An Israeli company that makes software for breaking into mobile devices including iPhones, has been publicly shamed by cryptographer Moxie Marlinspike, the creator of the Signal messaging app, who exposed poor security in the software which the company uses.
The Australian firm Azimuth Security was responsible for hiring a researcher who succeeded in gaining access to an iPhone 5C used by a terrorist in the US in 2015. The incident led to a well-documented stoush between Apple and the FBI in 2016.
Israeli firm Cellebrite, widely believed to be the company that helped the FBI gain access to the iPhone of a terrorist in 2016 after Apple refused to bow to the crime agency's demands, has advertised its latest wares as being able to break into systems running iOS 12.3 and also recent Android phones.
A feature in version 11.4.1 of iOS — known as USB Restricted Mode — will disable the Lightning port after an hour of the device being unlocked, but it can be bypassed for now, a researcher claims. The new version has just been released.
A new feature in iOS 11.4.1 beta will disable the Lightning port after an hour of the device in question being unlocked, as claimed by a researcher last month, with the only difference being how long it would take for this to happen. Version 11.4 was announced at Apple's Worldwide Developers Conference in California on Monday.
A new feature in iOS 11.4, which is expected to be released in the next few weeks or even sooner, disables the Lightning port after seven days of the device in question being unlocked, and is aimed at preventing device acquisition by law enforcement, a researcher claims.
A company known as Grayshift based in Atlanta, Georgia, is selling a device called GrayKey which can be used to unlock iPhones — even the latest 8 series and the X model — a security company claims.
A forensics expert from the FBI has lashed out at Apple, calling the company's security team a bunch of "jerks" and "evil geniuses" for making it more difficult to circumvent the encryption on its devices.
A court in the US has ensured that the public will never know whom the FBI contacted to gain access to data on an iPhone 5C belonging to a terrorist or how much the agency paid for the job.
An employee of the Australian Taxation Office has published information obtained from the Israeli firm Cellebrite online, detailing ways of breaking into mobile phones.
A Democrat senator in the US has revealed that the FBI paid a private company US$900,000 to break the encryption on an iPhone 5C that had been owned by one of the terrorists involved in an attack in San Bernardino, California, in December 2015.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]