Though the companies named in a blockbuster Bloomberg story have denied that China hacked into Supermicro hardware that shipped to Amazon, Apple and nearly 30 other firms, a recent demonstration at hacking conference in Germany proves the plausibility of the alleged hack.
In-brief: Apple is urging iPhone and iPad users to upgrade to the latest version of iOS amid published claims by Israeli firm Cellebrite that its engineers can unlock basically any iPhone model, including those running the new iOS 11. Apple again finds itself at the center of controversy surrounding the ability to hack into iPhones to extract protected user information. The company is urging iPhone users to upgrade their devices to the latest version of iOS amid claims by an Israeli mobile-device surveillance firm that its engineers can unlock virtually any iPhone model in the world. However, the Cupertino, Calif.-based company is remaining mum on what, if anything, it might do now or in the future to resolve the issue. Citing anonymous sources, Forbes reported Monday that Cellebrite, based in Petah Tikva, Israel, is telling customers that its engineers already can bypass the security of devices running iOS 11, the […]
In-brief: After legislation in five states stalled in the Spring, states like Massachusetts will be on the front line of renewed efforts to pass pro-consumer laws that create a “right to repair” for cell phones, medical devices and other software-driven products. At stake could be the right of consumers to control Internet of Things devices they purchase for use in their home, on their person or in their business.
In-brief: a remotely exploitable flaw in a common hardware component used in phones by Apple, Samsung and others underscores the risk posed by software embedded in system on chip components that are found in almost every connected device, experts warn.
In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”