×
Desktops (Apple)

Typosquatters Running .om Domain Scam To Push Mac Malware (threatpost.com) 64

msm1267 writes from an article on Threatpost: Typosquatters are targeting Apple computer users with malware in a recent campaign that snares clumsy web surfers who mistakenly type .om instead of .com when surfing the web. According to Endgame security researchers, the top level domain for Middle Eastern country Oman (.om) is being exploited by typosquatters who have registered more than 300 domain names with the .om suffix for U.S. companies and services such as Citibank, Dell, Macys and Gmail. Endgame made the discovery last week and reports that several groups are behind the typosquatter campaigns. Mac OS X users are being singled out in this typosquatting campaign with malware. According to Endgame, when a Mac user stumbles on one of the typosquatters' webpages, a fake Adobe Flash update pops up and attempts to trick users to install the advertising component called Genieo. Endgame suspects that typosquatters are exploiting a hole in Oman's domain name registration process. When Endgame tried to register a domain it was asked to verify that it had the authority to registrar a specific commercial domain. "It's unclear how typosquatters were able to register so many domains in such a short period of time," Endgame said.
Desktops (Apple)

Sorry, Indie Devs -- Pop Apps Are the Future of App Store (imore.com) 103

An anonymous reader points us to an opinion piece by Apple blogger Rene Ritchie on the dim prospects for indie app developers, in the face of mass-market, big-name competition. From his piece: Big apps get all the attention these days, just like big movie, music, or book releases and indies get what little is left, when there's even a little left. The App Store is big business, and that's how big business works. [...] Apple could use its considerable power and influence to help shape the App Store economy into one more hospitable to indie developers. After all, those are the apps I love and the ones that dominate my home screens. But the truth is, even if Apple gave indie developers everything they wanted, it wouldn't matter much over the long term. It may help a few for a while, and a very few for a while longer, but the app economy and apps themselves are evolving. Brent Simmons has offered his opinion on the matter. He writes, The Mac has for a long time been overlooked -- first because Windows was so huge, and then web apps, and now iOS. For my entire career people have said that the Mac is a bad bet, that it's dumb to write Mac apps. [...] There was never a golden age for indie iOS developers. It was easier earlier on, but it was never golden. (Yes, some people made money, and some are today. I don't mean that there were zero successes.) And there's a good chance that many of the people you currently think of as thriving iOS indie developers are making money in other ways: contracting, podcast ads, Mac apps, etc.
Facebook

WhatsApp Encryption Said To Stymie Wiretap Order (nytimes.com) 56

bsharma writes from an article on the New York Times: WhatsApp, which is owned by Facebook, allows customers to send messages and make phone calls over the Internet. In the last year, the company has been adding encryption to those conversations, making it impossible for the Justice Department to read or eavesdrop, even with a judge's wiretap order. [As recently as this past week, officials said,] the Justice Department was discussing how to proceed in a continuing criminal investigation in which a federal judge had approved a wiretap, but investigators were stymied by WhatsApp's encryption. (WhatsApp uses Signal software developed by Open Whisper Systems.) "WhatsApp cannot provide information we do not have," the company said this month when Brazilian police arrested a Facebook executive after the company failed to turn over information about a customer who was the subject of a drug trafficking investigation. "The F.B.I. and the Justice Department are just choosing the exact circumstance to pick the fight that looks the best for them," said Peter Eckersley, the chief computer scientist at the Electronic Frontier Foundation, a nonprofit group that focuses on digital rights. "They're waiting for the case that makes the demand look reasonable."
Education

Amazon Working On Education Platform To Offer Free Learning Materials (techcrunch.com) 20

An anonymous reader writes: E-commerce giant Amazon is planning to launch a new education platform which would enable educators to upload, manage, share, and discover open education resources. Earlier this month, the company quietly opened an Amazon Education Wait List to allow educators to be alerted about the availability of the platform. The website currently reads, "The future of education is open. Someday soon, educators everywhere will have free and unlimited access to first-class course materials from a revolutionary platform. Get on the wait list to be notified when the platform is available for all schools and classrooms!" The webpage, do note, could be related to some other project. This isn't the first time Amazon has shown interest in the education sector. In 2013, it acquired TenMarks, a company that offers mathematics learning materials. Amazon, which lets you purchase or rent books for Kindle, is also a major name in the publishing world. Over the years, Apple, Google, and Microsoft have also become increasingly interested in seeing their hardware and software in classrooms.
Data Storage

Intel's Optane SSD Compatible With NVMe; Could Boost MacBook Storage Speeds By 1000x 76

