Skip to main content

Security

See All Stories

Stolen Device Protection is a great move by Apple; Activation Lock next, please

Stolen Device Protection | iPhone 15 shown

One of the key features added in the iOS 17.3 beta is Stolen Device Protection. This is a thoughtful and creative solution to balancing out the need for protecting iPhone users without stopping them do the things they want to do with their devices.

What I love about Apple’s solution here is that someone has clearly put a lot of thought into that balancing act …

Expand Expanding Close

How to catch iMessage impersonators with Contact Key Verification in iOS 17.2

turn on Contact Key Verification iMessage iPhone

Apple has delivered iOS 17.2 to all users and with it comes a brand new security feature for iMessage. Called Contact Key Verification (CKV), the capability gives users more certainty they’re messaging with the people they think they are. Follow along for what this feature is, how it works, and how to turn on Contact Key Verification on for iMessage.

Expand Expanding Close

PSA: It’s a good time to turn on ADP; Apple study reveals 2.6B personal records stolen in data breaches

Apple Advanced Data Protection

Following up on last year’s report “The Rising Threat to Consumer Data in the Cloud”, Apple has shared a new study from MIT’s Dr. Madnick that looks at how cyber threats are growing worldwide. Read on for a look at the state of online security and what we can do to limit our exposure and risk like using Apple’s Advanced Data Protection.

Expand Expanding Close
Proton Sentinel

Proton Sentinel arrives for Proton Pass Plus users, secures accounts even when credentials are stolen

Continuing with its mission to provide the most private and secure services, Proton is out today with the expansion of its Proton Sentinel security program. The feature comes to Proton Pass Plus users for free and delivers the company’s highest level of protection that can secure your Proton account even if your login credentials are compromised.

Expand Expanding Close

PSA: Update Chrome on Mac, as security flaw is being actively exploited

Update Chrome on Mac | 3D representations of Chrome logo

If you use Chrome on Mac, it’s strongly recommended to update it immediately, as a security flaw discovered by Google is being actively exploited by attackers. It could potentially allow personal data to be extracted from your Mac (the same issue also affects Chrome on Windows and Linux).

Google says it is aware of at least one real-life case of the exploit being used by a bad actor …

Expand Expanding Close

Bluetooth security flaws allow connections to be hijacked; AirDrop unlikely to be affected [U]

Bluetooth security flaws BLUFFS | iPhones showing Bluetooth on and Airdrop request

Update: Whether AirDrop is vulnerable to this exploit is unclear, but the odds are against it. See the update at the end.

Two newly-discovered Bluetooth security flaws allow attackers to hijack the connections of all devices using Bluetooth 4.2 to 5.4 inclusive – that is, all devices between late 2014 and now.

Six separate exploits have been demonstrated, allowing both device impersonations and man-in-the-middle attacks …

Expand Expanding Close

Windows Hello fingerprint security tests failed on top three laptops

Windows Hello fingerprint security | Microsoft Surface keyboard cover with fingerprint reader

While Windows laptop users like to think they have their own version of Touch ID, it appears not to offer the same level of security. The Windows Hello fingerprint authentication system on the top three laptops to use it has been put to the test by security researchers – and all three failed.

To be fair, the team was carrying out the penetration tests at the request of Microsoft – but it was a Microsoft Surface product that turned out to be easiest to bypass …

Expand Expanding Close

PSA: Watch out for these fake Safari and Chrome updates infecting Macs with AMOS

Mac malware fake Safari Chrome updates

A powerful new malware launched in early 2023 called Atomic macOS Stealer (AMOS) targets Apple users and has become a growing threat. Now, with the latest iteration of the malware, malicious parties are planting AMOS inside fake Safari and Chrome browser updates for Mac. We’ll cover how it works and how to avoid this threat.

Expand Expanding Close

Flipper Zero can still crash iPhones running the latest version of iOS 17

flipper zero iphone ios 17 bluetooth exploit attack

In September, 9to5Mac reported that Flipper Zero, a popular and cheap hacking tool, was being used to wreak havoc on nearby iPhones and iPads, spamming them with fake Bluetooth pop-ups until they eventually crashed.

Despite many iOS 17 updates since, including last week’s release of new iOS 17.2 betas, Apple has yet to implement safeguards to prevent the attack. So, what gives?

Expand Expanding Close

Apple’s head of security speaks out against iPhone app sideloading in new interview

A new report from The Independent this weekend offers an interesting look at why and how Apple is “working hard to break into its own iPhones.” Ivan Krstić, Apple’s head of security engineering and architecture, spoke to The Independent for the report and explained why Apple feels the need to invest so heavily in security.

Notably, Krstić also addressed the possibility of Apple opening up the iPhone to third-party app stores and sideloading due to impending regulation in the European Union.

Expand Expanding Close

Apple sends iPhone hack warning to Indian opposition leader; walks tricky line

iPhone hack warning | A copy of the alert message from Apple

Apple has sent iPhone hack warnings to the leader of India’s main opposition party, alongside other politicians opposing Narendra Modi’s government – placing Apple in a potentially delicate position.

A security researcher was also alerted, and shared a copy of the alert message he was sent, in which Apple advised enabling Lockdown Mode …

Expand Expanding Close

iMessage Contact Key Verification blocks the ‘ghost proposal’ plan by government spy agency

iMessage Contact Key Verification blocks the 'ghost proposal' | Robed figure holds an object with a ghost in it

Apple’s new iMessage Contact Key Verification at first glance seems to be a rather niche security feature, likely to be of interest only to the most paranoid or highly-targeted individuals. But it could turn out to be a privacy feature which protects us all from government spying.

That’s because it seems almost custom-designed to prevent a plan developed by the UK’s equivalent to the NSA – GCHQ …

Expand Expanding Close

Apple reveals technical details behind how iMessage Contact Key Verification works

Apple launched a new iMessage security feature yesterday in beta called Contact Key Verification. We learned the basics of how it works yesterday but now Apple has published technical details of how the next-level iMessage security feature operates – including a unique solution to a problem that other messaging services face.

Expand Expanding Close

iLeakage flaw could force iPhones and Macs to divulge passwords and more

Site default logo image

A vulnerability in A-series and M-series chips could force iPhones, Macs, and iPads to divulge passwords and other sensitive information to an attacker. Security researchers have dubbed the flaw – which affects Safari on the Mac, and any browser on iOS devices – iLeakage.

In a proof of concept attack, researchers were able to obtain access to the contents of a Gmail inbox, YouTube history, and passwords auto-filled by Safari …

Expand Expanding Close