Back to Mobile View

Skip to Content

Tag: security

Apple publishes privacy and security page; Cook pens open letter to customers

Ahead of the iPhone 6 launch, and in the wake of the iCloud celebrity hacking saga, Apple on Wednesday evening put up a new privacy page on its website which aims to assure customers that their private information is safeguarded by rigorous security measures. "The moment you begin using an Apple p...

Continue Reading

Setting up two-step verification for Apple ID and iCloud security

Since you're probably moving to iOS 8 soon -- if not as soon as possible after it goes live -- you might want to start thinking about security as well. In particular, Apple has recently enabled two-step verification for iCloud. What's two-step authentication? As Apple describes it on this web page...

Continue Reading

Apple begins sending alert emails to users when iCloud detects a web-based login

Days after Tim Cook told the Wall Street Journal that Apple needs to be more vigilant about iCloud security, word comes that Apple has started sending users alert emails whenever iCloud detects a browser-based login. Notably, the enhanced security measure from Apple is enabled by default and requi...

Continue Reading

The only way to make your iCloud security questions actually secure

The recent leak of nude photographs from some of America's biggest female celebrities has drawn attention to the security of Apple's iCloud. If there's one takeaway from this incident, other than people who share the private photos of other are scum, it's that sometimes it's the simplest things th...

Continue Reading

Apple: Celebrity photo breach not due to iCloud or Find my iPhone issues

Apple has just released a press statement updating its investigation into the weekend breach of celebrity photos. As noted in the press release, the company says that none of the cases investigated were the result of any breach of Apple's systems including iCloud and Find my iPhone. Apple believes...

Continue Reading

Think iCloud's two-factor authentication protects your privacy? It doesn't

As the forensic analysis of the weekend's celebrity intimate photo leak continues, plenty of attention is being focused on iCloud's photo storage as a likely vector for the criminal theft of the images. Proof of concept code for a brute-force attack on iCloud passwords (via the Find My iPhone API)...

Continue Reading

Apple, FBI investigating possible iCloud celebrity photo theft

Both the FBI and Apple are investigating the theft of private celebrity photos in an intrusion that may have used iCloud to gain access to the images. As reported by The Telegraph, FBI spokesperson Laura Eimiller confirmed the government agency's activation investigation into the theft. "[The FB...

Continue Reading

iCloud password hack published, blocked as celebrity photo theft confirmed [Updated: Apple comment]

If you've been enjoying the US holiday weekend away from sources of news, well done. If not, you may well have seen reports of a large cache of explicit photos of celebrities being published to 4chan's image boards, including Academy Award winner Jennifer Lawrence, supermodel Kate Upton and other ...

Continue Reading

Call or text while protecting your identity with StitMe

"It is our belief that privacy is a right – not a commodity." Those are the words of Gurtaj Padda, CEO of StitMe, a free app for iOS that imports your contacts and let you call or text message anyone using a randomly generated phone number, thereby completely concealing your identity and rea...

Continue Reading

The Facebook Messenger switch: annoying, but not evil

If you use the Facebook iOS app, you've probably noticed that the social network's private SMS-like Messenger functionality is migrating out of the "mother" application and into the standalone Facebook Messenger app (currently at version 9.1). Messenger's solo app has been around for a couple of...

Continue Reading

Russian government requests Apple source code

The recent revelations that Apple has included backdoors into iOS devices may have lead to an interesting development in the company's relationship with Russia. According to Reuters the Russian government has asked Apple Inc to turn over its source code to confirm its products aren't being used to...

Continue Reading

Apple details legitimate uses of backdoor services in iOS

After denying the accusation that it deliberately included backdoor services in iOS for potential data collection by third-parties, Apple has followed up this denial with a new support document that details several backdoor services and their legitimate uses. The services described by Apple inclu...

Continue Reading

The TUAW Daily Update Podcast for July 22, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of ...

Continue Reading

Apple denies it included 'backdoor' services in iOS

Apple denied the accusation that it included backdoor services in iOS that could be exploited by law enforcement and other government agencies in order to obtain personal data from iOS devices. The denial statement was provided to Financial Times journalist Tim Bradshaw who shared the communicatio...

Continue Reading

The TUAW Daily Update Podcast for July 21, 2014

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get some the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the player at the top of ...

Continue Reading

© 2014 AOL Inc. All Rights Reserved.