Posts tagged "apple"

Shortsighted Federal Bureau of Investigation Considered Taking Apple to Court Over Encryption Fears

The shortsighted Federal Bureau of Investigation considered taking Apple to court due to their encryption capabilities built-in to iMessage, Facetime, and iOS devices: The clash with Cupertino was reportedly sparked by an investigation this summer — “involving guns and drugs” — in which a court order was obtained, demanding that Apple provide real time iMessages… Continue reading

Obama Administration War Against Apple and Google Just Got Uglier

The ostensible Obama administration’s war against Apple and Google providing device encryption on by default has gotten uglier with the prospect that the companies could potentially be held liable for providing material support to terrorists (emphasis added): Benjamin Wittes, editor-in-chief of the LawFare blog, suggested that Apple could in fact face that liability if it… Continue reading

German Researcher Identifies Dangerous Local Privilege Escalation Vulnerability in Mac OS X

Generally speaking, Mac OS X is a much safer operating system compared to Microsoft Windows, but that does not mean it is completely immune to vulnerabilities. German researcher Stefan Esser has identified a dangerous local privilege escalation vulnerability in Mac OS X (emphasis added): “Furthermore the opened log file is never closed and therefore its… Continue reading

Facebook Is Offering a Service Capable of Hunting Down Hacking Team Malware Solely on Apple Mac OS X

Well this sure is interesting: Facebook is offering a service capable of hunting down Hacking Team malware solely on Apple Mac OS X: Facebook announced today it was pushing out some “query packs” on its code page that would enable IT folk to quickly look for signs of Hacking Team infection. These query packs form… Continue reading

Hacking Team Hack Reveals Why Jailbreaking Your iPhone Is a Security Nightmare

I know many techies have this innate urge to tweak things and feel constrained by what Apple brings to the table with stock iOS, so they opt to jailbreak their beloved iPhone for various reasons. What a lot of people do not realize is, now confirmed by the Hacking Team hack, is jailbreaking your iPhone… Continue reading

Inside China’s iPhone Jailbreaking Industrial Complex

Forbes has done some outstanding writing on their article about inside China’s iphone jailbreaking industrial complex: It was a bizarre trip hosted by an equally bizarre and secretive entity called TaiG (pronounced “tie-gee”), which flew the hackers to China to share techniques and tricks to slice through the defences of Apple’s mobile operating system in… Continue reading

iOS9 Maps Does Not Offer Transit Directions in Japan, WTF?

iOS9 does not offer any transit directions in Japan, quite possibly the country with the largest, most comprehensive, and best transit system in the world. If Google Maps can do it, WTF is Apple incapable of launching iOS9 w/support for Japanese public transportation?

HOWTO Delete Old iCloud Backups and Free Up Space

If you ever need to know, or ever have to help someone else, here is a list of steps to take to delete old iCloud backups and free up space on your various Apple mobile devices: When a device is set to backup to iCloud, Apple automatically backs up data and settings stored locally on… Continue reading

Apple Is Freaking Ginormous!

I found this list explaining just how big Apple is really fascinating: Apple is worth almost twice as much as the world’s second largest company, Google (valued at $375 billion). Apple is worth as much as the second and third largest companies in the world (Google and ExxonMobil) combined. Apple is worth more than Walmart,… Continue reading

New Remote Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

Ars Technica on a new remote exploit leaving most Macs vulnerable to permanent backdooring: Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published… Continue reading