Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'ios'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 218 results

  1. MiniTool Mobile Recovery for iOS is a piece of iOS data recovery software. This tool supports recovering lost data, like photos, messages/imessages, contacts, call history, notes and etc files from iPhone (or other iOS devices), iTunes and iCloud backup. MiniTool Mobile Recovery for iOS has three recovery modules: “Recover from iOS Device”, “Recover from iTunes Backup File” and “Recover from iCloud Backup File”. You can choose a proper module according to the actual situation to recover the lost data.MiniTool iOS Data Recovery provides free iPhone data recovery service. No matter your files were lost due to accidental deletion, iOS upgrade failure, factory resettings or white apple, etc.. MiniTool Mobile Recovery for iOS will find and fully restore all files. LINK
  2. Used An iPhone And Social Media Pre-2013? You May Be Due A Tiny Payout Twitter, Instagram, and others are stumping up $5.3m to settle a privacy suit with implications for those who used social-media apps on an iPhone in 2012 or earlier. Given the millions who downloaded the social-media apps in question, it's likely the settlement will result in a very small payment for each individual. Eight social-media firms, including Twitter and Instagram, have agreed to pay $5.3m to settle a lawsuit over their use of Apple's Find Friends feature in iOS. The main problem that complainants had with the accused firms was that their apps, which used Apple's Find Friends, didn't tell users that their contact lists would be uploaded to company servers. The lawsuit alleged the privacy incursions occurred between 2009 and 2012, the year the class action suit began. Instagram, Foursquare, Kik, Gowalla, Foodspotting, Yelp, Twitter, and Path have agreed to pay in to the settlement fund, which will be distributed to affected users via Amazon.com, according to Venture Beat. Yelp had previously argued it was necessary to store user contact lists to enable the Find Friends feature, which consumers understood would occur in the context of using a mobile app. However, US District Judge Jon Tigar countered that the key question was whether Apple and app developers "violated community norms of privacy" by exceeding what people reasonably believe they consented to. "A 'reasonable' expectation of privacy is an objective entitlement founded on broadly based and widely accepted community norms," said Tigar. If the judge approves the settlement, Apple and LinkedIn would be the only remaining defendants among 18 firms originally accused of the privacy violation. Given the millions of people who downloaded these apps, it's likely the settlement will result in a very small payment for each individual. However, people who took part in the class action suit could receive up to $15,000 each. Source
  3. Proton VPN 0.9.5 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.5.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  4. Owners of Android and iOS devices should pay special attention to security updates released by Google and Apple on Monday, as they contain fixes for a series of critical bugs affecting their phone's WiFi component. The issues, discovered by Google Project Zero security researcher Gal Beniamini, affect the Broadcom WiFi SoC (Software on Chip), included with many Android and iOS smartphones, and for which both Google and Apple include custom firmware with their OS. Bugs allow remote hacking of Android and iOS devices According to Beniamini, a stack buffer overflow vulnerability in the Broadcom firmware code allows an attacker in the phone's WiFi range to send and execute code on the device. Depending on the attacker's skills, he can deploy code that takes over the user's device and installs applications without the user's knowledge, such as adware, banking trojans, or ransomware. The possible ways in which these bugs can be leveraged range from evil WiFi spots up to wardriving scenarios. Both companies addressed the issue with updates released on Monday, with Apple releasing iOS 10.3.1, and Google delivering updates via its Android Security Bulletin for April 2017. Beniamini described his findings, in the context of attacking a fully-patched Nexus 6P Android device, in a blog post published today. Broadcom needed four months to patch all issues The iOS and Android RCE attacks are two of ten flaws Beniamini discovered in Broadcom's WiFi SoC firmware. None of these flaws affected the Android and iOS operating systems per-se, but the source code of the Broadcom firmware. Both OS makers had to wait for over four months until the chip maker finally managed to fix all flaws. These security bugs were particularly difficult, both in numbers and complexity, as Broadcom asked Beniamini for an extension to Project Zero's 90-day public disclosure policy so they could finish the patching process. Source
  5. Google and Lookout researchers published a report today revealing the activities of a new Android malware family, which they believe to be the Android counterpart of the Pegasus iOS spyware. After surfacing in 2016, the Pegasus spyware made headlines around the world after it was discovered that this wasn't your ordinary malware but a cyber-surveillance toolkit sold by an Israeli company called NSO Group. Similarly to Italian surveillance vendor HackingTeam, the NSO Group developed Pegasus and sold it to governments and law enforcement agencies across the world, even in countries with dictatorial regimes, where it was used to track down dissidents and journalists. At the time, Pegasus was the most advanced iOS malware ever discovered, using several iOS zero-days to infect and collect data from a victim's iPhone. Initial Pegasus investigation moved to Android ecosystem That investigation, spearheaded by security researchers from Lookout and Citizen Lab, continued after the publication of their Pegasus report. During the fall, as Apple was patching the zero-days used by Pegasus, Lookout researchers reached out to Google and sent over a list of suspicious apps, they thought to be connected with Pegasus and the NSO Group. An investigation from Google revealed a new Android malware family named Chrysaor, very similar to Pegasus. Chrysaor features included: Keylogging features Ability to silently answer phone calls and listen in on conversations (Users see a black screen and if they unlock the phone, the phone call is dropped immediately) Ability to take screenshots of the user's screen Ability to spy on users via the front and rear cameras Usage of the ContentObserver framework to gather any updates to apps such as SMS, Calendar, Contacts, Cell info, Email, WhatsApp, Facebook, Twitter, Kakao, Viber, and Skype Ability to collect data such as SMS settings, SMS messages, call logs, browser history, calendars, contacts, and emails Ability to steal messages from apps such as WhatsApp, Twitter, Facebook, Kakoa, Viber, and Skype Usage of alarm functionality to repeat malicious actions at certain intervals Ability to install itself in the /system folder to survive factory resets Ability to sabotage the phone's self-update features Ability to disable WAP push messages to hinder forensics operations Ability to delete itself when instructed or when the C&C server goes dormant Most of these features could be turned on by both an HTTP request from one of the attacker's C&C servers, but also via an SMS message. Chrysaor was by far the most sophisticated threat researchers encountered. In fact, researchers said Chrysaor was far more complex and full of features when compared to Pegasus. Chrysaor used in targeted attacks Just like Pegasus, Chrysaor was used in a small number of attacks, a clear sign this is an advanced tool deployed only by a few groups in targeted attacks, and not something me and you will ever come across. While the victims are unknown, Google said it identified at least three dozen users infected with Chrysaor. All of them got infected because they installed an app via a third-party app store. Using Android's Verify Apps feature, Google intervened and disabled the apps on the victims' phones. From the samples they found, Google and Lookout researchers say these apps appear to have been compiled in 2014, meaning there's likely more victims than the current headcount, most of which they'll never be able to identify. Most of these victims most likely switched or upgraded phones, and their trail was lost. Based on current data, the vast majority of Chrysaor victims were located in Israel, Georgia, Mexico, and Turkey. Security researchers always knew there was an Android version of Pegasus, based on NSO Group brochures, but until now, they were never able to discover a sample and study its behavior. The NSO Group, which is a licensed cyber-arms dealer, has remained quiet to all accusations of selling surveillance tools to oppressive regimes. The full technical report on Chrysaor is available here. Source
