iPhone Privacy ‘Lies’ Exposed Again: Apple Analytics not Anonymous

iPhone Privacy ‘Lies’ Exposed Again: Apple Analytics not Anonymous

Apple has been caught lying in a privacy policy. So say the now-notorious security researchers at Mysk ...
Security Boulevard
Lockdown Mode: Apple to protect users from targeted spyware attacks

Lockdown Mode: Apple to protect users from targeted spyware attacks

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies. “Lockdown Mode” is scheduled to arrive ...
DuckDuckGo Browser and Microsoft Trackers, Verizon Employee Database, Attacking Powered Off iPhones

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee ...

Faking an iPhone Reboot

Researchers have figured how how to intercept and fake an iPhone reboot: We’ll dissect the iOS system and show how it’s possible to alter a shutdown event, tricking a user that got ...
SMS messages

FluBot malware warning after 70,000 attacks launched over SMS

Finland’s National Cyber Security Centre (NCSC-FI) has issued a warning about malicious SMS messages that have been spammed out to mobile users, directing iPhone owners to phishing sites and Android users to ...
Mac UK - Virus

The Coming Mac Threat (Revisited)

How we viewed security for the Mac in 2008. This is a republished article from MacUser magazine. In The Coming Mac Threat (Revisited) we look at how experts perceived security for the ...
How Hidden Vulnerabilities will Lead to Mobile Device Compromises

How Hidden Vulnerabilities will Lead to Mobile Device Compromises

Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that ...
privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Jailbreak or Jail – Is Hacking for the Government A Crime?

After the horrific shooting in San Bernardino, California, federal law enforcement officers seized the now-dead suspect’s iPhone, and sought to examine it. However, the phone was “locked” using proprietary hardware and software ...
Security Boulevard

Details on the Unlocking of the San Bernardino Terrorist’s iPhone

The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was ...