Iphone

Apple Announces 'Let Us Loop You In' Event For March 21st (theverge.com) 66

An anonymous reader writes: The official Apple Events page has been updated in advance of the newly announced media event. Invitations were sent out earlier Thursday inviting members of the press to "let us loop you in." The event will be streamed using Apple's HTTP Live Streaming technology and will require an iPhone, iPad or iPod Touch running iOS 7.0 or later. The company is expected to announce a new, smaller iPhone SE, that will be the same size as the iPhone 5 but with improved specs like a A9 processor and 8-megapixel rear camera. In addition, Apple is expected to announce a new, smaller iPad Pro. It is rumored to feature a 9.7" display and a Smart Connector to support Smart Keyboard -- it may even be compatible with the Apple Pencil. We can expect some kind of update for the Apple Watch, most likely new Apple Watch bands. A black version of the Milanese Loop may be in the works to match the Space Black Apple Watch. Of course, Apple will talk encryption as the event is scheduled one day before the next hearing between Apple and the FBI on March 22. Apple may surprise us with new MacBooks or OS X updates but we will most likely have to wait until Apple's developer conference in June.
Privacy

Federal Judge Admits Existence Of NSA's PRISM Program (vocativ.com) 82

An anonymous reader writes: A U.S. judge has just admitted the existence of the NSA's infamous PRISM program by name, apparently the first time any federal judge has done so. PRISM has been an open secret since June 2013, when documents leaked by former NSA contractor Edward Snowden were first made public. An ominous NSA PowerPoint training slide claimed that PRISM allowed "collection [of user data] directly from the servers" of major American tech companies like Yahoo, Google, and Apple, though those tech companies immediately and fiercely protested that no, to their knowledge, they didn't give the NSA such access. It's since been generally accepted that the NSA wasn't physically accessing those companies' servers with PRISM, but instead creating a streamlined legal process to compel those companies, via orders processed in the secret Foreign Intelligence Surveillance Court, to turn over users' data. Since the program's disclosure, most government reports and redacted FISA court orders have referred to PRISM by the legal authority the NSA claims authorizes it, Section 702 of the Foreign Intelligence Surveillance Act. But that's confusing, because 702 also authorizes what's called Upstream collection, which gives the NSA access to raw internet data -- not the same thing as PRISM, which is more specifically targeted.
Power

Apple Executive Confirms: Manually Quitting Apps Doesn't Improve Battery Life (bgr.com) 151

An anonymous reader writes: Apple software engineering VP Craig Federighi recently dispelled one of the more long-standing myths about iPhone battery life. In short, if you spend a few minutes every day double clicking the iPhone home button and manually closing up applications in an effort to maintain battery life, you're wasting your time. The reality is that the applications you see upon opening up the multitasking pane are actually nothing more than static images intended to represent a list of your most recently used applications. Apple support documents have indicated, "generally, there's no need to force an app to close unless it's unresponsive." Apple support docs further explain: "After you switch to a different app, some apps run for a short period of time before they're set to a suspended state. Apps that are in a suspended state aren't actively in use, open, or taking up system resources."
Cellphones

Galaxy S7 vs iPhone 6S: Samsung Has the Upper-Hand, For Now (hothardware.com) 131

MojoKid writes: To look at Samsung's new Galaxy S7 and S7 Edge smartphones, on the surface, one might mistake them for only a modest uplift of bells and whistles, and perhaps a light rebuffing of the phone's design language. However, one of the primary new features of the US-targeted Samsung Galaxy S7 is its underlying power plant — Qualcomm's Snapdragon 820 system-on-a-chip (SoC). The Snapdragon 820 is based on Qualcomm's new, custom ARM-based core architecture called Kyro. Kyro marks an evolution beyond Qualcomm's venerable Krait core architecture that the company claims offers 2X the performance and power efficiency of their previous-gen Snapdragon 810. In addition, the quad-core Snapdragon 820 has a beefed-up Adreno 530 graphics engine on board as well. In performance testing versus Apple's potent A9 platform in the iPhone 6S Plus, Samsung's Galaxy S7 with the Snapdragon 820 generally outpaces the iPhone in multithreaded performance as well as graphics. The Apple A9 still does a lot of work with just two cores, but overall it looks as though Qualcomm has a highly-competitive SoC and Samsung put it to good use.
Iphone

