Smartphones are a utility in our lives more than any other thing. The addiction has increased to a level that most of us keep our smartphones by our side whether we are at the office, home or even while we are on the bed. According to the research by Cellular Telecommunication and Internet Association, there […]
Software pirates are distributing hacked and infected versions of iPhone apps by hijacking Apple’s enterprise developer program. Reportedly, the hacked apps include versions of Minecraft, Spotify, Angry Birds, and Pokemon Go. These apps have been modified for making paid content/features available for free to deprive the original developers and Apple of their due revenue share […]
Is two factor authentication such a pain in the rear end that it’s costing the economy millions? Do you feel safe having a Google Nest in your home? And don’t get caught by a catfisher this Valentine’s Day.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by B J Mendelson.
iPhone SE 2 featuring notch and full glass rear shown in latest concept video
Ever since Apple launched its popular budget handset, the iPhone SE in March 2016, there have been rumors and leaks of the Cupertino giant working on its successor, iPhone SE 2.
Now, an artist (Dr. Gunho Lee for ConceptsiPhone) has reimagined the iPhone SE 2 in a concept video (see below) showing what the modern smartphone could look like.
As we can see, the video showcases the iPhone SE 2 with an edge-to-edge display a screen cutout (notch) for Face ID camera. This means that the smartphone will not have the Home button and Touch ID from its predecessor, the iPhone SE. It also features the same 4-inch display as the iPhone SE.
Further, the concept video shows that the smartphone has a full glass rear, which means it could enable Qi wireless charging. It also shows a single rear camera with a bump that protrudes through the case. One can also notice the volume buttons (+/-) and alert slider on the left side of the smartphone, while the power on/off button on the right side.
The successor to the iPhone SE is also shown in a number of colors, namely, red, gold, silver, and blue. The video also hints that the iPhone SE 2 could launch in ‘coming spring’. In the past too, there were strong rumors that an iPhone SE 2 would come out in mid-2018; however, this never turned into reality.
Since this is just a concept video, we cannot depend completely on the above-mentioned information. Do let us know what do you think about this possible iPhone SE 2 concept in the comments section mentioned below.
Hackers, Thieves, and Repair Shops Access iCloud-Locked iPhones, Here’s How
Hackers, thieves, and repair shops have discovered a new way to bypass the ‘Find My iPhone’ feature on iCloud-locked iPhones so that they can sell stolen or non-stolen devices, according to a report from Motherboard.
For those unaware, “Find my iPhone” is an app and service from Apple, which lets you locate, lock down or wipe your lost iPhone, iPad, iPod, or Macbook and requires a password to continue. Apple had introduced this feature in 2013 to safeguard people’s information stored on their iPhones.
In order to keep iPhones secure and make it less valuable targets to would-be thieves, iPhones can be associated only to one iCloud account at a time. This means that the hackers and thieves need to figure a way out to remove the iCloud account from the iPhone in order to sell the stolen device to someone else or for someone new to use it. The iCloud account can only be removed by entering the Apple ID password.
“The iCloud security feature has likely cut down on the number of iPhones that have been stolen, but enterprising criminals have found ways to remove iCloud in order to resell devices. To do this, they phish the phone’s original owners, or scam employees at Apple Stores, which have the ability to override iCloud locks. Thieves, coders, and hackers participate in an underground industry designed to remove a user’s iCloud account from a phone so that they can then be resold,” according to Motherboard.
In order to get into iCloud-locked iPhones, thieves are now producing fake receipts and invoices to fool Apple into believing that they are the actual owners of the phone. While the tricks include social engineering at Apple Stores, there are also “custom phishing kits for sale online designed to steal iCloud passwords from a phone’s original owner,” mentions Motherboard.
Additionally, a few hackers also reprogram stolen iPhones with a new IMEI. Besides this, there are also forums for the hacker community where they share new methods and tips to break into locked iPhones.
Even some unnamed repair companies have become actual customers of companies that illegally reset and reactivate the iCloud-locked iPhone.
