iPhone

now browsing by tag

 
 

#mobilesecurity | #android | #iphone | Trusted Platform Module (TPM) Market Growth Insight Analysis 2020-2026 – Cole Reports | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans

The “Trusted Platform Module (TPM) Market” research report enhanced worldwide Coronavirus COVID19 impact analysis on the market size (Value, Production and Consumption), splits the breakdown (Data Status 2014-2020 and 6 Year Forecast From 2020 to 2026), by region, manufacturers, type and End User/application. This Trusted Platform Module (TPM) market report…

The post #mobilesecurity | #android | #iphone | Trusted Platform Module (TPM) Market Growth Insight Analysis 2020-2026 – Cole Reports appeared first on .

Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #mobilesecurity | #android | #iphone | Trusted Platform Module (TPM) Market Growth Insight Analysis 2020-2026 – Cole Reports | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

| Denies IPR in Apple v Fintiv | #iphone | #ios | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans

The Patent Trial and Appeal Board’s (“PTAB”) institution rate for inter partes reviews (“IPRs”) has fallen virtually every year.  In its recent decision in Apple, Inc. v. Fintiv, Inc. issued on May 13, 2020, the PTAB denied institution of Apple’s petition for IPR and set forth a new test for determining whether to institute an IPR based on the status of the underlying district court proceedings, which suggests that institution rates may continue to fall.

Ever since inception of the AIA, the institution rate of IPRs has declined significantly almost every year.  According to published PTAB statistics, the institution rate has fallen from a high of over 87% in 2013 to a low of 63% in 2019 and is only 55% so far in 2020.[1]  An analysis of the data reveals that the driving force behind the falling IPR rate appears to be the recent and dramatic increase in the rate of discretionary denials under 35 U.S.C. §314(a).  Under that statute, an IPR may not be instituted unless there is a “reasonable likelihood that the petitioner would prevail” on at least one patent claim challenged in the petition.[2]  Over the past four years, discretionary denials have increased from only 5 petitions denied under §314(a) in 2016 to 75 petitions denied under §314(a) in 2019.[3]  That number is expected to more than double in 2020.[4]

A recent decision by the PTAB is a good illustration of the PTAB’s exercise of its broad discretion to deny institution under §314(a) in view of the advanced stage of the underlying district court proceeding.

In a landmark decision designated as precedential or binding, the PTAB recently exercised its discretion under §314(a) to deny institution of an IPR petition filed by Apple against Fintiv, Inc., a company that develops mobile commerce platforms to support mobile marketing and mobile payments.[5]  In Apple, the PTAB announced and applied a new six-factor test to be used in determining whether to deny institution based on the advanced status of the underlying district court case.  Technically, the six factors were articulated in the PTAB’s order authorizing supplemental briefing on whether to grant a discretionary denial a couple months earlier,[6] and a different list of non-exclusive factors was set forth in General Plastic Co., Ltd. v. Canon Kabushiki Kaisha,[7] but the present six-factor test was not designated as precedential until the PTAB’s May 13, 2020 decision.  In any event, the parties’ dispute began when Fintiv filed suit against Apple for patent infringement in the Western District of Texas.[8]  Apple filed its IPR petition ten months later, and the parties were in the relatively early stages of discovery when the PTAB issued its decision.  In denying institution, the PTAB announced and considered the following six factors: (1) whether the District Court had granted a stay or evidence exists that the Court would grant a stay if the IPR were instituted; (2) the proximity of the court’s trial date to the PTAB’s expected deadline for a final decision in the IPR proceeding; (3) the investment by the parties and the court in the district court proceedings; (4) the degree of overlap between the issues raised in the IPR and the district court case; (5) whether the parties in the two proceedings are the same; and (6) any other factors that might affect the Board’s discretion, including the merits of the IPR petition.[9]

