AG Says They Unlocked Shooter’s iPhone Without Needing Apple to Hack Their Security For a couple of decades the FBI and Justice Department has been saying that software vendors need to insert backdoors into their security software to make it easier for the government to hack it if they want to. One high profile case […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple’s Ad Tracking Crackdown Shakes Up Ad Market Two years ago Apple decided that since they don’t earn a lot of revenue from ads and Google, their competitor in the phone business, does, wouldn’t it be great to do something to hurt them. Oh, yeah, we can pretend the real reason we are doing it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Facebook/Cambridge Analytica Suit Moves Forward Facebook tried to convince a judge that when users share information privately on Facebook they have no expectation of privacy. The judge didn’t buy it and the suit against Facebook moves forward. Source: Law.com (registration required) Equifax Quietly Added More Hoops for you to get your $0.21 Yes, if everyone […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10. For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request. So yet another reminder that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple uses contractors to listen to Siri recordings to figure out whether Siri responded correctly. Apple says that these contractors are under non-disclosure agreements and the Siri conversations are not directly tied to the person’s iPhone or Apple credentials. Still, these people hear about: Confidential medical conversations People having sex Drug deals Other likely illegal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
All smartphones are data collection machines; hopefully everyone understands that. There are an amazing number of sensors on the device and many apps just ask for everything. If the user grants that, then the app can harvest all that data and likely sell it, either individually or in the aggregate. Researchers took a tiny sample […]
Continue reading →
[DISPLAY_ACURAX_ICONS]