Apple

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Apple vs. UK — ADP E2EE Back Door Faceoff
Richi Jennings | | #nobackdoors, ADP, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, SB Blogwatch, uk, UK Investigatory Powers Act, Won’t somebody think of the children?
Won’t Tim Think of the Children? End-to-end encryption battle continues ...
Security Boulevard

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
Tom Eston | | Apple, canada, cisa, Concerns, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, DOGE, economy, encryption, Encryption Backdoor, Episodes, government, Impact, Incompetence, Information Security, Infosec, Jokes, national security, Phishing, Podcast, Podcasts, Privacy, security, technology, Trump, uk, Weekly Edition
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on ...

Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
Richi Jennings | | AirTag, AirTags, Apple, Apple AirTag, apple bug, apple hack, apple hacker, Apple iCloud, BLE, bluetooth, Bluetooth low energy, Bluetooth Protocol, bluetooth security, Bluetooth vulnerability, Find My iPhone, ICloud, icloud hack, nRootTag, OpenHayStack, SB Blogwatch
Dumb Design + Crud Code = Privacy Panic: It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs ...
Security Boulevard
UK Demanded Apple Add a Backdoor to iCloud
Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United Kingdom. But the British ...

Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum
Richi Jennings | | #nobackdoors, ADP, Andy Biggs, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Tulsi Gabbard, uk, Won’t somebody think of the children?
Just meet me at the ADP: Sen. Ron Wyden and Rep. Andy Biggs got no love for the United Kingdom ...
Security Boulevard
UK Is Ordering Apple to Break Its Own Encryption
Bruce Schneier | | Apple, backdoors, cloud computing, Data Privacy, encryption, law enforcement, Privacy, uk, Uncategorized
The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring it to break the Advanced Data ...

SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws
Richi Jennings | | Apple, apple bug, Apple Data Security, Apple Silicon, ARM, Arm CPU Attack, arm64, Daniel Genkin, FLOP, iPad, iPhone, Jalen Chuang, Jason Kim, Mac, SB Blogwatch, Side-Channel, side-channel attack, side-channel attacks, SLAP, Spectre, Spectre attack, Spectre variant, speculative execution, Yuval Yarom
Watch this: Want more “speculative execution” bugs? You’re gonna be in a great mood all day ...
Security Boulevard

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety
Tom Eston | | AI, AI Risks, AI safety, Apple, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Happy New Year, Information Security, Infosec, ios, iPhone, Mobile, New Year, Podcast, podcasting, Podcasts, Privacy, security, Smart Phone, Stolen Device Protection, technology, Weekly Edition, Y2K
Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises ...

Auto Creating Reminders from Email Messages
In my constant state of trying to make things a bit more efficient for myself. (I'm a big believer in automation, ask anyone that has ever worked with me.) We have computers! ...