Enabling Secure Enterprise Productivity on Apple Watch

BlackBerry Work extends mobile productivity to Apple Watch. You can collaborate with emails, meeting invites, contacts, and even drive a presentation straight from your watch. Using BlackBerry Work on your Apple Watch makes it easy for you to get more work done – anytime and anywhere. Keep your enterprise secure and productive with BlackBerry. Check out www.blackberry.com/enterprise

Source: Enabling Secure Enterprise Productivity on Apple Watch

Share

New Word macro malware infects macOS and Windows

Another form of Microsoft Word malware that infects both macOS and Windows machines has been detected.

The malicious VBA (Visual Basic for Applications) code is buried in a Word document macro and automatically adapts its attack depending on the operating system used. Once installed, it can be used to download more payload files to your computer. …

Because the attack is disguised as an innocent Word macro, it goes undetected until it is too late. If you’ve told your computer to open macros automatically, malicious code can be executed before you have any idea it’s there. …

Source: New Word macro malware infects macOS and Windows

Share

Fresh WikiLeaks Dump Shows CIA Was Hacking iPhones A Year After Launch

A new Wikileaks release called DarkMatter was released today, affirming that the Central Intelligence Agency has long targeted Apple Macs, creating malware designed to evade the tech giant’s security mechanisms. The leak also revealed the CIA had been targeting the iPhone since 2008, a year after the landmark device was released.

That slice of info was included in a small dump of information Wednesday, that included manuals for a handful of implants and rootkits – malware that can hide at the lowest level of Apple systems, the kernel and the firmware of the device. …

Source: Fresh Wikileaks Dump Shows CIA Was Hacking iPhones A Year After Launch

Share

Hackers: We Will Remotely Wipe iPhones Unless Apple Pays Ransom

A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts.

The hackers, who identified themselves as ‘Turkish Crime Family’, demanded $75,000 in Bitcoin or Ethereum, another increasingly popular crypto-currency, or $100,000 worth of iTunes gift cards in exchange for deleting the alleged cache of data.

“I just want my money and thought this would be an interesting report that a lot of Apple customers would be interested in reading and hearing,” one of the hackers told Motherboard.

The hackers provided screenshots of alleged emails between the group and members of Apple’s security team. One also gave Motherboard access to an email account allegedly used to communicate with Apple. …

Source: Hackers: We Will Remotely Wipe iPhones Unless Apple Pays Ransom – Motherboard

Share

Researchers Uncover macOS and Safari Exploits at Pwn2Own 2017

… Day one results have already been published over at the Zero Day Initiative website, with a couple of successful Mac-related exploits already appearing in the list of achievements. Independent hackers Samuel Groß and Niklas Baumstark landed a partial success and earned $28,000 after targeting Safari with an escalation to root on macOS, which allowed them to scroll a message on a MacBook Pro Touch Bar. …

Later in the day, Chaitin Security Research Lab also targeted Safari with an escalation to root on macOS, finding success using a total of six bugs in their exploit chain, including “an info disclosure in Safari, four type confusion bugs in the browser, and a UAF in WindowServer”. The combined efforts earned the team $35,000. …

The participating teams earned a total of $233,000 in prizes on day one, including a leading $105,000 earned by Tencent Security, according to published details. Other software successfully targeted by contestants include Adobe Reader, Ubuntu Desktop, and Microsoft Edge on Windows. …

Source: Researchers Uncover macOS and Safari Exploits at Pwn2Own 2017

Share

The Phone Hack that Strangled 911

“911” Ring. Ring. Ring. Ring….

It’s easy to take for granted. You pick up a phone, punch a few buttons, and then someone’s there to help you in a time of great need, maybe even life or death.

It’s the emergency response phone system. Often called 911 in America. Although, it goes by other names; check out this list for emergency numbers in other countries.

A few months ago, this entire infrastructure was as risk. It wasn’t because of a huge government hack. Nor was it because a some lay about IT person, not standing guard. No, this hack happened at the endpoint, the end user. And the thing that almost crippled a national public safety system? A viral tweet. …

This hack only affected iPhones. Other smartphone OS’s were not vulnerable to the coded takeover.

It’s estimated that over half a million people saw this tweet, and it was clicked over 100,000 times. That’s a possible 100,000 phones that flooded their local 911s, 911s that might not be equipped to handle more than a few calls at a time, thus crippling their ability to handle any real emergencies. …

Source: The Phone Hack that Strangled 911 – UTB Blogs

Share

Hackers can attack your phone via 76 popular iOS apps

According to Will Strafach, CEO of New-York based Sudo Security Group, there are dozens of iPhone apps which are at risk of being hacked. They include apps such as Music Tube and Gift Saga. …

Source: Hackers can attack your phone via 76 popular iOS apps

Share

DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher

Earlier this week, malware said to belong to the Russian group behind the hack of the Democratic National Committee, known as APT28 or Fancy Bear, leaked online. Though novel both for its targeting of Apple Macs and iPhone backups, the surveillance tool’s real intrigue lies underneath the hood. According to Patrick Wardle, an ex-NSA staffer and head of research at bug hunting firm Synack, a significant chunk of the APT28 Mac spyware looks much like that shipped by Italian spyware vendor Hacking Team, which sold to both Russian and U.S. government agencies. Ex-NSA staffer is “100 per cent” sure Russia either borrowed or bought Hacking Team’s malicious code. …

Source: DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher

Share