Printer of Doom
via Corey Nachreiner, CISSP and Director of Security Strategy for WatchGuard Technologies.
via Corey Nachreiner, CISSP and Director of Security Strategy for WatchGuard Technologies.
Evidently, crank developers are now targeting Cupertino, California based Apple, Inc.'s (NasdaqGS: AAPL) decision to out the utilization of location data by apps resident on iOS devices, even when an app is not running...
The company's own apps require authorization as well; perhaps the coming singularity is slowing down, just a tad, mind you... Certainly a contrarian view.
Much ado about something, nearly a quarter century in the offing, and further evidence to support our Theory of Cruft, or the Things that are Left Over, and Getting in the Way...
Ladies and Gentlemen, Girls and Boys, here's why Apple Inc. (NasdaqGS: AAPL) iOS 8.x driven devices are marginally better for privacy concerns: Rotating (Programmatic MAC Spoofing) Media Access Control addresses. Today's MustRead; whilst, another view of tracking iOS devices has surfaced.
Newly discovered BASH vulnerability finds Apple Inc.'s (NasdaqGS: AAPL) MAC OS X operating system with it's shell environment cracked; of course, this pernicious bug also finds its way into most Linux and/or other Unix-like and UNIX systems. Interestingly, there are workarounds and patches available for the version of BASH resident on your OS X systems. If you look hard enough, there is a workaround in the StackExchange article (linked to above).
Cogitate thrice upon updating newly released software with newly released patches to fix newly discovered bugs, as evidence of cruft...
Since early youth, I have been enamored of all things elephantine...
via MacDrifter's Gabe, revealing les couilles of the developers of SwiftKey. Evidently, a very popular iOS 8's key logger, for sale on the AppStore, mon Dieu.
News, via Paul Rubens writing at eSecurity Planet, of the apparent resurfacing of the TrueCrypt project, this time, with more eyes on the prize, so to speak. Look for a resurrected TrueCrypt 7.1a code-base with a new re-branded name: CipherShed. Hat Tip to Firewall Consultants.
Outstanding screed, penned by Andrew Metcalf and Christopher Barber, and published via Small Wars Journal, details, perhaps for the first time publicly, a well-reasoned, rational and deployable methodology focused on tactical work within the electronic warfare realm. Entitled 'Tactical Cyber: How to Move Forward' and deemed today's' MustRead. If by chance, you examine any document today, read Messrs. Metcalf and Barbers' output...
iOS 8, that is... Apparently, Apple Inc.'s (NasdaqGS: AAPL) soon-to-be-released iOS 8, shows' evidence of significant attack surface minimization (e.g., File Relay, also known as com.apple.mobile.file_relay - the service that permits data egress via WiFi is now protected from, at least, easy attacks) . Jonathan Zdziarski's white paper informs us of the necessity to curtail iOS paths of data exfiltration, and such. Today's Must Read.
"File Relay (com.apple.mobile.file_relay) was the service responsible to causing the biggest potential privacy threat, by dumping large amounts of personal data from the device and bypassing the user’s backup encryption password. The file relay service is now guarded. While the service still exists, all attempts to extract data from it will fail with a permission denied error" -via the Jonathan Zdziarski Blog
The Boeing Company (NYSE: BA), brings the astonishing capability to add 10KW+ of photonic energy to the warfighter's arsenal; now, with the functionality to lase in high particulate per square meter fog. A development effort between The Boeing Company and the United States Army Space and Missile Defense Command (SMDC), and monikered the HEL MD, will surely be miniaturized, dependent of course, upon physics for it's size and the device's coefficient of energy.