Categories
News security Software

Apple implements two-step authentication protocol for iCloud Web services

It’s a step in the right direction. Or at least a step to make the iCloud user base feel more secure. Per AppleInsider, Apple on Tuesday activated two-factor authentication for iCloud.com access, allowing only basic access to Find My iPhone for those opted-in to the security layer. The authentication system now requires users to enter […]

Categories
iCloud security

Apple to institute 2-step iCloud authentication protocol after recent celebrity photo leaks

Sometimes you’ve gotta go the two step security authentication route to keep everyone happy. Especially the celebrities. Following a rash of nude photos apparently stolen from celebrities’ iCloud accounts, Apple CEO Tim Cook said the company plans to activate new security measures designed to thwart future attacks. Per AppleInsider and the Wall Street Journal, Cook […]

Categories
News security Software

Apple releases Safari 7.0.6, 6.1.6, addresses WebKit security issues

On Wednesday, Apple released version 7.0.6 of its Safari web browser for OS X Mavericks and version 6.1.6 for its OS X Lion and Mountain Lion operating systems. The new version, features fixes for several WebKit-related security and memory corruption issues that could let attackers run arbitrary code on victim’s computers. The security issue could […]

Categories
iOS News security Software

Apple posts support document detailing iOS “backdoor” allegations

The timing’s a bit strange, but Apple seems to be trying to explain what its assortment of “backdoor” services are doing on its iOS devices only days after forensic scientist Jonathan Zdziarski disclosed the services during a speech at a hacker convention. Per AppleInsider, a recently published support document on Apple’s web site. In what […]

Categories
iOS iPad iPhone iPod Touch News security

Jonathan Zdziarski’s talk at hacker conferences shows backdoors on every iOS device, questionable services being run

There’s apparently a back door access point on every iOS device on the market. Per The Apple Core, forensic scientist and author Jonathan Zdziarski has posted the slides (in PDF format) from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS […]