Apple and the Department of Justice are not getting along these days. The DoJ wants Apple to feed them real time iMessage traffic for someone the DoJ is quietly investigating. Apple says that the way their system is designed, this is not possible. If the user stores their messages in iCloud, they can give the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In addition to the traditional ransomware that everyone knows about, the AdultFriendFinder breach I wrote about earlier has the hackers blackmailing users of the site. Now, mSpy clients are being extorted too. Brian Krebs is reporting that hackers are using the mSpy breach to extort iPhone users. Apparently, users who have mSpy installed are asked […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at the RSA conference this week disclosed an interesting iOS hack that would allow an attacker to put an iPhone into an endless reboot loop with no way for a user to get out of it. The attacker would need to set up a bogus WiFi hotspot near the target iPhone. This hotspot can […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who read the security news, you know that this last 12 months has brought an amazing number of SSL bugs to the surface (see a few of my blog posts here and here and here). Now iPhone and iPad users have their turn to deal with an SSL bug. The bug, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is being reported by several sources (see here) that iPhone and iPad users are being targeted as part of a massive cyber espionage campaign that is being linked, at least by one firm, to Russia. Operation Pawn Storm is using a specially crafted iOS app to quietly steal text messages, contact lists, location information, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]