First, the PTAB observed that neither party had requested a stay pending the IPR and “declined to infer” whether a stay would be granted if the IPR were instituted, which did not weigh for or against institution.  Second, the PTAB noted that trial in the district court was expected to occur two months before the Board’s deadline for a final decision in the IPR proceeding, which weighed in favor of a discretionary denial.[10]  Third, even though fact discovery was only “in its early stages, with document production ongoing and depositions just getting underway,” the PTAB noted that the district court had issued a Markman ruling, and the parties had exchanged their final infringement and invalidity contentions.[11]  Based on the parties’ investment in the district court case, the PTAB considered this factor to weigh “somewhat in favor” of a discretionary denial.[12]  Fourth, although Apple had raised additional invalidity contentions in the district court case that were not at issue in the IPR, the PTAB reasoned that the assertion of additional invalidity contentions in the District Court is “not relevant to the question of the degree of overlap.”  Instead, because the identical patent claims were challenged in both proceedings, and because “same [prior] art” was presented in both proceedings, this factor weighed in favor of discretionary denial.[13]  Fifth, because Apple and Fintiv were parties in both proceedings, this factor also weighed against institution.  Finally, the PTAB’s “initial inspection” of Apple’s petition revealed “certain weaknesses,” such as where the prior art disclosed certain steps and other claimed features.  In conclusion, the PTAB determined that the balance of factors weighed in favor of discretionary denial and that “efficiency is best served by denying institution.”[14]

Takeaways:  Discretionary denials under §314(a) are increasing.  Patent owners seeking to defeat institution of IPR petitions may wish to emphasize the weaknesses in the merits of the IPR petition and argue that the denial of institution will save judicial and party resources.  On the other hand, IPR petitioners may wish to file their petitions sooner and not wait the full twelve-month statutory period allowed before filing their IPR petition in order to give the district court proceedings less time to reach an advanced state.  Additionally, petitioners may wish to challenge more or different patent claims in the IPR than challenged in the district court case to reduce the degree of overlap between the IPR and district court proceedings.  For the same reason, petitioners seeking institution may also wish to assert additional or other invalidity contentions, prior art or prior art combinations in the IPR petition in order to reduce the degree of overlap between the IPR and district court proceedings.


FOOTNOTES

[1] https://www.uspto.gov/sites/default/files/documents/trial_statistics_20200331.pdf.

[2] 35 U.S.C. §314(a).

[3] https://www.unifiedpatents.com/insights/2020/5/13/ptab-procedural-denial-and-the-rise-of-314?utm_source=Unified+Patents+Newsletter&utm_campaign=ca8294e39b-EMAIL_CAMPAIGN_2019_10_02_08_16_COPY_01&utm_medium=email&utm_term=0_5140119467-ca8294e39b-124506621

[4] Id.

[5] Apple, Inc. v. Fintiv, Inc., IPR2020-00019, Paper 15 (PTAB May 13, 2020).

[6] Apple, Inc. v. Fintiv, Inc., IPR2020-00019, Paper 11 at 5 (PTAB March 20, 2020).

[7] IPR2016-01357, Paper 19 at 15-16 (precedential) (PTAB Sep. 6, 2017).

[8] Id. at 8.

[9] Id. at 7-8.

[10] Id. at 13.

[11] Id. at 14.

[12] Id.

[13] Id. at 15.

[14] Id. at 17.

Copyright © 2020, Sheppard Mullin Richter & Hampton LLP.

______________________________________________________________________________________________

Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post | Denies IPR in Apple v Fintiv | #iphone | #ios | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

#mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans

[ad_1]

The ministerial committee in charge of combating Covid-19 decided on Monday not to submit to a parliamentary vote a bill authorizing the continued use of phone surveillance technologies by the Israel Security Agency, also known as Shin Bet, to track suspected Covid-19 cases.   The bill is still…

The post #mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients appeared first on .

[ad_2]

Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

You Can Now Run Android on an iPhone With ‘Project Sandcastle’

Source: National Cyber Security – Produced By Gregory Evans

Not happy with your expensive iPhone and wondered if it’s possible to run any other operating system on your iPhone, maybe, how to install Android on an iPhone or Linux for iPhones?

