They are going to upgrade their server software? What are they running? Mac OS server or Windows?
Certainly not Apple OSX Server - since no reasonable server hardware can run Apple OSX Server.
Or, do you think that Apple's cloud runs on MiniMacs?
They are going to upgrade their server software? What are they running? Mac OS server or Windows?
All this, and yet people are still foolishly attacking the NSA, who are being constantly vigilant in trying to find out where this stuff comes from.
oh boy!![]()
Obviously they're different teams (although there's more than likely overlaps), but it'd be stupid for them to release the 4th beta. Sure the OTA would work, but actual developers need access to the 4th beta of Xcode for it to be of any worth. You need the developer website for this.
They are going to upgrade their server software? What are they running? Mac OS server or Windows?
This is why I'm not a fan of the keychain syncing with iCloud in OS X Mavs. That's a lot of information that Apple now has (and am I to completely trust them with it?), and that's a lot of information that could be hacked.
This is why I'm not a fan of the keychain syncing with iCloud in OS X Mavs. That's a lot of information that Apple now has (and am I to completely trust them with it?), and that's a lot of information that could be hacked.
Apparently all they got was a list of usernames. No passwords (or even password hashes, as in the Evernote hack for example). No app data.
While it isn't the best news for Apple from a security perspective, it's good that they've been tested and found to be extremely resilient.
No, this isn't what the NSA uses PRISM for (or at least they absolutely should not).
Hacking Apple's developer site is bad, and it's a crime, but it isn't a terrorist threat. If we start being OK with PRISM as a substitute for policing, we really are going down a slippery slope.
this will hit news stations like a frenzy, android users are gonna gloat
Apparently all they got was a list of usernames. No passwords (or even password hashes, as in the Evernote hack for example). No app data.
While it isn't the best news for Apple from a security perspective, it's good that they've been tested and found to be extremely resilient.
this kind of stuff is what has always worried me about cloud stuff.
News reporting would go something like this...
Of the Apple hacking, which didn't really affect much, and is actively being resolved:
Of the Android master key exploit which exposes 900 million phones to malware/viruses and more, and has no chance of ever being resolved:
This is why I'm not a fan of the keychain syncing with iCloud in OS X Mavs. That's a lot of information that Apple now has (and am I to completely trust them with it?), and that's a lot of information that could be hacked.
Someone says that they are required to inform us within a timely manner about this?
I highly doubt they'll offer to change apple ids. I don't think they have the mechanism to do that.
Hopefully this doesn't effect iOS 7 Beta 4 release. But I think it most likely will.![]()
ibrahimBalic 1 hour ago
Hi there,
My name is ibrahim Balic, I am a security researcher. You can also search my name from Facebook's Whitehat List. I do private consulting for particular firms. Recently I have started doing research on Apple inc.
In total I have found 13 bugs and have reported through http://bugreport.apple.com. The bugs are all reported one by one and Apple was informed. I gave details to Apple as much as I can and I've also added screenshots.
One of those bugs have provided me access to users details etc. I immediately reported this to Apple. I have taken 73 users details (all apple inc workers only) and prove them as an example.
4 hours later from my final report Apple developer portal gas closed down and you know it still is. I have emailed and asked if I am putting them in any difficulty so that I can give a break to my research. I have not gotten any respond to this... I have been waiting since then for them to contact me, and today I'm reading news saying that they have been attacked and hacked. In some of the media news I watch/read that whether legal authorities were involved in its investigation of the hack. I'm not feeling very happy with what I read and a bit irritated, as I did not done this research to harm or damage. I didn't attempt to publish or have not shared this situation with anybody else. My aim was to report bugs and collect the datas for the porpoise of seeing how deep I can go within this scope. I have over 100.000+ users details and Apple is informed about this. I didn't attempt to get the datas first and report then, instead I have reported first.
I do not want my name to be in blacklist, please search on this situation. I'm keeping all the evidences, emails and images also I have the records of bugs that I made through Apple bug-report.
Watch this video
http://www.youtube.com/watch?v=q000_EOWy80&feature=youtu.be
An interesting comments from the techcrunch article:
http://techcrunch.com/2013/07/21/ap...kers/?hubRefSrc=permalink#lf_comment=87472293
and has no chance of ever being resolved:
I'm not normally one to step up and defend Apple, but in this case, sadly this is how things are now.
Facebook has been hacked, Twitter has been hacked, Sony has been hacked, Zendesk has been hacked, Microsoft has been hacked, Ubuntu has been hacked, numerous government websites have been hacked etc. etc.
It's simply next to impossible these days to guarantee security in the millions of lines of code that constitute modern Operating Systems and the dozens of processes that run on them. Someone will find a vulnerability sooner or later and exploit it. The only thing you can do is make it as hard as possible for them, and store your data in as safe a manner as possible with strong encryption (and hashing for passwords).
This was going to happen sooner or later, and while it looks bad for Apple, it's a fact of life that there are people out there for whom hacking is their job and how they earn their money. The only way to secure your data from hacking, is not to put it on the internet. End of story.