Data Security: Hot Stories

Search Result for iPhone in All Fields - Find 9 Stories

 Search Stories
Hot Words
Key Words
In Field

 Search Result for iPhone in All Fields - Find 9 Stories
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
Apps are main risk of your iPhone data leak. By Sudo Security Group, 19 of 76 apps are high-risk. Your financial or medical credentials, authentication tokens, or any else could be siphoned off by hackers. Local network, namely Wi-Fi, is the core of these risks. You cannot always keep your iPhone from Wi-Fi, a few seconds are enough for attackers to transfer credentials through unsafe apps...
By Thomas Fox-Brewster  View Source  
Apple Rushes Out iOS Update To Fix Spyware Threat
Apple has issued an emergent upgrade of iOS mobile operating system, for its iPhone and iPad, after a botched attempt to break into the iPhone of an Arab activist using hitherto unknown espionage software.
By Associated Press  View Source  
The Best Encryption Software
Do you remember the story of Bernardino shooter's iPhone? FBI needed information encrypted in the phone, but Apple refused to offer a back door to get it. No such back door existed as Apple said? None knows the truth. The FBI had to hire hackers to get into the phone...
By NEIL J. RUBENKING  View Source  
A Single Text Gives Hackers to Access iPhone
By latest security research, All Apple devices, especially iPhone, can be corrupted simply by receiving a malicious image text, even through a webpage on Safari browser. This test creates a memory overflow, and then allows for "remote code execution on vulnerable systems."
By Darren Orf  View Source  
Apple engineers note that hackers are the real danger to our security
There's been a lot of talk recently about the U.S. government's position concerning mobile security, encryption, and the sanctity of personal data. This came about when Apple refused to help the FBI unlock the San Bernardino suspect's iPhone 5c on ethical grounds. Since, the FBI called in so-called “pro hackers” to do the job; the iPhone has been...
By Joe White  View Source  
The Strange Origins of TrueCrypt, ISIS Favored Encryption Tool
Before companies like Apple and Microsoft built encryption into their products, before Apple took on the U.S. government (briefly) over the unlocking of a San Bernardino shooter’s iPhone, TrueCrypt and programs like it were the primary means for securing files and disks by those with a privacy bent of whatever stripe. Free to download and...
By EVAN RATLIFF  View Source  
iPhone 6 Touch ID ‘hacked’ days after launch, poses absolutely no threat to anybody
Just days after the iPhone 6 and iPhone 6 Plus went on sale, a security researcher has managed to ‘hack’ the new, improved Touch ID sensor. Except, despite what the fear-mongering report from the International Business Times might have you believe, this ‘hacking’ poses absolutely no risk to any iPhone owner whatsoever. According to the report, a...
By Adam Oram  View Source  
What To Do If Your iPhone Is Hacked And Remotely Locked
This week, in the hours before daylight, a hacker sent an unsettling alert to iPhone users in Australia. The husband of a Sydney council member received the message at 4 a.m.; a graphic designer was awakened at 2 a.m. Their phones had been hacked and locked by "Oleg Pliss" and were being held for ransom, unless the users sent money to a PayPal...