to Be and not to seem
iOS 8, Apple will not be able to unlock the phones for police
Changes have been made to show the new features in iOS 8, or to provide additional security information, such as your date of birth.
the Change was accompanied with a message from Apple CEO Tim cook.
He said that the company had never worked with any government Agency from any country, to create access to any of their products or services, and that they were never given access to their servers.
This same information was repeated in a web page, explaining how they deal with requests for information from the government.
Starting with iOS 8, Apple made sure that it was not possible to extract information that is protected by a password set by the user, because the more Apple will not store the encryption keys are created by selecting passcode.
«On devices running iOS 8, your personal data such as pictures, messages (including the merger), e-mail, contacts, call history, content, iTunes, notes, and reminders are encrypted using your passcode,» he explained.
«unlike our competitors, Apple can’t bypass your passcode and therefore cannot access these records. Thus, it is technically not feasible for us to respond to government requests to retrieve these data from devices running iOS 8.»
However, these data can still be provided if the user stores them in iCloud.
Leave a Comment » | Security of mobile devices. It security. Computers and the Internet. Article. IT-Security. Mobile | Tags: Apple. Security. The smartphone. privacy. Security | Permalink
Author Vladimir Bespaly
the statement Gartner, most mobile apps will not pass the standard test security
According to the statement of researchers — this is a serious problem for companies that concept BYOD ( bring is your is own is device ).
Seventy-five percent of all mobile apps will not pass the most basic of security tests next year, predicts market researcher Gartner .
the market Researcher said that in 2015, the majority of mobile applications — no matter whether it is Android, iOS or Windows Phone — will not be acceptable to support the basic business security protocols on devices. This creates a serious problem for the company, which will adopt bring-your-own-device.
Employees must download apps that can access the assets or to perform business functions, but at the same time do not have any basic safety standards?
If so, then not only security policy because of the risk of infringement, but also sensitive corporate data and networks may also be vulnerable.
«Enterprises that embrace mobile computing and use BYOD strategy is vulnerable to security breaches if they do not accept methods and techniques for testing the security of mobile applications» said primary analyst-researcher Gartner.
«the Majority of enterprises do not have experience in testing the security of mobile applications. Moreover, even when the security testing of applications made, it is often done carelessly developers, which are mainly concerned with the application functionality, not security.»
Existing static application security testing (SAST) and dynamic application security will have to change and adjust their tests to test mobile technologies. And SAST and DAST was used in the past decade, but mobile apps are a new problem.
Gartner believes that in addition to the SAST and DAST for mobile devices should see new kinds of tests based on the level of behavioral analysis. These tests control GUI and run background applications to detect malicious or dangerous behavior. For example, the audio player that you want to access contacts access or geolocation should raise suspicion.
However, these measures do not necessarily enough — and enterprise users should also make sure that the servers that communicate with mobile devices continuously tested and protected.
by 2017, Gartner predicts that 75 percent of mobile security breaches are the result of incorrect configurations mobile app, such as the misuse of personal cloud hraneniya in tandem with enterprise data.
Leave a Comment » | Security of mobile devices. It security. Different. Article. IT-Security. Mobile | Tags: Android. Apple. Security. Different. The smartphone. privacy. Security | Permalink
Author Vladimir Bespaly
you Have a corporate laptop? How to maintain privacy while online surfing
You periodically take the laptop home? You want to protect yourself from the administrator in the office saw the results of your home surfing the Internet?
In General all browsers today have a private mode (in Google Chrome this mode called Incognito mode). In this case the browser does not history, and does not store the temporary files, or remove that, and the other after the end of the session.
However, it is worth remembering that this mode can be simply blocked by the corporate security policy. In addition, it is possible that your computer has to monitor staff and his actions, which keeps track of all your actions. (This is the analogue of the parent control, which you can use to track the habits of your children while in the Internet).
it is Worth remembering that it’s not your computer, and your employer. Moreover, I believe that the employer is entitled to know what is happening on your PC. The company may lose huge sums from malware attacks and therefore has good reason to limit what you can do with the United Internet computer company.
do you Like the rules adopted in the company or not, you are obliged to comply with them. Because you will get used to the fact that your office laptop (PC) is always watching you, in the office or at home. Like this is you or not, but it is!
Author Vladimir Bespaly
9 ways to protect the data on your mobile device
Recent headlines naked photos of celebrities in Hollywood seeping in Internet remind us of the privacy risks arising from the storage of personal data on mobile devices. In this case the mobile devices we have laptops, tablets and smartphones.
- avoid to store locally on Your laptop, smartphone or tablet personal information, including pictures. last year in the UK only lost a total of 290 651 devices such as laptops, smartphones and tablets. Stealing smartphones so prevalent that in the United States by next year, all devices will be pre-equipped with anti-theft capabilities.
- Save a secure backup on external media or other less portable devices to securely store your confidential and sensitive documents. make Sure that the hard disk does not have an Internet connection, because any connection with the Internet device can be an open door for hackers.
- Encrypt, encrypt, encrypt. This may seem unnecessary, bloated functionality, but creating your data inaccessible to hackers, is a strong defense. The latest Android devices have built-in encryption function of the entire device, which can encrypt all data, including applications, downloaded files and images. However, be aware that using this function in addition to safety, will bring you significant inconvenience, especially on the phone.
- Protect your account complex passwords. Use symbols, numbers and uppercase letters or even phrases to block your cloud content from prying eyes.
- Think where and what pictures you post. Treat any photos posted on the Internet as the public. You do not would like your risky selfies appeared on Twitter, Reddit or Facebook?
- please do Not send your private photos via e-mail. mailboxes, especially those that do not use two-factor authentication, are easy targets for hackers.
- Format your memory card or internal memory, and it is better to use specialized software for secure deletion of data. When you sell or provide your own phone, make sure that you have formatted and re-recorded the data using a special tool to erase, to ensure that your data is securely removed.
- do Not use open public Wi-Fi network for the transmission of confidential information, if you don’t use good mobile solution for security. Hackers can monitor your traffic and capture your credentials.
- Disable startup for cloud storage solutions, such as iCloud and Dropbox. These services, as useful as they may seem, copy your image without filtering your most sensitive pictures from the safe.
article Summary: Posts about Apple written by Vladimir Bespaly apple
Source: Apple | to Be and not to seem