More details have emerged about Intel's Optane, a new kind of memory and SSD that utilizes 3D Xpoint. The upcoming 3D Xpoint technology, which is supposedly 10 times denser than DRAM and 1,000 times faster than flash storage, will be compatible with NVMe, a storage protocol that allows an SSD to make effective use of a high-speed PCIe. Several MacBook Pro models already support NVMe technology. Apple is often among the first companies to adopt emerging standards and technologies, which has led many to believe that the Cupertino-based company might leverage Intel's Optane solid state drives for super fast performance speeds in its next batch of laptops. Apple is expected to announce the refreshed MacBook lineup sporting Intel Skylake processor later this year.
Iphone

Obama: Government Can't Let Smartphones Be 'Black Boxes' (bloomberg.com) 546

JoeyRox writes: President Obama said Friday that smartphones -- like the iPhone the FBI is trying to force Apple to help it hack -- can't be allowed to be "black boxes," inaccessible to the government. He believes technology companies should work with the government on encryption rather than leaving the issue for Congress to decide. He went on to say, "If your argument is strong encryption no matter what, and we can and should create black boxes, that I think does not strike the kind of balance we have lived with for 200, 300 years, and it's fetishizing our phones above every other value." Obama's appearance on Friday at the event known as SXSW, the first by a sitting president, comes as the FBI tries to force Apple to help investigators access an iPhone used by one of the assailants in December's deadly San Bernardino, California, terror attack. "The question we now have to ask is, if technologically it is possible to make an impenetrable device or system, where the encryption is so strong there's no key, there's no door at all, then how do we apprehend the child pornographer? How do we solve or disrupt a terrorist plot?" Obama said. "If in fact you can't crack that at all, government can't get in, then everybody's walking around with a Swiss bank account in their pocket." He said compromise is possible and the technology industry must help design it.
Encryption

Skype Co-Founder Launches End-To-End Encrypted 'Wire' App (reuters.com) 52

An anonymous reader writes: A group of former Skype technologists, backed by the co-founder of the messaging platform, has introduced a new version of its own messaging service that promises end-to-end encryption for all conversations, including by video. Wire, a 50-person start-up mostly made up of engineers, is stepping into a global political debate over encryption that pits privacy against security advocates, epitomized by the standoff between the U.S. government and Apple. Wire, which is headquartered in Switzerland and Germany, two of the most privacy-friendly countries in the world, relays communications through its network of cloud computers where user communications are stored, in encrypted form, on their own devices. It delivers privacy protections that are always on, even when callers use multiple devices, such as a phone or desktop PC simultaneously. For voice and video calls, Wire uses the same DTLS and SRTP encryption standards found in the peer-to-peer WebRTC protocol. Rivals such as Facebook's Messenger and WhatsApp or Telegram offer encryption on only parts of a message's journey or for a specific set of services, the company said. "Everything is end-to-end encrypted: That means voice and video calls, texts, pictures, graphics -- all the content you can send," Wire Executive Chairman Janus Friis told Reuters.
IOS

Apple Might Be Forced to Hand Over iOS Source Code to the FBI (theguardian.com) 273

Bruce66423 writes: In its latest filing, the FBI implies that, if the burden on Apple programmers of their alternative approach is too great, then Apple should release the whole source code to the FBI to allow them to do the work, quoting the precedent of the Lavabit confrontation. Clearly it is time for Apple to move offshore!? To recall, Lavabit abruptly shut down in 2013 when the FBI attempted to get the company to hand over the encryption keys for its secure email service. While the current situation seems to put Apple in the same ballpark as Lavabit, what gives the Cupertino-giant company an advantage is the immense support it is receiving from other Silicon Valley companies and personnel. Many believe that the FBI doesn't really need Apple's help in unlocking the iPhone. Reports claim that the iPhone in question already has a "backdoor" which could allow the government-backed institution to access the data on the smartphone. Other widely reported theories include cracking the iPhone and manipulating the innards to trick the system into spilling out all the information. One proposed method, which requires the phone's NAND flash chip to be taken out, may not work, though. Daniel Kahn Gillmor, a technology fellow with the ACLU's Speech, Privacy and Technology Project, pointed out the risks in playing with flash memory. He said that an error in removing the memory could make the data unreadable forever.
Iphone