“There are many listings on eBay, Craigslist, and wholesale sites for phones billed as ‘iCloud-locked,’ or ‘for parts’ or something similar,” added Motherboard. “While some of these phones are almost certainly stolen, many of them are not. According to three professionals in the independent repair and iPhone refurbishing businesses, used iPhones — including some iCloud-locked devices — are sold in bulk at private ‘carrier auctions’ where companies like T-Mobile, Verizon, Sprint, AT&T, and cell phone insurance providers sell their excess inventory (often through third-party processing companies.)”
Basically, in the event your iPhone is stolen or lost, ensure that you change the password of your iCloud account immediately. Further, beware of phishing scams and carefully check the addresses or URLs of the websites you visit, especially login pages. It is recommended to keep a unique password not only for your iCloud account but also for every other online account. Also, ensure that you have enabled two-step authentication on your iCloud account.
For those hoping the next iPhone would ditch the Lightning port in favor of the more versatile USB-C port, you'll surely be disappointed by the latest rumor. "Japanese site Macotakara says that not only will the 2019 iPhone use Lightning, Apple will also continue to bundle the same 5W charger and USB-A to Lightning cable in the box," reports 9to5Mac. "This is seen as a cost saving measure. It seems that customers wanting faster iPhone charge times will still have to buy accessories, like the 12W iPad charger." From the report: The site explains that Lightning port is not going anywhere and Apple is resistant to changing the included accessories to maintain production costs. Apple can benefit from huge economies of scale by selling the same accessories for many generation. As such, Apple apparently will keep bundling Lightning EarPods, Lightning to USB-A cable, and the 5W USB power adaptor, with the 2019 iPhone lineup. This is disappointing as Apple began shipping an 18W USB-C charger with its iPad Pro line last fall, and many expected that accessory to become an iPhone standard too. Even if the iPhone keeps the Lightning port, Lightning can support fast-charging over the USB Type-C protocol. It's not clear if the cost savings of this decision would be passed on to consumers with lower cost 2019 iPhone pricing.
Apple has vowed to remove iOS apps that record screen data. User data recording has become an issue of concern among the cyber-security community as the data is used to launch a variety of scams, identify customer demographics, and targeted marketing gimmicks. Mobile phone manufacturers are trying to ensure that apps that indulge in sneaky […]
The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a dangerous new Mac malware capable of targeting devices for multi-purposes including stealing cryptocurrency. Dubbed CookieMiner by researchers; the Mac malware is a variant of OSX.DarthMiner, another nasty piece of malware known for targeting MacOS. But, CookieMiner aims at much more than its predecessor. See: 400% increase in […]
It turns out that Google, like Facebook, abused its Apple Enterprise Developer Certificate to distribute a data collection app to iOS users, in direct contravention of Apple’s rules for the distribution program. Unlike Facebook, though, the company did not wait for Apple to revoke their certificate. Instead, they quickly to disabled the app on iOS devices, admitted their mistake and extended a public apology to Apple. Google’s app Google’s Screenwise Meter app is very similar … More →
With Apple’s introduction of iOS 12 for all their supported mobile devices came a powerful new utility for automation of common tasks called Siri Shortcuts. This new feature can be enabled via third-party developers in their apps, or custom built by users downloading the shortcuts app from the app store. Once downloaded and installed, the Shortcuts app grants the power of scripting to perform complex tasks on users’ personal devices.
But accessing the phone from Siri Shortcuts also presents some potential security risks that were discovered by X-Force IRIS and reported to Apple’s security team. This post gives some insight into potential attack scenarios using Shortcuts and reminds users that keeping a tight lid on app permissions is a critical step to upping security on devices and the way we use them.
Shortcuts Make Life Easier, Right?
Want to turn all your lights to disco, play your favorite soundtrack, and text your friends to come over? Or maybe perform complex mathematical computations with a single voice command? Siri Shortcuts can help do that and facilitate much more in user interaction with their devices, directly from the lock screen or via existing apps they use. These shortcuts can also be shared between users, using the app itself via iCloud, which means they can be passed around rather easily.
