iPhoneRoot.com       

News tagged ‘security’


Apple improving iTunes account security with stricter requirements





security

Ars Technica reports that Apple has began asking users of iOS devices to select and answer some question related to their Apple IDs. Such measures were reportedly taken by the company to improve security of iTunes accounts.

After being shown the message, users are asked to select from a number of security questions and provide personal answers. Users are also prompted to provide a backup e-mail address in case the primary address associated with their Apple ID is compromised.


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Friday, April 13th, 2012. 16:02

A Look Inside Apple Headquarters



applehq

The Apple Gazette has compiled a nice photo gallery that offers a look inside Apple Headquarters at 1 Infinite Loop. Take a look:

When you first walk inside Apple HQ, you’re greeted by the welcome/reception desk, which is situated inside the massive atrium with its bright natural light and suspended walkways.


Reception Desk


Apple HQ atrium


Read the rest of this entry »




|
   

Leave a comment, read comments [1]

Written by admin

Monday, April 9th, 2012. 14:23

Dropbox And Facebook iOS Apps Are Vulnerable To Credential Theft



iphonefb

This week Gareth Wright reported that Facebook's app for iOS has a security vulnerability through which malicious users can access login credentials saved in a .plist file of the app. With a copy of that .plist file malicious users could automatically log into the affected user's Facebook account on another device. Reportedly, the vulnerability also exists on Android devices.


Read the rest of this entry »




|
   

Leave a comment

Apple Releases Its Second Java Update For OS X



javaupdate

Apple has released its second Java security update for OS X in two days. The first update closed Flashbaсk vulnerability that has affected 600,000 Macs.


Read the rest of this entry »




|
   

Leave a comment

Written by maxim

Friday, April 6th, 2012. 13:51

RIM hiring iOS developers



rim-logo

Research in Motion has recently posted a job listing on its website that reveals that the BlackBerry maker is looking to hire developers for an undisclosed iOS enterprise app to be distributed through Apple's App Store. A RIM spokesperson confirmed the rumours. As he said, “the company is indeed developing an iPhone app as part of its BlackBerry Mobile Fusion project.”

Along with the usual coding and communication skills, requirements called for a candidate well-versed in creating apps for both the iPhone and the iPad.


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Friday, March 23rd, 2012. 16:12

Geohot Arrested for Marijuana Possession En Route to SXSW



geohot

Famous hacker George Hotz (aka Geohot) was arrested and charged with felony marijuana possession while en route to SXSW conference.

Hotz was on his way to give a talk at SXSW, when he had to pass through a border patrol checkpoint in Sierra Blanca. According to a source familiar with the case, Department of Homeland Security officers brought drug dogs to each car. When the dogs barked, Hotz (and his passengers) were pulled over for more searching.


Read the rest of this entry »




|
   

Leave a comment

Written by admin

Friday, March 16th, 2012. 4:54

Apple introduces Developer ID



Developer-ID

On Monday Apple sent out e-mails inviting developers to prepare their software for OS X Mountain Lion by joining the Developer ID program. The program will allow for apps to run on a Mac or iOS device that is protected by the Gatekeeper anti-malware system that requires that apps be certified through the Developer ID program to ensure seamless installation.

Gatekeeper is a new anti-malware feature that, according to Apple, will filter out malicious third-party applications and prevent OS X users from "unknowingly downloading and installing malicious software." To that end, the system implements a hierarchy of security that is based on digital certificates embedded in a software's code.


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Tuesday, February 28th, 2012. 22:09

Apple rumored to be secretly shipping 'iPad 3' as Best Buy cuts iPad 2 by $50



iPad3Case

Meijer, a regional big-box retailer in the U.S., slashed the price of the 16GB iPad 2 with Wi-Fi by $70, and Best Buy has begun offering $50 off every iPad 2 model. These facts could, however, suggest that Foxconn is already preparing to ship the device's third-generation successor to Apple in the United States.

The alleged secret shipments from Foxconn were revealed in a shipping manifest from Apple.pro revealed this weekend, which shows a series of shipments scheduled to begin delivery in the U.S. no later than March 9. The mystery orders arriving from Chengdu, China, are said to be under high security. A source from Foxconn's Chengdu plant reportedly indicated that the shipment is for "Apple's latest products."