Apple Announces 'Let Us Loop You In' Event For March 21st (theverge.com) 66

An anonymous reader writes: The official Apple Events page has been updated in advance of the newly announced media event. Invitations were sent out earlier Thursday inviting members of the press to "let us loop you in." The event will be streamed using Apple's HTTP Live Streaming technology and will require an iPhone, iPad or iPod Touch running iOS 7.0 or later. The company is expected to announce a new, smaller iPhone SE, that will be the same size as the iPhone 5 but with improved specs like a A9 processor and 8-megapixel rear camera. In addition, Apple is expected to announce a new, smaller iPad Pro. It is rumored to feature a 9.7" display and a Smart Connector to support Smart Keyboard -- it may even be compatible with the Apple Pencil. We can expect some kind of update for the Apple Watch, most likely new Apple Watch bands. A black version of the Milanese Loop may be in the works to match the Space Black Apple Watch. Of course, Apple will talk encryption as the event is scheduled one day before the next hearing between Apple and the FBI on March 22. Apple may surprise us with new MacBooks or OS X updates but we will most likely have to wait until Apple's developer conference in June.
Privacy

Federal Judge Admits Existence Of NSA's PRISM Program (vocativ.com) 82

An anonymous reader writes: A U.S. judge has just admitted the existence of the NSA's infamous PRISM program by name, apparently the first time any federal judge has done so. PRISM has been an open secret since June 2013, when documents leaked by former NSA contractor Edward Snowden were first made public. An ominous NSA PowerPoint training slide claimed that PRISM allowed "collection [of user data] directly from the servers" of major American tech companies like Yahoo, Google, and Apple, though those tech companies immediately and fiercely protested that no, to their knowledge, they didn't give the NSA such access. It's since been generally accepted that the NSA wasn't physically accessing those companies' servers with PRISM, but instead creating a streamlined legal process to compel those companies, via orders processed in the secret Foreign Intelligence Surveillance Court, to turn over users' data. Since the program's disclosure, most government reports and redacted FISA court orders have referred to PRISM by the legal authority the NSA claims authorizes it, Section 702 of the Foreign Intelligence Surveillance Act. But that's confusing, because 702 also authorizes what's called Upstream collection, which gives the NSA access to raw internet data -- not the same thing as PRISM, which is more specifically targeted.
Power

Apple Executive Confirms: Manually Quitting Apps Doesn't Improve Battery Life (bgr.com) 151

An anonymous reader writes: Apple software engineering VP Craig Federighi recently dispelled one of the more long-standing myths about iPhone battery life. In short, if you spend a few minutes every day double clicking the iPhone home button and manually closing up applications in an effort to maintain battery life, you're wasting your time. The reality is that the applications you see upon opening up the multitasking pane are actually nothing more than static images intended to represent a list of your most recently used applications. Apple support documents have indicated, "generally, there's no need to force an app to close unless it's unresponsive." Apple support docs further explain: "After you switch to a different app, some apps run for a short period of time before they're set to a suspended state. Apps that are in a suspended state aren't actively in use, open, or taking up system resources."
Cellphones

Galaxy S7 vs iPhone 6S: Samsung Has the Upper-Hand, For Now (hothardware.com) 131

MojoKid writes: To look at Samsung's new Galaxy S7 and S7 Edge smartphones, on the surface, one might mistake them for only a modest uplift of bells and whistles, and perhaps a light rebuffing of the phone's design language. However, one of the primary new features of the US-targeted Samsung Galaxy S7 is its underlying power plant — Qualcomm's Snapdragon 820 system-on-a-chip (SoC). The Snapdragon 820 is based on Qualcomm's new, custom ARM-based core architecture called Kyro. Kyro marks an evolution beyond Qualcomm's venerable Krait core architecture that the company claims offers 2X the performance and power efficiency of their previous-gen Snapdragon 810. In addition, the quad-core Snapdragon 820 has a beefed-up Adreno 530 graphics engine on board as well. In performance testing versus Apple's potent A9 platform in the iPhone 6S Plus, Samsung's Galaxy S7 with the Snapdragon 820 generally outpaces the iPhone in multithreaded performance as well as graphics. The Apple A9 still does a lot of work with just two cores, but overall it looks as though Qualcomm has a highly-competitive SoC and Samsung put it to good use.
Iphone

Snowden: FBI's Claim It Can't Unlock The San Bernardino iPhone Is 'Bullshit' (theguardian.com) 242

An anonymous reader writes: Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI's attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: "The FBI says Apple has the 'exclusive technical means' to unlock the phone. Respectfully, that's bullshit." Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI's claims in the case are fraudulent. Apple's clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.
Encryption

