Apple is Taking Steps to Protect iCloud Users from Hackers

Apple introduced security measures in the wake of high-profile celebrity images being hacked from personal iCloud accounts. Apple now alerts users when their iCloud data is downloaded to a new device, and the company has added a two-factor authentication option. Users of anonymous image board Anon-IB, one of the forums hackers used for stealing and sharing photos, are reportedly angry. They are complaining that the leaked celebrity images have exposed their secret hacking techniques. Continue reading Apple is Taking Steps to Protect iCloud Users from Hackers

Security Experts Warn of Potentially Dangerous Shellshock Bug

In 1987, programmer Brian J. Fox wrote one of the Internet’s most widely used tools. The software is named “Bash” (short for Bourne-Again Shell) and now appears in more than 70 percent of devices connected to the Internet, including computers, routers, servers and some mobile phones. Yesterday, security experts warned that Bash contains a software bug called “Shellshock” that could potentially be used to take over hundreds of millions of machines, including Mac computers and smartphones that run Android. Continue reading Security Experts Warn of Potentially Dangerous Shellshock Bug

Apple to Add Security Alerts Following Celebrity Photo Leaks

Apple CEO Tim Cook confirmed that the hackers responsible for recently leaking nude photos of celebrities were able to break into the celebrities’ iCloud accounts. The company plans to add additional security alerts to help prevent future security breaches. In the next two weeks, Apple users will start receiving notifications when someone tries to change an account password, restore iCloud data to a new device, or when a new device logs onto the account for the first time. Continue reading Apple to Add Security Alerts Following Celebrity Photo Leaks

Encrypted Communication Tools Seeking Mainstream Users

Apps and other products that enable encrypted communication are on the rise. Even tech giants like Google and Yahoo have promised to give encrypted sites a higher ranking in search results and to start encrypting emails. However, the creators of encryption apps, such as ProtonMail or Bleep, are still looking for mainstream users, not just gadget enthusiasts or security-conscious professionals. These companies are targeting mainstream users concerned about their privacy. Continue reading Encrypted Communication Tools Seeking Mainstream Users

Russian Criminals Obtain Passwords and More in Massive Hack

Hold Security, an Internet security research firm in the U.S., discovered a Russian crime ring has stolen an unprecedented amount of Internet credentials, including 1.2 billion user names and passwords, and more than 500 million email addresses. The hackers targeted websites from multiple countries and a range of businesses, from Fortune 500 companies to small websites. The crime ring is currently using the information to send spam through social networks for a fee. Continue reading Russian Criminals Obtain Passwords and More in Massive Hack

Amazon Faces FTC Lawsuit Over Children’s In-App Purchases

The Federal Trade Commission filed a lawsuit against Amazon, accusing the online retailer of allowing children to make unauthorized purchases in its app store. The lawsuit comes after the company refused a proposed settlement that would have refunded customers and made changes to the app store. The FTC believes Amazon needs to require passwords for consumers to buy products, make purchase notices more prominent, and make refunds easier and simpler. Continue reading Amazon Faces FTC Lawsuit Over Children’s In-App Purchases

Cybersecurity Focus Shifts From Blocking to Spotting Threats

Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches.  Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats

Apple will Modify App Purchases with More Parental Control

The Federal Trade Commission announced on Wednesday that Apple has agreed to better enforce parental approval of purchases from the company’s App Store. Apple will also refund at least $32.5 million to parents whose children made purchases without their consent. Apple settled a related class-action lawsuit last year, but the FTC said that the problem continued after the settlement, so Apple has agreed to further modify its practices. Continue reading Apple will Modify App Purchases with More Parental Control