'We need new privacy laws,' urges Apple CEO Tim Cook

Credit to Author: Jonny Evans| Date: Thu, 17 Jan 2019 04:25:00 -0800

In a sidelong slap at the business model of Facebook, Google and others, Apple CEO Tim Cook has published an article in which he urges the U.S. government to put surveillance capitalists/data brokers under transparent legal oversight.

Stand up for your rights

“In 2019, it’s time to stand up for the right to privacy — yours, mine, all of ours.” Cook writes in an article for Time Magazine.

To read this article in full, please click here

Read more

'We need new privacy laws' urges Apple CEO, Tim Cook

Credit to Author: Jonny Evans| Date: Thu, 17 Jan 2019 04:25:00 -0800

In a sidelong slap at the business model of Facebook, Google and others, Apple CEO Tim Cook has published an article in which he urges the U.S. government to put surveillance capitalists/data brokers under transparent legal oversight.

Stand up for your rights

“In 2019, it’s time to stand up for the right to privacy – yours, mine, all of ours.” Cook writes in an article for Time Magazine.

To read this article in full, please click here

Read more

'We need new privacy laws' urges Apple CO, Tim Cook

Credit to Author: Jonny Evans| Date: Thu, 17 Jan 2019 04:25:00 -0800

In a sidelong slap at the business model of Facebook, Google and others, Apple CEO Tim Cook has published an article in which he urges the U.S. government to put surveillance capitalists/data brokers under transparent legal oversight.

Stand up for your rights

“In 2019, it’s time to stand up for the right to privacy – yours, mine, all of ours.” Cook writes in an article for Time Magazine.

To read this article in full, please click here

Read more

How to create and open compressed files on iPhone, iPad

Credit to Author: Jonny Evans| Date: Thu, 10 Jan 2019 07:27:00 -0800

Many enterprises rely on zip files to exchange data, particularly confidential data – compression helps keep information safe, even against inquisitive ads trackers lurking inside “free” email or online storage services. How do you handle these things on iPad or iPhone?

How to handle zip files on iPhone

While it isn’t especially obvious, iOS provides some limited features that let you archive and decompress zip files. You can even create a nice little Shortcut to do this for you:

  • Open Shortcuts, Tap Create Shortcut
  • In the search bar, type Extract Archive: That shortcut should appear in the list below, tap it to add it to your workflow.
  • Returning to the search bar, type Save File. When it appears tap it to add it to the workflow you are building.
  • Tap the switch button at top right of the shortcut name
  • In the next pane you can name the shortcut and give it an icon. The most important change you should make is to enable Show in Share Sheet (flick to green).
  • You can create a second Shortcut to make archives. Just tupe Make Archive to find the relevant flow and then add Save File and Show in Share Sheet as decribed above. Don’t forget to give it a name, such as Make Archive.
  • Shortcuts can work with multiple compression formats, including .tar, .zip and .iso.

How to use it:

To read this article in full, please click here

Read more

Enterprise iPhones will soon be able to use security dongles

Credit to Author: Jonny Evans| Date: Wed, 09 Jan 2019 07:25:00 -0800

Enterprise security professionals will be pleased to learn that it will soon be possible to enhance the already considerable device security of Apple’s iPhones with hardware-based physical authentication dongles using the Lightning port.

A highly secure proposition

Announced at CES 2019, the key fits on a keyring and comes from the authorization experts at Yubico. The hardware connects to iOS systems using the Lightning connection and is also equipped with USB-C for Macs. This is quite a big deal.

To read this article in full, please click here

Read more

In 2019, look for AI-enabled mobile devices – and a UEM push

Credit to Author: Lucas Mearian| Date: Mon, 07 Jan 2019 03:00:00 -0800

This year, artificial intelligence will continue its push into mobile hardware and enterprise communication devices, challenging IT shops’ enterprise mobility management (EMM) capabilities while at the same time offering potential security benefits.

To read this article in full, please click here

(Insider Story)

Read more

The new landscape of pre-installed mobile malware: malicious code within

Credit to Author: Nathan| Date: Wed, 02 Jan 2019 18:15:46 +0000

We are now seeing malware authors target system apps that are required for mobile devices to function properly. By injecting malicious code within these necessary apps, threat actors have reshaped the landscape of pre-installed malware for the worse.

Categories:

Tags:

(Read more…)

The post The new landscape of pre-installed mobile malware: malicious code within appeared first on Malwarebytes Labs.

Read more

Q&A: Experian exec says biometrics won’t save you from mobile hacks

Credit to Author: Lucas Mearian| Date: Mon, 31 Dec 2018 03:01:00 -0800

If you think your new iPhone’s Face ID facial recognition feature or your bank’s fancy new fingerprint scanner will guarantee privacy and block hackers from accessing sensitive personal or financial data, think again.

In the coming year, cyberattacks will zero in on biometric hacking and expose vulnerabilities in touch ID sensors, facial recognition technology and passcodes, according to a new report from credit reporting agency Experian Plc. While biometric data is considered the most secure method of authentication, it can be stolen or altered, and sensors can be manipulated, spoofed or suffer deterioration with too much use.

Even so, as much as 63% of enterprises have implemented or plan to roll out  biometric authentication systems to augment or replace less-secure passwords, Experian said in its report. The push toward biometric systems dates back to the turn of the century in the financial services industry.

To read this article in full, please click here

Read more

All the reasons why cybercriminals want to hack your phone

Credit to Author: Kayla Matthews| Date: Tue, 18 Dec 2018 16:00:00 +0000

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Read more

Mobile Menace Monday: Is Fuchsia OS the end of Android?

Credit to Author: Gleb Malygin| Date: Mon, 17 Dec 2018 20:10:25 +0000

The next major Android version will be Android Q and not Android 9.1 Pie. In parallel, Google is also developing a new operating system based on its own microkernel called Fuchsia. Will this be the OS that replaces Android? Read on to find out.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Is Fuchsia OS the end of Android? appeared first on Malwarebytes Labs.

Read more

Android security audit: An easy-to-follow annual checklist

Credit to Author: JR Raphael| Date: Wed, 12 Dec 2018 13:35:00 -0800

Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason.

As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly sensationalized accounts tied to theoretical threats with practically zero chance of actually affecting you in the real world. If you look closely, in fact, you’ll start to notice that the vast majority of those stories stem from companies that — gasp! — make their money selling malware protection programs for Android phones. (Pure coincidence, right?)

To read this article in full, please click here

Read more