ProtonMail launches standalone iOS app

Credit to Author: Lucas Mearian| Date: Tue, 20 Nov 2018 03:22:00 -0800

Encrypted email service provider ProtonMail has launched a standalone virtual private network app for iOS devices. With iOS now added to its list, ProtonMail said it now offers protection for the most popular operating systems, which include Windows, MacOS, Linux and Android.

VPN functionality is prevalent in enterprise security products and management products, according to Phil Hochmuth, program director for IDC’s Enterprise Mobility team. At the same time, consumers are increasingly looking at VPN services to shield their online activities on wired networks, as well as on LTE/4G connections, he said.

To read this article in full, please click here

Read more

What Apple's T2 security chip brings to the enterprise table

Credit to Author: Ryan Faas| Date: Tue, 20 Nov 2018 03:00:00 -0800

There’s been a lot of discussion about Apple’s T2 security chip, particularly the restrictions it places on repairs not sanctioned by Apple. The controversy centers on an Apple utility needed to make changes like swapping out the built-in SSD drives. The overall argument ties into the right-to-repair fight, allowing hardware owners to make changes to their own devices.

To read this article in full, please click here

(Insider Story)

Read more

Apple y Samsung multados por ralentizar sus móviles más viejos

Credit to Author: Naked Security| Date: Mon, 29 Oct 2018 16:26:33 +0000

Como Apple y Samsung acaban de descubrir, a costa de sus arcas, hay una forma correcta y otra incorrecta de ofrecer actualizaciones de software a sus clientes. Según investigadores del anti trust italiano AGCM, la forma correcta de proveer las actualizaciones a iOS y Android es añadir nuevas funciones que mejoren la experiencia del usuario [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/Ik0XswHr1XI” height=”1″ width=”1″ alt=””/>

Read more

Apple appears to have blocked GrayKey iPhone hacking tool

Credit to Author: Lucas Mearian| Date: Thu, 25 Oct 2018 14:09:00 -0700

Apple has apparently been able to permanently block de-encryption technology from a mysterious Atlanta-based company whose blackbox device was embraced by government agencies to bypass iPhone passcodes.

Atlanta-based Grayshift is one of two companies that claimed it could thwart Apple iPhone passcode security through brute-force attacks.

The blackbox technology purportedly worked, as Grayshift’s technology was snapped up by regional law enforcement and won contracts with Immigration and Customs Enforcement (ICE) and the U.S. Secret Service.

Another vendor, Israel-based Cellebrite, also discovered a way to unlock encrypted iPhones running iOS 11 and marketed its product to law enforcement and private forensics firms around the world. According to a police warrant obtained by Forbes, the U.S. Department of Homeland Security tested the technology.

To read this article in full, please click here

Read more

Stats make iOS a hard OS to ignore

Credit to Author: Evan Schuman| Date: Tue, 16 Oct 2018 03:00:00 -0700

The latest version of Apple’s mobile operating system — iOS 12 — was released just a few weeks ago, and yet it’s already installed on 53% of relatively newer iPhones (introduced since September 2014) and 50% of all iPhones. Bottom line: It’s the fastest acceptance of any Apple OS.

This is more than a minimally interesting statistic. It illustrates the key difference between Apple mobile devices and Android mobile devices: Although there are more Android users on the globe, Apple’s users are much more of a community. That means many things from an Apple marketing perspective, but for IT, it means far greater security.

To read this article in full, please click here

Read more

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12

Credit to Author: Darlene Storm, Michelle Davidson| Date: Tue, 18 Sep 2018 11:16:00 -0700

Update for iOS 12

With iOS 12 and iPhones that have Touch ID, you can still bypass the iPhone lock screen and trick Siri into getting into a person’s phone. The bypass is the same as it was in earlier versions of the operating system:

  • Press the home button using a finger not associated with your fingerprint authentication, prompting Siri to wake up.
  • Say to Siri: Cellular data.

Siri then opens the cellular data settings where you can turn off cellular data.

As was the case before, anyone can do this. It doesn’t have to be the person who “trained” Siri.

To read this article in full, please click here

Read more