Bypass an iPhone 5c’s passcode lock for $100

Which is a lot cheaper than the $1.3 million the FBI paid to break into the San Bernardino shooter’s iPhone 5c.

1 min read

iPhones ‘bricked’ as Apple releases iOS 10 (and then rapidly fixes the problem)

iOS 10, the “biggest release of iOS ever”, is plagued by reports of ‘bricked’ iPhones and iPads.

Thankfully, Apple was quick to release a fix.

1 min read

Want the iPhone 7? Make sure you sell your old phone safely!

Tempted to upgrade your old iPhone to the newly-announced iPhone 7?

David Bisson reports on what safety steps you should take before selling your old device.

1 min read

Mac users vulnerable to state-sponsored Trident attack, fixed in iOS last week. Patch now

No excuses. Patch your Mac computers and Apple mobile devices.

56 sec read

Found an iOS zero-day? This firm will pay you $300,000 more than Apple

Exodus Intelligence is offering half a million dollars ($300,000 more than the maximum offered by Apple) to anyone who can sell them an iOS zero-day exploit.

Read more in my article on the Tripwire blog.

0 sec read

Earn up to $200,000 as Apple *finally* launches a bug bounty

Found a vulnerability in Apple products? Finally the company has recognised that you might be grateful for some financial reward.

1 min read

Apple’s lack of 2SV for Find My Phone nearly costs student his digital life

A computer science graduate student who almost had his iPhone and Mac wiped by online criminals feels that Apple should do more to protect accounts.

David Bisson reports.

1 min read

Users of iPhones and Macs must update to avoid Stagefright-like bug

Make sure that all your Apple devices are patched before online criminals attempt to take advantage of this flaw.

Read more in my article on the We Live Security blog.

0 sec read

Apple fixes FaceTime eavesdropping bug, but other flaws may remain

Although it’s good that Apple has apparently fixed this FaceTime snooping vulnerability, it’s alarming to hear that there may be other as-yet-unpatched vulnerabilities still to be addressed

Read more in my article on the Hot for Security blog.

0 sec read

The iPhone is nine years old – and still no significant malware outbreaks

Apple was right to describe the iPhone as revolutionary. It changed the world.

But what I find particularly remarkable is that despite Apple selling such a popular mobile computing device for nine years, there has still been no major outbreak of malware on the platform.

1 min read

Scammers claim there is a virus in Apple’s iTunes database

Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information.

Read more in my article on the We Live Security blog.

0 sec read

Error 56. Has the iOS 9.3.2 update turned your iPad Pro into a brick?

iPad Pro user? You may wish to hold off installing iOS 9.3.2 for a little while…

44 sec read

Apple bans iPhone app that warned if you had been secretly hacked

Apple has banned a top-selling iOS app that raised the alarm if it determined your iPhone or iPad had been jailbroken without your knowledge. And the security researcher responsible for the app isn’t at all happy…

Read more in my article on the Intego Mac Security blog.

0 sec read

I’m so glad I don’t have a Filofax

Like a complete wombat, I left my smartphone in a taxi on Wednesday night.

But I didn’t need to panic…

1 min read

SMS phishing attackers continue to pursue Apple users

You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password – bad as that would be. It’s much worse than that.

Read more in my article on the We Live Security blog.

0 sec read

FBI paid over $1.3 million to hack into San Bernardino iPhone that contained ‘nothing of real significance’

It’s good that Apple wasn’t forced to create a new vulnerability to allow the FBI to break into the San Bernardino iPhone 5C, and I am pleased that an existing exploit was used instead. But the FBI not telling Apple how it was done puts all of us at risk.

Read my article on the Hot for Security blog.

0 sec read