Skip to main content

Security

See All Stories

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

iPhone spy tool

A spy tool developed by former U.S. government intelligence operatives reportedly allowed the United Arab Emirates government to remotely hack the iPhones of diplomats, activists and even foreign leaders.

The tool apparently didn’t require the victim to click a link, but could somehow be activated simply by loading in the phone numbers or email addresses of the intended targets …


Expand
Expanding
Close

Comment: Apple’s own privacy standards make FaceTime bug massively damaging

The revelation that a major FaceTime bug can effectively turn your Apple devices into a hot mic, allowing a caller to hear or even see you before you pick up, would be a massive embarrassment no matter which company was involved. It’s an absolutely crazy security fail.

But when that company is Apple – which has been ceaselessly pushing privacy of late – it becomes so cringeworthy we’re going to have to invent a whole new scale just to measure it …


Expand
Expanding
Close

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

UPDATE: Apple has taken Group FaceTime offline in an attempt to address the issue in the interim.

A significant bug has been discovered in FaceTime and is currently spreading virally over social media. The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their phone — before the person on the other end has accepted or rejected the incoming call. Apple says the issue will be addressed in a software update “later this week”.

Naturally, this poses a pretty big privacy problem as you can essentially listen in on any iOS user, although it still rings like normal, so you can’t be 100% covert about it. Nevertheless, there is no indication on the recipient’s side that you could hear any of their audio. There’s a second part to this which can expose video too …


Expand
Expanding
Close

Two-factor authentication: Why do I need it? What are the best apps?

two-factor authentication

Security on the internet has become more important with each passing year. It seems like every other month there is a major data breach from major retailers or online properties. One of the key things that you can do to minimize the effect these breaches will have on you is to set up and use two-factor (or multi-factor) authentication. Two-factor authentication can be explained as something you know (your password) and something you have (a smartphone or another authorized device). With most implementations, you will log in to a website using your normal login, and you will then prompted to input a secondary code. The secondary code can be generated in multiple ways (more on that later) and changes every thirty seconds. By enabling two-factor authentication on websites that support it, a hacker wouldn’t be able to log in just using your username and password. They’d need access to your two-factor authentication database in order to access the current code.
Expand
Expanding
Close

Apple privacy

T-Mobile and Sprint promise to stop selling user location data to third-parties, for real this time

Update: AT&T now says it will also stop selling user location to aggregation services, according to CNET.

After Motherboard published details about a concerning investigation into how US wireless carriers are selling user location data to third-parties, T-Mobile and Sprint have made some fresh promises. They say they will end the practice of selling users’ data to third-party aggregators that often have little to no oversight.


Expand
Expanding
Close

Package tracking app turns users’ devices into a bot farm, violates user privacy

package tracking app bot farm

We’ve been seeing a lot of scam apps in the App Store lately, which try to trick users into purchasing expensive subscriptions or products, we’ve also seen apps that track and transmit the user’s location without their consent. Today, I want to talk about an app that’s using iOS devices to perform work for other users, without the device owner’s consent.


Expand
Expanding
Close

Viral ‘Twinning’ app from Popsugar matches selfies with celebrities … and exposed personal photos

Twinning app

Over the last few days, a Twining app from Popsugar has gone viral across various social media platforms. Essentially, the service allows you to snap a selfie of yourself and get an instant result showing which celebrity you look like most. As it turns out, somewhat unsurprisingly, privacy wasn’t necessarily a focus for Popsugar when developing the Twinning app…


Expand
Expanding
Close

open source VPN

‘Confirmed VPN’ iOS/macOS update makes it the first open service with third-party audits, open source code, more

Confirmed VPN launched last year for iOS, macOS and more, but it has been working on something bigger than just another VPN service. Today, the company has made its apps openly operated with third-party audits, open source code, audit logs, and much more. It is also inviting other VPN services to join the platform called Openly Operated.


Expand
Expanding
Close

Super Micro audit complete, including servers supplied to Apple: no spy chips found

Super Micro

The tech news was dominated in October by a dramatic Bloomberg claim that Chinese spy chips had been embedded into the Super Micro motherboards of servers supplied to Apple, Amazon and others. The report claimed that Apple had discovered the chips, and reported the fact to the FBI.

All involved – Apple, Amazon and Super Micro – denied the claims, but the motherboard supplier decided the only way to lay this to rest was to commission an independent audit to investigate. That investigation has now been completed, and the firm says it found absolutely no evidence to support the story …


Expand
Expanding
Close

Security expert Jon Callas makes second exit from Apple to join ACLU

Apple security

An Apple security expert, who was previously hired back in 2011, and then re-hired in 2016, is now leaving the company to join the American Civil Liberties Union. Apple often touts its security and privacy efforts, so having someone who worked on Apple’s security team leave the company is always interesting, let alone leaving the company twice…


Expand
Expanding
Close

PSA: If you’ve ever used a Sennheiser headset with your Mac, it is wide open to attack

HeadSetup

If you’ve ever used a Sennheiser headset or speakerphone device with your Mac (or Windows PC), the accompanying HeadSetup app has left your machine wide open to attack.

In what has been described as a ‘monumental security blunder,’ the app allows a bad actor to successfully impersonate any secure website on the Internet …


Expand
Expanding
Close