Back to Mobile View

Skip to Content

TUAW Deals

Security

Researchers challenge Apple's 'unbreakable' iMessages

Shortly after revelations about the NSA's data-snooping programs became public, Apple publicly stated that the end-to-end encryption used in iMessage was so good that it was impossible for anyone -- including Apple -- to break the code. Now...

Continue Reading

Oh look, another "easy" way to spoof Touch ID on the iPhone 5s

I'll be honest: I'm getting kind of tired of seeing words like "easy" and "simple" being used to describe the ridiculous how-to videos showing that it's possible to trick the Touch ID sensor on the iPhone 5s into believing you're someone you're...

Continue Reading

A look at the iPhone 5s Touch ID fingerprint sensor

One of the biggest features of the iPhone 5s announced yesterday is the Touch ID fingerprint sensor that is used for user authentication. Rich Mogull at TechHive has written the definitive Q&A about the sensor built into the iPhone 5s, and...

Continue Reading

Bug in CoreText allows a string of characters to crash apps

A serious bug has been uncovered in Apple's CoreText layout engine, which is responsible for laying out text in applications that make use of the Cocoa framework on OS X and iOS systems. The bug causes any app relying on CoreText to crash when a...

Continue Reading

U.S. government finds 0.7% of all mobile malware affects iOS, while Android accounts for 79%

A cautionary memo put out by the US Department of Homeland Security and the US Department of Justice shows that, according to the government's findings, only 0.7 percent of all mobile malware is designed to take advantage of iOS. This figure is in...

Continue Reading

How to avoid iCloud email spam

It's nice to know that Makayla, Taylor, Olivia and Madeline are all thinking nice thoughts and letting me order my pills online. They're part of a rush of spam emails that showed up in my iCloud email last week. Apparently I'm not the only person...

Continue Reading

Google's lawyers: If you use Gmail you have no expectation of privacy

While we know none of our readers would ever use email for nefarious purposes, the privacy of one's personal information is a hot topic thanks to the recent revelations about the NSA's domestic spying program. Well, there's bad news for...

Continue Reading

PGP inventor doesn't use PGP "because it doesn't run well on a Mac"

Phil Zimmermann is a legend in the world of online privacy, having invented PGP (Pretty Good Privacy) in 1991 to create a way of creating cryptographic privacy and authentication to keep digital communications -- and entire computers -- safe from...

Continue Reading

Don't get hooked by this Apple Store phishing campaign

Apple fans beware! A new email phishing campaign dangling a bogus US$200 Apple Store gift card as bait to snag unsuspecting victims is making the rounds, according to security firm Webroot. The email that arrives (see image above) looks strikingly...

Continue Reading

Getting iMessage spam? Report it to Apple

Federico Viticci over at MacStories posted an interesting story about iMessage spam tonight courtesy of Beau Giles. A support document on the Apple website now presents details on how users can report iMessage spam directly to the company: If...

Continue Reading

Facebook security bug exposed user data for 6 million users

A security bug on Facebook accidentally exposed the personal information (emails or phone numbers) of upwards of 6 million users. Facebook announced the discovered bug on Friday, noting that its team fixed it within 24 hours upon being made aware of...

Continue Reading

Evernote introduces two-step verification, other security enhancements

Evernote's motto is "remember everything," which means that you might put everything onto the cloud service -- work notebooks, pictures of food, business cards, you name it. One problem with placing all of that personal and work-related information...

Continue Reading

US Pentagon grants security clearance to iPad, iPhone

Earlier this month TUAW reported that iOS 6 had obtained FIPS 140-2 certification, "opening the door to more government use." It didn't take long for that door to swing wide open, as the Pentagon has now officially approved iPhones and iPads...

Continue Reading

Your Mac's connection to Harry Potter

The next time you wish to hack into a Mac, it may help to grab your wand and book of spells. At the NoSuchCon security conference this week, security architect Alex Ionescu presented a talk where he revealed that special undocumented code on a...

Continue Reading

Talkcast preview: Dolly Drive and backups and Kelly and...you?

I know, it's weird to see a sneak peek of the talkcast, but this week it's a Very Special Talkcast. We'll be chatting with the Dolly Drive folks about backups and cloud syncing and what it all means for users and their data. You may have...

Continue Reading

Apple on the verge of rolling out two-step verification for iCloud, Apple ID

According to a report on 9to5 Mac, Apple has begun training support personnel in advance of rolling out two-step authentication for iCloud and Apple ID. This is a significant step towards enhanced security for Apple accounts as it requires both...

Continue Reading

© 2014 AOL Inc. All Rights Reserved.