Sonny Dickson, a well known source of Apple hardware rumors, has tweeted that Apple is working with Chinese authorities to stop the leaks, hiring 200 security officers to catch anyone who tries to sell any iPhone 6 accessories.
The Dev Center was offline for maintenance work over the weekend, but this time a security issue that leaked private information of accounts was also patched.
Heartbleed bug is a critical security bug that was discovered in OpenSSL. Open SSL is a popular open source encryption software used by a number of websites and it is considered the biggest security threat the internet has seen. Continue reading to see what steps you can take to protect yourself against this bug.
In the past, some users’ accounts have proven fairly easy pickings for those looking to grab a few apps from a linked credit card. Often, the victims hadn’t selected a strong combination of characters as a password, and as a result, found themselves considerably out of pocket as the fraudsters grabbed the most expensive apps they could find.
If you use Skype’s app on your iOS devices then continue to read this article.
AppSec Consulting security researcher Phil Purviance who discovered the vulnerability explains:
The iPhone Dev-Team has released RedSn0w 0.9.8b3 which can perform a tethered jailbreak on iOS 4.3.4.
For the convenience of kernel hackers like @comex and @i0n1c, we have a new redsn0w 0.9.8b3 that supports a TETHERED jailbreak for iOS 4.3.4 on all devices that have 4.3.4 except the iPad2. The vast majority of people will want to stay back at 4.3.3 because that’s where the untethered jailbreak is! There are no new features in 4.3.4 – only fixes for jailbreak exploits.
iPhone developer Daniel Amitay has posted the ten most common iPhone passcodes which he found by anonymously recording and analyzing passcodes used by customers of his Big Brother Camera Security iPhone app.
Formulaic passwords are never a good idea, yet 15% of all passcode sets were represented by only 10 different passcodes (out of a possible 10,000). The implication? A thief (or just a prankster) could safely try 10 different passcodes on your iPhone without initiating the data wipe. With a 15% success rate, about 1 in 7 iPhones would easily unlock–even more if the intruder knows the users’ years of birth, relationship status, etc.
Worried about local hackers? Like leaving your laptop behind in the coffee shop while you take long, leisurely trips to the bathroom? We wouldn’t be so self-assured. Turns out there’s a gaping security hole in the FaceTime beta, which allows anyone with access to your computer to change your password without knowing it to begin with, as well as peep and edit your security questions and answers. It would be nice if signing out of FaceTime would protect you, but unfortunately the app seems to have a lock-tight memory on your password, so it’s easy for anyone to open the app and sign-in again. Hopefully Apple will fix these holes quickly, and until then we recommend uninstalling FaceTime or choosing your friends very wisely.
If you need another great reason to pick up an Android phone, then hear this — one-in-five Android apps can steal your personal data and share it around.
I’m referring to reports breaking this morning – here and here — which claim that 20 per cent of the 48,000 apps in the Android market allow third-party apps to access your most sensitive information.
Some of the apps can make calls and send text messages without you the user knowing what happened, warns SMobile Systems in its Android market threat report. (Of course, SMobile Systems makes security packages for Android).