Back to Mobile View

Skip to Content

TUAW Deals

Tag: security

Think iCloud's two-factor authentication protects your privacy? It doesn't

As the forensic analysis of the weekend's celebrity intimate photo leak continues, plenty of attention is being focused on iCloud's photo storage as a likely vector for the criminal theft of the images. Proof of concept code for a brute-force attack on iCloud passwords (via the Find My iPhone API)...

Continue Reading

Apple, FBI investigating possible iCloud celebrity photo theft

Both the FBI and Apple are investigating the theft of private celebrity photos in an intrusion that may have used iCloud to gain access to the images. As reported by The Telegraph, FBI spokesperson Laura Eimiller confirmed the government agency's activation investigation into the theft. "[The...

Continue Reading

iCloud password hack published, blocked as celebrity photo theft confirmed [Updated: Apple comment]

If you've been enjoying the US holiday weekend away from sources of news, well done. If not, you may well have seen reports of a large cache of explicit photos of celebrities being published to 4chan's image boards, including Academy Award winner Jennifer Lawrence, supermodel Kate Upton and other...

Continue Reading

Call or text while protecting your identity with StitMe

"It is our belief that privacy is a right – not a commodity." Those are the words of Gurtaj Padda, CEO of StitMe, a free app for iOS that imports your contacts and let you call or text message anyone using a randomly generated phone number, thereby completely concealing your identity and...

Continue Reading

The Facebook Messenger switch: annoying, but not evil

If you use the Facebook iOS app, you've probably noticed that the social network's private SMS-like Messenger functionality is migrating out of the "mother" application and into the standalone Facebook Messenger app (currently at version 9.1). Messenger's solo app has been around for a couple of...

Continue Reading

Russian government requests Apple source code

The recent revelations that Apple has included backdoors into iOS devices may have lead to an interesting development in the company's relationship with Russia. According to Reuters the Russian government has asked Apple Inc to turn over its source code to confirm its products aren't being used to...

Continue Reading

Apple details legitimate uses of backdoor services in iOS

After denying the accusation that it deliberately included backdoor services in iOS for potential data collection by third-parties, Apple has followed up this denial with a new support document that details several backdoor services and their legitimate uses. The services described by Apple...

Continue Reading

The TUAW Daily Update Podcast for July 22, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of...

Continue Reading

Apple denies it included 'backdoor' services in iOS

Apple denied the accusation that it included backdoor services in iOS that could be exploited by law enforcement and other government agencies in order to obtain personal data from iOS devices. The denial statement was provided to Financial Times journalist Tim Bradshaw who shared the...

Continue Reading

The TUAW Daily Update Podcast for July 21, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of...

Continue Reading

Forensic scientist discovers backdoors running on 600 million iOS devices

Your iPhone may well be at risk of spilling a good deal of your personal data, but not in the way you imagine. According to security researcher Jonathan Zdziarski, today's iPhone is actually quite good at fending off a typical hacker, but it also comes with a few convenient -- and secret -- tools...

Continue Reading

Apple isn't being parental enough, according to EU

Preventing unauthorized purchases on the App Store isn't difficult. Apple's system already requires separate authorization for App Store transactions and in-app purchases, provides a warning of the 15-minute purchase window when a paid app is bought, and iOS allows you to disable both in-app...

Continue Reading

The TUAW Daily Update Podcast for July 17, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of...

Continue Reading

Popular iCam app gets a big brother with a lot more features

I've really enjoyed using the iCam app (US$4.99) over the years. It lets me remotely view the webcams in my house, helping me keep track of my parrot and make sure no one is breaking in. The old iCam is still for sale, but it now has a sibling in the form of iCam Pro (free, but a subscription...

Continue Reading

The TUAW Daily Update Podcast for July 16, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of...

Continue Reading

© 2014 AOL Inc. All Rights Reserved.