Inside a lab in New York worth US$10 million, specialists are trying to brute force their way into iPhones and iPads.
What’s going on in the isolation room is important, if silent, forensic work. All of the phones are hooked up to two powerful computers that generate random numbers in an attempt to guess the passcode that locked each device. At night, technicians can enlist other computers in the office, harnessing their unused processing power to create a local supercomputer network.
Charlotte Henry and Andrew Orr join host Kelly Guimont to discuss Charlotte’s move (back) to Google Chrome, and the first Security Friday!
Bryan Chaffin and John Martellaro join host Kelly Guimont to discuss sending location data to Apple (or not), and John’s new Background Mode.
Charlotte Henry joins Kelly Guimont to discuss subscriber stats for Disney+ vs Apple services, bundles, and iOS using hardware security keys.
Criminal group eGobbler took advantage of a WebKit zero day to create over a billion malicious ads to affect iOS and macOS users.
Andrew Orr and John Martellaro join host Kelly Guimont to discuss sharing photos (but not their location data), and Apple’s OS security.
Apple just released a statement about the iOS exploits that Google’s Project Zero found, to allay fears that customers may have.
Trending security news today shows that iPhone Bluetooth can reveal some personal information like phone numbers.
Security expert Tarah Wheeler recently tweeted a list of the top 20 most common iPhone passcodes. These are all four-digit passcodes.
Apple just released the iOS 12.1.4 update with important security fixes, like a fix for the Group FaceTime bug.
You may have read in the news that a hacker group is holding a number of iCloud accounts for ransom. If Apple doesn’t pay a certain amount of money by April 7, the hackers will reset the accounts and remotely wipe iOS devices. Andrew Orr shows us how to protect your Apple ID.
AirDrop is a feature on Apple devices that lets you wirelessly share files with other Apple devices.
It’s always good to hear the origin story, but you shouldn’t be worried about this leak.
Aside from iOS, there is also a supplemental update for macOS. You should download both as soon as you can.
This is part of Project Zero’s modus operandi, as it routinely searches other companies’ software for bugs.
The details on the Common Vulnerabilites and Exposures (CVE) website aren’t available yet. This is because Apple imposed a moratorium on publishing until the bugs were patched. We’ll know more about them in the days ahead.
Apple, as companies get hacked left and right, it’s time to reassure users as well as security experts that you really do have our backs.
Security is on the brain this week! Learn how to secure your iCloud account and also learn how to secure your entire home network from your ISP’s prying eyes! Dave and John also help you determine what devices and processes are using your network, and what the difference is between WPA2 Personal and Enterprise. All of this and more in this week’s Mac Geek Gab. Press play and enjoy!
Apple recently hired a prominent iOS security researcher, Jonathan Zdziarski. Known as NerveGas in the jailbreaking community, Mr. Zdziarski is the author of several books about iPhone forensics and how to secure iOS apps. In light of recent events like the CIA Vault 7 leak, this move may improve Apple’s standing within security and privacy circles.
If you’re using two-factor authentication for your Apple ID (and you should be!), then you’re likely familiar with how you’ll approve access from your trusted devices with a six-digit code. But what if that code never comes through or you accidentally dismiss the prompt? Well, in today’s Quick Tip, we’re going to show you an easy way to generate a new one from your Mac or iOS device!