Snowden: FBI's Claim It Can't Unlock The San Bernardino iPhone Is 'Bullshit' (theguardian.com) 242

An anonymous reader writes: Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI's attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: "The FBI says Apple has the 'exclusive technical means' to unlock the phone. Respectfully, that's bullshit." Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI's claims in the case are fraudulent. Apple's clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.
Encryption

Former NSA, CIA Director Michael Hayden Sides With Apple Over FBI (foxbusiness.com) 146

cold fjord writes: General Michael Hayden (Retired), who served as head of both the NSA and CIA, has taken a position supporting Apple in its conflict with the FBI. Apple is fighting a court order to assist the FBI in breaking into the government owned phone used by one of the two dead terrorists responsible for the recent San Bernardino massacre. General Hayden stated, "You can argue this on constitutional grounds. Does the government have the right to do this? Frankly, I think the government does have a right to do it. You can do balancing privacy and security dead men don't have a right to privacy. I don't use those lenses. My lens is the security lens, and frankly, it's a close but clear call that Apple's right on just raw security grounds. ... I get why the FBI wants to get into the phones but this may be a case where we've got to give up some things in law enforcement and even counter terrorism in order to preserve this aspect, our cybersecurity."
Crime

KeRanger Mac Ransomware Based On Linux Forebear, Not Windows 77

An anonymous reader writes: It appears that the KeRanger ransomware that's been tormenting Mac users for the past days is actually based on a ransomware variant that targets Linux servers, and not on a ransomware family coming from Windows. That particular Linux ransomware is also based on an open-source ransomware called Hidden Tear that was uploaded to GitHub by a Turkish security researcher. So obviously, the conclusion is that GitHub is to blame for the KeRanger Mac ransomware. (Note to readers: That last bit is tongue in anonymous cheek.)
OS X

Brazilian Coders Are Pioneering the First Cross-OS Malware Using JAR Files 124

An anonymous reader writes: Criminal gangs in Brazil are experimenting with the first malware families that are packaged as JAR files, capable of being deployed to Windows, Linux, Mac, and even Android from the same codebase, instead of relying on 4 different versions. Right now, only the malware dropper, a component used to infect computers with banking trojans, seems to have been coded in Java, but security experts expect a full-blown banking trojan to soon follow.
Government

Supreme Court Rejects Apple eBooks Price-Fixing Appeal (reuters.com) 84

chasm22 writes: The Supreme Court on Monday declined to hear Apple Inc's challenge to an appellate court decision that it conspired with five publishers to increase e-book prices, meaning it will have to pay $450 million as part of a settlement. The court's decision not to hear the case leaves in place a June 2015 ruling by the New York-based 2nd U.S. Circuit Court of Appeals that found Apple liable for engaging in a conspiracy that violated federal antitrust laws. Apple, in asking the high court to hear the case, said the June appeals court decision that the company had conspired with the publishers contradicted Supreme Court precedent and would "chill innovation and risk-taking." The 2nd Circuit's ruling followed a 2013 decision by U.S. District Judge Denise Cote that Apple played a "central role" in a conspiracy with publishers to raise e-book prices. The Justice Department said the scheme caused some e-book prices to rise to $12.99 or $14.99 from the $9.99 price previously charged by market leader Amazon.com Inc. "Apple liability for knowingly conspiring with book publishers to raise the prices of e-books is settled once and for all," said Bill Baer, head of the U.S. Justice Department's antitrust division.
Perhaps Congress should change the price fixing laws... What about Amazon? Just trying to anticipate the response from Apple.
OS X

Apple Has Shut Down the First Fully-Functional Mac OS X Ransomware (techcrunch.com) 124

