Archiv: iOS / MacOS (operating system)


09.02.2025 - 17:35 [ Computer and Communications Industry Association (CCIA) ]

CCIA Responds to Reports of UK Demand for Worldwide Apple iCloud Access

The following can be attributed to CCIA President & CEO Matt Schruers:

“As the recent Salt Typhoon breach makes clear, end-to-end encryption may be the only safeguard standing between Americans’ sensitive personal and business data and foreign adversaries.

“Reports that Apple has been secretly ordered by the UK Government to weaken its encryption, including in the United States, are a troubling development, if accurate. Decisions about Americans’ privacy and security should be made in America, in an open and transparent fashion, not through secret orders from abroad requiring keys be left under doormats.”

09.02.2025 - 17:30 [ Forbes ]

Apple’s ‘Dangerous’ iPhone Update Is Much Worse Than You Think

So, why is this worse than you think. In my view — and no one can officially comment, so “views” will be all we can share — any such government action would not stop with Apple. Not to over-simplify matters, but a bad actor would simply run Google’s helpful switch to Android software. If the U.K is going after Apple, it’s also going after Google and Meta and others. Why would they not? But Soviet-style, none of these other parties can comment or answer questions or confirm or deny.

01.07.2023 - 13:40 [ SearchEngineJournal.com ]

Elon Musk Hires Prolific Hacker George Hotz To Fix Twitter Search

(November 23, 2022)

In the span of a 12-week internship, Hotz promises to “fix” Twitter search and introduce all-new features, such as the ability to search within liked tweets.

As the first person in the world to jailbreak the iPhone, Hotz is no stranger to bringing new capabilities to existing platforms.

12.04.2023 - 15:33 [ Haaretz ]

Spyware From Israeli Firm QuaDream Used to Hack Journalists, Activists Around the World

Israel‘s offensive cyber industry accounts for a wide variety of surveillance and espionage technologies. A number of these are tools sold to policing bodies which reveal the geographic location of a target. There are also more advanced technologies, sold to law enforcement and intelligence bodies, which allow clients to hack into computers, mobile phones and encrypted messaging apps, extracting all information stored on a device and secretly turning on its microphone and camera to create a tool which spies on its owner.

05.02.2023 - 11:48 [ TeleGuard.com ]

TeleGuard – No storage of data. Highly encrypted. Swiss made.

– Practical, modern messenger with full functionality for iOS and Android

– Independent company under Swiss data protection law and GDPR-compliant

– Complex encryption system for all transmitted data

– Complex encryption system for all transmitted data

– All servers are located in data centers in Switzerland

– No storage of user data on the servers

– No connection to a telephone number and no collection of user identification data

02.01.2023 - 17:23 [ 9to5mac.com ]

How to turn on end-to-end encryption for iMessage, iCloud, iPhone backups in iOS 16.2

(Dec. 16th 2022)

While end-to-end encryption (E2E) has been already present for Apple’s Messages, iCloud Keychain, Health data, and more, the update brings E2E to your Messages Backup (Messages in iCloud) your iPhone iCloud backup, iCloud Drive, Notes, Photos, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, and Wallet Passes.

25.06.2022 - 08:59 [ theRegister.com ]

Google: How we tackled this iPhone, Android spyware

We‘re told it is potentially capable of spying on the victims‘ chat apps, camera and microphone, contacts book and calendars, browser, and clipboard, and beam that info back to base. It‘s said that Italian authorities have used this tool in tackling corruption cases, and the Kazakh government has had its hands on it, too.

On Thursday this week, TAG revealed its analysis of the software, and how it helped dismantle the infection.

25.06.2022 - 08:49 [ ORF.at ]

Google: Spionageangriffe auf Handys in Italien

Google erklärte weiter, in einigen der nun aufgedeckten Fälle mit der Spähsoftware aus Italien hätten die Hacker die Spionagesoftware möglicherweise unter Zusammenarbeit mit Internetdienstanbietern eingesetzt. Daraus könne geschlossen werden, dass die Käufer der Programme Verbindungen zu staatlich unterstützten Akteuren hatten.

25.06.2022 - 08:08 [ Google Threat Analysis Group ]

Spyware vendor targets users in Italy and Kazakhstan

(23.06.2022)

Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors. TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.

(..)

In some cases, we believe the actors worked with the target’s ISP to disable the target’s mobile data connectivity. Once disabled, the attacker would send a malicious link via SMS asking the target to install an application to recover their data connectivity. We believe this is the reason why most of the applications masqueraded as mobile carrier applications. When ISP involvement is not possible, applications are masqueraded as messaging applications. (…)

We assess, based on the extensive body of research and analysis by TAG and Project Zero, that the commercial spyware industry is thriving and growing at a significant rate. This trend should be concerning to all Internet users.

These vendors are enabling the proliferation of dangerous hacking tools and arming governments that would not be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are often found to be used by governments for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers and opposition party politicians.

01.02.2022 - 03:14 [ Haaretz ]

NSO Is an Arm of Israel‘s Government

In 2019 NSO agreed to reconnect the Pegasus system in Saudi Arabia, in the context of Netanyahu’s contacts regarding the Abraham Accords. Until the accords were announced, Israel gave NSO a permit to sell Pegasus to almost all of the countries that signed the agreements.

01.02.2022 - 03:00 [ New York Times ]

The Battle for the World’s Most Powerful Cyberweapon

(Jan. 28, 2022)

The F.B.I. had bought a version of Pegasus, NSO’s premier spying tool. For nearly a decade, the Israeli firm had been selling its surveillance software on a subscription basis to law-enforcement and intelligence agencies around the world, promising that it could do what no one else — not a private company, not even a state intelligence service — could do: consistently and reliably crack the encrypted communications of any iPhone or Android smartphone.

01.02.2022 - 02:28 [ New York Times ]

F.B.I. Secretly Bought Israeli Spyware and Explored Hacking U.S. Phones

(Jan. 28, 2022)

The Times found that sales of Pegasus played a critical role in securing the support of Arab nations in Israel’s campaign against Iran and negotiating the Abraham Accords, the 2020 diplomatic agreements, signed at a Trump White House ceremony, that normalized relations between Israel and some of its longtime Arab adversaries.

The U.S. had also moved to acquire Pegasus, The Times found. The F.B.I., in a deal never previously reported, bought the spyware in 2019, despite multiple reports that it had been used against activists and political opponents in other countries. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States.