  6. Telegram Is Rolling Out Voice Calls: Secure, Crystal-Clear, Constantly Improved By Machine Learning(AI-Powered) Voice Calls: Secure, Crystal-Clear, AI-Powered Over the past few months, we’ve worked hard to make sure Telegram calls are the best in terms of quality, speed, and security. The wait is over: today we’re rolling out Voice Calls in Western Europe. The rest of the world will get them very soon as well. The Voice Call interface is familiar and easy to use, but as always, you get loads of innovation under the hood with Telegram. Click Here to Watch Video Secure Telegram Calls are built upon the time-tested end-to-end encryption of Telegram's Secret Chats. The key verification UI we came up with in 2013 to protect against man-in-the-middle attacks served well for Telegram (and for other apps that adopted it), but for Calls we needed something easier. That‘s why we’ve improved the key exchange mechanism. To make sure your call is 100% secure, you and your recipient just need to compare four emoji over the phone. No lengthy codes or complicated pictures! Key verification Super-Fast Whenever possible, your calls will go over a peer-to-peer connection, using the best audio codecs to save traffic while providing crystal-clear quality. If a peer-to-peer connection can't be established, Telegram will use the closest server to you to connect you with the person you’re calling in the fastest way possible. Unlike other apps, Telegram has a distributed infrastructure all over the world which we’ve already been using to deliver your texts faster than other apps. Now these servers will also be used for calls. In the coming months, we’ll be expanding our content delivery network around the globe, getting the connection up to light-speed even in remote areas. AI-Powered Each time you make a Voice Call on Telegram, a neural network learns from your and your device‘s feedback (naturally, it doesn’t have access to the contents of the conversation, it has only technical information such as network speed, ping times, packet loss percentage, etc.). The machine optimizes dozens of parameters based on this input, improving the quality of future calls on the given device and network. These parameters can also be adjusted during a conversation if there's a change in your connection. Telegram will adapt and provide excellent sound quality on stable WiFi — or use less data when you walk into a refrigerator with bad reception. According to our tests, Telegram Calls are already superior to any of our competitors on comparable connections. But the quality of Telegram Calls will further improve as you and others use them, thanks to the built-in machine learning. Complete Control If you’re like us, you don’t like to be bothered. On Telegram, you can control who can and who can't call you with granular precision. You can even switch voice calls off altogether, blocking anyone and everyone from calling you. Privacy settings for calls By default, Telegram calls are lightweight and automatically adapt to the speed and type of your connection, so as to consume the least data possible. But if you want to reduce your data spending by another 25-30% at the expense of sound quality, you’re welcome to enable the Use Less Data option in Data and Storage Settings. No Added Calories Telegram is the most powerful messaging platform out there, but it is also famous for being the easiest one to use. We want to keep things this way, and that’s why by default we won’t clutter your screen with additional tabs and redundant buttons. Once you start making calls, Telegram for iOS will offer you to add a dedicated tab for calls on the main screen of the app. Alternatively, you can turn the Calls tab on right away from the Recent Calls section in Settings. On Android, the call tab is accessible via the pull-out main menu on the left. It‘s always easy to make a call, even if you’ve never opened the calls tab. As soon as Voice Calls are enabled for your country, a phone icon will appear on every profile page. On Android, you can also call from the ‘…’ menu in a chat and choosing ‘Call’ on iOS. On Android, the Call button is in the ‘…’ menu at the top. New call button One more thing For those of you who don’t do voice calls, v.3.18 brings something different: direct control over the quality of videos you share. Use this brand-new setting to select the degree of compression before sending a video. For the first time in the history of messaging, you can preview how the recipient will see your video before you send it. Click Here to Watch Video The app will remember the compression rate you selected and will use it by default for your future video uploads. And that‘s it for today. Stay tuned, there’s always more coming! Source Downloads: Telegram Applications Mobile apps Telegram for Android Telegram for iPhone and iPad Telegram for WP Telegram for Firefox OS Desktop apps Telegram for Windows/Mac/Linux Telegram for macOS Web apps Telegram Web-version Telegram Chrome app Unofficial apps Telegram CLI for Linux Source Code Downloads - Source Code
  7. Lots of Android ransomware news this week even though Google feels they are pretty rare. Also some updates to tools created by Michael Gillespie (CryptoSearch & ID-Ransomware), a new RaaS, a new PyCL ransomware being distributed via RIG, and ransomware asking for 6 bitcoin ransoms while making fun of USA sanctions on Russia. Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @fwosar, @malwrhunterteam, @BleepinComputer, @struppigel, @demonslay335, @malwareforme, @jorntvdw, @FourOctets, @DanielGallagher, @campuscodi, @JAMESWT_MHT, @Seifreed, @JakubKroustek, @kafeine, @FreeBSDfan, @rommeljoven17, @BroadAnalysis, @nyxbone, @Malwarebytes, @Google, @zscaler, and @Lookout. If you are interested in ransomware or InfoSec, I suggest you follow them on Twitter. March 25th 2017 CryptoSearch Updated to Support Files Encrypted by Spora Michael Gillespie has updated CryptoSearch so that it now supports files encrypted by Spora Ransomware. New Ransomware called WannaCry GData security researcher Karsten Hahn found a new ransomware called WannaCry. Spanish Ransomware Pretends to be a Windows Update Karsten Hahn found a Spanish ransomware that uses Smart Install Maker and bunch of .vbs scripts to encrypt a computer. When run it pretends to be Windows Update. In-Dev MemeLocker Discovered Karsten Hahn keeps pumping out the new ransomware infections with MemeLocker. This ransomware is in development, but based on its name, I hope we wont see pictures of cats everywhere. March 28th 2017 Unskilled Group Behind Many Junk Ransomware Strains A person or group of malware authors calling themselves "Mafia Malware Indonesia" claimed responsibility for writing a collection of ransomware families that includes threats such as KimcilWare, MireWare, MafiaWare, CryPy, and the recent