An anonymous reader writes: Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your personal computer so you can no longer access it. Afterwards, the hackers request that you pay them in a hard-to-trace digital currency — in this case, bitcoin — in order for you to retrieve your files. This ransomware, called KeRanger, was first reported by researchers at Palo Alto Networks. They also noted that Apple has now revoked the abused certificate that was used in the attack and updated its built-in anti-malware system XProtect with a new signature to protect customers.
Cellphones

McAfee Says He Lied About iPhone Hacking Method To Get Public Attention 171

blottsie writes: McAfee, who founded of one of the first companies to offer antivirus software, claimed on CNN and Russia Today, as well as in a Business Insider column, that he could bypass the advanced encryption protecting the phone without Apple's help. But he lied in these interviews, he said in an interview with the Daily Dot, to "get a shitload of public attention."
Security

Transmission BitTorrent App Contained Malware (cnbc.com) 109

An anonymous reader writes: Apple users were targeted in the first known Mac ransomware campaign. Hackers targeted Transmission, which is one of the most popular Mac applications used to download software, videos, music, and other data from the BitTorrent peer-to-peer information sharing network. As per this forum post (English screenshot of warning), OS X detected malware called OSX.KeRanger.A. This is the first one in the wild that is functional as it encrypts your files and seeks a ransom. An Apple representative said the company had taken steps over the weekend to prevent attacks by revoking a digital certificate from a legitimate Apple developer that enabled the rogue software to install on Macs.
OS X

BorgBackup 1.0.0 Released (github.com) 64

An anonymous reader writes: After almost a year of development, bug fixing and cleanup, BorgBackup 1.0.0 has been released. BorgBackup is a fork of the Attic-Backup project — a deduplicating, compressing, encrypting and authenticating backup program for Linux, FreeBSD, Mac OS X and other unixoid operating systems (Windows may also work using CygWin, but that is rather experimental/unsupported). It works on 32bit as well as on 64bit platforms, x86/x64 and ARM CPUs (maybe as well on others, but these are the tested ones). For Linux, FreeBSD and Mac OS X, there are single-file binaries which can be just copied onto a system and contain everything needed (Python, libraries, BorgBackup itself). Of course, it can be also installed from source. BorgBackup is FOSS (BSD License) and implemented in Python 3 (91%), speed critical parts are in C or Cython (9%).
Crime

San Bernadino D.A. Says Shooter's Phone Could Harbor "Cyber Pathogen" (theguardian.com) 253

Mr.Intel writes with the Guardian's report that : San Bernadino D.A. has a novel argument for why Apple should be forced to provide the FBI with tools to decrypt the iPhone once used by mass-shooter Syed Rizwan Farook: a "dormant cyber pathogen," he says, could have been unleashed by the county's electronic infrastructure, and only by examining the phone's content can any really be sure. From the article: The questionable claim comes from Ramos's amicus brief in the case, filed with the US District Court on Thursday afternoon. In it, Ramos supports the FBI's argument that Apple should be compelled to build a one-use version of its operating system to load on to the seized phone – used by the mass-murderer, but still technically property of his employer, San Bernardino county – in order to weaken the security and allow the Government to brute-force the shooter's passcode. ... Ramos said: 'The iPhone is a county owned telephone that may have connected to the San Bernardino County computer network. The seized iPhone may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino County's infrastructure and poses a continuing threat to the citizens of San Bernardino County'.
Google

Server Snafu Makes Microsoft Beg For CA Audit Data From Its Partners (softpedia.com) 115

An anonymous reader writes: Microsoft, just like Google, Apple, and Mozilla, is part of the CA/BForum, an organization of web browser vendors and certification authorities (CAs). As a browser vendor, Microsoft maintains a list of authorized CAs and their respective root certificates. According to a message on the CA/BForum, there was an error on the server that was running a CRM application that managed this list of trusted certificates and the adjacent details regarding each certificate and CA. The data is lost forever and Microsoft is now asking CAs to resend their most recent audits. Currently a lot of certs are broken in Edge and IE. Microsoft says that it lost audit data for 147 root certificates, which resulted in many SSL/TLS certificates showing errors inside the company's products.
Desktops (Apple)

