Apple Publicly Trolls Google Over Controversial Smart City Surveillance Plans

Apple Publicly Trolls Google Over Controversial Smart City Surveillance Plans

Privacy has become a new frontier in Big Tech's fight for consumer confidence, and Apple has clocked that (whether reality or perception) it has an advantage over arch-rival Google, given that its business has not been built around capturing, analyzing and monetizing user data.

Israeli tech company says it can break into all iPhones ever made, some Androids

Israeli tech company says it can break into all iPhones ever made, some Androids

The announcement from Cellebrite came in the form of an update this week to its website promoting the iPhone-hacking technology, dubbed “UFED Premium,” as “the only on-premise solution for law enforcement agencies to unlock and extract crucial mobile phone evidence from all iOS and high-end Android devices.”.

Leaked: The Feds’ Favorite iPhone Hackers Plan To Crack Android

Leaked: The Feds’ Favorite iPhone Hackers Plan To Crack Android

Apple iPhones can be raided for data by U.S. law enforcement thanks to Grayshift's GrayKey, even if the company can't decipher the device's passcode. Grayshift were first revealed by Forbes last year, when the company claimed it could crack the passcode of all modern iOS devices with its GrayKey hacking tool.

'Siri, I'm getting pulled over': A shortcut for iPhones can automatically record the police

'Siri, I'm getting pulled over': A shortcut for iPhones can automatically record the police

There's a big new feature for iPhone experts this year: It's an app called Shortcuts, and with a little bit of logic and know-how, you can stitch together several apps and create a script that can be activated by pressing a button or using Siri.

Apple touts privacy in web sign-on war with Facebook, Google

Apple touts privacy in web sign-on war with Facebook, Google

When users sign in with their Google or Facebook Inc profiles to third-party apps, the apps often share valuable data with Google and Facebook, a practice that Apple is looking to stop. Bajarin said Apple appears to be working to “firewall” off its customers from data collection practices it disagrees with.

Letter: Does Apple respect the privacy of iPhone users?

Letter: Does Apple respect the privacy of iPhone users?

We are told by Apple that it will keep our data secure, but the company doesn’t seem to respect our privacy and has decided to share our information with other companies.

While you're sleeping, your iPhone stays busy harvesting data

While you're sleeping, your iPhone stays busy harvesting data

One app, the crime-alert service Citizen, shared personally identifiable information, in violation of its published privacy policy. Apple offers a privacy setting called "Limit Ad Tracking" (sadly off by default) which makes it a little bit harder for companies to track you across apps, by way of a unique identifier for every iPhone.

While you’re sleeping, your iPhone stays busy — snooping on you

While you’re sleeping, your iPhone stays busy — snooping on you

Apple offers a privacy setting called “Limit Ad Tracking” (sadly off by default) which makes it a little bit harder for companies to track you across apps, by way of a unique identifier for every iPhone.

All iPhones And Some Android Phones Are Vulnerable To A New Device Fingerprinting Attack

All iPhones And Some Android Phones Are Vulnerable To A New Device Fingerprinting Attack

The researchers developed a method for creating a much more robust device fingerprint that uses data gathered from the sensors in a smart phone. As with iPhones, there’s good news and bad about SensorID and Android phones.

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked

Jonathan Levin, a researcher who has written books about iOS and macOS internals and security and provides training on iPhone security, said that in his opinion, so few iOS zero-days have been caught because they are worth a lot of money, and thus more likely to be used in targeted attacks.

IPhone owners can sue Apple for monopolizing App Store, Supreme Court rules

IPhone owners can sue Apple for monopolizing App Store, Supreme Court rules

New York (CNN Business)A group of iPhone owners accusing Apple of violating US antitrust rules because of its App Store monopoly can sue the company, the Supreme Court ruled Monday.

Privacy. That’s iPhone. No matter what Google says

Privacy. That’s iPhone. No matter what Google says

Apple on Friday published a third installment to an ad series focusing on iPhone privacy , with the latest commercial throwing a spotlight on the company's end-to-end encrypted iMessage platform. Via Apple's latest iPhone privacy ad touts iMessage encryption.

Google now wants to crack down on cookies to convince you it cares about privacy

Google now wants to crack down on cookies to convince you it cares about privacy

We said above that this move has the “semblance” of a pro-privacy effort, because of course the importance of cookies has waned a bit in recent years, thanks in part to the impact of smartphones and mobile browsers on web activity.

How to unlock an iPhone you've forgotten the password to, even if it's disabled

How to unlock an iPhone you've forgotten the password to, even if it's disabled

Dave Johnson/Business Insider Instead, you need to reset the iPhone to its factory settings and then restore your apps and data from a backup. After it's erased, it'll be returned to its factory settings and you can follow the directions to restore the iPhone with a recent backup.

