Archive for the ‘iphone’ Category
Researchers at the RSA conference explained about a newly found vulnerability that allows attackers to crash just about any iOS device. San Francisco: Researchers from Skycure security firm revealed vulnerability “No iOS Zone” yesterday at the RSA security conference. This vulnerability allows cybercriminals crash just about any iOS device that comes within a WiFi hotspot range. They acknowledged the fact that this happens regardless if you have deliberately connected or not. The […]
This is a post from HackRead.com Read the original post: Any iPhone, iPad Within Wi-Fi Range can be Crashed due to Security Flaw
So it was intriguing to hear that Apple had decided to try to help out in this area. Smartphones have a number of significant advantages: people use them already, users already accept that phones can gather information on everything from our location to our fingerprints, and it's possible to develop sophisticated software that runs on them. The problem has been that medical researchers' software talents tend to lie in building statistical models, not sophisticated user-facing software.
ResearchKit had the potential to make a decent GUI much more manageable. But Apple hadn't even revealed what was in the framework, so it was difficult to tell how much easier it would be—or even what problems it attempted to solve. Now that it's possible to take a look, it's obvious that Apple has created a simple programming paradigm that works in a number of contexts, one that takes the need to build a GUI almost entirely out of the developer's hands.
Researchers have identified a serious vulnerability in at least 1,500 iOS apps. This security flaw has made the apps exploitable by hackers who look for victims to swipe passwords and obtain financial data. Last month IT security firm SourceDNA discovered a bug that has been fixed in an open-source code update. This bug contained a serious vulnerability and still some app developers have ignored updating their apps to the new version. The […]
This is a post from HackRead.com Read the original post: Serious Security Flaw found in 1,500 iOS apps—Checkout if your iPhone is at risk
About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research released Monday.
An estimated two million people have installed the vulnerable apps, which include the Citrix OpenVoice Audio Conferencing, the Alibaba.com mobile app, Movies by Flixster with Rotten Tomatoes, KYBankAgent 3.0, and Revo Restaurant Point of Sale, according to analytics service SourceDNA. The weakness is the result of a bug in an older version of the AFNetworking, an open-source code library that allows developers to drop networking capabilities into their apps. Although AFNetworking maintainers fixed the flaw three weeks ago with the release of version 2.5.2, at least 1,500 iOS apps remain vulnerable because they still use version 2.5.1. That version became available in January and introduced the HTTPS-crippling flaw.
"The issue occurs even when the mobile application requests the library to apply checks for server validation in SSL certificates," researchers Simone Bovi and Mauro Gentile wrote in a blog post published in late March. They went on to say that they analyzed one app running AFNetworking 2.5.1 and found alarming results. "We tested the app on a real device and, unexpectedly, we found that all the SSL traffic could be regularly intercepted through a proxy like Burp without any intervention!" (Emphasis is theirs.)
All you need to do is search for your Android device, a mobile phone or tablet on Google. The search engine will instantly track the device’s location and upload its map. Smartphones or any such electronic device can be misplaced or lost anytime and anywhere. We all have faced this issue at one point or another at home, office or in the car. Usually we search for our lost mobile phone everywhere in […]
This is a post from HackRead.com Read the original post: How to use Google Search to locate your lost Android Smartphone or Tablet
Proving once again that platform loyalty is a powerful thing, two Tulsa, OK roommates got into an argument over whether Android smartphones are better than Apple smartphones—and both ended up in jail.
Tulsa’s Channel 8 reports that police were called to a local apartment complex at around 1:00am on the morning of April 17 to investigate at least one report of a bloody person wandering around the parking lot. According to The Tulsa World, police found roommates Jiro Mendez and Elias Ecevo each in some distress—Mendez was the man in the parking lot and was covered in scratches and wounds, while Ecevo, similarly wounded, apparently had stayed inside their apartment.
The World indicates that Mendez told police that the wounds came from an argument between the roommates, which started over which roommate had the better smartphone—Apple or Android—and ended with both roommates allegedly stabbing each other with broken glass bottles and Ecevo allegedly stealing Mendez’s car (police found the car near the apartment, with blood in the interior). Perhaps unsurprisingly, alcohol appears to have been a factor in the fight.
Researchers at MDSec, an IT security firm, have identified a method that allows thieves and hackers to bypass iPhone’s lockscreen utilizing equipment that costs merely few hundred dollars. In an iPhone, the lockscreen basically serves as a barrier between thieves and the phone since it bricks the device after 10 wrong guesses. Moreover, it has proven to be difficult to bypass on phones that aren’t jailbroken. However, according to MDSec, there is […]
This is a post from HackRead.com Read the original post: Researchers Find Technique to Bypass iPhone Lockscreen
Encryption should be Outlawed – FBI Retracts Support to Further Weaken Our Security. In the past when Apple started encrypting its iPhone by default, the step was lauded by the FBI as it ensured enhanced security. However, FBI has revoked its support and now maintains that encryption of this type needs to be outlawed of course, for the safety of Americans. Before the House Appropriations Committee, Jim Comey, FBI’s director, pleaded for […]
This is a post from HackRead.com Read the original post: FBI Wants Tech Companies to Disable Default Smartphone Encryption