Oculus Founder: Rift Will Come To Mac If Apple "Ever Releases a Good Computer" (arstechnica.com) 542

An anonymous reader writes: It's been almost a year now since Oculus announced that the consumer version of the Rift virtual-reality headset would only support Windows PCs at launch -- a turnaround from development kits that worked fine on Mac and Linux boxes. Now, according to Oculus co-founder Palmer Luckey, it "is up to Apple" to change that state of affairs. Specifically, "if they ever release a good computer, we will do it," he told Shacknews recently. Basically, Luckey continued, even the highest-end Mac you can buy would not provide an enjoyable experience on the final Rift hardware, which is significantly more powerful than early development kits. "It just boils down to the fact that Apple doesn't prioritize high-end GPUs," he said. "You can buy a $6,000 Mac Pro with the top-of-the-line AMD FirePro D700, and it still doesn't match our recommended specs."
Government

New Legislation Would Ban US Government From Purchasing Apple Products (arstechnica.com) 296

HughPickens.com writes: Cyrus Farivar reports at ArsTechnica that Congressman David Jolly has introduced the "No Taxpayer Support for Apple Act," a bill that would forbid federal agencies from purchasing Apple products until the company cooperates with the federal court order to assist the unlocking of a seized iPhone 5C associated with the San Bernardino terrorist attack. "Taxpayers should not be subsidizing a company that refuses to cooperate in a terror investigation that left 14 Americans dead on American soil," said Jolly, who announced in 2015 that he's running for Senate, joining the crowded GOP primary field to replace Sen. Marco Rubio. "Following the horrific events of September 11, 2001, every citizen and every company was willing to do whatever it took to side with law enforcement and defeat terror. It's time Apple shows that same conviction to further protect our nation today." Jolly's bill echoes a call from Donald Trump last month to boycott Apple until it agrees to assist the FBI. Not to fear, GovTrack gives Jolly's bill a 1% chance of being enacted.
Electronic Frontier Foundation

EFF On Why FBI Can't Force Apple To Sign Code (boingboing.net) 252

New submitter Kurast writes with this article at Boing Boing: Code is speech: critical court rulings from the early history of the Electronic Frontier Foundation held that code was a form of expressive speech, protected by the First Amendment. The EFF has just submitted an amicus brief in support of Apple in its fight against the FBI, representing 46 "technologists, researchers and cryptographers," laying out the case that the First Amendment means that Apple can't be forced to utter speech to the government's command, and they especially can't be forced to sign and endorse that speech. In a "deep dive" post, EFF's Andrew Crocker and Jamie Williams take you through the argument, step by step. (You can follow along by reading the brief itself (PDF), too.)
Crime

Godfather Of Encryption Explains Why Apple Should Help The FBI (bgr.com) 293

An anonymous reader writes: Famed cryptographer and Turing Award winner, Adi Shamir, has an interesting if not surprising take on Apple's current legal tussle with the FBI. While speaking on a panel at RSA Conference 2016 earlier this week, the man who helped co-invent the vaunted RSA algorithm (he's the 'S' in RSA) explained why he sides with the FBI as it pertains to the San Bernardino shooter's locked iPhone. It has nothing to do with placing trapdoors on millions of phones around the world," Shamir explained. "This is a case where it's clear those people are guilty. They are dead; their constitutional rights are not involved. This is a major crime where 14 people were killed. The phone is intact. All of this aligns in favor of the FBI." Shamir continued, "even though Apple has helped in countless cases, they decided not to comply this time. My advice is that they comply this time and wait for a better test case to fight where the case is not so clearly in favor of the FBI."
Encryption

Amazon Just Removed Encryption From the Software Powering Kindles, Smartphones, Tablets (dailydot.com) 202

Patrick O'Neill writes: While Apple continues to resist a court order requiring it to help the FBI access a terrorist's phone, another major tech company took a strange and unexpected step away from encryption. Amazon has removed device encryption from the operating system that powers its Kindle e-reader, Fire Phone, Fire Tablet, and Fire TV devices. The change, which took effect in Fire OS 5, affects millions of users.

Slashdot Top Deals