Beyond users wishing to automate daily activities, app developers can create shortcuts and present them to their user base from within their apps. The shortcut can then appear on the lock screen or in ‘search’ when it is deemed appropriate to show it to the user based on time, location and context. For example, a user approaches their usual coffee shop, and the relevant app pops up a shortcut on the screen to allow them to order the usual cup of java and pay for it on the app before they even enter the coffee shop.
These shortcuts are a nifty addition to Siri’s functionality, but while allowing extended functionality and personalization of the use of Siri, there are some less favorable scenarios to consider.
Siri Shortcuts Can Also Be Abused by Attackers
Siri Shortcuts can be a useful tool for both users and app developers who wish to enhance the level of interaction users have with their apps. But this access can potentially also be abused by malicious third parties. According to X-Force IRIS research, there are security concerns that should be taken into consideration in using Siri Shortcuts.
Siri Demanding Ransom?
Using Siri for malicious purposes, Shortcuts could be created for scareware, a pseudo ransom campaign to try to scare victims into paying a criminal by making them believe their data is in the hands of a remote attacker.
Using native shortcut functionality, a script could be created to speak the ransom demands to the device’s owner by using Siri’s voice. To lend more credibility to the scheme, attackers can automate data collection from the device and have it send back the user’s current physical address, IP address, contents of the clipboard, stored pictures/videos, contact information and more. This data can be displayed to the user to convince them that an attacker can make use of it unless they pay a ransom.
To move the user to the ransom payment stage, the shortcut could automatically access the Internet, browsing to a URL that contains payment information via cryptocurrency wallets, and demand that the user pay-up or see their data deleted, or exposed on the Internet.
The More the Merrier
To add to this scenario, the malicious shortcut can also be configured to spread to other devices by messaging everyone on the victim’s contact list, prompting them to download and install the same shortcut. This would be a cost effective and hard to detect distribution method, coming from a trusted contact.
In a video we created we show how native functionality can be used to make convincing ransom threats to someone running a malicious Siri Shortcut.
Pay attention to the following steps taking place in the video:
The shortcut is configured to gather personal data from the device:
It can collect photos from the camera roll.
Grab the contents of the clipboard.
Get the physical address of the device’s location.
Find the external IP address.
Get the device’s model.
Get the device’s current mobile carrier
The Siri Shortcut can message the information to an external party; this data can also be sent over SSH to the attacker’s server using native functionality.
The Shortcut can set the brightness and volume of the device to 100%
It can turn the device’s flashlight on and off while vibrating at the same time to get the user’s attention and make them believe their device has been taken over.
The Shortcut can be made to speak a ransom note which can include convincing personal details to make the user believe the attacker. For example, it can indicate the IP address and physical address of the person and demand payment.
The Shortcut can be further programmed to then display the spoken note in a written alert format on the device.
To nudge the user to pay up, the Shortcut can be configured to open a webpage, accessing a URL that contains payment information to a cryptocurrency wallet, or a phishing page demanding payment card/account information.
To spread around, and since Siri Shortcuts can be shared among users, the malicious Shortcut could also send a link to everyone in the user’s contact list giving it a “worm like” capability that’s easy to deploy but harder to detect.
Not Only Ransom
In our security research labs, we tested the ransom attack scenario. The shortcut we created was named “Ransom” in the video, but it could easily be named any other name to entice users to run it. Lures, such as game cheats/hacking, unlocking secret functionality in apps, or getting free money, often entice users to tap on a shortcut and see where it leads.
From our researchers’ experience, users may fall prey to social engineering and end up installing and running malicious code or apps on their devices.
Using Siri Shortcuts More Safely
Siri Shortcuts has its merits and some security concerns to be aware of. Yet, it is possible to use this functionality in a safer manner.
Never install a Shortcut from an untrusted source.
Check the permissions that the shortcut is requesting and never give permission to portions of your phone you are not comfortable with. Things like photos, location and camera could be used to obtain sensitive information.
