iPhone

now browsing by tag

 
 

#Cyber #Security Today: Jan. 7, 2019 — #iPhone call #scam, Germans #hacked and Android #spyware

Watch out for this iPhone call scam, prominent Germans hacked, Android spyware found and an Acrobat update.

Apple iPhone users should be on the lookout for a phone phishing scam. According to security writer Brian Krebs, it works like this: You get a call and when you look at the phone’s screen to see who it is, the Apple logo, real phone number and real address is displayed. The target in this case didn’t answer the call so a message was left asking her to call a 1-866 number. It probably led to a scammer who would have asked for personal information. So iPhone users, ignore calls purporting to be from Apple. Apple won’t phone you. And for those who use other phones, hang up on anyone who tries to get personal information or passwords.

Hackers somehow have gotten access to private emails, memos and financial information of hundreds of German politicians, reporters, comedians and artists. The information was then published through a Twitter account. At this point no one knows if this was the work of a mischievous activist or a foreign country, or exactly how it was done. But British security writer Graham Cluley suspects victims fell for a phishing lure and gave away a password to one of their email or social media accounts. The hacker then went from there. Victims may have also used the same password for different accounts, which also makes a hacker’s job easier. If so, it’s another example of why you shouldn’t use the same password on more than one site, and, where possible enable two-factor authentication to make sure someone else can’t log into your account. Two factor authentication usually sends a six-digit number to your smart phone that you have to enter in addition to your password. Check your applications’ settings to see if you have it.

UPDATE: According to the Associated Press, a popular German YouTube contributor who was victimized said the perpetrator somehow first gained access to his email account and then convinced Twitter to disable a second security check — presumably two-factor authentication — required to take control of his account on the social networking site.

Twitter didn’t immediately respond to a request for comment and it wasn’t clear how many of those affected by the leak had such “two-factor authentication” enabled for their email or social media accounts, and whether the hacker similarly managed to bypass it.

As hard as Google tries to keep malware out of the Google Play store, criminals manage to find ways to evade detection. Trend Micro reports it discovered spyware hidden in six seemingly legitimate Android applications including a game called Flappy Bird, a presumably copycat called Flappy Birr Dog, FlashLight, Win7Launcher and others. All have been removed from the app store. The spyware would have stolen information like user location, text messages, contact lists and device information as well as try to phish for passwords. Owners of any computing device have to be cautious when deciding what to download, advises Trend Micro.

Finally, Adobe usually issues security updates on the second Tuesday of the month, which is tomorrow. However, it has already issued an emergency patch for Acrobat and Acrobat Reader. So if you use either of these applications check you have the latest versions.

 

Source: https://www.itworldcanada.com/article/cyber-security-today-jan-7-2019-iphone-call-scam-germans-hacked-and-android-spyware/413736

 

 

View full post on National Cyber Security

iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps

Source: National Cyber Security – Produced By Gregory Evans

iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps

The cyber security community is still reeling after the revelation of the KRACK security vulnerability that breaks down Wi-Fi encryption. Now it seems another Wi-Fi-based bug has also been discovered.

Presented at the global Pwn2Own hacking contest in Tokyo, a team of researchers demonstrated how a separate Wi-Fi bug could be exploited to gain entry to iPhones and install malicious apps on them without the owners knowledge.

The details of the threat haven’t been made public yet as Apple hasn’t had time to patch the flaw. It’s discovery was enough to net the Tencent Keen Security Lab the top prize of $110,000.

The hacking contest is set up and run by the Zero Day Initiative, which seeks to find vulnerabilities in popular products and services and alert the manufacturers in time.

According to the official event page , the Tencent Keen Security Lab team used “code exectution through a WiFi bug” to escalate “privileges to persist through a reboot.” Effectively breaking through an iPhone’s lock screen through a Wi-Fi network.

The flaw will be relayed to Apple which could offer a software patch to close the gap.

“Once we verify the research presented is a true 0-day exploit, we immediately disclose the vulnerability to the vendor, who then has 90 days to release a fix,” explains the Zero Day Institute.

“Representatives from Apple, Google, and Huawei are all here and able to ask questions of the researchers if needed.

“At the end of the disclosure deadline, if a vendor is unresponsive or unable to provide a reasonable statement as to why the vulnerability is not fixed, the ZDI will publish a limited advisory including mitigation in an effort to enable the defensive community to protect users.”

