An Israeli company that makes software for breaking into mobile devices including iPhones, has been publicly shamed by cryptographer Moxie Marlinspike, the creator of the Signal messaging app, who exposed poor security in the software which the company uses.
The Australian firm Azimuth Security was responsible for hiring a researcher who succeeded in gaining access to an iPhone 5C used by a terrorist in the US in 2015. The incident led to a well-documented stoush between Apple and the FBI in 2016.
Israeli firm Cellebrite, widely believed to be the company that helped the FBI gain access to the iPhone of a terrorist in 2016 after Apple refused to bow to the crime agency's demands, has advertised its latest wares as being able to break into systems running iOS 12.3 and also recent Android phones.
A feature in version 11.4.1 of iOS — known as USB Restricted Mode — will disable the Lightning port after an hour of the device being unlocked, but it can be bypassed for now, a researcher claims. The new version has just been released.
A new feature in iOS 11.4.1 beta will disable the Lightning port after an hour of the device in question being unlocked, as claimed by a researcher last month, with the only difference being how long it would take for this to happen. Version 11.4 was announced at Apple's Worldwide Developers Conference in California on Monday.
A new feature in iOS 11.4, which is expected to be released in the next few weeks or even sooner, disables the Lightning port after seven days of the device in question being unlocked, and is aimed at preventing device acquisition by law enforcement, a researcher claims.
A company known as Grayshift based in Atlanta, Georgia, is selling a device called GrayKey which can be used to unlock iPhones — even the latest 8 series and the X model — a security company claims.
A forensics expert from the FBI has lashed out at Apple, calling the company's security team a bunch of "jerks" and "evil geniuses" for making it more difficult to circumvent the encryption on its devices.
A court in the US has ensured that the public will never know whom the FBI contacted to gain access to data on an iPhone 5C belonging to a terrorist or how much the agency paid for the job.
An employee of the Australian Taxation Office has published information obtained from the Israeli firm Cellebrite online, detailing ways of breaking into mobile phones.
A Democrat senator in the US has revealed that the FBI paid a private company US$900,000 to break the encryption on an iPhone 5C that had been owned by one of the terrorists involved in an attack in San Bernardino, California, in December 2015.
I agree. Not much new in these devices these days, but there is a big market out there for the[…]
Copying Samsung, which also has a A3x, A5x, A7x, A9x line up at similar price points.
Has Jennifer put the Dud in Dudley-Nicholson?
The problem lies with so-called pundits who are trying to push a particular line and do not bother to verify[…]
If disinformation about the 2016 USA election was bad then the disinformation about the 2020 election was a disaster.The problem[…]