Use the show actions button before installing a third-party shortcut to see the underlying actions the shortcut might take. Look for things like messaging data to numbers you don’t recognize, emailing data out, or making SSH server connections to servers.
Apple Controls Centralized Patch Control
Siri Shortcuts is a native feature of iOS12; however, in order to utilize custom shortcuts, one must download the Shortcuts app from Apple’s app store. This gives Apple the ability to patch/update the functionality of the Shortcuts app without having to update the entire OS version.
Users Should Be Very Selective with App Permissions
It’s also important to note that using the shortcuts is designed for, and therefore requires, a lot of user interaction. First, users must download and install the shortcut from a shared source, and then manually tap it to run. Users must also grant access to photos, contacts or any sensitive data the shortcut wants access too.
A sharp reminder to validate anything you install on your mobile device as Shortcuts allows you to see everything the script is capable of before installing. As tempting as it might be to just scroll past that text and hit accept, users must be more aware of good security practices, which includes reading and understanding anything they authorize to run on their device.
Social media caught fire yesterday as the news of a new Apple bug spread. It seemed that there was a flaw in FaceTime that allowed you to place a call to someone, but listen in on their microphone if they didn’t pick up. Worse, as the news spread, it turned out that there was also a way to capture video from the camera on the target device, and that this issue was affecting not just iPhones and iPads, but Macs as well.
The result was a chorus of voices all saying the same thing: turn off FaceTime. The good news, though, if you’re just tuning in now, is that this is completely unnecessary, as Apple has disabled the service that allowed this bug to work.
How did the bug work?
The bug relied entirely on a feature of iOS 12.1 and macOS 10.14.1 called Group FaceTime. If you are using an older version of iOS or macOS, you have nothing to fear.
The bug involved doing something a bit unusual with Group FaceTime. First, you would have to place a FaceTime call to your intended victim. Next, while the call is still ringing, you would need to bring up the Add Person screen and add yourself to the call. Doing this would invoke Group FaceTime, and the microphone of the intended target would be activated, even if they didn’t answer.
Capturing video from the target phone’s camera required one of two known techniques. One would be to hope that the recipient pressed the power button on the phone to “decline” the call, in which case the camera would turn on as well. (Of course, if they pressed it twice, as some have become accustomed to doing on iPhones in these days of scam calls, that would cut the video off again. But you’d still see a flash of video.)
Alternately, you could apparently join the call from another device, which would also turn on the recipient’s camera. (Although I was able to test and verify everything else, I didn’t know about this trick until after Apple disabled Group FaceTime, so I can’t verify this one from personal experience.)
What were the dangers?
To make this work, you would need to rely on the target not answering, which could potentially be orchestrated if the target’s activities were known and it was likely that he or she would both be disinclined to answer at the time of the call, and be doing or saying something of interest. (I think we can all think of at least one such activity!)
Fortunately, this did pretty much rule out generalized surveillance, though nonetheless, there were some valiant efforts (most likely pranks) in the brief time the bug was known.
This also didn’t open up an open-ended wiretap. FaceTime rings for a while, but not forever. At most, you might get about a minute or so of spying. It’s also not the stealthiest of attacks, since you’d literally be announcing yourself in the process.
All this means that the risks were fairly low for anything beyond a prank. I personally did not feel it necessary to turn off FaceTime on my devices. Once I was aware, I could have simply covered the camera and ended the call—or had a little fun with the caller by playing Rick Astley into the phone’s mic!
How was this resolved?
Apple temporarily solved the problem by disabling Group FaceTime on their servers. This means that you can no longer add people to a FaceTime call, so the bug currently cannot be triggered. Apple will undoubtedly release iOS and macOS updates with a fix for this bug.
It’s unknown how soon Apple will re-enable Group FaceTime after that update is released, so if you’re on iOS 12.1 or macOS 10.14.1, it will be of great importance to install the next update in a timely fashion! You don’t want to be caught with your pants down (possibly literally) on a vulnerable system after the Group FaceTime switch is turned back on.
How did this happen?
Apple has had an unusually large number of high-profile and embarrassing bugs of late, which has led many people to ask what has happened to Apple’s quality assurance process. This bug is no exception.