SADStory and the L0CK3R74H4T ransomware. Yesterday's iOS 10.3 Update Bring Safari Ransomware Campaign to an End According to Lookout, the iOS 10.3 update, released yesterday, has thwarted a screen-locking ransomware campaign that used a bug in mobile Safari to lock users' browsers and demand a ransom paid in iTunes pre-paid gift cards. PyCL Ransomware Delivered via RIG EK in Distribution Test This past Saturday security researchers Kafeine, MalwareHunterteam, BroadAnalysis, and David Martínez discovered a new ransomware being distributed through EITest into the RIG exploit kit. As this ransomware was only distributed for one day and does not securely encrypt files, it makes me believe that this may have been a test distribution run. R Ransomware Discovered R is for Ransomware according to the new ransomware discovered by MalwareHunterTeam. Not sure what the big S is for at the bottom of the ransom page. Skulls are Creepy According to the AnDROid Ransomware MalwareHunterTeam discovered another ransomware today called AnDROid. This ransomware appends the .android extension to encrypted files. Even cooler the skull is animated. Such skillz!! Ransom Hunt Underway for pr0tect Ransomware Michael Gillespie initiated a ransomware hunt for that uses the .pr0tect and drops a ransom note called READ ME ABOUT DECRYPTION.txt. March 29th 2017 Explained: Sage ransomware Malwarebytes explains how Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files offline. The malware is actively developed and currently, we are facing an outbreak of version 2.2. of this product. HappyDayzz Sample Found MalwareHunterTeam found a sample of the HappyDayzz Ransomware. What is interesting about this ransomware is that it uses different encryption algorithms depending on the response from the C2 server. DoNotChange Ransomware Discovered MalwareHunterTeam found a sample of the DoNotChange Ransomware. New RaaS called File Frozr Discovered Rommel Joven discovered a new RaaS called File Frozr. March 30th 2017 Decryptor for the DoNotChange Ransomware Released Michael Gillespie released a decryptor for the DoNotChange Ransomware. Instructions can be found here. Google: Ransomware on Android Is Exceedingly Rare Android apps spreading ransomware aren't as common as most users and security experts think, says Jason Woloz, Sr. Program Manager for Android Security at @Google. CryptoSearch Updated to Support Files Encrypted by FadeSoft Michael Gillespie released an updated version of CryptoSearch that supports files encrypted by FadeSoft. ID-Ransomware can now Identify Files Encrypted by FadeSoft Michael Gillespie added support for FadeSoft identification to ID-Ransomware. March 31st 2017 New Android Ransomware Evades All Mobile Antivirus Solutions Zscaler has spotted a new strain of Android ransomware that could evade detection on all mobile antivirus engines at the time of its discovery. Currently targeting Russian-speaking users, this ransomware lacks basic decryption functionality. This means that users infected with this ransomware version cannot unlock their phones and regain access to their data, even if they pay the ransom. Introducing the Ugly LanRan Ransomware Don't ransomware developers have any pride anymore? This is obviously not apparent with the LanRan ransomware discovered by Karsten Hahn. This ransomware appears to be in-dev as it just sets the background and displays an ugly ransom lock screen. The contact email for this crapsomware is [email protected] New Variant of the Fantom Ransomware MalwareHunterTeam discovered a new variant of the Fantom Ransomware. When I took a look, its quite different then its predecessors. This variant will encrypt files and rename them to a base64 encoded filename with an extension that is based on the time the ransomware started. The extension format is .. An example is Ny5wbmc=.11232323. The ransom note is named in a similar manner with a name like RESTORE-FILES..11232323.hta. It logs the status of the infection process by retrieving one of these two images hxxp://iplogger.ru/1qzM6.gif or hxxp://iplogger.ru/1wzM6.gif. If its detects the user is from Russia, it terminates the process and deletes the infection from the computer. New version of CrypVault Found Karsten Hahn found a new version of CrypVault. This variant tells victims to contact [email protected] Ransom Hunt Underway for Cradle Ransomware Michael Gillespie initiated a ransomware hunt for that uses the extension .cradle and drops a ransom note called _HOW_TO_UNLOCK_FILES_.html. Sanctions Ransomware Makes Fun of USA Sanctions Against Russia If you want to know what some ransomware developers think about the USA, you can get a good idea from the ransom note of the Sanctions Ransomware that was released in March. Dubbed Sanctions Ransomware due to the image in the ransom note, the developer makes it fairly obvious how they feel about the USA and their attempts to sanction Russia. Source
  8. Apple's latest iOS 10.3 release patches a flaw that can be used to repeatedly dial a phone number, accidentally exploited last year to redial 911 call centers, protecting emergency operators from potential cyberattacks. As noted by The Wall Street Journal, the vulnerability was first discovered by an 18-year-old in Arizona who took advantage of a JavaScript flaw in a bid to collect a bug bounty last year. Last October, Meetkumar Hiteshbhai Desai, acting on a tip about a potential iOS flaw, wrote and shared code that caused target iPhones to continually dial 911 emergency call centers. After the code went live, the Surprise, Ariz., Police Department received more than 100 hang-up 911 calls within a few minutes, local publication AZ Central reported at the time. The Maricopa County Sheriff's Office traced the calls and discovered they originated from a link Desai posted to Twitter. Users who clicked the link would find their iPhone automatically dial emergency services. Due to the mass dissemination of the link, call volumes had the potential to shut down 911 services across Maricopa County, the Sheriff's Office said. Desai, when taken in for questioning, said the code was crafted to trigger pop-ups, open emails and dial phone numbers. The Twitter distribution was meant to be funny. He was also interested in proving the flaw could be exploited to collect a bug bounty from Apple. In previous versions of iOS, users who clicked on a phone number linked to in apps like Twitter and Messages would automatically trigger a call. With iOS 10.3, Apple has instituted a secondary confirmation to alleviate the potential for erroneous dialing. The new feature also restricts nefarious users from using the exploit to conduct cyberattacks. By Mikey Campbell http://appleinsider.com/articles/17/03/30/apples-ios-103-fixes-flaw-used-in-accidental-ddos-attack-on-911-call-system
  9. Google Play Store Starts Offering a Free Android App Every Week The first free app is Car Wars-Adventure Time Sadly, it’s only available in the US for now, but we expect Google to offer the new section globally soon enough. The first free app is Card Wars – Adventure Time, a game based on Cartoon Network’s Adventure Time show. The app normally costs $2.99, but Google is offering it for free for a limited time. The game is also available on iOS for the price of $3.99. This isn’t the first time that Google offered such a deal. Back in 2015, the tech giant ran a similar weekly promotion, but later decided against it. Google Play Store runs a similar promotion like App Store Google isn’t the only app store to offer free applications each week. Apple has been running a similar promotion in its App Store, providing iOS users with access to a “Free iOS app of the week” without requiring them to pay. This week’s free iOS app is a video camera and editing app called Musemage, which normally costs $3.99, but users don’t have to pay for it if they download the app this week. Apple offers both productivity and game apps for free each week, and we expect Google to adopt a similar move. Truth be told, the Play Store has lots of free applications and alternatives to paid apps that users can check out, but this is mostly applicable for productivity offerings. When it comes to paid games, there weren't any alternatives to those who don’t wish to use their credit cards when downloading apps. Google recently introduced a new feature that allows developers to run sales on their paid apps or make them available for free for a limited time. Moreover, the tech giant introduced playable ads for Android games and Play Store updates. Source
  10. Most people don’t give much thought to what happens when you connect to your bank’s website or log in to your email account. For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many different steps that are taken to ensure you are safely and securely connecting to the websites that claim they are who they are. This process includes certificate validation, or making sure that the servers that users are connecting to present “identification” showing they are legitimate. This helps to protect users from fraudulent servers that might otherwise steal sensitive information. Due to the sensitive nature of this process, software vulnerabilities that adversely impact the security of certificate validation could have major consequences. Unfortunately, digital systems are complex and bugs are an inevitable reality in software development. Identifying vulnerabilities and responsibly disclosing them improves the security of the internet by eliminating potential attack vectors. Talos is committed to improving the overall security of the internet and today we are disclosing TALOS-2017-0296 (CVE-2017-2485), a remote code execution vulnerability in the X.509 certificate validation functionality of Apple macOS and iOS. This vulnerability has been responsibly disclosed to Apple and software updates have been released that address this issue for both macOS and iOS. By Talos Group http://blogs.cisco.com/security/talos/1703-apple-x509
  11. New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices A new trove of documents belonging to Wikileak’s Vault 7 leaks, dubbed “Dark Matter” reveal that Apple devices including Macs and iPhones have been compromised by the CIA. They are affected by firmware malware meaning that even a re-installation of the operating system will not fix the device. The CIA’s Embedded Development Branch (EDB) have created several tools for exploiting Apple devices, these include: Sonic Screwdriver – allows an attacker to boot its malware from peripheral devices such as a USB stick. DarkSeaSkies – is an “implant” that persists in the EFI firmware of MacBook Air computers. It consists of “DarkMatter”, “SeaPea” and “NightSkies” which affect EFI, kernel-space, and user-space respectively. Triton – macOS malware. Dark Mallet – Triton infector. DerStake – EFI-persistent version of Triton. The documents show that DerStake was at version 1.4 as of 2013, but other documents show that as of 2016, the CIA was working on DerStake 2.0. According to Wikileaks, NightSkies can infect Apple iPhones, the organisation said what’s noteworthy is that NightSkies has been able to infect iPhones since 2008. The CIA documents say NightSkies is a “beacon/loader/implant tool”. It is “expressly designed” to be physically installed onto factory fresh iPhones meaning the CIA has been intercepting the iPhone supply chain of its targets since at least 2008. "Dark Matter" is just the latest release of documents from the wider Vault 7 leaks, more CIA documents are expected in the future. Main Source: Wikileaks Source
  12. Alexa in Amazon app for iOS Amazon’s virtual AI assistant, Alexa is one of the most competitive on the market, as it can be found on Echo speakers and a number of smartphones, including Huawei Mate 9. Now, Amazon decided to make the virtual assistant available to even more users. Amazon app for iOS has just received an update, which includes Alexa. The virtual assistant is now integrated into the app, while the update is expected to rollout in stages, reaching all users in about one week. Alexa can be accessed by tapping on an iPhone’s microphone in the search bar. The virtual assistant answers to questions, helps users with online shopping and plays music upon request. The virtual assistant can be used for accessing books in the user’s Kindle library, as well as songs from Amazon Music Unlimited, Prime Music and purchased songs and albums. Amazon might update its Android app as well Playback controls are featured on the screen when media starts playing and audio will continue to stream, in the background when users dismiss them. Alexa can provide users with updates on the news, weather information and traffic details. Alexa can also help manage smart home devices and seems to give users access to all features that are also found on Amazon’s smart speaker line. At this point, it’s unclear if Alexa will be included in a possible update to Amazon’s shopping app for Android. However, Alexa is making its way to a number of smartphones, including Moto Z, Moto Z Force and Moto Z Play. Last month, Motorola introduced a new Moto Mod modular accessory which offers an enhanced speaker with Alexa integration. The competition in the market of virtual personal assistants is about to become even more heated this month after Samsung launches the Galaxy S8 with its own virtual assistant Bixby. Currently, the market includes such AI assistants like Apple’s Siri and Google Assistant. Source
  13. Smartphone OS sales share The latest Kantar World Panel report reveals market trends in the past period, providing an insight into smartphone OS sales. The study shows that iOS continued to grow in most regions, except for Japan, Spain and Urban China. On the other hand, Android grew in the US, and accounted for 74.3% of smartphone sales, an increase from 72.9% in the three months ending January 2016. iOS recorded a share of 22.7%, while iPhone 7 remained the top-selling smartphone in major European countries. Newly announced Nokia 3, 5 and 6 smartphones are said to leave a mark in European markets, especially since Nokia accounted for 6% of phone sales in EU5 at the start of 2016. It was the fourth largest brand in Great Britain, Germany, France, Italy and Spain. Android dominates the market in Asia with 83.2% of smartphone sold, after increasing 9.3% during the three months period ending January 2017, while Huawei continued to account for over a quarter of smartphone sales at 26.6% for the three months ending January 2017. Apple is the second largest smartphone seller in Asia with 16.6%, but continues to experience year-on-year decline resulted from increased competition from local manufacturers. 70% of the US market is dominated by Apple and Samsung The numbers are quite different in the US, where Android accounts for 56.4% of smartphone sales, down 1.8% from a year earlier. iOS’ share is 42% of sales, up 2.9% year-on-year, while 70% of the US domestic market is dominated by Apple and Samsung, with LG being the third largest manufacturer and accounting for 11.1% of sales. The report mentions that Android and iOS will soon be the only two smartphone ecosystems moving forward, while phone manufacturers will have to adapt in order to remain competitive on the market. In addition, no other mobile OS has the capacity to challenge Android and iOS, and the situation won’t change in the near future. Source
