Archive for the ‘iphone’ Category

First free Apple Music trials end this week—now what?

September 29th, 2015

(credit: Apple)

If you were one of the first people to jump on the Apple Music bandwagon a few months ago, you have an important decision to make now. When Apple launched its music subscription service in June, it allowed users a three-month free trial to test the waters. On September 30, the first trials will begin to expire.

In an effort to persuade current trial users (and no doubt convince skeptics), Apple launched a minisite devoted to explaining the ropes of Apple Music. The "Guided Tour" section of the site shows users how to use Apple Music's features including Connect, the social area of the app where you can follow your favorite artists, and Radio, where the curated artists' stations and the Beats 1 station live.

Current users have two options to manage Apple Music: the first is to do nothing. Subscriptions will renew automatically, so you can keep the service for $9.99 per month if it has become your listening app of choice. Families can also subscribe for $14.99 per month, and that will allow up to six users to have access to that Apple Music account.

Read 2 remaining paragraphs | Comments

Posted in apple music, Gear & Gadgets, ios, iphone | Comments (0)

How hackers can access iPhone contacts and photos without a password

September 25th, 2015

iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a new video demonstration that shows how the bug can be exploited to gain unauthorized access to photos and contacts.

The hack reportedly works on iOS version 9.0.1, which Apple released Wednesday, although some people say they are unable to reproduce it. The vulnerability makes it possible for someone who gets even a brief moment with an iPhone to rifle through contacts and photos without entering the password. Here it is in action.

Beware! iOS 9 & iOS 9.0.1 - Security Flaw - Passcode Bypass. Turn Off Siri on Lockscreen to be Safe.

It works by entering an incorrect password four times. Then, immediately after the incorrect password is entered for the fifth time, the attacker holds down the home button before the device can lock the attacker out. The Siri personal assistant pops up and the attacker uses it to bring up the inbuilt clock. The attacker then taps the clock and presses the + icon, giving access to search capabilities. From there, the attacker gets access to iMessage.

Read 2 remaining paragraphs | Comments

Posted in bypass, Infinite Loop, iphone, LockScreen, Risk Assessment | Comments (0)

Your iOS 9 Lockscreen Can Be Bypassed in 30 Seconds

September 23rd, 2015

By Farzan Hussain

A security flaw has been discovered in Apple’s mobile software

This is a post from Read the original post: Your iOS 9 Lockscreen Can Be Bypassed in 30 Seconds

Posted in apple, Apple News, iOS9, iPad, iphone, LockScreen, Photos, privacy, security, Siri, Technology News, videos, Vulnerability | Comments (0)

Apple XcodeGhost Malware: List of iOS Apps You Should Delete Immediately

September 23rd, 2015

By Ryan De Souza

Apple’s App Store in China has apparently been penetrated by

This is a post from Read the original post: Apple XcodeGhost Malware: List of iOS Apps You Should Delete Immediately

Posted in apple, Apple News, china, Cyber Crime, Hacking, infosec, ios, iPad, iphone, malware, security, xcodeghost | Comments (0)

Security firm pledges $1 million bounty for iOS jailbreak exploits

September 21st, 2015

A broker of software attacks that exploit vulnerabilities in widely used software is placing a $1 million bounty on critical iOS bugs that allow hackers to remotely commandeer iPhones and iPads.

"Apple iOS, like all operating system(s), is often affected by critical security vulnerabilities," officials with the Zerodium bug broker said in blog post published Monday that announced the hefty reward. "However, due to the increasing number of security improvements and the effectiveness of exploit mitigations in place, Apple's iOS is currently the most secure mobile OS. But don't be fooled, secure does not mean unbreakable. It just means that iOS has currently the highest cost and complexity of vulnerability exploitation and here's where the Million Dollar iOS 9 Bug Bounty comes into play."

Under the program, Zerodium is prepared to pay a total of $3 million for remote iOS exploits that give attackers complete control over a vulnerable device. Zerodium will pay $1 million to each person or team who creates and submits an exclusive browser-based attack that works on the latest-available version of the operating system. The program is scheduled to run through October 31, but it will be terminated earlier if three winning exploits are submitted sooner.

Read 3 remaining paragraphs | Comments

Posted in exploits, Infinite Loop, ios, iPad, iphone, Law & Disorder, Technology Lab, vulnerabilities | Comments (0)

Apple scrambles after 40 malicious “XcodeGhost” apps haunt App Store

September 21st, 2015

Apple officials are cleaning up the company's App Store after a security firm reported that almost 40 iOS apps contained malicious code that made iPhones and iPads part of a botnet that stole potentially sensitive user information.

The 39 affected apps—which included version 6.2.5 of the popular WeChat for iOS, CamScanner, and Angry Birds 2—may have been downloaded by hundreds of millions of iPhone and iPad users, security researchers said. The programs were infected by a tampered version of Apple's legitimate iOS and OS X app development tool called Xcode. A repacked tool, called XcodeGhost, surreptitiously inserted malicious code alongside normal app functions that caused the app to report to a command and control server. From there, the app reported a variety of device information, including the name of the infected app, the app bundle identifier, the device name, type and unique identifier, network information, and the device's "identifierForVendor" details.

