Apple Hacker Alert: Beats Encryption. 'It's As Bad As You Can Imagine'
Due to a major flaw in Apple Inc software for mobile devices, hackers can intercept email and other communications meant to be encrypted and Mac computers are even more vulnerable, according to the company and experts Friday.
“It’s as bad as you could imagine, that’s all I can say,” said Johns Hopkins University cryptography professor Matthew Green.
Using Gmail, Facebook, unsecured netoworks such as at restaurants leave users particularly vulnerable.
If attackers have access to aan individual’s mobile user’s network, such as by sharing the same unsecured wireless service offered by a restaurant, they could see or alter exchanges between the user and protected sites such as Gmail and Facebook,” Reuters reports. ”Governments with access to telecom carrier data could do the same.”
(Read: US warns merchants on methods used by Target hackers)
Apple refrained from saying when or how it learned about the flaw and whether the flaw was being exploited. A statement on its support website, however, was blunt: The software “failed to validate the authenticity of the connection.”
Apple released software patches and an update for the current iOS for iPhone 4 versions, for 5th-generation iPod touches, and iPad 2r.
Without that fix, however, a hacker could impersonate a protected site and sit in the middle as email or financial data goes between the user and the real site, Green said.
“Because spies and hackers will also be studying the patch, they could develop programs to take advantage of the flaw within days or even hours,” Reuters says.
The is a “fundamental bug in Apple’s SSL implementation,” said Dmitri Alperovich, chief technology officer at security firm CrowdStrike Inc.
OS X is at risk, agreed Adam Langley, a senior engineer at Google.
Sources: Reuters, CNBC
Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.
"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.
Please Help Support BeforeitsNews by trying our Natural Health Products below!
Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST
Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!
HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.
Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.
MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser! Cleans out toxic buildup with oxygen!
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover - Reduces Smart Meter radiation by 96%! (See Video).
So what systems if any are best protected against hackers (aside from the US govt, from which no one is safe in any medium)?
@ Paul Brown there’s always a way in. If at first you dont succeed try again. If you cant find a way find another. Most of these encryptions reaquire advanced algerbra, some basic calclulus and understanding of computer programming to break in. Why most people dont hack is because of the risk. IF I were a hacker I would do it in a country like China or Russia where I can hide behind my government that supports its people.
I use WildHog as my operating system. It’s way better than Apple, microsoft or any other ops combined!
Designed by hackets and 100% un-.breakable.
You can get it on the black market via web 2. For those who don’t know Web 2 is the layer underneath the normal Google web you see evey day, sometimes referred to as deep web.
You get the software and it installs over your apple iphone software and over either you microsoft software or apple on your computers. My iphone is so secure you won’t believe. It even tells me when someone tried or tries to hack me!!! And guess what, NSA already tried 6 times!
Ha! You can’t hide in the Morphic Field.
Your “three satanic spheres” are EVIDENCE.
Do you know the math to discover (reverse) the founding rules of complexity theory?
The watchers are watched…
NSA (et al) says, “I iz in ur space-time continuum, upsetting all your gravity and quantums and stuffs.”
MaBell to NSA (et al) ; “I AM space-time continuum…”
And Apple users thought they were immune, so it was worth paying more…
Blackberry anyone.
How to create a secure password:
Think of a sentence and number and/or character.
IE: My dog is named Chubby and is 3.
password: MdinCai3
Use the first letter of each word according to the case and add a number or character. Use a sentence you can easily remember. No birthdates or addresses.
Random password are easier to break than a string of ordinary words. It’s just a myth that they aren’t.
Your first character is likely to be a letter and uppercase, not a word, and ending in a number. And a small enough sentence to remember. It’s already half broken.
What they are really saying is that on an open wifi, if I poisen the dns, setup a clone mail server and fake an ssl cert then I can read your Gmail. Which is already being read by half the planet.
This is sooo much a non issue that it’s amazing it’s even a story. Protip.. you can do EXACTLY the same thing with windows.. or linux if you really want to.
Given that it is WAY easier to infect your web browser with conduit, or safe search or a bzillion toolbars, I would think that this is more likely an exploit vector.