Android phones can be rooted, and iPhones can be jailbroken to unlock new features, but so far, it’s been close to impossible to get Android running on iPhones, given the mobile device hardware constraints and software limitations.

However, it’s now possible to smoothly run Android on an iPhone—thanks to a new initiative, dubbed Project Sandcastle.

Undertaken by cybersecurity startup Corellium, Project Sandcastle is the consequence of a 13-year-long developmental effort to port Android to iOS and as well as demonstrate that Apple’s much-vaunted security barriers can indeed be compromised.

“Where sandboxes set limits and boundaries, sandcastles provide an opportunity to create something new from the limitless bounds of your imagination,” the project website says. “The iPhone restricts users to operate inside a sandbox. But when you buy an iPhone, you own the iPhone hardware.”

“Android for the iPhone gives you the freedom to run a different operating system on that hardware. Android for the iPhone has many exciting practical applications, from forensics research to dual-booting ephemeral devices to combatting e-waste.”

For now, only a handful of devices, the iPhone 7, the iPhone 7 Plus, and the iPod Touch, are capable of running a customized version of Android, which comes installed with OpenLauncher and the secure Signal messaging app.

Even then, there’re a lot of restrictions, including no support for audio output, cellular modem, Bluetooth, and camera, to name a few, as shown in the chart below.

All of this is only to say that Project Sandcastle is very much a work in progress.

The hack makes use of semi-tethered Checkra1n jailbreak to bypass restrictions, which is based on the checkm8 unpatchable bootrom exploit that makes it possible to gain deeper access to iOS.

It was initially released last November and works on the iPhone 5s to iPhone X, running iOS 12.3 and newer versions.

install android on iphone

Jailbreaking — similar to rooting on Google’s Android — is a process to escalate privileges that allows iOS users to remove software restrictions imposed by Apple, thereby making it possible to bypass the company’s walled garden to add apps and other functions, including those from unofficial app stores.

The practice, it is to be noted, also voids your device’s warranty, as it’s a violation of Apple’s End User License Agreement that you agree to every time you purchase a new iPhone.

Furthermore, due to the inherent security risks involved, Apple has steadily imposed a hardware and software lockdown of its ecosystem and made it deliberately difficult to jailbreak devices.

Furthermore, jailbreaks tend to be very specific, and very much dependent on the phone and iOS version, in order for them to be successfully replicated.

The only problem is that Checkra1n is just a temporary jailbreak, and will get wiped out once the phone reboots.

While the jailbreak at first was only possible through macOS, it gained Linux support last month, opening up the possibility of performing a jailbreak via non-Apple devices.

Thus, using the checkra1n jailbreak exploit, the Correlium team found that it’s even possible to install a semi-working version of Android on an iPhone. The result is almost equivalent to running a temporary OS on your iPhone.

Correlium’s Project Sandcastle comes as Apple sued the company last year for alleged copyright infringement by selling iOS and device virtualization software, including virtual versions of iOS devices running what Apple calls unauthorized copies of iOS.

The development also follows Apple’s announcement last year that it will distribute special iPhones with root access that are less restrictive than their consumer counterparts for security research as part of a new iOS Security Research Device program.

While Project Sandcastle is a huge achievement, it goes without saying that jailbreaking and rooting devices come with their own risks.

The efforts are on to expand the project to the other iPhones included in the jailbreak. You can give the beta a shot by following the instructions here.

The Original Source Of This Story: Source link

The post You Can Now Run Android on an iPhone With ‘Project Sandcastle’ appeared first on National Cyber Security.

