alt=
203x44-linked-in
News  Apple
Spike Apple Smartphone Virus

Hack uses Siri, Twitter and email search

Youtube user EverythingApplePro has demonstrated another iOS hack which works with the current live version (as at the time of writing) of iOS 9.

With a locked iPhone 6S Plus, he issues a simple Siri query which lets a user access a users photos and contacts. Securing this has proved a headache for Apple for years, and this latest hack just goes to show how difficult a task this is proving to be.

He stesses the trick is to get Siri to answer with an email, which then following through by tapping on it opens up the contacts app. Once in, the hacker can create new contacts and access the devices photos.

News  Android
Samsung S7

Don't try this at home

Here's an epic Samsung vs LG battle - but is it fair? Max Lee decided to test the waterproofing claim Samsung are making of the S7 and took a video for good measure.

Now whilst there are endless jokes about keeping your phone clean we could make, or not leaving it in your jeans, in the end this was actually a deliberate waterproofing test. Just to really give things a twist, the handset is powered up throughout its entire ordeal.

Well, it makes a change from the usual "dropping onto concrete" antics. Wonder what this would have done to the warranty...

News  Android
Android Truecaller exposes millions of users data

Millions of devices hit

Truecaller has been around a while now, and unfortunately is no stranger to being on the receiving end of the bad guys attention.

This is largely due to its age and user base - over 100 million - and its profile, at one point even falling victim to the "Syrian electronics army".

Recently Cheetah Mobile Security Research Lab has discovered a remotely exploitable flaw in the system which allows the attackers to steal their victims sensitive information, as well as modify their application settings such as deleting a users blacklist, etc. 

News  Apple
Apples iMessage security busted

Keys cracked

Using brute force with a little extra know-how, a team from Johns Hopkins University led by professor Matthew Green has cracked an iOS flaw and retrieved the encryption key used.

iOS 9.3 beta is not affected, which is great news for users as the stable version is due for release any time now. Green quietly tipped off Apple in good time for this release, and although the current version is vulnerable, it's only with the use of a "nation-grade" level of cryptographers and equipment.

Green said "Even Apple, with all their skills - and they have terrific cryptographers - wasn’t able to quite get this right. So it scares me that we’re having this conversation about adding backdoors to encryption when we can’t even get basic encryption right."