Business, Cloud Computing, Cyber Security, Defense, Finance, IT Security, Security, Technology

Apple Has Patched A Hole In iCloud That Let Hackers Access Anyone’s Account

Apple has fixed a vulnerability in its iCloud service that a hacker used to prove that any account was vulnerable to being hacked into.

iDict was a hacking tool released online on New Year’s Day. It used a hole in Apple’s security to repeatedly guess user passwords, allowing hackers to access any account given enough time.

Pr0x13, the person who created the hacking tool, claimed that there was a “painfully obvious” flaw in Apple’s iCloud which could be used to bypass security systems like passwords, security questions, and even two-factor authentication (which is the security system using text messages that could have prevented the celebrity iCloud hack).
Read more

Advertisements
Standard
Cyber Security, IT Security, Security, Technology

‘The Interview’ Becomes Opportunity for Google’s YouTube Movie Service

Sony  is distributing “The Interview” through YouTube’s movie channel, highlighting a little-known arm of ’s video empire.

Most people know YouTube for the cornucopia of music and short-form videos available for free on the site. But YouTube also offers movies for rent or purchase, much likeApple’s iTunes Store and Microsoft ’s Xbox Video Store and on a special website set up by Sony, seetheinterview.com, as well as Google’s Play Store.

Neither Apple nor Amazon.com, the top online movie distributors, were willing to immediately offer the film, according to a person involved in the discussions. Spokesmen for both companies declined to comment.

“The Interview” could draw new users to YouTube’s movie channel. If it proves popular on YouTube and on Google Play, it could also benefit Google by capturing credit-card information that could make it easier to sell subscriptions and other digital content to users in the future.

Read More

Standard
Cloud Computing, Cyber Security, cyber security legislation, Government, IT Security, Security, Technology

Hacker Clones German Defense Minister’s Fingerprint Using Just her Photos

Hackers have already bypassed Apple’s fingerprint scanner using fake fingerprints, and now they have found a way to reproduce your fingerprints by using just a couple of photos of your fingers.

 

Special Fingerprint sensors have already been used by Apple and Samsung in their smartphones for authentication purposes and in near future fingerprints sensors are believed to be the part of plenty of other locked devices that can be unlocked using fingerprints, just to add an extra layer of authentication. But, How secure are your fingerprints?

A member of Europe’s oldest hacker collective, the Chaos Computer Club (CCC), claimed to have cloned a fingerprint of a Germany’s federal minister of defense, Ursula von der Leyen, using pictures taken with a”standard photo camera” at a news conference.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, IT Security, Security, Technology

Apple must continue to improve cybersecurity as attacks increase

Several high-profile cyberattacks launched against Apple have revealed OS X and iOS aren’t as secure anymore, with criminals trying to compromise both operating systems. Enterprise workers are at risk because of Apple taking a “whack-a-mole” approach to security, which is a major threat with sophisticated spear-phishing attacks.

Read More

Standard
Business, Cloud Computing, Cybersecurity, Finance, Government, IT Security, Security, Technology

Cybersecurity Firm IDs New Apple-Targeting Malware

The cybersecurity provider has named the malware WireLurker and said it monitors devices connected by a USB cable to an infected computer and installs malicious applications onto the device. The malware steals a variety of information from mobile devices, but the goal of its creator isn’t clear yet.

Read More

Standard