Tag Archives: iOS

1-15 February 2015 Cyber Attacks Timeline

I was delivering to Anthem the very unwelcome prize for the first massive breach of 2015, when the Operation Carbanak has brought an unexpected tail to this first half of February.

These two events have undoubtedly characterized this timeline and overshadowed all the others: on one hand, a massive cyber attack (allegedly carried on by Chinese hackers) targeting one of the largest US ensurers, able to scoop up 80 million records. On the other hand, a sophisticated long lasting campaign, stealing more than $300 million on 100 banks in 30 nations.

read more

16-30 September 2014 Cyber Attacks Timeline

And finally we can complete the September 2014 Cyber Attacks Timeline (Part I here), with the second part covering the most important events between the 16th and the 30th.

A very fruitful month for Cyber Criminals, since there are several events that will be remembered. For sure the Shellshock vulnerability will spoil the troubled sleeps of many System Administrators. In any case this is not the only remarkable event, the chronicles report of an (un)expected tail of the Celebrity Leak scandal (the so-called Fappening), with other two rounds of leaked pictures occurred on the 20th and the 26th, and a couple of massive breaches against TripAdvisor subsidiary Viator (1.4 million users affected) and Japan Airlines (750,000 users affected). Last but not least, it is also worthwhile to mention the group of teen hackers charged for hacking into Microsoft, the US Army and several game companies, stealing $100 million in Intellectual Property, and the so-called Operation Harkonnen, the longest cyber crime campaign ever.

read more

Antisec Steals 12M Apple Device IDs from FBI (Exploiting a Java Vulnerability) UPDATED

Update 4 Sep 23:38 GMT+2: The FBI issued a tweet denying that it ever had the 12 million Apple IDs in question:

[tweet https://twitter.com/FBIPressOffice/status/243089221529763840 align=’center’]

Here the complete Statement from the FBI Press Office.

read more

Breaking: First Known Detection of Carrier IQ in Italy

Update December 13: Carrier IQ issued an updated statement, new concerns for an endless saga…

I am proud to post here the first known detection in Italy of the infamous Carrier IQ software!

As you will probably know, everything started on Nov. 28, on the other side of the Atlantic, when Trevor Eckhart, an Android developer posted a video on YouTube showing the hidden software Carrier IQ interacting oddly with his mobile phone activity. Eckhart subsequently alleged his keystrokes and data were being collected without his permission.

read more

Mobile Antiviruses: Malware Scanners or Malware Scammers?

Few days ago Juniper Networks has released a report on the status of Android Malware. The results are not encouraging for the Android Addicted since they show a 472% increase in malware samples since July 2011 (see the infographic for details).

This does not surprising: already in May in its annual Malicious Mobile Threats Report, report, Juniper had found a 400% increase in Android malware from 2009 to the summer of 2010. This trend is destined to further grow since the Juniper Global Threat Center found that October and November registered the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28%. whilst October showed a 110% increase in malware sample collection over the previous month and a noticeable 171% increase from July 2011.

read more

First Security Breach In The App Store

It looks like the Judgment Day for iOS has finally arrived. Until today the robustness of the AppStore has always been considered one of the strengths of the Apple Model: unlike the Android Market, which is constantly under attack for its weak security model that allowed too many malicious users to upload malicious applications, a strict control policy had prevented, at least so far, the same destiny for the mobile Apple Application.

read more

The Dangerous Liaisons (Updated)

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the $ 4.5 billion auction to buy 6,000 Nortel patents by the consortium formed by Apple, Microsoft, Research in Motion, Sony Ericsson and EMC was so cruel. You may also easily understand why Google, the loser of the Nortel auction, decided to react immediately acquiring Motorola and its patent portfolio made of more than 17,000 approved patents (and another 7,500 patents filed and pending approval) for the large sum of $ 12.5 billion.

read more

Grab Your Data? There’s An App For That!

The news of the day is undoubtedly the discovery that Apple devices are a bit ‘too nosy’ and regularly record the position of the device into a hidden (!!) unencrypted and unprotected file.

The unwelcome and serendipitous discovery, which was announced today at Where 2.0, has been performed by two researchers, Alasdair Allan and Pete Warden, while they were working on a project concerning visualization of Mobile Data. It looks like this unrequested feature has been introduced since the arrival of iOS 4.0 and allows the locations and their relative time stamps to be written on an easily accessible file on the device and, even worse, backed up on every PC the device has been synchronized with.

read more

(Other) Chronicles Of The Android

I know it is late and I am quite tired after a day of work. Still few seconds (and energies) to comment a new Gartner Report confirming what previously indicated by ABI Research and IDC, according to which, the Google Creature will command Nearly Half of Worldwide Smartphone Operating System Market by Year-End 2012.

read more

Sbucciare Una Mela In 6 Minuti

Poteva, questo scorcio di 2011 regalarci (in)soddisfazioni di sicurezza informatica solo per il povero Androide? Niente affatto! Ed ecco che dalla Germania, in particolare dal Fraunhofer Institute for Secure Information Technology (SIT), arriva una interessante analisi sul livello di sicurezza del KeyChain Apple, ovvero l’architettura usata dai sistemi operativi di Casa Apple per la gestione dei dati personali (password, etc.). I risultati non sono certo esaltanti poiché gli autori dell’articolo, in 6 minuti, sono stati in grado di decifrare completamente il contenuto del KeyChain, da un gioiello di Casa Apple (iPhone 4 ed iPad), simulando le stesse condizioni al contorno di un furto (quindi dispositivo non Jailbreakato, cifrato con una password complessa, con la funzione di Data Protection attiva e con le attività di hack che sono state effettuate da un PC che non si era mai sincronizzato con il dispositivo).

read more