View full post on National Cyber Security

#nationalcybersecuritymonth | Security experts explain why unlocking the Pensacola shooter’s iPhones would unleash a privacy nightmare for iPhone owners

Source: National Cyber Security – Produced By Gregory Evans

  • Apple’s decision not to unlock or create a backdoor into the iPhones used by a gunman in a Florida shooting last month puts the tech giant at odds with the United States government yet again.
  • Security experts agree, however, that circumventing the iPhone’s security poses a significant risk to iPhone users since it would provide a means to obtain private data that even Apple can’t presently access.
  • There’s a risk that such a tool could fall into the wrong hands, some experts warn.
  • Visit Business Insider’s homepage for more stories.

Attorney General William Barr recently called on Apple to help unlock the iPhones used by a gunman in Pensacola, Florida last month – a situation that once again requires the tech giant to balance protecting consumer privacy with its legal obligation to assist in investigating a shooting that’s resulted in the loss of American lives.

But security experts agree that providing access to the shooter’s iPhone could jeopardize the security of the millions of iPhones in use around the world.

„In essence, you’re trying to make a weapon that can only be used on a single target,“ Jacob Doiron, an information systems lecturer at San Diego State University, said to Business Insider. „But that’s not the nature of weapons, or exploits. They are applicable to any device that has that profile or configuration.“

On Monday, Barr said that Apple had not provided any „substantive assistance“ in getting access to two iPhones belonging to the shooter, Mohammad Alshamrani, who killed three people at a naval airbase last month. But Apple has since refuted that characterization, saying that it had provided iCloud backups, information, and other data from Alshamrani’s account in cooperating with the investigation. Now, Apple is reportedly gearing up for a legal battle with the Department of Justice to defend its position, according to The New York Times.

„We have always maintained there is no such thing as a backdoor just for the good guys,“ Apple said in a comment to Business Insider. „Backdoors can also be exploited by those who threaten our national security and the data security of our customers.“

Apple took a similar position in 2016 when it was caught in a stand-off with the Federal Bureau of Investigation over whether it should unlock an iPhone linked to a shooting in San Bernardino, California. Apple refused to unlock the iPhone, and the FBI ultimately ended up working with a private companyto gain access to the device.

The crux of the issue when it comes to unlocking an iPhone or bypassing its encryption , according to privacy experts, is that once Apple creates a backdoor, there’s a risk that it can be used in unpredictable and in some cases harmful ways.

„I would say the chances of it falling into the wrong hands are 100%,“said Mark Nunnikhoven, vice president of cloud research for cybersecurity firm Trend Micro.

There’s also the question of why Apple couldn’t just create the tool for the purposes of the investigation and then push an update to iPhones that would render it obsolete. For that to work, the backdoor would have to be tied to the software only, not the iPhone’s hardware, says Doiron. „Sometimes these vulnerabilities take place on the hardware, level,“ he said. „That’s not something that could be fixed via software.“

„We’re on your side“

The broader issue, however, may be that creating such a tool would put private, encrypted data from iPhone users in the hands of Apple and its employees – a privilege the company doesn’t want to begin with. Such a move that would be in stark opposition to Apple’s stance on consumer privacy.

„You are not our product,“ Apple CEO Tim Cook said in an interview with ABC News last year. „Our products are iPhones and iPads. We treasure your data. We want to help you keep it private and keep it secure. We’re on your side.“

Foto: Apple CEO Tim Cook.sourceREUTERS/Toru Hanai

Theoretically, if Apple were to create some type of tool or key that would provide backdoor access to encrypted iPhone data, employees from Apple would have access to that information as well since they would likely be assisting in the investigation. What’s to prevent an Apple worker from going rogue and possibly leaking iPhone user data, or using the tool for nefarious purposes?

Nunnikhoven pointed to EternalBlue as an example of how a tool built for specific purposes could fall into the wrong hands. EternalBlue was a National Security Agency hacking tool that leaked to the public in 2017 that was linked to the WannaCry ransomware attack that infected computers all over the world during that same year.

Creating the tool in general would also require a significant effort on Apple’s part. It’s not simply about cracking the passcode of the device, but would likely require that a dedicated team at Apple create a piece of software capable of accessing the data stored on the device, says Nunnikhoven. The government, in other words, is asking Apple to enable something that isn’t even possible on iPhones today.

