Can an employer track phone activity without a company SIM and without MDM?

Been looking for a phone upgrade and my dad has an iPhone (iPhone 13) given to him by his work, which he doesn’t use anymore. He offered to let me use it on the condition that the company can’t see that it’s being used.
Based on what I’ve … Continue reading Can an employer track phone activity without a company SIM and without MDM?

Using the iPhone Recovery Key to Lock Owners Out of Their iPhones

This a good example of a security feature that can sometimes harm security:

Apple introduced the optional recovery key in 2020 to protect users from online hackers. Users who turn on the recovery key, a unique 28-digit code, must provide it when they want to reset their Apple ID password.

iPhone thieves with your passcode can flip on the recovery key and lock you out. And if you already have the recovery key enabled, they can easily generate a new one, which also locks you out.

Apple’s policy gives users virtually no way back into their accounts without that recovery key. For now, a stolen iPhone could mean devastating personal losses…

Continue reading Using the iPhone Recovery Key to Lock Owners Out of Their iPhones

Get the scanner app that can turn your iPhone into an office for only $40

Now you can have an office scanner in your pocket with such powerful AI that it can do practically anything, including math.
The post Get the scanner app that can turn your iPhone into an office for only $40 appeared first on TechRepublic.
Continue reading Get the scanner app that can turn your iPhone into an office for only $40

Bypassing a Theft Threat Model

Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.

I wrote about this kind of thing in 2000, in Secrets and Lies (page 318):

My favorite example is a band of California art thieves that would break into people’s houses by cutting a hole in their walls with a chainsaw. The attacker completely bypassed the threat model of the defender. The countermeasures that the homeowner put in place were door and window alarms; they didn’t make a difference to this attack.

The article says they took half a million dollars worth of iPhones. I don’t understand iPhone device security, but don’t they have a system of denying stolen phones access to the network?…

Continue reading Bypassing a Theft Threat Model

QuaDream: Israeli Cyber Mercenary Behind iPhone Hacks

By Habiba Rashid
Citizens Lab and Microsoft have exposed an Israeli firm, QuaDream, selling spyware to governments around the world.
This is a post from HackRead.com Read the original post: QuaDream: Israeli Cyber Mercenary Behind iPhone Hacks
Continue reading QuaDream: Israeli Cyber Mercenary Behind iPhone Hacks

Texas Dad Says ‘Find My iPhone’ Glitch is Directing Angry Strangers to his Home

An anonymous reader shares a report from the New York Post:

A supposed glitch in the popular “Find My iPhone” app has been directing random strangers to the home of an unsuspecting Texas dad at all hours of the day, falsely accusing him of stealing th… Continue reading Texas Dad Says ‘Find My iPhone’ Glitch is Directing Angry Strangers to his Home