Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
16.1K views | +0 today
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Apple-ID: Polizei warnt vor neuer Phishing-Welle | #Apple #CyberSecurity #Awareness

Apple-ID: Polizei warnt vor neuer Phishing-Welle | #Apple #CyberSecurity #Awareness | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Mit gefälschten E-Mails und Webseiten wollen Kriminelle Zugangsdaten von Apple-Nutzern erschleichen. Die Phishing-Seiten setzen auf "gute Optik" und geben sich durch https-Verschlüsselung einen seriösen Anschein, warnt die Polizei Niedersachsen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:
Mit gefälschten E-Mails und Webseiten wollen Kriminelle Zugangsdaten von Apple-Nutzern erschleichen. Die Phishing-Seiten setzen auf "gute Optik" und geben sich durch https-Verschlüsselung einen seriösen Anschein, warnt die Polizei Niedersachsen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:50 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Apple : une "vaste" attaque de phishing s'en prend aux Macs

Apple : une "vaste" attaque de phishing s'en prend aux Macs | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Les pirates informatiques s'en donnent à coeur joie pendant les fêtes. Depuis le jour de Noël, une campagne de phishing cible les utilisateurs d'ordinateurs fabriqués par Apple. Son but : dérober des données bancaires....

 

Si une personne clique sur ce lien, elle sera dirigée vers un site Internet très convaincant : d'abord, une page de connexion, demandant de saisir ses identifiants (Apple ID et mot de passe).

 

Puis, le visiteur est transféré sur une page lui demandant de mettre son "profil" à jour, notamment en indiquant ses informations bancaires (numéro de carte, etc.). Encore une fois, la page en question est très crédible.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Horror-Lücke in iOS: Ihre Apple-ID wurde womöglich schon gestohlen! | eSkills | Digital CitiZEN | Awareness

Horror-Lücke in iOS: Ihre Apple-ID wurde womöglich schon gestohlen! | eSkills | Digital CitiZEN | Awareness | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Der Sicherheitsexperte Jan Soucek hat einen äußerst gefährlichen Bug in der E-Mail-App von Apples iOS entdeckt. Ein Angreifer kann darüber eine Fake-Abfrage der Apple-ID einblenden - und so das Passwort abgreifen.


CHIP Online meint:
Auch wenn nicht jeder glücklich darüber sein dürfte, dass Soucek seinen Programm-Code mit der Veröffentlichung auch möglichen Angreifern bereitstellt, trifft die eigentliche Schuld Apple. Es ist eine äußerst fragwürdige Politik, eine Sicherheitslücke derartigen Ausmaßes einfach ein halbes Jahr zu ignorieren. Hier muss Apple nun unbedingt in kürzester Zeit nachbessern - spätestens mit der Veröffentlichung von iOS 8.4 Ende Juni.


Mehr erfahren/ Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Der Sicherheitsexperte Jan Soucek hat einen äußerst gefährlichen Bug in der E-Mail-App von Apples iOS entdeckt. Ein Angreifer kann darüber eine Fake-Abfrage der Apple-ID einblenden - und so das Passwort abgreifen.


CHIP Online meint:
Auch wenn nicht jeder glücklich darüber sein dürfte, dass Soucek seinen Programm-Code mit der Veröffentlichung auch möglichen Angreifern bereitstellt, trifft die eigentliche Schuld Apple. Es ist eine äußerst fragwürdige Politik, eine Sicherheitslücke derartigen Ausmaßes einfach ein halbes Jahr zu ignorieren. Hier muss Apple nun unbedingt in kürzester Zeit nachbessern - spätestens mit der Veröffentlichung von iOS 8.4 Ende Juni.


Mehr erfahren/ Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple of discord

Apple of discord | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices.
Gust MEES's insight:

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 23, 2013 7:26 AM

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 23, 2013 7:28 AM

 

===> As Apple's popularity grows, so does the desire among fraudsters to make money from the people who own the company's devices. <===

 

On some days the number of web antivirus detections for fake apple.com phishing sites exceeded the daily average by several times. There were a number of peaks, the most significant of which occurred on December 6, 2012 (939,549 detections) and May 1, 2013 (856,025 detections).

 

This periodic surge in cybercriminal activity and the resulting increase in web antivirus detections can be put down to important events in the life of Apple. For example, December's peak occurred immediately after the iTunes Store opened in Russia, Turkey, India, South Africa and 52 other countries around the world.

 

How do users end up on fake sites? One of the most popular methods is to use spam to spread links to phishing sites. For example, cybercriminals send out emails on behalf of Apple in which they ask the recipient to confirm their account by following a link in the message.

 

The link leads to a fake website where users are asked to enter their Apple ID and password - this data is then stolen by the cybercriminals and used for their own ends.

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security