Unlocking these iPhones for the Pensacola investigation would also likely set a precedent for law enforcement agencies to request similar treatment for future cases as well, says Matt Wilson, chief information security advisor at BTB Security.

„It’s just more evidence to prove this isn’t just [cybersecurity experts] saying, ‚I don’t want to think about it,’“ said Wilson. „It’s [experts] saying we’ve thought about it very long and very hard, and we don’t see a viable way that addresses all of these issues.“

Source link

The post #nationalcybersecuritymonth | Security experts explain why unlocking the Pensacola shooter’s iPhones would unleash a privacy nightmare for iPhone owners appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | 7 paid iPhone apps you can download for free on December 24th – BGR

Source: National Cyber Security – Produced By Gregory Evans

Yesterday’s roundup had six paid iPhone and iPad apps on sale for free in it, and a bunch of them are actually still free downloads today. If you haven’t already checked it out, definitely go back and download the remaining freebies while you still can — then come back to Tuesday’s roundup, where you’ll find seven different premium iOS apps that are all on sale for free for a limited time.

This post covers paid iPhone and iPad apps that have been made available for free for a limited time by their developers. BGR is not affiliated with any app developers. There is no way to tell how long they will be free. These sales could end an hour from now or a week from now — obviously, the only thing we can guarantee is that they were free at the time this post was written. If you click on a link and see a price listed next to an app instead of the word “get,” it is no longer free. The sale has ended. If you download the app anyway, you will be charged by Apple. Some apps may have additional features that require in-app purchases. Subscribe to our RSS feed or use that feed to create an email alert so you’ll be notified as soon as these posts are published and avoid missing any sales.

Relax Alarm-Voice time clock

Normally $0.99.

【Application scenario】
– Although the alarm clock function is small, it is indispensable in life.
– On the morning of each business day, the alarm clock will ring until you press the stop button.
– Then I struggled with the annoyed emotions and my sleepy eyes to see the time.
– Which music is used as an alarm, which music will become the music you hate the most?
– I will get up, but I don’t need to be bothered when I wake up in the morning.
– It’s time to change the way of the alarm clock reminder!
– Ding-dong~ It’s 6:30 now…
– Relax Alarm app uses short prompt tone and voice broadcast the current time to remind you, then accompanied by relaxing music to wake you up. All sounds will stop after 30 seconds, you don’t need to do anything.
– You can freely set the prompt tone, the combination of voice time and music.
– Remove the music part of the ringtone, it is a voice timer.
– Eat breakfast at 7:30, go out at 8:00, ok, remove the music, only broadcast the time.
– Lying in bed to see the phone too invested, set an alarm clock at 11 o’clock in the evening to remind you of the time, do not miss the best time to sleep.
– Relax alarm clock is such a simple application.
– Relax alarm, just want to be an alarm clock that is not annoying.

【Features】
– Focus on the alarm clock, no other complex functions, simple interface, easy to set
– Customize ringtones that are composed of a combination of prompt tone, voice time and music
– The ring tone is stopped after 30 seconds of playback, no action is required
– Snooze time can be set from 5 minutes to 30 minutes

Download Relax Alarm-Voice time clock

Marvin The Cube

Normally $1.99.

Meet Marvin, a small cube looking for his place in the Universe.
Help him with solving encountered puzzles and finding the perfect look!

Enjoy original gameplay, complemented by pleasant music and nice graphics.
Unleash your inner cube!

Marvin The Cube offers:
* Marvin’s unique character
* Billions of Marvin’s different looks
* Intriguing story
* Over 170 puzzles with varying degree of difficulty
* The encyclopedia with description of all the tiles you can find in the game
* Climatic music
* Very simple controls
* Achievements

Download Marvin The Cube

Gravity – Light Particles Manipulation App

Normally $1.99.

