A while back, when the world was made aware of the Heartbleed bug, there was hue and cry all over, mainly because the bug was discovered in a system that was widely used and implemented across the Internet. Today, a new threat has surfaced that's perhaps bigger than Heartbleed. Labeled the Bash bug - or Shellshock - the new vulnerability affects almost all Linux and Unix based systems, as the vulnerability exists in the Bash command that's widely implemented in Unix systems. The good news, at least for Mac OS X users, is that Apple is actively working to patch it and release a fix that can put users' minds at ease.
By and large, jailbreaking is a relatively safe affair to perform, and as long as you abide by the precautionary steps that must be taken when opening areas of the ecosystem ordinarily shut off by Apple, you're generally safe. However, given that third parties can access root files, things can sometimes go horribly wrong, and with the jailbreak scene having been afflicted by two widespread incidents in the past five months, another piece of malicious software is said to be capable of stealing your Apple ID and password to buy apps without your consent.
Given the recent spate of celebrity phone compromising, allied to the fact that Apple is about to roll out its new mobile payment system with iOS 8 and the new iPhone 6 / 6 Plus, and it's fair to say that these are testing times for the company. From a security point of view, the Mac maker will want to avoid any more high-profile gaffes as it looks to win the trust of the consumer market, and although the new iOS 8 GM has fixed some vulnerabilities first highlighted by a seasoned security researchdf, a few still continue to linger.
Last week, numerous celebrities found themselves victims of a widespread hack, and although Apple stepped out with a statement to swiftly deny any wrongdoing, CEO Tim Cook did outline the company's intention to strengthen up security. As a number of users have already discovered, though, some of these improvements are already in place, with email notifications going out to users when a password change is or device restore is attempted, as well as when a login from a new device occurs.
This week's headlines have been dominated by yet another incident regarding the compromising of mobile devices, with several celebrities and news outlets having outlined Apple's iCloud as the wrongdoer in this particular sequence of events. But while, after an internal investigation, the Cupertino company has since stepped out and inferred that private photos wouldn't have leaked out if two-step verification were present, one reporter has done a little digging of his own, and found that in certain pockets of the Web, folks are using law enforcement tools to snatch iCloud backups of unwitting victims.
In case you missed it, a number of high-profile celebrities had their very private images leaked onto the Web. But while it was rumored that Apple's iCloud infrastructure was to blame for the large-scale breach, the Cupertino giant has stepped out and denied that its services were to blame in an official statement on the matter.
Big breaches of security are never fun, but when you're the provider of cloud storage that holds all kinds of personal data, things can get particularly hairy when someone finds a way through. That's the situation Apple finds itself in today, or at least, that's the claim.
If you thought that your expensive Wi-Fi access point or router was secure, you may need to think again after a flaw was found in at least two of the chipsets used by hardware manufacturers.
Andrei Neculaesei, a full-stack Copenhagen based developer, has thrown his hat into the mobile app security debate by expressing concern regarding poorly implemented security relating to URI schemes within many popular apps. Neculaesei believes that the fact that many developers neglect to implement vital security measures within their apps could potentially lead to unwitting users falling victim to malicious services that could, in theory, invoke expensive phones calls on the device being used.
We're all tech lovers at heart here, and given the fact that you're reading this then we're going to go out on a limb and assume you are, too. That assumption means that you're probably guilty of buying and selling your fair share of smartphones too, just like the rest of us.
