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Monday, February 27th, 2012. 21:01

Foxconn's Servers Hacked, Exposing Vendor Usernames and Passwords



login

Swagg Security hacking group announced this week that they managed to hack Foxconn servers that expose usernames and passwords for clients and employees. Such information could be used to place fraudulent orders for companies like Apple and Microsoft.

Swagg Security alleged that it had bypassed Foxconn's firewall "almost flawlessly." Using several hacking techniques and a couple of days time, the hackers reportedly dumped "most of everything of significance," including usernames and passwords. According to the group, the leaked passwords "could allow individuals to make fraudulent orders under big companies like Microsoft, Apple, IBM, Intel, and Dell."


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Thursday, February 9th, 2012. 20:48

Apple removes blatant copycat apps from App Store



appstore

TechCrunch reports that Apple removed from the App Store a number of copycat applications such as Temple Run, Tiny Wings and Words with Friends that closely mimicked the titles of successful games after they provoked a public outcry from developers over the issue. The fraudulent apps were largely the work of developer Anton Sinelnikov.

Sinelnikov, however, is not alone in his efforts, as dozens of other applications from other developers have attempted to dishonestly capitalize on the successes of others. Numerous developers and users asked Apple to take down the offending apps. Keith Shepherd, the creator of Temple Run, noted on his account that an app like Temple Jump "taints the integrity of the App Store." After Apple pulled the app, Shepherd posted on Twitter that he was "thankful."


Read the rest of this entry »




|
   

Leave a comment

Taiwanese Site Sued by Supplier After Leaking Claimed iPad 3 Dock Connector



ipad_3_dock_connector

In July 2011 Taiwanese site Apple.pro published several photos of what was claimed to be the dock connector and ribbon cable for the next-generation iPad 3. Honestly, the connector didn’t provide much information about the full iPad 3 tablet. The only obvious fact was that the connector itself being white as opposed to black on the iPad 2, and it was one of the first reported leaks of iPad 3 parts. However,  Apple's suppliers seem to have taken the leak seriously. Apple.pro now reports that it has been sued by the supplier responsible for the part leaked in last year's report.


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Tuesday, January 31st, 2012. 23:02

Mac platform faced 58 malware threats from Q2 to Q4 2011



malware

Security lab F-Secure released its 2011 Mac Malware Summary earlier this week, noting that Mac OS X platform endured 58 separate malware attacks from April 2011 to December 2011. Of course, this numbers couldn’t be compared with multiply attacks that Microsoft's Windows operating system experienced over the same period.

The firm counted only unique variants of malware that occurred during the second, third and fourth quarters of 2011. "We prefer a more conservative approach when counting malware. The more generic and family based, the better," the report noted.


Read the rest of this entry »




|
   

Leave a comment

Written by Svetlana Osipova

Friday, January 20th, 2012. 14:27

iOS Accessories At CES 2012: Wireless HDMI, Multi-docks, iNotebook, Kiosk



inCharge

There are tons of accessories showed off at CES 2012, many of which were designed for iOS devices. Among the most interesting are multi-docs which offer various ways of charging several iOS devices simultaneously.


Read the rest of this entry »




|
   

Leave a comment

Written by maxim

Thursday, January 12th, 2012. 21:29

"Dream Team" will work on untethered iPad 2 and iPhone 4S jailbreak



pwned

Pod2g has recently announced that Planetbeing, MuscleNerd, and P0sixninja have joined his effort to release an iOS 5.0.1 untethered jailbreak for the iPhone 4S and iPad 2.

@planetbeing, the legendary hacker behind iPhone Linux and lot of jailbreaks has joined the A5 research! The famous @MuscleNerd, the leader of the iPhone Dev Team, who did a lot of tests for Corona and whom integrated it and made it simple in redsn0w is willing to help also. And last, but not least @p0sixninja, the leader of the Chronic Dev Team, and my partner for years on iPhone security research has started to code and fuzz the Apple sandbox.

That means that we now have a dream team to create a public release of the A5 jailbreak.


Read the rest of this entry »




|
   

Leave a comment, read comments [7]

Apple Patent Describes Multi-User Face Detection System



apple-face-detection

Like the controversial face unlock functionality in Google’s Galaxy Nexus, a new Apple’s patent application points out that the company is developing similar but more sofisticated face detection solution. As PatentlyApple reports, Apple said that these user detection system could be included in a future MacBook, iPad, iPod touch and iPhone.
Read the rest of this entry »




|
   

Leave a comment