Mozilla criticizes Apple's iPhone privacy claims, launches online petition

Mozilla criticizes Apple's iPhone privacy claims, launches online petition

Mozilla is going so far as to launch a petition, hoping to get Apple to change an important iPhone default setting. Each iPhone that Apple sells comes with a unique ID (called an 'identifier for advertisers' or IDFA), which lets advertisers track the actions users take when they use apps.

Researchers Tried To Crack An Android Phone To See If FBI Could

Researchers Tried To Crack An Android Phone To See If FBI Could

Data encryption on smartphones involves a key that the phone creates by combining 1) a user’s unlock code, if any (often a four- to six-digit passcode), and 2) a long, complicated number specific to the individual device being used.

Apple makes cool new ad about iPhone Privacy

Apple makes cool new ad about iPhone Privacy

That’s iPhone.” Then we’re shown how we already value privacy in the everyday world in ways we might not relate to digital privacy: no trespassing signs and vicious guard dogs to protect our property, pausing a private conversation or swallowing a secret note from a classmate to avoid others receiving the message, and shredding personal information to leave no trace for identity thieves.

As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits

As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits

Image: Seth Laupus/Motherboard On Thursday, Crowdfense, a company that buys zero day exploits from researchers and then sells them to government agencies, announced it is now offering a total of $15 million to hackers who have particular exploits for sale.

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

There's a little-known feature built into your iPhone that keeps a history of every location you've been — and how many times you've been there.

'Internet of things' connected cars will invade your privacy

'Internet of things' connected cars will invade your privacy

Cars have become part of the "internet of things." They are connected to our devices, the internet as well as big tech companies. Click or tap to listen to learn about IoT and cybersecurity.

Personal Security & Privacy Tools I Recommend

Personal Security & Privacy Tools I Recommend

It uses client side encryption, default email encryption between proton mail users, and claims all their code is open source and they do no logging. Backups I use a custom script that uses duplicity on Linux to locally encrypt files and then back up to BackBlaze B2 storage.

Those Twitter DM’s From the Account You Deleted? They Could Still be Around

Those Twitter DM’s From the Account You Deleted? They Could Still be Around

Twitter claims accounts that have been deactivated and deleted are removed from the service along with all the rest of the account’s data after 30 days.

Now this Android spyware poses as a privacy tool to trick you into downloading

Now this Android spyware poses as a privacy tool to trick you into downloading

The campaign has been active since May last year, with users previously duped into downloading the malware with a fake version of an adult app — but now those behind Triout have altered their tactics, distributing the malware with a re-purposed version of a legitimate privacy tool that has been ripped from the Google Play store.

Apple’s Empty Grandstanding About Privacy

Apple’s Empty Grandstanding About Privacy

Companies such as Google and Facebook get access to iPhone users by offering their apps—Messenger, Gmail, Google Maps, and so on—for download from the Apple App Store. If Apple really objected to data-hungry business models, it could take much more aggressive action during app review.

Apple rushes to fix FaceTime bug that let users eavesdrop on others

Apple rushes to fix FaceTime bug that let users eavesdrop on others

Serious glitch, which can also turn on video without people’s knowledge, comes amid increasing concerns over privacy Apple has made the group functionality on its FaceTime application temporarily unavailable as it rushes to fix a glitch that allowed users to listen in on the people they were calling when they did not pick up the call.

Apple FaceTime bug lets you listen even if someone doesn't answer

Apple FaceTime bug lets you listen even if someone doesn't answer

There's a FaceTime bug that lets you hear through someone else's iPhone, even if they haven't answered your phone call. I tried placing a video call to my editor from my iPhone using Apple's FaceTime app.

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up

The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their phone — before the person on the other end has accepted or rejected the incoming call.

PSA: Disable FaceTime. Miscreants can snoop on your iPhone, Mac mic before you pick up call

PSA: Disable FaceTime. Miscreants can snoop on your iPhone, Mac mic before you pick up call

Here's the steps to reproduce the security blunder: on an iPhone, video call a contact using FaceTime on a vulnerable device, and while connecting, swipe up and add a person to the call.

A major privacy flaw in Apple's FaceTime lets others listen in on you before you answer the call

A major privacy flaw in Apple's FaceTime lets others listen in on you before you answer the call

A major privacy flaw in Apple's FaceTime video chat product has been discovered allowing someone to secretly eavesdrop on another user before they answer the call.

Facebook, WhatsApp and Instagram MERGING into ‘single messaging service’ – as angry staff ‘clash with controlling Zuckerberg’

Facebook, WhatsApp and Instagram MERGING into ‘single messaging service’ – as angry staff ‘clash with controlling Zuckerberg’

"With the integration project currently expected to take a year to complete, and with end-to-end encryption as part of the plan, we should expect the Facebook engineering teams to focus attention on uniform data security both in their platform and in the apps themselves." Worryingly, child safety campaigners have warned that this could make child-grooming even easier for online sickos.

More