Apple outlines diagnostic capabilities in response to iOS ‘backdoor’ concerns

iOS 7 teaser (iPhone 5s ad 009)

Forensic expert, and former jailbreak hacker, Jonathan Zdziarski caused quite a stir earlier this week when he published a report accusing Apple of building backdoors into iOS that could be used for government surveillance.

Apple of course came out and denied the claim, saying that these so-called ‘backdoor services’ are actually used for troubleshooting. But this wasn’t a good enough explanation for a lot of users, so tonight it delved a little deeper…... Read the rest of this post here


"Apple outlines diagnostic capabilities in response to iOS ‘backdoor’ concerns" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Former jailbreak hacker accuses Apple of building surveillance backdoors into iOS

iOS 7 (App Store teaser 002)

Former iPhone jailbreak hacker Jonathan Zdziarski recently gave a presentation at the HOPE/X conference regarding iOS device security. He said that the platform is reasonably secure from attacks by malicious hackers, but noted there are several backdoors built-in for surveillance.

In the presentation, called ‘Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,’ Zdziarski detailed a number of undocumented high-value forensic services running on iOS devices, and suspicious design omissions in the OS, that appear to be for snooping… ... Read the rest of this post here


"Former jailbreak hacker accuses Apple of building surveillance backdoors into iOS" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Security researcher: iOS security has been intentionally compromised by Apple

Apple's iPhone and iOS Security and Privacy

Apple’s placing a lot of emphasis on iOS security (especially when compared with that "toxic hellstew" Android) and on privacy (again, compared to its rival) but it turns out that iOS might not be as secure or private as Apple has led customers to believe. Security researcher Jonathan Zdziarski has a new paper out calledIdentifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices,” in which he reveals Apple’s complex tools inside iOS that would allow Apple to share certain user data at the request of law enforcement without the user knowledge.

More importantly, with or without Apple's help, spying agencies such as NSA and other third parties that are very familiar with how iOS operates can apparently use these vulnerabilities to grab plenty of data from an iPhone, or to install applications for spying and other malicious purposes without the user’s knowledge.

Continue reading...

Geohot joins elite team of hackers for Google’s Project Zero

MEMBER EXCHANGE-PEOPLE

Since wunderkind George Hotz, better known as Geohot, first made a name for himself by hacking the iPhone at age 17, he’s bounced around to several projects. He hacked the PlayStation, did some work for Facebook, and more recently popped up in Android land.

His latest gig is an internship for Google’s Project Zero—a team of elite hackers tasked with finding and eradicating serious software vulnerabilities. Back in March Geohot won $150K for exposing Chrome exploits, and it seems the Mountain View company took notice…... Read the rest of this post here


"Geohot joins elite team of hackers for Google’s Project Zero" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Apple patent would let iPhone lock itself in case of unusual user behavior

Appe patent (unusual user behavior 001)

Apple is researching new methods of securing data on your iPhone by sending an alert to another device or locking it altogether to protect against theft should it detect a pattern of unusual behavior.

The United States Patent and Trademark Office today published an Apple patent for “Generating notifications based on user behavior”.

The document outlines a method by which an iPhone could automatically lock itself or set off an alert in case it detects unusual changes in user behavior. Read on for more…... Read the rest of this post here


"Apple patent would let iPhone lock itself in case of unusual user behavior" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Apple ID 2-step verification live in 48 new markets

two-step 6

It appears that Apple has rolled out its two-factor authentication feature for Apple ID accounts in an additional 48 markets, bringing the total number of countries which support this security-minded feature to a cool 59.

Two-factor authentication bolsters up your security when logging in to your Apple ID account on the web by combining something you know – your Apple ID username and password or a Recovery Key – with something you own – a four-digit authorization code sent to your iPhone, iPod touch or iPad device…... Read the rest of this post here


"Apple ID 2-step verification live in 48 new markets" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Now they tell us: Microsoft says strong passwords are overrated

Best Password Tips Microsoft

You know all the time and trouble you put into making and memorizing unique strong passwords for every website you visit? Well, Microsoft says a lot of that was likely misspent energy. The Guardian informs us that new research from Microsoft (PDF) shows that we probably shouldn't use strong passwords for all our websites and that having weak passwords will suffice in many circumstances.

Continue reading...

These are the absurd names British intelligence spies have to remember to spy on you

GCHQ Names for Spying Tools

In case you didn’t know it by now, spy agencies are really good – and hopefully effective – at spying on people, including both actual valid targets as well as unsuspecting citizens who aren’t plotting anything bigger than a trip to an exotic country. To further demonstrate the power of one such agency – NSA’s close buddy, the British GCHQ, in this case – The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names.

Continue reading...

Apple is now encrypting your iCloud emails in transit between providers

iOS 7 Mail

A month ago, Apple confirmed that it would soon start encrypting iCloud Mail traffic in transit.

As Google’s Transparency Report noted at the time, Apple and several major email providers did not properly encrypt email messages sent and received from other providers like Gmail and Yahoo, creating security concerns.

Although Apple only encrypts emails sent between its own iCloud customers, the company appears to have stepped up iCloud Mail security and is now finally protecting your emails from eavesdropping as they travel between various third-party email service providers using end-to-end encryption…... Read the rest of this post here


"Apple is now encrypting your iCloud emails in transit between providers" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.

Apple responds to Chinese media warning against iPhone location tracking

Frequent Locations settings

Last week, China’s state-run China Central Television broadcasted a report that labeled the iPhone as a “national security concern.” More specifically, the CCTV criticized the “frequent locations” function in iOS 7, which records time and location for the owner’s movements.

Yesterday, Apple issued an official response to the report on its Chinese website. The statement reaffirms the company’s commitment to privacy, and states that the Location Services found in the iOS firmware are only used to help users for activities that require navigation…... Read the rest of this post here


"Apple responds to Chinese media warning against iPhone location tracking" is an article by iDownloadBlog.com.
Make sure to follow us on Twitter, Facebook, and Google+.