iPhone

MalwareBytesSecurity

Unprecedented new iPhone malware discovered

Credit to Author: Thomas Reed| Date: Fri, 30 Aug 2019 17:40:24 +0000

Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period. Thomas Reed investigates.

Categories:

Tags:

(Read more…)

The post Unprecedented new iPhone malware discovered appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

Why blockchain-based voting could threaten democracy

Credit to Author: Lucas Mearian| Date: Mon, 12 Aug 2019 03:00:00 -0700

Public tests of blockchain-based mobile voting are growing.

Even as there’s been an uptick in pilot projects, security experts warn that blockchain-based mobile voting technology is innately insecure and potentially a danger to democracy through “wholesale fraud” or “manipulation tactics.”

The topic of election security has been in the spotlight recently after Congress held classified briefings on U.S. cyber infrastructure to identify and defend against threats to the election system, especially after Russian interference was uncovered in the 2016 Presidential election.

To read this article in full, please click here

Read More
MalwareBytesSecurity

Backdoors are a security vulnerability

Credit to Author: David Ruiz| Date: Fri, 09 Aug 2019 16:10:27 +0000

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Categories:

Tags:

(Read more…)

The post Backdoors are a security vulnerability appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

How to take control of Face ID (with tools you may not know exist)

Credit to Author: Jonny Evans| Date: Mon, 15 Jul 2019 09:00:00 -0700

If you travel frequently and use an iPhone or iPad then you simply must familiarize yourself with these two tips – they’ll make it much easier to secure your device and its contents when you are on the move.

In praise of Face ID

I’ve become very used to using Face ID. It’s seamless.

On the iPhone, I like that I can pay for groceries with a look and find it much easier to use in the dark than the Home button.

My iPad experience is similar, but I do get annoyed sometimes that I must raise the tablet slightly to get the face angle right – this isn’t always as intuitive as I would like.

All the same, given Apple’s claim that there is a 1 in 50,000 chance that someone else’s fingerprint will unlock your iPhone and a 1 in 1,000,000 chance that it will be unlocked by another person’s face, I’ll always opt for the highly secure choice.

To read this article in full, please click here

Read More
ComputerWorldIndependent

WWDC: What you need to know about Sign In with Apple

Credit to Author: Jonny Evans| Date: Tue, 04 Jun 2019 11:32:00 -0700

There’s lots of interest in Apple’s new Sign In with Apple system, a highly secure, private way to sign in to apps and websites. Here’s what you need to know:

What is Sign In with Apple?

Apple has noticed that sign-in systems for services, apps, and websites rely on services that use your action of signing in to place cookies on your computer and track what you do.

Apple’s focus on privacy means it is attempting to restrict such practices, which is why it has developed the new system as a more private way to sign into these apps and services.

To read this article in full, please click here

Read More