Gravity combines music, art and science in one relaxing experience. Use all your fingers to guide the star flow. You can create 10 different animations depending on the number of fingers touching the screen:

1 – Rocket, 2 – Sparkle, 3 – Energy flow, 4 – Atomic, 5 – 3D freeze, 6 – Circularium, 7 – Fish, 8 – Vortex, 9 – Lasers, 10 – Lightning.

Unleash your creativity and create unique masterpieces!

Features:

* Multitouch (upto 10 touch points iPad, 5 on iPhone)
* Thousands of particles animated at 60 frames per second
* Changing/manual colors
* Play/pause the animation
* Save snapshots to your Photo Library
* Multiple animation options (ex: speed, tail, size, opacity, etc.)
* Ability to save and load option presets
* Multiple play modes: default, drawing, tranquility and user defined
* No ads

Download Gravity – Light Particles Manipulation App

System Activity Monitors

Normally $0.99.

The app monitors iOS activity like memory usage, battery life, used space, and device information. Great visuals like speedometer view, LED indicator, 3D bar charts, battery charging animation, LED flashing charger, provides you a rich visual views of your iOS device internals, like you have never seen before.

$$ Over a million satisfied users of our apps $$

## Few of our user TESTIMONIALS ##
$ Way cool
This is a terrific system tracker.
– Macquest

$ Definitely get this App.!
Love the cool dashboard. Tells you what’s going on in the Apple brain in your iPad or iPhone. This App rules.
– Battyguy

$ Simple App !
Great tool! Helps to keep your standby time ridiculously long and device running smoothly.
– Spader1969.

$ I have tried many products like this one and so far I keep coming back to this one.
– Markeith3000

The System Activity Monitor, is the most comprehensive all in one health check app. on the App store, that monitors memory usage, battery performance, device information like IP address and hardware address, battery tips, all system information, and used space on the iOS device.

You can use this app to accurately monitor your battery life, monitor memory in use, and used and free space. By appropriately charging the battery using this app to full charge, you can get a good battery life.

KEY FEATURES:

1. Battery tips are shown to help save battery life while using the iPhone.

2. Tap battery to see the battery capacity for your favorite apps.

3. Shows the used and free space on your iPhone/iPod.

4. Shows the IP address acquired, and hardware address of your device.

5. Displays a long list of device information, like physical specs, hardware info, and many more.

These are the different views on the App.

Memory view:

Shows the used and free iPhone memory available as used by other apps. This is shown in an excellent speedometer animation view. Double tap home button, and see other apps in use. Close out the other apps, and see the memory being reclaimed in this app, when the speedometer shows the free memory available increase.

This has an LED indicator with blue, green, yellow and red colors indicating the amount of memory being used.

Double tap the speedometer, to see a 3D bar view of the different break up of the memory used. Like, Free, Wired, Active and Inactive memory of your iOS device.

Battery view:

This view shows the battery available for discharge, how much time to recharge to make it full, and when it is charged to FULL, displays an indication, as “FULLY CHARGED”, as opposed to quick charge. It has glow panels on the top to let you know, how much battery is available.

Tap the battery on the fill, to show the detailed break up of battery availability for 3G talk time, browsing, videos, games etc.

Animated battery charging with current flashes inside the battery.

Space used view:

This is shown as a pie-chart that presents the used and free space available on your iOS device.

Info view:

Now it shows a lot more device information, like system information, camera information, display, hardware and physical characteristics. It shows whether you device is connected to Wi-Fi or cellular and its IP address.

Download System Activity Monitors

Night Web Browser

Normally $0.99.

Night Web Browser by Alex is THE ONLY web browser that lets you DIM 100% of your screen, including the keyboard, status bar, web videos like YOUTUBE and INSTAGRAM, Facebook etc.

Do you think that your iPhone’s/iPad’s screen is too bright when you look at it in the dark?

Night Web Browser allows you to surf the web in the dark without disturbing the one next to you and without straining your eyes.

