Showing posts with label iOS. Show all posts
Showing posts with label iOS. Show all posts

Tuesday, April 4, 2017

Update your iPhone to avoid being hacked over Wi-Fi

It’s only been five days since Apple’s last security update for iOS, when dozens of serious security vulnerabilities were patched.
As we mentioned last week, the recent iOS 10.3 and macOS 10.12.4 updates included numerous fixes dealing with “arbitrary code execution with kernel privileges”.
Any exploit that lets an external attacker tell the operating system kernel itself what to is a serious concern that ought to be patched as soon as possible – hesitation is not an option.
After all, it’s the kernel that’s responsible for managing security in the rest of the system.


Take this analogy with pinch of salt, but an exploit that gives a remote attacker regular user access is like planting a spy in the Naval corps with a Lieutenant’s rank.
If you can grab local administrator access, that’s like boosting yourself straight to Captain or Commodore; but if you can own the kernel (this is not a pun), you’ve landed among the senior Admiral staff, right at the top of the command structure.
So make sure you don’t miss the latest we-didn’t-quite-get-this-one-out-last-time update to iOS 10.3.1:
iOS 10.3.1

Released April 3, 2017

Wi-Fi

Available for: iPhone 5 and later, 
               iPad 4th generation and later, 
               iPod touch 6th generation and later

Impact:        An attacker within range may be able to 
               execute arbitrary code on the Wi-Fi chip

Description:   A stack buffer overflow was addressed 
               through improved input validation.

CVE-2017-6975: Gal Beniamini of Google Project Zero
This is rather different from the usual sort of attack – the main CPU, operating system and installed apps are left well alone.
Most network attacks rely on security holes at a much higher level, in software components such as databases, web servers, email clients, browsers and browser plugins.
So, attacking the Wi-Fi network card itself might seem like small beer.
After all, the attacks that won hundreds of thousands of dollars at the recent Pwn2Own competition went after the heart of the operating system itself, to give the intruders what you might call an “access all areas” pass.
Nevertheless, the CPU of an externally-facing device like a Wi-Fi card is a cunning place to mount an attack.
It’s a bit like being just outside the castle walls, on what most security-minded insiders would consider the wrong side of the moat and drawbridge.
But with a bit of cunning you may be able to position yourself where you can eavesdrop on every message coming in and out of the castle…
…all the while being ignored along with the many unimportant-looking peasants and hangers-on who’ll never have the privilege of entering the castle itself.
Better yet, once you’ve eavesdropped on what you wanted to hear, you’re already on the outside, so you don’t have to run the gauntlet of the guards to get back out to a place where you can pass your message on.

What to do?

As far as we know, this isn’t a zero-day because it was responsibly disclosed and patched before anyone else found out about it.
Cybercrooks have a vague idea of where to start looking now the bug that has been described, but there’s a huge gap between knowing that an exploitable bug exists and rediscovering it independently.
We applied the update as soon as Apple’s notification email arrived (the download was under 30MB), and we’re happy to assume that we’ve therefore beaten even the most enthusiatic crooks to the punch this time.
You can accelerate your own patch by manually visiting Settings | General | Software Update to force an upgrade, rather than waiting for your turn in Apple’s autoupdate queue.

Friday, October 16, 2015

iOS still does app privacy better than Android

There's not a lot new in Android 6.0 Marshmallow, which is now slowly making its way onto Android smartphones and tablets. Google characterizes Marshmallow more as an under-the-hood effort to improve system performance and stability. But one of the key new features for users is the ability to manage the privacy settings of applications.
How do Marshmallow's privacy controls compare to iOS's?
For several versions, Android has shown users what data and services an app wants to use when the app is installed, but you could only accept or reject them all. Also, you could not deactivate permissions (such as to your contacts or camera) later.
There's not a lot new in Android 6.0 Marshmallow, which is now slowly making its way onto Android smartphones and tablets. Google characterizes Marshmallow more as an under-the-hood effort to improve system performance and stability. But one of the key new features for users is the ability to manage the privacy settings of applications.
How do Marshmallow's privacy controls compare to iOS's?
For several versions, Android has shown users what data and services an app wants to use when the app is installed, but you could only accept or reject them all. Also, you could not deactivate permissions (such as to your contacts or camera) later.
If you want to see all the apps that use a specific type of data or resource, here's how: In the Settings app, tap App, then tap the Settings icon (the gear) to open the Configure Apps screen. Normally, you use the More menu (via the ... icon) in Android for accessing additional features, but in this case you use Settings. In the Configure Apps screen, tap App Permissions to get a screen that shows each permission. Tap a permission, as you would in iOS's equivalent but more accessible screen, to see and manage which apps use those permissions. It shouldn't be that hard to find.
Of course, a diligent user will eventually find that obtuse path or go into each app's settings in Android Marshmallow and check into every permission. (iOS lets you work that way too; if you tap an app in Settings, you can see its privacy permissions and adjust them.) But Android's approach is also more apt to let apps get more access to your private data and system services than you'd like or realize.

Monday, August 17, 2015

Mcommerce fraud rate higher on Android devices

Mobile commerce fraud rate is higher on Android devices, a recent report points out.

According to data from Kount, a provider of fraud detection technology, instances of fraud on Android devices was 44% higher than on iOS devices in 2014. The same source mentions that until 2013, fraud on iOS devices was more frequent than on Android, but currently, this has significantly changed.
Findings indicate that Android’s US platform share has increased substantially since 2013. Android’s US platform share increased from 51.5% in June 2013 to 66.1% in June 2015, according to Kantar Worldpanel, while iOS's share declined from 42.5% to 30.5% during the same period. Fraud likely occurs on Android more often than iOS because there are now more Android devices.
The report has also unveiled that mobile fraud will intensify compared to online and in-store. Research shows that merchants have a blind spot when it comes to mobile. In 2014, the share of organizations that believed mobile was far riskier than other forms of commerce was only 15%, and most see it as “just as risky” or “less risky” than standard commerce. A prevailing belief that mobile behaves similarly to other channels could reduce a sense of urgency among merchants to tighten their mobile security, which could invite further fraud.
The study mentioned that fraud moves to the weakest channel. As in-store security tightens, fraud is moving online, and mobile is quickly emerging as the new target. Mobile fraud increased 81% between 2011 and 2015 to date. Meanwhile, non-mobile fraud decreased 50% from 2011 to 2014, and an additional 50% in the first six months of 2015. Increased EMV penetration and digital identity verification will continue to push fraud out of the stores and onto digital channels, of which mobile is the most vulnerable.
via paypers

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes