Do you know how to ride a bicycle? It's easy, isn't it?
But do you remember how hard it turned out to be when you first tried? Who would have thought?
We often forget that many things are "obvious" only with experience, meaning, in fact, that they're not really obvious at all. That's why we do phishing walkthroughs fairly regularly on Naked Security. The idea is to step you through a typical email phish, pointing out the telltale warning signs in the original email and the web pages that follow, so you know what to look for in future.
We’re probably less than two months away from the announcement of the iPhone 6, but if you just can’t wait another minute to tell your fanboy friends that you’ve already pre-ordered the 6, luxury retailer Brikk is ready to accept your pre-orders. But it’s going to set you back at least $4,495.
Developers have been toying with the beta of OS X Yosemite since Apple announced the operating system at WWDC in June. Unfortunately for the rest of us, we have to wait (im)patiently until Yosemite launches officially this fall. Unless you signed up for Apple’s public OS X Yosemite beta program, in which case tomorrow is your lucky day.
OS X users who sign up for this program, which was also announced at WWDC, get access to the beta early without needing a developer account. And beta access will ship Thursday, July 24th.
Information security has never been a more sensitive subject than it is these days, so it’s little surprise that allegations from a security researcher that iOS contains a ‘backdoor’ permitting access to users’ information provoked a strong response from Apple.
A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.
Jonathan Zdziarski, a researcher who often trains federal and state law enforcement agencies in forensic techniques, revealed the existence of the mostly hidden features. The data-stealing avenues have evolved over the last few years and may have been used by the U.S. National Security Agency to collect data on potential targets, Zdziarski said.