Worse, it appears that at least one person knew about the bug almost two weeks before the news broke, and had been trying to alert Apple.
It’s unknown at this point exactly which points of contact for Apple this person was using, so it’s entirely possible that the right people at Apple didn’t learn about it until they saw it on the news. Since Apple didn’t disable Group FaceTime until after the news broke, I would hope that this is the case. It would be far more concerning if the right people at Apple knew about the bug, but didn’t make the call to disable Group FaceTime.
What’s the takeaway?
Bottom line, at this point, there’s absolutely no reason to panic or to turn off FaceTime. If you turned off FaceTime, and you want to turn it back on, it’s safe to do so, as long as you don’t delay installing the next update. There’s no indication that FaceTime can be abused without having Group FaceTime available.
There will be some who cite this as a reason to delay installing system updates. They will say that you should wait and let others work out the bugs. However, this is questionable advice. If you stay on an old version of iOS or macOS, you are using a system that has known security issues. That’s a far riskier proposition than updating to a newer version of the system where there aren’t (yet) any known security issues. From a security perspective, you should always install updates in a timely fashion.
FaceTime bug is exposing calls and videos – Here’s how to disable FaceTime until this issue is fixed. According to reports, there is a major bug in iPhone FaceTime’s video calling function that lets users hear audio from the call even before the recipient has accepted the video call. Moreover, the flaw also lets people see […]
Earlier today Apple users from all over the world, including US citizens and permanent residents, realized that they could spy on each other by taking advantage of a FaceTime exploit that allows eavesdropping. First reported by 9 to 5 Mac, the bug in Apple’s videotelephony app allowed users without any technical skills to eavesdrop on virtually anyone in the world who uses FaceTime. By simply making a FaceTime video call users were able to listen through the callee’s device, even if the call recipient was not picking up. All users had to do was to create a “group call” by adding themselves to a standard two-way video call. The self-addition was tricking the system into thinking that all participants have picked up the phone. This ended up resulting in eavesdropping on the callee’s device. Here’s a video that shows the exploit in action:
What made the bug even worse was the fact that the caller was able to see a video stream directly from the recipient’s device should the recipient hit the power button to “reject” the video call. In response to the major privacy breach, Apple decided to turn off the group FaceTime feature, until they figure out how to get it fixed.
The FaceTime bug is currently one of the trending stories on all social media platforms. Dozens of users have already uploaded videos replicating the exploit. Some users even reported that they have managed to reproduce the FaceTime bug with an iPhone calling a Mac.
After the bug was discovered Apple issued a statement acknowledging it and stated that they plan to issue a fix later this week. New York City governor Andrew Cuomo called the FaceTime bug an “egregious breach of privacy that puts New Yorkers at risk.” Governor Cuomo added that he is “deeply concerned by this irresponsible bug that can be exploited for unscrupulous purposes.” It is currently unknown for long has the exploit been active.
The bug comes only weeks after Apple started using the following slogan “What happens on your iPhone, stays in on your iPhone.”, a wordplay from the famous Las Vegas slogan “What happens in Vegas, stays in Vegas.” Coincidently, the bug was also discovered on the national Data Privacy Day. Unaware of the exploit, and hours after the bug was discovered, Apple’s CEO Tim Cook tweeted that people “must keep fighting for the kind of world we want to live in. On this #DataPrivacyDay let us all insist on action and reform for vital privacy protections. The dangers are real, and the consequences are too important.”
What has Apple done to stop the bug?
Apple managed to anger the crowds by stating that they will patch the bug “later this week” but failed to take any immediate action to prevent people from spying on each other. However, hours after they realized the seriousness of the issue, they completely turned off the group FaceTime feature on all Apple devices and issued an update to patch the exploit. The group FaceTime feature is still temporarily unavailable.
What should you do?
First and foremost, you can delete the FaceTime app from your iPhone or Mac and reinstall it after Apple confirms that the issue has been officially fixed. If you do not wish to remove the app, you can disable the app through the settings of your iPhone or Mac.