  14. Sticky Password Premium - 1 Year[365 Days] Promo by Comss.ru Overview: Sticky Password Premium is a password Manager that allows you to store your credentials locally or in the cloud, synchronizing them with computers Windows, Mac, Android devices, iPhone and iPad, ensuring that you can create secure passwords and automatically enter them, wherever you are. Sticky Password Premium for Windows can automatically log on to websites and apps, to import data from browsers and other password managers will automatically recognize and store the type of the created web account, create a password and has a dashboard showing all the weak passwords, so the user know where we need to strengthen security. Features: Award-winning password Manager Automatic login and form filling High data security: AES‑256 Support for all platforms Windows, Mac, Android and iOS Cloud sync and backup copy, the local sync via Wi-Fi Annual subscription license with priority support More Info: Product Homepage, Detailed Features, Security, Edition Comparision Supported OS: Windows, Mac OS X, Android 2.3+ and iOS 7.0+. Links: Offer: https://www.stickypassword.com/ru/comss-giveaway Optional Offer: 90% Off on Lifetime Premium License. To avail, visit the offer page and click on the link named "предложение ограничено" below the "Скачайте БЕСПЛАТНО" or "Download now for FREE" button. To change the language, choose from top of the page. Note: Limited Period Offer. Expires by 28 February 2017. Current Status: Open. Terms: The offer is valid for new users Sticky Password and is available until February 28, 2017. You'll receive an annual license for 1 user for home use only. The license can be used for all your devices, including desktops, laptops, smartphones and tablets. You'll receive free updates and technical support during the term of the license. Steps: Visit the above promotional page(Russian) or English(Translated) Click the "Скачайте БЕСПЛАТНО" or "Download now for FREE". Optionally you can use the below link from "Downloads". During installation, login/create an account. Just install the software to activate a yearly subscription. Activation will occur automatically. You will then be able to install the application on the mobile device, using the created account. Downloads: Windows - Giveaway Installer - Size: 29.7 MB: http://download.stickypassword.com/files/campaign/StickyPassword_rev801054_comss1073.exe Mac - Giveaway Installer - Size: 7.6 MB: http://download.stickypassword.com/files/campaign/StickyPassword_rev984_comss1073.dmg Other Downloads: Android App iOS App Note: You need to install either Win / Mac giveaway installer and then use the apps to activate on other devices.
  15. How To Use Facebook Messenger Without A Facebook Account You Can Now Use Facebook Messenger Without A Facebook Account, Know How With over one billion users worldwide, Facebook Messenger is now one of the biggest messaging platforms worldwide. In order to have a Facebook Messenger app on your device, you need to have an active Facebook account. However, there are a lot of reasons that many people may not want to use Facebook but only the Messenger app. For instance, Facebook staples like pyramid schemes, political debates, and pointless status updates can fill some users with rage and using such a social media site is a big no-no for them. Similarly, there are users who are not interested in keeping up with friends online and rather catch up over a cup of coffee or on the phone instead of through liking each other’s perfect social media posts. But, what about those people who want to keep in touch with certain people who are not on any other platform except for Facebook Messenger. In such a scenario, is it possible to use Facebook Messenger app without having an active Facebook account? Yes, it is. You can stay in touch with your friends via Facebook Messenger, by following the steps below: Open Facebook’s deactivate account page. Ignore the photos of the people who will apparently miss you and scroll to the bottom. The last option says you can continue using Facebook Messenger even if you deactivate your account. Make sure this is not checked and just leave it as is. Scroll down and hit Deactivate. Now, your Facebook account will be deactivated. All your Facebook data will be safe until you are ready to log in again. Go ahead and open the Messenger app using your old Facebook credentials on your smartphone or log in via the website on your PC. You will notice that you can continue chatting with all your friends without losing any of your data. Please note that your deactivated Facebook account doesn’t get reactivated, if you are using Messenger. Your friends will only be able to contact you via the chat window in Facebook or the Messenger app. If you want to use Messenger and don’t have a Facebook account, then follow the instructions mentioned below: Download Facebook Messenger on iOS, Android, or Windows Phone. Open the app and enter your phone number. Tap Continue. You will get a code via SMS to confirm your number. Once you have done that you can key in phone numbers of your friends and start messaging them. Source
  16. How to Opt Out of iOS Beta Updates and Reinstall iOS 10.2.1 on Your iPhone/iPad The tutorial also applies to iPod touch devices iOS 10.2.1 is the first point release to the iOS 10.2 series. It received a total of four Beta/Public Beta versions during its entire development cycle since mid-December last year. The last one was seeded only ten days ago. Like many of us running the iOS 10.2.1 Public Beta 4 release, it turns out you'll not receive the final version of iOS 10.2.1, which some will say it's identical with the last Beta, but what if your device is not working properly and you are still experiencing bugs. For example, we found out that, since we've installed the last Public Beta versions of iOS 10.2.1 on our iPhone 6 device, some applications were very slow to load and not so responsive like they used to be. Also, we noticed major battery drains. Removing the iOS Public Beta profile If you're experiencing the same issues on your iPhone, iPad, or iPod touch device, it's time to refresh it by reinstalling the operating system. First off, make sure that you have a recent iCloud backup, or at least a local backup in iTunes. It's time to remove the Public Beta profile (you can always reinstall it at a later time if you still want to use upcoming Beta versions), so open the Settings app, go to General, scroll down to the Profile section and click it. Then, remove the iOS Beta profile by pressing the red "Delete Profile" button. Restoring the device and reinstalling iOS Connect your device to your personal computer, where the latest version of iTunes needs to be installed (make sure you have the latest version installed, 12.5.5 at the moment of writing). With the device connected to your PC, enter DFU mode. Entering DFU Mode is as simple as pressing and holding both the Power and Home buttons on your device until you see the Apple logo on the screen. Release the Power button but keep holding the Home one until the "Connect to iTunes" logo appears. iTunes will soon offer you the option to "Restore and Update" the device. Click the "Restore and Update" button and the application will tell you that iOS 10.2.1 is available. Click OK and let it download the update. Once iTunes completes downloading iOS 10.2.1 from Apple's servers, it will soon begin installing it on your device. You don't have to do anything at this point, just don't touch anything and make sure your computer has enough battery or that it's plugged in. Reset and erase the device to restore it from a backup Just before iOS 10.2.1 finishes installing, iTunes will display a message saying "Congratulations, your iPhone has been unlocked. To set up and sync this iPhone, click Continue." Click the "Continue" button and iTunes will immediately detect your device. At this point, you need to set up your device by pressing the Home button. Choose your preferred language and region. On the next screen, you'll have to connect to your Wi-Fi network. Then, enable the location services, or simply don't. It doesn't matter, because we're going to reset and erase the device anyway, so there's no need to set up Touch ID now. When you reach the home screen, open the Settings app, go to the Reset section and press on "Erase All Content and Settings." Erase your device, which will bring you to the setup screen again. So, this time, make sure that you set up everything correctly, including Touch ID, location services, etc., and, after entering your Apple ID, you can finally choose to restore from a backup. Select the restore method you want (we prefer the iCloud backup) and let your device restore the backup, which can take a few good minutes. Once everything is restored, you can unlock your device and access the home screen. Most of the apps will continue to download and install in the background, so you'll have to wait a little longer for everthing to be exactly like it was before you've started all this. Congratulations, you refreshed your device and have the final iOS 10.2.1 installed, too. Source
