Hackers Have Access to iOS 14 Months Before You Will
Apple gives developers early prototypes of their new software so that Apple doesn’t have a disaster on its hands when the new software is released and user’s applications no longer work. Unfortunately, some developers sell those phones – or at least access to them – so that they can get unlocked copies of the OS to hack and reverse engineer. This is why hacks appear so quickly after the new versions are finally released. Credit: Vice
Reports: eBay is Scanning User’s Computers for Open Ports
Bleeping Computer tested reports that users who visit eBay’s web site have their Windows computers scanned for open ports. It is possible that they are looking for computers that are compromised and used to commit fraud. However, accessing a user’s computer like this likely violates the Justice Department’s interpretation of the Computer Fraud and Abuse Act, which is a felony, specifically because they did not ask for permission. That “interpretation” is now being reviewed by the Supreme Court. Expect lawsuits. Credit: Bleeping Computer
UK Says They Will Keep Contact Tracing Info for 20 Years
No big surprise here – I expected this. This is the downside of the “centralized” model for contact tracing apps.
According to the privacy notice attached to the UK’s new contact tracing app, data collected by the app will be stored for up to 20 years.
And, you have no right to have it deleted. Credit: Computing UK
Abandoned Apps May Pose a Security Risk to Mobile Devices
If you are like most people, you have a number of apps on your phone or tablet.
Question for you – whether you use every single one of those apps frequently or not – is how many of those apps are still supported by the developer? That includes the so-called “packages” that the app developer used to write that app.
The unsupported app – with bugs that have not be discovered or patched – can provide an avenue for exploit by hackers. For as long as those apps remain on your phone.
So while you are not using that app, hackers are trying to figure out how to exploit it. The risk is higher than you might think. Credit: Dark Reading