Details of the infection were first reported late last week by security firm Palo Alto Networks in blog posts here and here. Researchers from mobile security firm Lookout independently analyzed the same apps and on Sunday issued a blog post that read in part:

Read 5 remaining paragraphs | Comments

Posted in App Store, infection, Infinite Loop, ios, iPad, iphone, Law & Disorder, malware, Risk Assessment, Technology Lab, Xcode, xcodeghost | Comments (0)

With Its First Android app, Apple tried to Kill Android Community, But Failed Badly!

September 19th, 2015
Are you a Die Hard Android Fan? If you are also one of those millions Android fans, for whom the brand has turned into an insane religious devotion, then Apple has something that could give you second thoughts. Apple is losing control, wants you to ditch your Android! <!-- adsense --> Few days ago, Apple made its debut on Google Play Store with its First App, called “Move to iOS”,

Posted in android, android apps, Apple iOS 9, Apple iPhone 6, Google Play Store, iphone, Move to iOS, Technology News | Comments (0)

Here’s why you can’t delete native iOS apps from your iPhone

September 15th, 2015
Megan Geuss

If you're an iOS user, you may have a junk folder on your device full of rarely used, native apps from Apple. Banishing them to their own cluster is just about the only course of action since these apps cannot be deleted. Now, we know more about why that's the case: in an interview with Buzzfeed, Apple CEO Tim Cook said that deleting native apps would essentially cause a domino effect in other programs on the device, possibly breaking things elsewhere in iOS.

"There are some apps that are linked to something else on the iPhone," Cook told Buzzfeed. "If they were to be removed, they might cause issues elsewhere on the phone."

While Cook didn't detail which preinstalled apps were linked to other functions, he went on to say that not every app is connected in this way. Eventually, Apple may allow some native apps to be deleted. "Over time, I think with the ones that aren’t like that, we’ll figure out a way [for you to remove them]. … It’s not that we want to suck up your real estate."

Read 1 remaining paragraphs | Comments

Posted in apple, Gear & Gadgets, ios, ios apps, iphone, Tim Cook | Comments (0)

Return of the Hack

September 15th, 2015

As our world has evolved, so has our technology. And, as that technology has evolved, so has its consumption. Now more than ever consumers are adopting the newest technological devices and integrating them into their daily lives. One prime example? Smart phones.

Once used only to make phones calls and play the occasional game of Snake, mobile phones have now grown into a one stop shop for everything you need to make life easier and more manageable. With consumers’ dependence on smart phones to make it through their days, it only makes sense that they have become a major target for today’s hackers.

Recently, there was an attack that affected 225,000 iOS users. These users had their iTunes login credential stolen through malware called KeyRaider. The information stolen included the account username, password and iPhone unique ID. Hackers sent this information to a remote server and then used it to install paid apps on other iOS devices.

A separate app was created to allow other people to install the paid apps on their own phones. Close to 20,000 people have downloaded the software that the hackers provided to steal from the affected iPhone users. There have also been cases of the malware locking phones and holding them for ransom. So, should you be worried? The answer is yes – if you have a  jailbroken iPhone.

As discussed in a recent article, Jailbreaking an iPhone is a popular practice that enables the iPhone owner to customize their phone. This typically means allowing jailbreakers to download apps that are not approved by the iTunes App Store.

Jailbreaking a phone is a way to bypass barriers that the device maker puts in place to protect users from attacks. While jailbreaking an iPhone might seem like a  way to personalize your device, it also puts each user at a higher risk.

When it comes to the security of your information, it’s better to be safe than sorry. Even if you haven’t purposely put your phone at risk, hackers are lurking around every corner, looking for a weakness. Here are some tips to stay protected from a potential hack:

  • Don’t jailbreak your phone. Smart phone software is designed to protect user information. When those guidelines are ignored, the data – and the user – are at risk.
  • Secure your phone with security software. McAfee® Mobile Security is free for both Android and iOS, and offers a variety of features  to safeguard personal information.
  • Download apps that are safe. If you aren’t comfortable with the permissions an app is requesting, it’s best not to download it. Go with your gut; if something feels fishy, there’s probably a different app you can download similar to the one you want.
  • Download apps from legitimate sources. It is important to download apps from reliable sources, such as the Apple Store and Google Play.

To keep up with the latest security threats, make sure to follow @IntelSec_Home on Twitter and like us on Facebook.


The post Return of the Hack appeared first on McAfee.

Posted in app security, consumer, iphone, jailbreaking, McAfee Mobile Security, mobile app, mobile devices, Mobile Security | Comments (0)

Apple’s iPhone Upgrade Program vs. the big four carriers’ payment plans

September 10th, 2015

Apple is now selling iPhones on installment plans, giving customers the ability to pay a monthly charge for a phone and upgrade to a new one every year. The four major carriers in the US already offer phones on installment plans, but Apple's new "iPhone Upgrade Program" provides yet another option that might be better for certain customers.

Here are the basics: Instead of paying hundreds of dollars up front for a new iPhone 6S or 6S Plus, a customer gives Apple anywhere from $32.45 to $47.45 per month, depending on the model and storage amount. Such customers are eligible to upgrade to a new phone after making 12 months of payments.

So if you buy an iPhone 6S with 16GB of storage, the cheapest model, you'd pay $389.40 to essentially rent the phone over the course of a year, instead of $649 to own the phone outright. If you prefer keeping a phone for at least two years, it's cheaper to buy it outright.

Read 30 remaining paragraphs | Comments

Posted in apple, AT&T, Gear & Gadgets, Infinite Loop, iphone, phone financing, sprint, t-mobile, verizon wireless | Comments (0)