Apple updated its suite of iWork apps across iOS, macOS and iCloud web apps. The feature that stands out the most is the ability to add password protection to your documents using Touch ID. Andrew Orr takes us through the features.
British Home Secretary Amber Rudd says it’s time for technology companies to give law enforcement a way to decrypt private communications because terrorists shouldn’t have a way to secretly chat. Her comments come in the wake of a terrorist attack in London where five people were killed.
There’s a new government call to for tech companies to let law enforcement bypass our security and encryption, but this time it’s from the United Kingdom. Bryan Chaffin and Jeff Butts join Jeff Gamet to look at the ramifications if the U.K. forces the issue, plus Bryan fills us in on Steve Wozniak’s presentation at Startup World Cup.
Apple’s App Store has loads of apps, but that doesn’t mean they’re all great or easy to find. Dave Hamilton and the Maccast’s Adam Christianson join Jeff Gamet to discuss the quality issues they’re seeing on the App Store, plus they explain why changing your iCloud password right now is a good idea.
Yesterday was the annual Pwn2Own hacking contest, and also marks the contest’s 10th anniversary. Hackers compete in challenges to find security holes in popular software and mobile devices. This year, two Safari zero days were found by the white-hat hackers.
Bryan and Jeff try and wrap their heads around a world where malware is being installed on Android devices in the supply chain, before customers even get the devices. They also take a trip into the anachronistic world of sealing wax and sealing wax stamps, as well as the fascinating world where 40 year-old Apple I computers are auctioned for hundreds of thousands of dollars.
It’s security time on TMO’s Daily Observations. Kelly Guimont and John Martellaro join Jeff Gamet to talk about Apple hiring security specialist Jonathan Zdziarski, plus they talk about why two-factor authentication is so important. They also talk about what an awesome asset Tom Negrino has been to the Apple community.
Waking up to find out your Twitter account has been hijacked to post antisemitic messages is a pretty crappy way to start your day. That’s why enabling two-factor authentication for your Twitter account is so important. It takes several steps, so follow along to learn how.
Get this: someone is slipping malware into Android devices while they’re still in the supply chain. Security firm Check Point found evidence that malware, adnets, spyware, and even ransomware was installed on some 36 Android devices before customers touched them. Devices from Samsung, LG, Xiaomi, ZTE, Lenovo, Asus, and Oppo were included in Check Point’s report. Bryan Chaffin explains.
FBI Director James Comey absolute privacy doesn’t exist in the United States. Dave Hamilton and John Martellaro join Jeff Gamet to look at what that means for privacy and security through encryption, plus John tells us why HP is targeting Apple’s Pro users with its new computers.
According to the Wikileaks Vault 7 information dump, the CIA has been hard at work developing hacks to get into the data on our iPhones. Most of the exploits listed in the report, however, are already patched and Apple is working on taking care of the remaining few.
With the Wikileaks report out saying the CIA developed hacking tools to get into our iPhones, John Martellaro joins Jeff Gamet to look at Apple’s security measures for our mobile devices. They also look at the negative message Apple is sending customers by not giving us solid information about the Mac, and Kelly Guimont drops by for a few minutes, too.
A scary piece from Motherboard brings to attention a tool for iOS 10 spying. A company called Mobistealth sells a special monitoring tool that can pull data from iCloud backups. And the device doesn’t need to be jailbroken to work.
Agilebits announced that 1Password users were getting an error message when trying to start the app. This error is due to the expiration of the developer certificate this past Saturday. The company knew the certificate was expiring but didn’t realize it would cause an issue with the software. [Updated with download link.]
Apple added another facial recognition company to its stable. This time it’s RealFace, the company behind the photo picker app Pickeez. Reports speculate Apple bought the company so it can jump into using facial recognition instead of Touch ID to unlock our iPhones. That may be Apple’s long-term plan, but don’t count on Touch ID going away any time soon.
The latest in the steady stream of iPhone 8 reports says the familiar Home button with Touch ID is going away and in its place we’ll get the Function Area. That’s fancy talk for a space at the bottom of the iPhone screen for a row of virtual buttons.
If you’re using two-factor authentication for your Apple ID (and you should be!), then you’re likely familiar with how you’ll approve access from your trusted devices with a six-digit code. But what if that code never comes through or you accidentally dismiss the prompt? Well, in today’s Quick Tip, we’re going to show you an easy way to generate a new one from your Mac or iOS device!
Apple’s iPhone 8 will include an iris scanner and wireless charging, making it even more Star Trek-like than any iPhone that’s come before. Both are likely, although it’s possible sources are misreading Apple’s iris scanner plans.
In unnerving news, Forbes reports that your web browsing history in Safari gets stored in iCloud, even if you deleted it. Using a special tool, a security analyst accidentally discovered an iCloud record called “tombstone,” and this is where Apple stores the deleted history.
A hacker dumped 900GB of hacking tools and data used by Cellebrite. The cache of data is on Pastebin, for now, at least. Cellebrite is an Israeli security company that came to public prominence when the FBI used its services to hack into the San Bernadino shooter’s iPhone.