Perfect for you who love doing some browsing before sleep without the risk of waking the one next to you because of the bright iPhone screen.

Night Web Browser lets you dim the screen including the keyboard to even less brightness than the minimum standard iPhone/iPad setting. You can simply access the brightness control whenever you want with just one tap in the browser.

NOTE THAT ONLY CONTENTS IN THE WEB BROWSER CAN BE DIMMED, NOT THE ENTIRE iOS!

Features:
– Brightness control/Darkness boost
– Night mode with warmer color temperature
– Search instantly in the address field and choose from search results that instantly appear as you type
-Choose your Google language in settings
– Swipe for back/forward navigation like in Safari
– Tabs
– Bookmarks
– Modern minimal design
– 64-bit support

If you’d like more features please don’t write a bad review. It does what it was meant to and extremely well. Instead send me a tweet at https://twitter.com/NightWebBrowser with your suggestions and I will give them consideration for the next update 🙂 Thanks for your support and we hope you enjoy Night Web Browser by Alex.

Download Night Web Browser

Bomb: A Modern Missile Command

Normally $0.99.

A simplified and modern take on the retro cult classic: Missile Command.

Defend your city from an endless hail of falling bombs using guided missiles. Create a chain of explosions using a single missile to destroy multiple bombs.

Single tap game play.

You can never win this game, only survive as long as possible, because when in war, all is lost in the end.

Download Bomb: A Modern Missile Command

Healium AR

Normally $4.99.

Healium is controlled by the biometric information that comes from you via your consumer wearables. Use your brain patterns and heart rate to illuminate the planets or hatch augmented reality butterflies.

Healium works with an optional 2016 or later Muse 1 brain-sensing headband (Not Muse 2 yet) or an optional Apple watch to power experiences with your heart rate. If you’re not using a wearable, just select “you’re not using a wearable” and the experiences will automatically play. There are three input choices. You can power the AR experiences with brain patterns associated with quiet-mind or open-heart via a Muse headband. Or, you can power the experiences by lowering your heart rate via an Apple watch. The fuel that powers Healium is your memories of a time when you felt a quiet mind or an open heart.

If you have a flat line, that could be forehead tension. Take a few deep breaths and relax. Adjust the difficulty by selecting the settings wheel. If this is your first Healium experience, set difficulty all the way to EASY. For heart rate with apple watch, use your breathing to lower your heart rate and see the planets illuminate. Try more Healium including our virtual reality app by emailing hello@story-up.com or see our frequently asked questions here: https://www.tryhealium.com/faq

Healium stories are metaphors that your thoughts and feelings have *power* not only in the virtual world but in the real world as well. This AR self-awareness experience is not a treatment or diagnostic tool for any kind of mental health or physical disorder. This app integrates with the health app.

Download Healium AR

Source link
——————————————————————————————————

The post #deepweb | <p> 7 paid iPhone apps you can download for free on December 24th – BGR <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Apple Confirms iPhone Regularly Gathers Location Data, But Says It Doesn’t Leave the Phone

Source: National Cyber Security – Produced By Gregory Evans Apple confirmed that their latest iPhone 11 phones come with a feature that requires regular geolocation checks, but the company said that information doesn’t leave the phone. Security researcher Brian Krebs noticed that the latest iPhone 11 was making geolocation check seven when all apps that […] View full post on AmIHackerProof.com

#androidsecurity | Google opens its Android security-key tech to iPhone and iPad users – TechCrunch

Source: National Cyber Security – Produced By Gregory Evans

Google will now allow iPhone and iPad owners to use their Android security key to verify sign-ins, the company said Wednesday.

Last month, the search and mobile giant said it developed a new Bluetooth-based protocol that will allow modern Android 7.0 devices and later to act as a security key for two-factor authentication. Since then, Google said 100,000 users are already using their Android phones as a security key.

Since its debut, the technology was limited to Chrome sign-ins. Now Google says Apple device owners can get the same protections without having to plug anything in.