Former NSA, CIA Director Michael Hayden Sides With Apple Over FBI (foxbusiness.com) 146

cold fjord writes: General Michael Hayden (Retired), who served as head of both the NSA and CIA, has taken a position supporting Apple in its conflict with the FBI. Apple is fighting a court order to assist the FBI in breaking into the government owned phone used by one of the two dead terrorists responsible for the recent San Bernardino massacre. General Hayden stated, "You can argue this on constitutional grounds. Does the government have the right to do this? Frankly, I think the government does have a right to do it. You can do balancing privacy and security dead men don't have a right to privacy. I don't use those lenses. My lens is the security lens, and frankly, it's a close but clear call that Apple's right on just raw security grounds. ... I get why the FBI wants to get into the phones but this may be a case where we've got to give up some things in law enforcement and even counter terrorism in order to preserve this aspect, our cybersecurity."
Crime

KeRanger Mac Ransomware Based On Linux Forebear, Not Windows 77

An anonymous reader writes: It appears that the KeRanger ransomware that's been tormenting Mac users for the past days is actually based on a ransomware variant that targets Linux servers, and not on a ransomware family coming from Windows. That particular Linux ransomware is also based on an open-source ransomware called Hidden Tear that was uploaded to GitHub by a Turkish security researcher. So obviously, the conclusion is that GitHub is to blame for the KeRanger Mac ransomware. (Note to readers: That last bit is tongue in anonymous cheek.)
OS X

Brazilian Coders Are Pioneering the First Cross-OS Malware Using JAR Files 124

An anonymous reader writes: Criminal gangs in Brazil are experimenting with the first malware families that are packaged as JAR files, capable of being deployed to Windows, Linux, Mac, and even Android from the same codebase, instead of relying on 4 different versions. Right now, only the malware dropper, a component used to infect computers with banking trojans, seems to have been coded in Java, but security experts expect a full-blown banking trojan to soon follow.
Government

Supreme Court Rejects Apple eBooks Price-Fixing Appeal (reuters.com) 84

chasm22 writes: The Supreme Court on Monday declined to hear Apple Inc's challenge to an appellate court decision that it conspired with five publishers to increase e-book prices, meaning it will have to pay $450 million as part of a settlement. The court's decision not to hear the case leaves in place a June 2015 ruling by the New York-based 2nd U.S. Circuit Court of Appeals that found Apple liable for engaging in a conspiracy that violated federal antitrust laws. Apple, in asking the high court to hear the case, said the June appeals court decision that the company had conspired with the publishers contradicted Supreme Court precedent and would "chill innovation and risk-taking." The 2nd Circuit's ruling followed a 2013 decision by U.S. District Judge Denise Cote that Apple played a "central role" in a conspiracy with publishers to raise e-book prices. The Justice Department said the scheme caused some e-book prices to rise to $12.99 or $14.99 from the $9.99 price previously charged by market leader Amazon.com Inc. "Apple liability for knowingly conspiring with book publishers to raise the prices of e-books is settled once and for all," said Bill Baer, head of the U.S. Justice Department's antitrust division.
Perhaps Congress should change the price fixing laws... What about Amazon? Just trying to anticipate the response from Apple.
OS X

Apple Has Shut Down the First Fully-Functional Mac OS X Ransomware (techcrunch.com) 124

An anonymous reader writes: Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your personal computer so you can no longer access it. Afterwards, the hackers request that you pay them in a hard-to-trace digital currency — in this case, bitcoin — in order for you to retrieve your files. This ransomware, called KeRanger, was first reported by researchers at Palo Alto Networks. They also noted that Apple has now revoked the abused certificate that was used in the attack and updated its built-in anti-malware system XProtect with a new signature to protect customers.
Cellphones

McAfee Says He Lied About iPhone Hacking Method To Get Public Attention 171

blottsie writes: McAfee, who founded of one of the first companies to offer antivirus software, claimed on CNN and Russia Today, as well as in a Business Insider column, that he could bypass the advanced encryption protecting the phone without Apple's help. But he lied in these interviews, he said in an interview with the Daily Dot, to "get a shitload of public attention."
Security

Transmission BitTorrent App Contained Malware (cnbc.com) 109

An anonymous reader writes: Apple users were targeted in the first known Mac ransomware campaign. Hackers targeted Transmission, which is one of the most popular Mac applications used to download software, videos, music, and other data from the BitTorrent peer-to-peer information sharing network. As per this forum post (English screenshot of warning), OS X detected malware called OSX.KeRanger.A. This is the first one in the wild that is functional as it encrypts your files and seeks a ransom. An Apple representative said the company had taken steps over the weekend to prevent attacks by revoking a digital certificate from a legitimate Apple developer that enabled the rogue software to install on Macs.

Slashdot Top Deals