iPhone backups are easier to crack if the device is running Apple’s iOS 10. Hackers discovered the issues, saying that Apple weakened backup security with iOS 10. But Apple is already on the case and plans to issue fixes for it.
The Apple vs. FBI fight over breaking the encryption of the San Bernardino iPhone was one of the most important news topics of the beginning of the year. Ultimately Apple won, as it didn’t have to create a backdoored version of iOS that would let the FBI spy on that iPhone 5c that belonged to one of the San Bernardino shooters. The FBI won too, as it bought an iPhone hack for more than $1.3 million that let it bypass the password that protects the lockscreen of iPhones.
The recent NSA hack just proved to the world that no system is hack-proof if attackers have what it takes to break the access door. Regardless of whatever protections guarded that NSA server, hackers found a security hole to get in and steal critical documents. The same thing could happen to encrypted services that would feature a backdoor for law enforcement.
But governments around the world still think they’d be able to handle such terrifying scenarios, with France and Germany being the latest nations looking to gain access to private encrypted messages exchanged over the internet by terror plot suspects. More →
The Apple vs. FBI legal battle over the San Bernardino case in early 2016 was one of the most important events of the year so far, as user privacy, device security and terrorism converged in a single case. On one hand, we have Apple, keen on protecting everyone’s privacy. On the other hand, there’s the FBI, a law enforcement agency that demands access to any communication device that may have been used during the plotting of a heinous crime. Apple won that battle, and while many from the tech sector sided with the iPhone company in its fight against the FBI, there was one notable company that argued that encryption has to be broken when the government needs it: BlackBerry.
The irony did not escape us then, and it doesn’t escape us now — BlackBerry’s CEO still thinks Apple is wrong. More →
We may have thought that Android is just as safe as the iPhone when it comes to encryption, but it looks like Google’s Android operating system has a critical flaw that can be exploited to decrypt a device. Even worse, while there are patches that can fix the issue, it seems that attackers can simply downgrade to a pre-patch state, and then decrypt a target device with ease. More →
Google isn’t happy with the chat apps it already has, so at I/O 2016 it showed off a new Assistant-infused Allo messaging app as well as a Duo video chat app intended to work like Apple’s FaceTime, but across platforms. From Google’s demos, you can easily see they’re incredible apps that should offer fast and smart communication. However, there are things you need to know about privacy and encryption. More →
Ted Lieu is one of the few bona fide computer geeks in Congress. Even if you didn’t already know the California Democrat is one of only four congressmen (out of a total of 535) with a computer science degree, it’s the kind of thing that quickly becomes apparent when talking to the Stanford grad about a range of privacy and encryption matters.
For starters, he recently downloaded and started using WhatsApp, the Facebook-owned messaging platform that earlier this month defaulted to end-to-end encryption for all users. He’s not only a supporter of strong encryption without backdoors — Lieu considers it “a national security priority.” More →
A few days ago, a first draft of an anti-encryption bill from Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) came to light and it drew an instant backlash from security experts. The law is apparently so bad that not only would it make the some of the NSA’s own work illegal, but it would also outlaw some of the things we’ve taken for granted for years, such as the ability to compress large files to share them online. More →
A zero-day software flaw is the kind of security issue tech companies fear most. These are unknown bugs that hackers can use to enter devices, websites, computer networks, and other internet services and products, for malicious purposes. It appears that one such attack was used recently to hack the San Bernardino iPhone, a new report shows. In fact, it looks like everything we thought we knew about the way the FBI breached the iPhone, without requiring Apple’s assistance, may be inaccurate. More →
Late last week we found out that the FBI can’t hack Apple’s latest iPhones. In fact, according to its director, the tool used to extract information from the San Bernardino iPhone 5c can’t be used on anything newer than the iPhone 5s. Not even the iPhone 5s which was launched simultaneously with the iPhone 5c can’t be hacked that way.
The FBI has abandoned its court battle with Apple for the time being, after figuring out how to hack the San Bernardino iPhone without Apple’s help. However, the fight over smartphone encryption is not over, and there’s a new proposal that seeks to regulate law enforcement’s access to encrypted devices and Internet products. More →
The FBI withdrew its assault on iPhone encryption after it managed to hack its way into the San Bernardino iPhone. Soon after that, the agency notified other law enforcement officials across the country that it’ll try and help out unlock other iPhones from various criminal investigations.
The FBI is yet to tell Apple how it performed the hack, but the Bureau does talk about it with senators. In the meantime, the FBI confirmed that while it may be able to hack some iPhones, the iPhone 6s is impenetrable for the time being.