Apple tiene dificultades para encontrar a empleados con habilidades particulares, así que decidió actuar para resolver su problema. Pero su caso no es excepcional. Desde hace años existe una brecha entre la experticia laboral y lo que requiere la economía actual, en donde el desarrollo de aplicaciones es fuente de ganancias y puestos de trabajo.
Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.
Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.
The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.
Prosecutors in Luxembourg have called for two whistleblowers on trial over the so-called LuxLeaks scandal to be jailed for 18 months and for a journalist to be fined.Antoine Deltour and Raphaël Halet, French former employees of auditing firm PricewaterhouseCoopers (PwC), are accused of leaking thousands of documents to journalist Edouard Perrin.The documents revealed the huge tax breaks that Luxembourg offered international firms including Apple, Ikea and Pepsi, saving the companies billions of euros in taxes.
The last time the mayor of Cupertino walked into Apple – the largest company in his small Californian town and, it so happens, the most valuable company in the world – he hoped to have a meeting to talk about traffic congestion.Barry Chang barely made it into the lobby when Apple’s security team surrounded and escorted him off the property.
Si bien estos casos judiciales destacados han sumado impulso, la ofensiva del sector contra la intrusión gubernamental en la información privada de los clientes comenzó hace al menos dos años, luego de las revelaciones de Edward Snowden sobre la recolección encubierta de datos que pusieron a todos a la defensiva.
With the court filing, Silicon Valley and Washington are poised to return to a cold war over the balance between privacy and law enforcement in the age of apps
Revealed: After postponing a court hearing with Apple, the FBI is testing a new technique which Apple says they will pressure government to reveal
Apple customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks have revealed.Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data.
The Federal Bureau of Investigation insisted that it was helpless. The bureau told a judge in February that Apple has the “exclusive technical means” to try to unlock the contents of San Bernardino shooter Syed Rizwan Farook’s iPhone — and that’s why it should be forced to do so. But notably missing from the FBI’s argument was any mention of whether it had consulted spies and sleuths from the government’s intelligence community — particularly the National Security Agency. The Twitterverse exploded with q
ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Management Life & Arts March 4, 2016 2:25 amApple gains support from tech rivals in FBI caseTim Bradshaw in San Francisco Share Print Clip CommentsFBI and Apple logos©FBI/AppleAmerica’s largest technology companies have joined Apple’s fight against the government over data protection and security, in an unusual display of unity by the Silicon Valley rivals.More than a dozen motions filed on Thursday sided with Apple as it tries to resist a demand to write software that would help the FBI unlock the San Bernardino shooter’s iPhone. Civil liberties groups and IT trade associations lined up alongside dozens of law professors and cryptography experts, after Apple filed its own motion for the judicial order to be withdrawn last week.
As you know, Apple just said no to the FBI’s request for a backdoor in the iPhone, bringing more public attention to the already hot discussion on encryption, civil liberties, and whether “those in authority” should have the ability to see private content and communications — what’s referred to as “exceptional access.”
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation. In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.
The world’s leading technology firms are becoming increasingly unhappy at the backlash over their tax arrangements and efforts to regulate their activities. Tim Cook, Apple chief, flew to Brussels to lobby against a tax probe and Google and Facebook
A newly revealed bug in iOS lets attackers force iPhones and iPads into restart loops, repeatedly crashing and rebooting, using nothing but aWi-Fi network.
Once the user has entered what its discoverer, security researchers Skycure, dubs the “no iOS Zone”, there’s no way to fix their phone other than escaping the range of the malicious network; every time it reboots, it crashes almost immediately.
The basis of the attack uses a “specially crafted SSL certificate”, typically used to ensure a secure connection, to trigger a bug in the operating system that crashes out any app using SSL.
“With our finding, we rushed to create a script that exploits the bug over a network interface,” the researchers wrote. “As SSL is a security best practice and is utilized in almost all apps in the Apple app store, the attack surface is very wide. We knew that any delay in patching the vulnerability could lead to a serious business impact: an organized denial of service (DoS) attack can lead to big losses.”
