unlock with Face ID

SecureDrive BT encrypted external SSD

If you’re looking for a secure external drive that meets both US military and government security standards, there are a number of encrypted external SSD options around. I reviewed one approach a couple of years ago, the iStorage diskAshur 2, which has a built-in PIN pad for entering a seven- to 15-digit code to unlock the drive.

The SecureDrive BT is a similar idea, but instead of a PIN pad, you unlock it via Bluetooth. Specifically, when you plug the drive into your Mac, you can use Face ID on your iPhone to unlock it…


Expand
Expanding
Close

Alarming test shows US carriers fail to protect you against SIM-swap attacks

US carriers make SIM-swap attacks easy

An alarming test carried out by Princeton shows that the five largest US carriers fail to properly protect their customers against so-called SIM-swap attacks.

They were able to persuade the carriers to assign phone numbers to new SIMs without successfully answering any of the standard security questions. Once a phone number has been reassigned to a SIM in the possession of an attacker, they can reset passwords even on accounts protected by two-factor authentication (2FA)…


Expand
Expanding
Close

Apple removes popular chat app ToTok after reports that it’s a govt spy tool

Aldar Building where ToTok and UAE intelligence agency were both based

Apple has removed ToTok from the App Store after a classified intelligence assessment and a New York Times investigation said that the app was a spy tool used by the United Arab Emirates.

The chat app, which last week became one of the most downloaded social apps in the US, was revealed to be feeding highly sensitive personal data to the UAE government…


Expand
Expanding
Close

Email usernames and passwords can be extracted from locked iPhones on iOS 13.3

Elcomsoft can access some data from locked iPhones

Elcomsoft, a company which sells tools to law enforcement agencies to access locked iPhones, says that it is now able to extract some data from devices running any version of iOS from 12.0 to 13.3.

It relies on the checkm8 exploit of a vulnerability present in most A-series chips, which made possible the Checkra1n jailbreak.

Crucially, Elcomsoft says that the $1,495 tool works even when the iPhone is in its most secure state, known as BFU…


Expand
Expanding
Close