  17. Windscribe VPN 1.61 Build 9 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. What's New: https://blog.windscribe.com/windscribe-1-61-changelog-bc07800beb5b#.3mn4dhu3l Changelog: Added ability to select connection port Added LAN proxy support Added speed ratings Added ability to add openvpn params externally Added using custom DNS while disconnected to prevent DNS poisoning Added custom API resolution field to combat advanced DNS poisoning Added “Best Location” to the location list Added connection testing after tunnel initiation Added tooltip for “no p2p” icon Fixed crashing in macOS Sierra Fixed LAN traffic bypass to work with UPnP devices Fixed debug log sender Fixed backup API usage logic Fixed CPU and energy usage Fixed multiple accounts info message Fixed multi-monitor menu placement in macOS Fixed Windows taskbar icon in collapsed mode Enable Base Filtering Engine if its disabled in Windows 7 Changed openvpn config location to a permanent one Changed server list scrollbar to be more visible Changed XPC to sockets in macOS Changed TAP adapter metric on Windows 10 Various stability fixes Downloads: Windscribe for Your Computer: Windscribe for Your Browser: Windscribe for Your Phone: Windscribe for Your Router:
  18. PhoneClean 4 - Full Version - 1 Year[365 Days] Promo by iMobile Overview: Enjoy a cleaner, faster and better iPhone, in almost every way By bringing you the hands-free cleaning, in-depth privacy protection, ultimate speed-up and an array of innovative iOS maintaining features, PhoneClean 4 comes to elevate your iPhone, iPad experience, even at a whole new scale. More Info: Product Homepage Links: Offer: https://www.imobie.de/promotion/2016-weihnachtsgiveaway.htm Note: Limited Period Offer. Page in German. Translated Page here. Current Status: Open. Steps: Visit the offer page link above. Enter name and email in the required fields. Click on "Gratis holen " or "Free get" Check email for license key. Downloads: https://dl.imobie.com/phoneclean-setup.exe More Advent Kalender Giveaways:
  19. EaseUS MobiSaver iOS Pro - Full Version - Single License Promo by EaseUS Links: Offer: EaseUS Adventskalender - Day 5/6. The Advent Calendar can be located from below nsane thread. Shared Key: Note: Limited Period Offer. Offer Period: 24 hours. Visit the link on specified time to grab your key. Current Status - Open. Please activate the program as soon as possible until the end of December 2016. If you have a problem, you can contact us at [email protected] Downloads: http://download.easeus.com/trial/ems_trial.exe More Advent Kalender Giveaways:
  20. Cross-platform development has presented a major challenge for most independent developers for many years. Quite often, it’s simply too much of an time and resource investment to learn a new programming language in order to port your app over to another platform. For years, this fact of resource allocation is what has pushed many developers to primarily focus their efforts on iOS, due to the more lucrative market. Thanks to projects such as Xamarin, however, developers who are familiar with C# have been able to push their projects across iOS, Android, and Windows Mobile. But Android developers are most familiar with writing in Java, so using Xamarin would require a developer to familiarize themselves with a new language and build platform. We’ve covered one project aimed at bridging the gap between mobile operating systems by providing a cross-development platform for Java developers – Intel’s Multi-OS Engine – but there’s no telling where that project is headed. That’s where MechDome comes in. MechDome is a start-up company based in California and incorporated in January that has developed a conversion tool to automatically create native iOS and OS X apps from your Android app. No need to learn how to use a new IDE or API. All you need to do is send an APK file to MechDome (no need to send them your source code), and the fully automated tool will compile a standalone binary in seconds for iOS and OS X that the developer can then distribute on Apple’s App Store. We sat down in an interview with MechDome’s founder and CEO, Mario Kosmiskas, to see a demonstration of the tool in action – and it works. Although there are some limitations due to fundamental differences between how iOS and Android operate (which we’ll discuss below), the tool has already produced a few live apps on the Apple App Store such as the open-source Reddit client RedReader and an open-source Sudoku client to prove it works. MechDome’s biggest promise is that the converted Android app will function in a manner that users of the target OS will be familiar with. For instance, the Android share menu will be replaced with the native share sheet in iOS, and will include the ability to use AirDrop if applicable. Apps that post notifications in Android will instead display a notification in iOS’s Notification Center. Certain intents such as opening a camera on Android will indeed open the camera on the iOS device, and URL intents on Android will call Safari on iOS. Content providers on Android that access contacts or the calendar will instead access the relevant iOS or OS X databases for this information. In general though, all hardware functionality required for the use of an Android app will be mapped directly to use the relevant hardware in iOS. Software functions, though, can be split into 3 distinct categories: 1) functionality that doesn’t exist on iOS (such as the toast message) will be implemented directly, 2) functionality that exists on both iOS and Android are replaced with the relevant iOS method, and 3) functionality that exists on iOS but not on Android (such as Apple’s 3D Touch library) cannot be converted but can be implemented through the use of a library. Most activities, views, services, toasts, and basic content providers should be convertible from Android to iOS, according to MechDome’s founder. But as mentioned previously, there are indeed some limitations to this tool that are imposed by the nature of how iOS works. One of the biggest challenges facing an Android developer looking to convert his or her app to iOS is how to handle a background service. iOS is much more stringent with when and what kinds of background services that third-party applications can run, for better or worse. Furthermore, the rich intent system present in Android that allows for inter-app communication is largely absent on iOS. Finally, the Google Play Services API is currently not supported, so any app relying on Google services will not function. Thus, developers will be mostly limited to functionality that is accessed directly by manual user input, which should not pose a significant problem for most games or apps. MechDome In Use In a private demo, the tool does indeed seem to function as advertised. Mr. Kosmiskas demonstrated compiling several fully functional Android apps into working iOS and OSX apps. Toast notifications, notifications in the Notification Center, webview, location access, text input, and general functionality of UI elements all worked in demo. The AOSP calculator