But in addition to crashing individual apps, the bug can be used to crash the underlying operating system as well. “With heavy use of devices exposed to the vulnerability, the operating system crashes as well. Even worse, under certain conditions, we managed to get devices into a repeatable reboot cycle, rendering them useless.
“Even if victims understand that the attack comes from a Wi-Fi network, they can’t disable the Wi-Fi interface in the repeated restart state as shown in the video.”
Google has failed in its attempt in the court of appeal to prevent British consumers having the right to sue the internet firm in the UK.
A group known as Safari Users Against Google’s Secret Tracking wants to take legal action in the English courts over what it says is Google’s tracking of Apple’s Safari internet browser.
It has accused Google of bypassing security settings in order to track users’ online browsing and to target them with personalised advertisements.
Three judges have dismissed Google’s appeal over a high court decision against it and ruled that claims for damages can be brought over allegations of misuse of private information.
Friday’s ruling was a victory for Safari Users, including editor and publisher Judith Vidal-Hall, and Robert Hann and Marc Bradshaw, who are both IT security company directors. They say Google’s “clandestine” tracking and collation of internet usage between summer 2011 and early 2012 led to distress and embarrassment among UK users.
They accuse Google of collecting private information without their knowledge and consent by the use of “cookies” – a small string of text saved on the user’s device.
The CIA led sophisticated intelligence agency efforts to undermine the encryption used in Apple phones, as well as insert secret surveillance back doors into apps, top-secret documents published by the Intercept online news site have revealed.
The newly disclosed documents from the National Security Agency’s internal systems show surveillance methods were presented at its secret annual conference, known as the “jamboree”.
The most serious of the various attacks disclosed at the event was the creation of a dummy version of Apple’s development software Xcode, which is used by developers to create apps for iOS devices.
The modified version of Xcode would allow the CIA, NSA or other agencies to insert surveillance backdoors into any app created using the compromised development software. The revelation has already provoked a strong backlash among security researchers on Twitter and elsewhere, and is likely to prompt security audits among Apple developers.
The latest revelations of sustained hacking efforts against Apple devices are set to further strain already difficult relations between the technology company and the US government.
Apple had previously been a partner in the Prism programme, in effect a legal backdoor to obtain user information by the NSA and its allies, but in the wake of the Snowden revelations it has stepped up efforts to protect user privacy, including introducing end-to-end encryption on iMessages.
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.
By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
La empresa de Cupertino se desmarca de cualquier responsabilidad en los casos, registrados en EE UU
El innovador sistema de pago con móvil Apple Pay, propiedad de la empresa de la manzana, ha sufrido en las últimas semanas una oleada de operaciones fraudulentas, según revela este viernes el Wall Street Journal. La plataforma en sí, que gestiona dos de cada tres dólares abonados vía teléfono móvil en EE UU desde su lanzamiento en otoño, no ha sufrido el pirateo: para cometer los desfalcos, los piratas informáticos han introducido en el sistema datos de tarjetas de crédito robadas y han realizado compras “de gran valor” en establecimientos de las cadenas Home Depot, Target Corp. y en tiendas de la propia Apple. Un portavoz de la empresa de Cupertino consultado por el diario estadounidense ha desmarcado a Apple de cualquier responsabilidad en estos casos. “Apple Pay está diseñado para ser extremadamente seguro y para proteger la información personal de los usuarios”, apunta. El número y valor total de pagos fraudulentos no ha trascendido.
Para poder utilizar Apple Pay los usuarios tienen que asociar una tarjeta de crédito o de débito a su cuenta Apple, bien sea enviando una fotografía de la tarjeta o introduciendo manualmente los datos. A partir de ese momento, puede comprar en los establecimientos que aceptan este medio de pago sin necesidad de presentar nada más que su iPhone. Aunque la responsabilidad de verificar la identidad del titular de la tarjeta antes de ser utilizada para abonar una compra con el móvil recae, exclusivamente, sobre los bancos —cada uno puede aplicar sistemas de control de identidad adicionales—, estos casos de fraude son un duro golpe para la plataforma de pagos de la empresa estadounidense. Apple Pay desembarcó en EE UU en octubre y aún no está disponible en otros países.