ios

Tue
01
Oct
John Lister's picture

Words With Friends DB Hacked; 620M Accounts Leaked

The word "hacked" is worth 16 points in Scrabble. It's also what appears to have happened to a database of 218 million users of the popular online game "Words With Friends." A few weeks ago game creators Zynga said it "recently discovered that ... certain player account information may have been illegally accessed by outside hackers." It didn't give any detail on numbers, but went on to say that account login information may have been accessed. (Source: zynga.com ) Now a hacker has come forth and is attempting to sell the details of 620 million Zynga game accounts, of which 218 million ... (view more)

Thu
22
Aug
John Lister's picture

iPhones, VLC Player Both At Risk

Users of both Apple devices and the VLC media player should watch out for potentially serious security bugs. The former is a particular embarrassment for Apple. It turns out the company fixed a security bug in iOS 12.3 in April, then accidentally ... removed the fix in iOS 12.4, which it released last month. It now plans to fix it imminently in an emergency update to be titled iOS 12.4.1. The bug is very serious as it potentially allows a rogue app to "execute arbitrary code with system privileges." That effectively means malware could have complete control over an iOS device, something that's ... (view more)

Mon
12
Aug
John Lister's picture

Apple Offers $1 Million For iPhone Hack

Apple is offering a million dollar bounty to anyone who can successfully hack an iPhone and shares the details. But its limited to specific circumstances that will mean the payout is well worth it for the company. Like several tech giants, Apple ... already had a reward scheme for people who find and report bugs. To date the biggest bounty Apple has offered is $200,000 and only to people who have previously been approved to explore Apple bugs. The million dollar bounty is officially open to anyone. The new offer was made at the Black Hat convention in Las Vegas, the leading annual gathering of ... (view more)

Wed
15
May
John Lister's picture

Researchers: Android Bloatware a Security Risk

Unwanted pre-installed software on Android devices often poses privacy and security risks according to a new study. That's because the so-called "bloatware" often by-passes Google's vetting process. One of the key selling points, or big drawbacks - ... depending on your perspective - of the Android operating system is that phone and tablet makers can customize their own devices, through the user interface and the apps that appear when a new device is first powered on. That's different from systems such as Apple, where both the hardware and software are controlled by the same company . The study ... (view more)

Tue
14
May
John Lister's picture

Supreme Court Rules on Apple's App Price Fixing

The Supreme Court has ruled that lower courts can hear a case claiming Apple's pricing policy for its apps breaches anti-trust laws . The claimants say Apple has a monopoly, and its mandatory commission drives up prices unfairly. The case centers on ... two main differences between apps on Apple mobile devices and those on rival systems such as Google's Android. The first is that it is virtually impossible to install an app on an iPhone or iPad from a sources other than the official iTunes App Store - something Apple cites as being important for security reasons. The second is that publishers ... (view more)

Wed
27
Mar
John Lister's picture

Apple Devices Need 51 Important Security Updates

Apple has released a patch for mobile devices which covers 51 security flaws. It's sparked debate over Apple's security levels and the way it issues such updates. The patch is for iOS, taking it up to version 12.2. Apple doesn't issue standalone ... security updates. Instead, it builds it into the main update for the system, which also includes new features or bug fixes. (Source: apple.com ) The most notable fix is a bug in an API (application program interface), which lets third party software interact with Apple services. In this case, the API bug could allow malware to access an iPhone, iPad ... (view more)

Tue
19
Mar
John Lister's picture

Most Android Antivirus Useless: Report

A new report claims most Android "antivirus" apps don't provide enough protection to justify that term. It says two-thirds of the antivirus programs were so ineffective, they were practically useless. The report comes from AV-Comparatives, a website ... that tests antivirus and other security software. It says it was inspired to look at Android apps after spotting one that literally did nothing but show a fake progress bar before saying no malicious apps were present (without actually carrying out a scan). The test involved putting 250 different Android antivirus apps to work on Samsung Galaxy S9 ... (view more)

Tue
29
Jan
John Lister's picture

Malware Makers Set Sights On Motion Sensor

An extremely creative form of malware on Android devices uses motion sensors to help stay undetected. It's designed to combat one of the key methods used by malware scanning tools. Trend Micro says it found the malware hidden in two Google Play ... Store apps named "BatterySaverMobi" and "Currency Converter," which claimed to provide functions as their names suggest. (Source: arstechnica.com ) Once installed, the apps downloaded malware in the background, then used a fake system update message to trick the user into giving permission to install it. The malware, named " ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Mon
30
Apr
Dennis Faas's picture

Explained: Absolute Best way to Limit Data on Android

Infopackets Reader Sam G. writes: " Dear Dennis, I work from home and also own an Android smartphone, which I use to communicate (via text messages) with friends and family. Because I am home all the time, I use WiFi on my phone instead of data. ... Therefore, I purchased a very cheap 'pay as you go' data plan for when I'm away from the office. The problem is that my data is being eaten away by apps on my phone whenever I'm on the go. I have tried disabling 'background data' on my Android phone to limit which apps can use data, but this is incredibly time consuming because each data permission is ... (view more)

Pages

Subscribe to RSS - ios