running on iOS looked and functioned exactly as it does on any Android device. Android Apps on iOS with MechDome The stated goal of MechDome is to allow developers to convert an unmodified Android app into a native iOS or OS X app. Compared to technologies such as Intel’s Multi-OS Engine or Xamarin, an Android developer does not need to know how to bind an Objective-C library because the tool will handle that for you. Nor is there any need to use a UI builder to modify your Android app, as MechDome handles converting all Android UI elements. Yes, even Android tablet apps translate nicely into a format suitable for iPads. Updating an application and re-compiling it for iOS was also shown, and the process fairly simple. The developer, in this case Mr. Kosmiskas, demonstrated changing a text box to display “XDA-Developers” in Android Studio. He then exported the app, generated a signed APK, and compiled the iOS and OS X binaries in seconds from the MechDome server. When the iOS app was started using an emulator, the changes made in Android Studio were present. Currently, MechDome is undergoing a free public beta program. Developers can register their app on the MechDome website to receive an invite to test converting their Android app. No pricing information has yet been unveiled for the service, unfortunately. Still, it’s an interesting project to stay on the lookout for if you’re an Android developer looking to eventually make waves in Apple’s ecosystem without having to expend much effort of your own. Source
  21. Apple’s Newly Released iOS 10 Has Hardcore Porn Hiding In It (NSFW) iOS 10 has actual hardcore porn GIFs in iMessage You couldn’t have expected this from Apple. Its newly released iOS 10 operating system seems to be hiding real porn inside. iOS 10 has a new GIF search feature to help iPhone users post GIFs directly into iMessage. But somehow, hardcore porn seems to be baked into the same. If you type the word “butt” into iOS 10’s new, baked-in GIF search, it leads you to a certain My Little Pony in a fairly compromised position. The issue was first noticed by Deadspin who noted down in a blogpost. Deadspin says that Apple immediately fixed the butt search issue but the iOS 10 Porn problem persists. For example, if you type in “huge” into the new GIF feature, and you’ll find an unpixelated version of this: It seems that the Apple engineers have somehow baked in NSFW hardcore porn into iOS 10’s new messaging App. Another woman emailed The Verge explaining a similarly embarrassing situation. She said that her eight-year-old daughter while trying to send a message to her dad, was presented with “a very explicit image” of “a woman giving oral sex to a well-endowed male.” Her daughter had also searched for “huge”and got the image shown above. The lady, Tassie Bethany was contacted over the phone by Verge and she told them, “I see the image come up like, holy shit, whoa whoa whoa, that’s a hardcore porn image.” “I grabbed the phone from her immediately. She typed in the word ‘huge,’ which isn’t sexual in any nature. It’s just a word, not like butt or anything else,” she added. Apple has been particularly strict with sexual content up to now but it seems to have slipped up with the new GIF search built into iMessage in iOS 10. It’s quite usual for any search to throw up NSFW results if you search for words like “boobs” and “penis” and “butt, ” but it’s a real problem for porn to slip through for an otherwise normal term like “huge.” Other iOS 10 users have also reported seeing NSFW images but not something as explicit as the result for “huge.” Apple is still to respond to the iOS 10 porn search issue, however, it fixed the “butt” issue within 10 hours after Deadspin’s blogpost while searches for “huge” have already been banned. Bethany says her daughter is fine — “she had no idea” — but she’s concerned about the possibility of other kids being accidentally exposed to porn through what’s supposed to be a goofy feature. “My daughter uses it because there’s cartoons and fart jokes, that kind of stuff,” she told Verge. “That’s hardcore porn. People making out she might see on ABC. That’s something that could potentially be pretty traumatizing for a small child.” It looks like Apple has a big big porn problem in its hands. Source
  22. Opera VPN Launches For Android Opera Software released its free VPN application for Android today after making it available to iOS devices earlier this year. The company's journey as a VPN provider started with its acquisition of SurfEasy VPN. Opera Software promoted services of SurfEasy shortly thereafter in the Opera desktop browser, and launched a free browser proxy back in April 2016. The iOS application followed in May, and today saw the release of the Android application. Opera VPN for Android is a VPN client that is free to use. It is provided by SurfEasy, an Opera company. Tip: Check out the privacy policy and terms of use before you start using the service. Basically, what it states is that you may not use it to break the law or the rights of others, that the service may be limited, modified or discontinued at any time, and that you may be contacted for limited marketing purposes. Opera VPN for Android Installation of the application is straightforward. Since it is a VPN, you will receive a request to set up a VPN connection on the device. You must accept it or won't be able to use the service at all. The app displays a short introduction to the features that it makes available. Basically, it offers three features that you may activate from within the app: Connect to the VPN network. Opera VPN connects to the closest region automatically, but displays options to switch the region once connected. Regions that were available during the test were Canada, USA, Netherlands, Germany, and Singapore. Wi-Fi Security. You may use this feature to test the security of the wireless network your Android device is connected to. Opera VPN displays the name of the WLAN and its ID, and whether it is protected or not on the screen. The test performs additional look ups and awards a security score at the end (one when connected regularly, and one when connected to Opera VPN). Guardian. Guardian can be activated to block ad trackers when you are online. The connection speed was quite good during tests but mileage may vary based on the location you connect to the service, the region you connect to, load at that time and other factors. A quick test playing videos on YouTube and other services showed that playback was fluent and without buffering issues or other issues. Since it is a VPN app that runs in the background, all applications you use tunnel their traffic through it. Closing Words Opera VPN is a free VPN app for Android that does not look that different than other free VPN apps for Android. The inclusion of the WiFi security test -- with the foreseeable result that the connection is more secure when you use Opera VPN -- and the system-wide tracker blocker are nice to have features. If you trust Opera Software, there is little reason not to use the company's VPN applications as well. Paid solutions on the other hand offer better privacy, whereas other free solutions usually don't. Source