This is a yet another great example why keeping your OS fully up-to-date is vital. Apple just issued a patch that fixes the exploit so if you are an Apple user, now is a good time to go and update your OS if you haven’t done so already.
Last but not least, install antivirus software on all your connected devices. Having another layer of protection on all your Apple products will prevent hackers from obtaining any missing pieces they may need from you to commit cybercrimes.
With Apple offering a clearance sale on the iPhone SE earlier this week, The Verge's Nick Statt decided that it was "the appropriate moment to hop on the backup phone bandwagon" and pick one up. He writes: I've always appreciated the classic 5S design, with its overtly rounded corners and its sturdy, not-so-delicate dimensions. It never felt like it really required a case, and its smaller screen and more comfortable, one-handed use is something I've thought far too much about as I've ferried around an iPhone X and now an XS over the past year and a half. Plus, it's got a headphone jack. Would you agree that the iPhone SE is "the best minimalist phone right now," or do you think that title belongs to a different device? Why or why not?
Apple produces some of the best health-related technology that helps users in one or the other way. Products like (PRODUCT)RED and Apple Watch have helped millions of users across the globe to stay healthy and fight deadly diseases.
A recent patent suggests that Apple may add miniature gas sensors in the future iPhone and Apple Watch models. So here’s everything you need to know about the “Poisonous Gas Sensor.”
Recently Apple has been granted a patent for small-sized sensors that could detect the presence of harmful gases like carbon monoxide. These sensors could be installed on future Apple products like iPhone, iPad, and Apple Watch.
This small-sized sensor can detect major harmful gases like Carbon Monoxide (CO), Ozone (O3), Nitrogen Dioxide (NO2), Nitrogen Monoxide (NO), Sulphur Dioxide (SO2), Methane (CH4) and volatile organic compounds (VOCs).
According to some reliable sources, this poisonous gas sensors will also be deployed in smart home and Internet of Things devices.
Poisonous Gas Sensor: The Benefits
According to a recent report from Centers For Diseases, Carbon Monoxide poisoning results in the death of around 400 Americans every year and around 20,000 injuries. It is worth noting that, Carbon Monoxide is an odourless and colourless gas. Consequently, it becomes fairly difficult to identify the gas.
The Poisonous Gas Sensor on Apple devices is a life-saving technology that will help prevent deaths from poisonous gases like Carbon Monoxide. With features like ECG on Apple Watch Series 4, it’s clear that Apple is working hard to protect the lives of people with innovation in day to day technology.
Do share your thoughts and opinions on the addition of Poisonous Gas Sensor on iPhone and Apple Watch in the comments section below.
A China-based security researcher associated with the Qihoo 360 Vulcan Team has published a proof-of-concept exploit for a kernel vulnerability, which he claims to be the second stage of an exploit chain that he was successfully able to jailbreak iPhone X remotely. The researcher Qixun Zhao posted the PoC on Twitter from his Twitter handle […]
Foxconn hit by iPhone sales slowdown sheds 50,000 contract workers earlier than expected
Foxconn Technology Group, Apple’s biggest iPhone assembler, has cut around 50,000 of its contract jobs since October 2018 at its most important iPhone factory in Zhengzhou, China, reports Nikkei.
Foxconn generally hires thousands of temporary employees throughout the peak season to meet the seasonal demand of newly released iPhone models. The company typically renews workers’ contracts every month from August until January. The company then reduces the influx of temporary employees once the demand decreases. However, this time around, Foxconn has cut many of those contract jobs months earlier than expected. Weaker demand for the iPhone throughout late 2018 is believed to be the reason behind the cut.
While the size of the cuts is not an issue, it is simply significantly sooner than previous years, the report said, citing an industry source familiar with the situation.
“Normally, the contracts of these workers would be renewed every month from August until mid- to late January, when the workforce is traditionally scaled back for the slow iPhone production season,” the source told Nikkei. “It’s quite different this year to ask assembly line workers to leave before the year-end.” This year, those reductions came as much as three months early.
