Back to Mobile View

Skip to Content

Security

Apple releases OS X bash Update 1.0

If you've been worried about the recent discovery of a security flaw called Shellshock in the bash UNIX shell, you can rest easier. Apple released OS X bash Update 1.0 to fix the issue, which made it possible for a remote attacker to execute...

Continue Reading

How to patch OS X for the bash/Shellshock vulnerability

There's a big bad bash bug out in the Unix world called Shellshock, and it is pretty serious. Bash is a ubiquitous bit of software; a command interpreter, or "shell," that provides a basic text-on-a-green-screen interface to POSIX/UNIX and Unix-like...

Continue Reading

Developer claims Apple was warned of iCloud security issue in March

A software developer in London warned Apple of iCloud's vulnerability to a brute-force attack months before the service was implicated in the leaks of hundreds of explicit photos and videos of celebrities. As reported by The Daily Dot, Ibrahim...

Continue Reading

How to easily add secure FileVault passcode to your Keychain

Since I have a terrible habit of losing things, I decided to encrypt my Verbatim "Tuff-N-Tiny" USB drive. This was a simple matter of control-clicking the drive name in Finder, choosing "Encrypt" and then setting an encryption password. I also...

Continue Reading

TunnelBear VPN lets you surf, securely

TunnelBear VPN is a simple app that works beautifully to let you securely surf online using your iPhone or iPad (and there's a Mac version as well). A VPN (Virtual Private Network) is an encrypted connection to a server that permits you to be...

Continue Reading

Setting up two-step verification for Apple ID and iCloud security

Since you're probably moving to iOS 8 soon -- if not as soon as possible after it goes live -- you might want to start thinking about security as well. In particular, Apple has recently enabled two-step verification for iCloud. What's two-step...

Continue Reading

The only way to make your iCloud security questions actually secure

The recent leak of nude photographs from some of America's biggest female celebrities has drawn attention to the security of Apple's iCloud. If there's one takeaway from this incident, other than people who share the private photos of other are...

Continue Reading

Apple: Celebrity photo breach not due to iCloud or Find my iPhone issues

Apple has just released a press statement updating its investigation into the weekend breach of celebrity photos. As noted in the press release, the company says that none of the cases investigated were the result of any breach of Apple's systems...

Continue Reading

Think iCloud's two-factor authentication protects your privacy? It doesn't

As the forensic analysis of the weekend's celebrity intimate photo leak continues, plenty of attention is being focused on iCloud's photo storage as a likely vector for the criminal theft of the images. Proof of concept code for a brute-force...

Continue Reading

iCloud password hack published, blocked as celebrity photo theft confirmed [Updated: Apple comment]

If you've been enjoying the US holiday weekend away from sources of news, well done. If not, you may well have seen reports of a large cache of explicit photos of celebrities being published to 4chan's image boards, including Academy Award winner...

Continue Reading

Call or text while protecting your identity with StitMe

"It is our belief that privacy is a right – not a commodity." Those are the words of Gurtaj Padda, CEO of StitMe, a free app for iOS that imports your contacts and let you call or text message anyone using a randomly generated phone number,...

Continue Reading

Security breach may be reason for Gatekeeper app signing changes (Updated)

A discussion has been brewing on Twitter today regarding the recent app signing changes that could leave some apps blocked by Gatekeeper if developers don't re-sign the apps. Apple had let developers know that "With the release of OS X Mavericks...

Continue Reading

Apple officially rebuts Chinese accusation that the iPhone is a security threat

Last week we reported that a Chinese state-run TV station was quick to call the iPhone a security threat on account of the device's "frequent locations" feature first introduced in iOS 7. In typical hyperbolic fashion, the Chinese media outlet...

Continue Reading

Apple testing two-step verification on iCloud site, apps

Update 9/2/2104: It looks like this test never made it to full release, as iCloud users are still not prompted to authenticate with 2FA when logging into iCloud.com. With all the security risks populating the world, two-step verification is the...

Continue Reading

Researchers crack iPad, iPhone PINs

"Shoulder surfing" refers to the practice of looking over someone's shoulder to watch them enter a PIN on a mobile device, like an iPad. It's not the most sophisticated hack ever, but it works, as long as the interloper has a line of sight....

Continue Reading

Google's Sundar Pichai rebuts accusation that Android is a "toxic hellstew" of vulnerabilities, likens Apple to Mercedes Benz

With Google's I/O conference set to get underway on Wednesday, Bloomberg Businessweek earlier today put up an interesting and sweeping profile of Sundar Pichai, the man Larry Page tapped to run Android following the departure of Andy Rubin. An...

Continue Reading

© 2014 AOL Inc. All Rights Reserved.