How to use a strong passcode to better secure your iPhone

Credit to Author: Lucas Mearian| Date: Wed, 18 Apr 2018 12:32:00 -0700

With police departments and federal agencies lining up to buy technology from two companies whose products can bypass iPhone security mechanisms, experts said users concerned about privacy should use a strong passcode to help prevent unwanted access to data.

That’s also true for enterprise users with iPhones that access potentially sensitive coporate data.

Simply put, complex passcodes are always better for security, according to Phil Hochmuth, IDC’s program director for enterprise mobility. Common best practices for creating a hard-to-crack passcode includes using both upper- and lower-case characters, numbers and uncommon words.

To read this article in full, please click here

Read more

12+ things you can do with a locked iPhone

Credit to Author: Jonny Evans| Date: Mon, 16 Apr 2018 07:06:00 -0700

With so much focus on staying productive, it may surprise you to realise just how many things you can do with a locked iPhone. What can you do and how can you switch these features off?

Wake it up

The Raise to Wake feature available since iPhone 6S/SE means your iPhone can tell when you pick it up and will wake the display up automatically, so you need not do so. Left on by default, you can disable this feature in Settings>Display & Brightness where you toggle Raise to Wake to off.

Make a call, send a message and more

You can call people from a locked iPhone. Just ask Siri to call a person in your contact book. You can also send Messages using the locked device, just ask Siri to send a Message and name someone in the device’s Contacts book. To stop this, set Allow Siri When Lockedto off in Settings>Siri & Search.

To read this article in full, please click here

Read more

Everything you need to know about Apple's GDPR privacy upgrade

Credit to Author: Jonny Evans| Date: Fri, 13 Apr 2018 08:07:00 -0700

Apple is updating its products and services to bring them in line with the EU’s forthcoming privacy protection rules (GDPR). Among other improvements, customers will be able to download all the information Apple keeps about them.

What is GDPR?

Europe is about to introduce General Data Protection Regulations, (GDPR). These rules are designed to bring existing data protection laws into the 21stCentury, they allow individuals the right to see what information companies hold about them, oblige business to handle data more responsibly, and put a new set of fines and regulations in place. Almost any entity that handles personal data will be impacted by the rules, which you can read here. These changes may be taking place in Europe, but there is expectation most big tech firms will apply similar protections outside Europe, which will give more effective protection to most people – which is a good thing.

To read this article in full, please click here

Read more

Facial recognition tech moves from smartphones to the boardroom

Credit to Author: Lucas Mearian| Date: Fri, 30 Mar 2018 03:03:00 -0700

Facial recognition technology, which has begun to gain traction on mobile devices like the iPhone X and various Android smartphones, could soon show up at work – and at the airport.

The technology uses a person’s face to authenticate their identity,  making it a potentially important security tool.

In 2015, Google launched its “Trusted Face” feature as part of its Android 5.0 Lollipop update. Trusted Face, part of Android’s Smart Lock technology, works in the same way as Apple’s Face ID, which replaced the Touch ID fingerprint reader on the iPhone X.

To read this article in full, please click here

Read more

Why Cambridge Analytica means it’s time for an Apple social network

Credit to Author: Jonny Evans| Date: Mon, 19 Mar 2018 07:37:00 -0700

The emerging Cambridge Analytica/Facebook affair, in which people’s personal data was allegedly used for purposes it should not have been used for, shows the danger of surveillance capitalism and the need for a new approach to social networking — and that’s what Apple can provide.

Understand history, but don’t repeat it

History shows us that Apple has never succeeded in creating a social network. Ping, launched in 2010, was closed down in 2012 due to lack of interest.

To read this article in full, please click here

Read more

GrayKey iPhone unlocker poses serious security concerns

Credit to Author: Thomas Reed| Date: Thu, 15 Mar 2018 13:00:00 +0000

GrayKey, an iPhone unlocker, is secretly being marketed to law enforcement. Thanks to an anonymous source, we now know how the device works—and the danger it presents to security.

Categories:

Tags:

(Read more…)

The post GrayKey iPhone unlocker poses serious security concerns appeared first on Malwarebytes Labs.

Read more

Essential Facebook security tips for iPhone users

Credit to Author: Jonny Evans| Date: Tue, 13 Mar 2018 05:05:00 -0700

The world of grey IT means both enterprise and consumer users frequently use popular social networking service Facebook on their devices. It makes sense, then, to stay safe while using it.

Manage Facebook Security settings

First things first: Always use a complex passcode with your account and do make sure to set up two-factor authentication.

Now that you’ve done that, you’ll find Facebook’s own privacy settings live inside Privacy Shortcuts in the iOS app. Get to these by tapping the three-line icon at bottom right of the Facebook app and scrolling down to Privacy Shortcuts. The first thing you should do is run Privacy check-up (at the top of the page). Facebook will guide you through your existing settings, change them for maximum privacy, and delete any Facebook apps you’ve forgotten about or no longer use.

To read this article in full, please click here

Read more

Warning as Mac malware exploits climb 270%

Credit to Author: Jonny Evans| Date: Mon, 12 Mar 2018 05:56:00 -0700

Reputable anti-malware security vendor, Malwarebytes, is warning Mac users that malware attacks against the platform climbed 270 percent last year.

Be careful out there

The security experts also warn that four new malware exploits targeting Macs have been identified in the first two months of 2018, noting that many of these exploits were identified by users, rather than security firms.

In one instance, a Mac user discovered that their DNS settings had been changed and found themselves unable to change them back.

This particular item of malware (OSX.MaMi) also installed a trusted root certificate on their Mac. The threat left the user vulnerable to fraudulent phishing websites posing as the real deal and man-in-the-middle attacks.

To read this article in full, please click here

Read more