  23. Spyware Sold to Governments Behind Recent iOS Zero-Days Apple fixes three zero-days used by Pegasus spyware According to the two organizations, the zero-days were part of a software suite called Pegasus, developed and sold by Israeli company NSO Group to governments around the world, which deployed it against targets of interest. Pegasus, described as surveillance software developed for law enforcement agencies, is nothing different from spyware developed and sold on underground hacking forums. Governments, security vendors, and news agencies knew of Pegasus and NSO's existence for many years, but the company has always been outshined by its more powerful competitors, Gamma Group, which sells FinFisher, and HackingTeam which sells the RCS surveillance package. Apple patched zero-days that enabled Pegasus spying features Apple released a fix today to address Pegasus features that allowed it to spy on iOS users without them ever being aware. These features were powered by three zero-days that allowed a remote attacker to compromise iOS devices by fooling a victim into accessing a malicious website. Once the zero-day exploit code was executed, the attacker would use the Pegasus software to control the victim's iPhone or iPad. According to Lookout, the attackers had full control over the device, and could exfiltrate data, listen on conversations via the microphone, detect the user's GPS position, follow IM conversations, and many more others. Zero-Day Description Exploit Capability CVE-2016-4655 Information leak in Kernel – A kernel base mapping vulnerability that leaks information to the attacker allowing him to calculate the kernel’s location in memory. An application may be able to disclose kernel memory CVE-2016-4657 Kernel Memory corruption leads to Jailbreak – 32 and 64 bit iOS kernel-level vulnerabilities that allow the attacker to silently jailbreak the device and install surveillance software. An application may be able to execute arbitrary code with kernel privileges CVE-2016-4658 Memory Corruption in Webkit – A vulnerability in the Safari WebKit that allows the attacker to compromise the device when the user clicks on a link. Visiting a maliciously crafted website may lead to arbitrary code execution "Pegasus is the most sophisticated attack we’ve seen on any endpoint because it takes advantage of how integrated mobile devices are in our lives and the combination of features only available on mobile," the Lookout team explained. A further, in-depth analysis of Pegasus also revealed traces of a kernel mapping table that has values that target previous iOS version, way back to iOS 7, meaning the spyware was used for years without being detected until this past month. Meet Ahmed Mansoor, the most spied on activist in the world One of the people targeted with Pegasus, and the one that detected something wrong and led to the discovery of the three zero-days, was Ahmed Mansoor, a human rights activist from the United Arab Emirates (UAE). Coincidentally, Mansoor was also targeted in the past with both FinFinsher and RCS spyware. As such, he was able to quickly recognize a phishing lure he received via SMS, which promised new details about torture practices in the UAE. Mansoor forwarded the SMS messages to Citizen Lab, an investigative interdisciplinary laboratory at the Munk School of Global Affairs at the University of Toronto, Canada, specialized in political cyber-espionage. Pegasus software also sold to Mexico and Kenya Recognizing the sophisticated campaign behind this SMS message, Citizen Lab brought in Lookout to investigate the technical side of the attack. Lookout discovered the three zero-days, while Citizen Lab connected the zero-days to the Pegasus software and the NSO Group, an Israeli company bought by US firm Francisco Partners in 2014. Citizen Lab tracked down the Pegasus software and discovered export licenses for various governments. The organization tied NSO's Pegasus suite used against a Mexican journalist who uncovered corruption by Mexico's President, and a few attacks against unknown targets in Kenya. "While these spyware tools are developed in democracies, they continue to be sold to countries with notorious records of abusive targeting of human rights defenders," the Citizen Lab team explains. "Such sales occur despite the existence of applicable export controls." Lookout provides a technical look at the three iOS zero-days fixed in iOS 9.3.5 in its report, while Citizen Lab's report focused on the morals and political background behind these recent attacks. Source
  24. Apple releases 'important security update' for iPhone after spyware discovery The patch comes after the discovery of spyware circulating in the Middle East. Apple has released a security fix for iPhones and iPads following the discovery of malware targeting the platform that was found circulating in the Middle East. The iPhone and iPad maker released the patch, iOS 9.3.5, on Thursday, calling it an "important security update". The patches fix three vulnerabilities, dubbed "Trident" by security firm Lookout, which could be used to access the device's location, read contacts, texts, calls, and emails, as well as turn on the device's microphone. The company said that spyware that exploited the vulnerabilities were developed by an Israel-based company specializing in zero-day exploits. Citizen Lab explained in a blog post that it had uncovered an operation by the security services of the United Arab Emirates to try to get into the iPhone of a renowned human rights defender, Ahmed Mansoor. The Canada-based security lab said that the UAE, which has long been criticized for its poor human rights record, could turn an affected iPhone into "a sophisticated bugging device", adding: "They would have been able to turn on his iPhone's camera and microphone to record Mansoor and anything nearby, without him being wise about it. They would have been able to log his emails and calls -- even those that are encrypted end-to-end. And, of course, they would have been able to track his precise whereabouts," said the blog post. Lookout said that the flaws included a memory corruption flaw in WebKit, which would let an attacker exploit a device when a user clicks on an affected link. Two other kernel vulnerabilities would let an attacker jailbreak the device, and then the attacker can silently install malware to carry out surveillance. Apple fixed the vulnerabilities within 10 days of being informed by Citizen Lab and Lookout. A spokesperson for Apple said in an email to ZDNet: "We advise all of our customers to always download the latest version of iOS to protect themselves against potential security exploits." Users can install the update over the air through the phone or tablet's settings. Source
  25. Upcoming iPhones Could Collect Fingerprints and Photos of Thieves Apple is working on enhanced security tools Apple filed a patent application for a method of storing biometric information of an unauthorized user, so that smartphone security would be enhanced. The patent surfaced over at Patently Apple and it will apparently make it very easy for authorities to identify thieves. iPhones will be able to capture pictures and record videos of thieves, as well as collect their fingerprints. The patent states that the feature could be triggered by repeated failed attempts to unlock the device or if the phone owner enables protections using Find My iPhone feature from another device. The patent also mentions that smartphones will be able to capture more than one fingerprint, photo or video of the thief, as well as audio files, forensic interface use information and more. Apple also offers Activation Lock and Find My iPhone security features This new feature would join all other tools that Apple has for helping users find their phones. The Find My iPhone feature helps users mark their devices as lost and their locations tracked, so that they could have a strong chance at recovering them. Aside from this, Apple also offers Activation Lock feature that doesn't allow anyone to reset smartphones without the approval of the owner using their Apple ID and password. Apple also offers its users the option to remotely wipe phones in case of loss or theft or to secure information using high end encryption. One must take into consideration that smartphone manufacturers often patent various projects and ideas, but that doesn't necessarily mean that they will be implemented into future products. However, considering that this is a security feature, Apple would have all the more reasons to actually incorporate this tool into its devices. Source