As ever, from a security standpoint it is always advisable to make sure your phone is running the latest OS version and you closely vet the permissions you give to certain apps.

The post iPhone #Wi-Fi #bug lets #hackers #hijack your #phone and #secretly install #malicious #apps appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Will the iPhone X’s Face ID be hackable? Security expert weighs in

Will the iPhone X’s Face ID be hackable? Security expert weighs inSource: National Cyber Security – Produced By Gregory Evans The iPhone X’s facial recognition technologies have been called into question by a security consultant at global tech firm Synopsys, who claims that no facial recognition technology is ever unbeatable. Nikola Cucakovic posted a blog titled ‘How secure is iPhone X Face ID facial recognition’, which […] View full post on AmIHackerProof.com | Can You Be Hacked?

Hackers Exploiting ‘Find My iPhone’ To Remotely Lock Mac Computers

Source: National Cyber Security – Produced By Gregory Evans

Apple’s Find My iPhone feature is meant to be a recovery feature of sorts, where if you’ve misplaced your iPhone, you will be able to locate it using the feature. Unfortunately it seems that in recent times, hackers have managed to exploit the feature and in turn have been locking…

The post Hackers Exploiting ‘Find My iPhone’ To Remotely Lock Mac Computers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Apple’s New iPhone X Could Help Identity Thieves Steal Your Face

Source: National Cyber Security – Produced By Gregory Evans

Apple has announced that it plans to replace previous iPhone login credentials with facial recognition technology to log into the iPhone and to access Apple Pay. This should prompt some privacy and security concerns, but probably not the ones you’re thinking. It’s not the TSA or the Deep State who…

The post Apple’s New iPhone X Could Help Identity Thieves Steal Your Face appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Apple issues cyber warning for iPhone users, issues security patch

Source: National Cyber Security – Produced By Gregory Evans

Apple issued a new warning after a new hacking threat. The tech giant says there is a new cyber threat, but has taken steps to thwart the attack. FOX Business Network’s Tracee Carrasco reports, “Apple has now issued a critical security patch for all iOS devices and for Mac computers…

The post Apple issues cyber warning for iPhone users, issues security patch appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Two Former Staffers Arrested in Plaskett iPhone Hack

Source: National Cyber Security – Produced By Gregory Evans

Two of Delegate Stacey Plaskett’s (D-VI) former personal staffers were arrested Thursday and charged with hacking her cell phone, stealing highly personal photos and videos and illegally posting them online on a phony Facebook account. According to the U.S. Department of Justice, Juan McCullum, 35, of Washington, D.C., was indicted…

The post Two Former Staffers Arrested in Plaskett iPhone Hack appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

FBI says it can’t release iPhone hacking tool because it might still be useful

Source: National Cyber Security – Produced By Gregory Evans

Justice Dept. officials say that details of a hacking tool used to access a terrorist’s iPhone should not be released because it may still be “useful” to federal investigators. The government is fighting a case against three news organizations, including …

The post FBI says it can’t release iPhone hacking tool because it might still be useful appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cheating Man Caught After Uber Sends Notifications To Wife’s iPhone

A cheating businessman from Côte d’Azur in the south of France is blaming Uber for the break-up of his marriage. According to him, it is not his fault for having sex with another woman. He is suing Uber for US$48 million after notifications from the app alerted his wife to the trips he was making to his lover’s home. He only used his wife’s iPhone once to request for a ride, but the glitch in the app caused the notifications to continue streaming to his wife’s phone. Read More….

The post Cheating Man Caught After Uber Sends Notifications To Wife’s iPhone appeared first on Dating Scams 101.

View full post on Dating Scams 101

Black Market iPhone Cracking is Pure Gold to Hackers and Apple Loves it

Source: National Cyber Security – Produced By Gregory Evans

Black Market iPhone Cracking is Pure Gold to Hackers and Apple Loves it

The ability to break through the encryption Apple Inc. (NASDAQ:AAPL) has on its gadgets is highly valued on the black market. The start of this year saw the makers of the iPhone go head-to-head with the FBI in a privacy

The post Black Market iPhone Cracking is Pure Gold to Hackers and Apple Loves it appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures