Apple and privacy
Get flash to fully experience Pearltrees
Apple records Siri's data
Apple patent to disable GPS tracking
Apple ID stolen from FBI
Apple patent to remotely disable camera
David Paul Morris/Bloomberg iPhone 4S smartphones at an Apple store in San Francisco. FinFisher spyware made by U.K.-based Gamma Group can take control of a range of mobile devices, including Apple Inc.
G planting spy on iPhone webrowsers
CSC: Leading Edge Forum Executive Programme :: Projects :: Confidentiality, Privacy, and Transparency in the Age of WikileaksThe recent disclosures of hundreds of thousands of US State Department diplomatic cables by Wikileaks have led CEOs, CIOs, and senior managers to ask, "How can I lock down my organization's information and make sure this doesn't happen to me?" But in some quarters, a question that is even more important is being asked: "What data and information that we've always considered confidential should we be making available online – and how could we leverage the disclosure of that information?" This project will assess how companies, government agencies, and non-profit institutions that have embraced transparency have fared and what lessons they might have for other companies, which due to the nature of their business, government privacy and security regulations, and other constraints, follow more traditional information management practices.
Charlie Miller has once again successfully hacked an Apple product at the Pwn2Own competition. This year he has successfully hacked an iPhone 4 via Safari resulting in access to the Address Book. Like the Safari hack we reported on earlier , Miller’s attack stems from a vulnerability found in the Webkit engine that powers mobile Safari on the iPhone 4.
Monday - The Setup The whole thing started when my plane landed in Los Angeles on Monday afternoon at 2:55pm coming from Cabo San Lucas. The guy sitting next to me on the plane asked me to loan him a pen so that he could fill out his customs form. I watched him fill out the form and clearly remember his birth year of 1984, but am a bit unsure about his name. I think it was -----, but in this story, we will refer to him as Pinche. How It Was Lost
November 05, 2010, 8:00 AM — Google is facing fresh complaints over Street View in Germany, after technical problems caused some properties to be visible rather than blurred in a preview of the service launched earlier this week. Users of Apple iPads and iPhones found that the blurring was not complete on their devices, said Johannes Caspar, head of the Data Protection Agency (DPA) for Hamburg, on Friday. Google released imagery for the city of Oberstaufen and landmarks in five other German cities on Tuesday. Google "agreed with our objections that nobody should see these pictures," Caspar said. The company has agreed to black out the images, Caspar said.
The user data collected by some iOS apps can be correlated to real-world identities, posing a privacy risk to iPhone, iPod touch, and iPad users. According to research from Bucknell University, a majority of iOS apps transmit user data back to their own servers. But because some store more info than others—and in some cases, in plaintext—it can be easily pieced together to reveal more about individual users than they bargained for. Bucknell University Assistant Director of Information Security and Networking Eric Smith authored the paper, entitled "iPhone Applications & Privacy Issues: An Analysis of Application Transmission of iPhone Unique Device Identifiers (UDIDs)." He and his team studied a total of 57 applications from the App Store—a combination of the Top 25 Free apps as well as some from the News: Top Free app sections.
Buried in the release notes of an updated iPhone app is significant new functionality which lets Apple devices stream music from its online storage in a useful manner for the first time. This is in defiance of record labels demands that any streaming service requires a license, but more on that later. First lets examine the new functionality.
Actually, we don't think that the scammers broke into peoples' computers like this either. Photograph: Nick Rowe/Getty Images Update: based on some of the comments here, it's clear that there have been purchases made very recently on the iTunes Store which have used people's login details - though apparently all linked to PayPal accounts.
"Sometimes when you innovate, you make mistakes. It is best to admit them quickly, and get on with improving your other innovations." - Apple CEO Steve Jobs as quoted in the book, The Journey is the Reward. Steve, you made a mistake... a big one! Now admit it and get on with some other brilliant, paradigm -shifting innovations for which the world has come to know and idolize you. For those of you who don't spend your time combing US Patent Office filings, Apple recently filed a patent for "Systems and Methods for Identifying Unauthorized Users of an Electronic Device." (" http://bit.ly/bF21qP ) That may sound mind-numbingly dull but what it means is that Apple wants to patent a method of determining who is using one of their products. The patent explains how Apple would seize control of a product (like, perhaps one of the 50 million iPhones out there, for instance) and use it to take a picture of the current user of the phone, or record their voice, or measure their heartbeat.
Foursquare players too busy painting the town red to go to the trouble of whipping out their iPhone and checking in can sit back and let Checkmate do the work for them. At $1.99, Checkmate offers a convenient alternative for those looking for a passive aggressive way to play the geosocial game. The brand new app harnesses background-running location on the iPhone to check in Foursquare players automatically at specified venues. After you download and fire up the app, you can select different venues to add to your "Auto Checkin Venues" list. You can toggle automatic checkins on or off for the whole list, as well as specify whether to automatically post a shout or share the checkin on Facebook and Twitter.
Nicolas Seriot created a proof-of-concept "SpyPhone" app to show how easy it is to snoop on iPhone users. (Credit: Pierrick Terrettaz) Lax security screening at Apple's App Store and a design flaw are putting iPhone users at risk of downloading malicious applications that could steal data and spy on them, a Swiss researcher warns.
5 hrs. Adam Dachis , Lifehacker GadgetBox If you have the same ringtone for calls and alert for messages regardless of what they are, you might want to create your own and assign spe... Read more 1 day
Apple has reportedly bought Swedish face-recognition firm Polar Rose . I met with Polar Rose in its early days when it was talking about a unique approach to recognizing faces. Some inefficient recognition engines would compare pixels in pictures to determine whether one face matched another.