Remains of the Day: Crimes and misdemeanors

iOS apps are still using UUIDs, and your iMessages may not be as secure as you thought, but that one guy is really, really sorry that he sold that iPhone 4 prototype. The remainders for Wednesday, June 26, 2013 have done their time.

Nearly Half of iOS Apps Violate Apple's Privacy Policy (Techlicious)

As of May 1, iOS developers are no longer supposed to use devices' unique identifiers as a way of identifying users. However, a study from the University of California, San Diego suggests that around 50 percent of iOS apps don't adhere to that rule; the UCSD team came up with an iOS app that notifies you when an app tries to get your UUID but, ironically, it's not available in the App Store. So, uh, thanks for that?

@825B @C=5B (Apple)

The Apple Online Store has launched officially in Russia, offering the company's full range of products. I bet Dmitri Medvedev was first in the virtual line.

Inside Steve Jobs' Mind-Blowing Pixar Campus (Buzzfeed)

Here's an image-laden tour of Pixar's campus, complete with the little touches picked out by Steve Jobs himself and the story of the unveiling of the new building named after the Apple co-founder. I still like to imagine Steve sweating over a kiln as he crafts the perfect brick for a building exterior.

Guy who sold unreleased iPhone 4 to Gizmodo in 2010 tells of his regret in Reddit AMA (The Next Web)

Brian Hogan, the guy who sold the iPhone 4 prototype he found in a bar, has given a Reddit Ask Me Anything (AMA) in which he said that he that regrets his decision. And here I've been waiting for the punchline to "An iPhone prototype walks into a bar..." for three years now.

Can Apple read your iMessages? (A Few Thoughts on Cryptographic Engineering)

Apple says iMessages are encrypted end-to-end, but just how secure are they? One cryptographer says that there could potentially be some weak points: for example, Apple backs up iMessages, meaning they're stored somewhere, and the company has not said if it retains metadata (data about your messages, like the time sent and to whom). So it seems that those cute pictures of your cat and reminders to your significant other to stop drinking from the milk carton could still fall into malicious hands.

Four reasons why Apple's Passbook is growing on retailers (GigaOm)

A year in, iOS's Passbook feature appears to be picking up steam, especially among gift cards and airlines. Still untapped: gift cards for airlines.

Join the CSO newsletter!

Error: Please check your email address.

Tags steve jobsioslegal issuesiPhonesoftwareencryptionoperating systemsprivacyAppleconsumer electronicssecuritysmartphonesapp store

More about AMA GroupApplePixar

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Dan Moren

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place