Signing in to a Google account on an iPad using an Android 7.0 device (Image: Google)

Security keys are an important security step for users who are particularly at risk of advanced attacks. They’re designed to thwart even the smartest and most resourceful attackers, like nation-state hackers. Instead of a security key that you keep on your key ring, newer Android devices have the technology built-in. When you log in to your account, you are prompted to authenticate with your key. Even if someone steals your password, they can’t log in without your authenticating device. Even phishing pages won’t work because only legitimate websites support security keys.

For the most part, security keys are a last line of defense. Google admitted last month that its standalone Titan security keys were vulnerable to a pairing bug, potentially putting it at risk of hijack. The company offered a free replacement for any affected device.

The security key technology is also FIDO2 compliant, a secure and flexible standard that allows various devices running different operating systems to communicate with each other for authentication.

For the Android security key to work, iPhone and iPad users need the Google Smart Lock app installed. For now, Google said the Android security key will be limited to sign-ins to Google accounts only.

Source link

The post #androidsecurity | Google opens its Android security-key tech to iPhone and iPad users – TechCrunch appeared first on National Cyber Security.

View full post on National Cyber Security

#Cyber #Security Today: Jan. 7, 2019 — #iPhone call #scam, Germans #hacked and Android #spyware

Watch out for this iPhone call scam, prominent Germans hacked, Android spyware found and an Acrobat update.

Apple iPhone users should be on the lookout for a phone phishing scam. According to security writer Brian Krebs, it works like this: You get a call and when you look at the phone’s screen to see who it is, the Apple logo, real phone number and real address is displayed. The target in this case didn’t answer the call so a message was left asking her to call a 1-866 number. It probably led to a scammer who would have asked for personal information. So iPhone users, ignore calls purporting to be from Apple. Apple won’t phone you. And for those who use other phones, hang up on anyone who tries to get personal information or passwords.

Hackers somehow have gotten access to private emails, memos and financial information of hundreds of German politicians, reporters, comedians and artists. The information was then published through a Twitter account. At this point no one knows if this was the work of a mischievous activist or a foreign country, or exactly how it was done. But British security writer Graham Cluley suspects victims fell for a phishing lure and gave away a password to one of their email or social media accounts. The hacker then went from there. Victims may have also used the same password for different accounts, which also makes a hacker’s job easier. If so, it’s another example of why you shouldn’t use the same password on more than one site, and, where possible enable two-factor authentication to make sure someone else can’t log into your account. Two factor authentication usually sends a six-digit number to your smart phone that you have to enter in addition to your password. Check your applications’ settings to see if you have it.

UPDATE: According to the Associated Press, a popular German YouTube contributor who was victimized said the perpetrator somehow first gained access to his email account and then convinced Twitter to disable a second security check — presumably two-factor authentication — required to take control of his account on the social networking site.

Twitter didn’t immediately respond to a request for comment and it wasn’t clear how many of those affected by the leak had such “two-factor authentication” enabled for their email or social media accounts, and whether the hacker similarly managed to bypass it.

As hard as Google tries to keep malware out of the Google Play store, criminals manage to find ways to evade detection. Trend Micro reports it discovered spyware hidden in six seemingly legitimate Android applications including a game called Flappy Bird, a presumably copycat called Flappy Birr Dog, FlashLight, Win7Launcher and others. All have been removed from the app store. The spyware would have stolen information like user location, text messages, contact lists and device information as well as try to phish for passwords. Owners of any computing device have to be cautious when deciding what to download, advises Trend Micro.

Finally, Adobe usually issues security updates on the second Tuesday of the month, which is tomorrow. However, it has already issued an emergency patch for Acrobat and Acrobat Reader. So if you use either of these applications check you have the latest versions.

 

Source: https://www.itworldcanada.com/article/cyber-security-today-jan-7-2019-iphone-call-scam-germans-hacked-and-android-spyware/413736

 

 

View full post on National Cyber Security