Foxconn isn’t the only Apple supplier making cuts. A similar story has been witnessed at Pegatron, which is Apple’s second largest iPhone assembler.
A source close to the company [Pegatron] said its normal practice was to reduce the 200,000-strong head count by tens of thousands every month until reaching about 100,000 – the minimum required for daily operation, according to one source familiar with the situation. “And for , it just happened sooner than in the past because of poor demand.”
The story is no different in case of smaller suppliers either.
One key component supplier based in Shenzhen had asked 4,000 workers to take an extended “vacation” from October to March, a person with knowledge of the situation said. “The company has not actively laid off those workers yet. It will decide whether or not to lay them off after March 1,” the source said.
The slow iPhone production sales have come at a time when Foxconn is scaling down its costs by combining its Mac and iPad production lines with those of Dell and Acer. It is looking to cut 100,000 jobs out of a workforce of 1.1 million by the end of 2019 across its associates and subsidiaries.
Chinese man suffers organ failure after selling his kidney to buy an iPhone
We have heard crazy stories about Chinese people going to the extent of selling their sperms to kidneys to newborn kids to own Apple’s latest gadgets. Well, this obsession to own an iPad and iPhone has now rendered this Chinese man bedridden for life!
Wang Shangkun, now 25, had sold his right kidney as a teenager (17 years) in 2011 to the black-market organ harvesters to buy Apple’s latest devices, as his family was too poor to afford it. Back then, he received 22,000 yuan for his kidney, which he used to purchase an iPhone 4 and iPad 2, reports News.com.au.
“Why do I need a second kidney? One is enough,” he had asked at the time.
According to CNTV, Wang who dreamt of owning Apple’s iPad 2 was approached by human organ harvesters online, who offered him hard cash for his kidney.
“At the time, I wanted to buy an iPad2, but I didn’t have any money. When I was on the internet, I had a kidney agent send a message, saying that selling a kidney can give me 20,000,” he explained.
Without informing his family, Wang secretly traveled from his home in the eastern Anhui Province to the southern Hunan Province. After the operation was carried out, Wang was sent back home.
Wang’s health started deteriorating immediately after the operation. Unsanitary conditions at the time of surgery and lack of postoperative care are believed to be the reasons behind the development of infection that eventually led to renal failure in his second kidney. Wang’s health condition also forced him to give up on his studies.
According to local China media reports, Wang now spends his days in bed and depends on the dialysis machine to clear his blood of toxins to survive his kidney failure. He is now dependent on social benefits.
In 2012, nine individuals were arrested in connection with the sale, including five surgeons, and were jailed for their involvement. Wang’s family reportedly received $225,000 in compensation the same year.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
According to KrebsOnSecurity, the phishing scam began for Global Cyber Risk LLC CEO Jody Westby when she received an automated call that displayed Apple’s logo, physical address, company domain and customer support phone number. The call warned Westby that unknown attackers had compromised multiple servers containing users’ Apple IDs. It then urged her to ring a 1-866 number immediately.
Suspicious of the call, Westby contacted Apple’s support number directly and requested a callback from a support representative. The agent who called back reassured Westby that Apple had not placed the original call. But when she looked at her phone, Westby observed that her iPhone had lumped together both the scam call and the official callback under Apple’s contact profile on her device. Not surprisingly, this failure of Apple’s own devices to spot a spoof call could potentially fool many users.
The Prevalence of Phishing Attacks Targeting Apple Users
This phony call scam stands out for its extensive use of Apple branding. But by no means is it the only phone-related phishing scam targeting Apple users in recent history. For example, in July 2018, Ars Technica identified an India-based tech support scam using a fake Apple website that popped up a system dialog box with a prompt to call the fraudsters.
These phishing instances come after enterprise mobile security and data management provider Wandera found in 2017 that nearly two-thirds of mobile phishing attacks occur on iOS devices. This rate means that Apple users are twice as likely to experience phishing on their devices than Android users.
Help Your Employees Defend Against Phishing Scams
Security professionals can help employees defend against phishing scams by creating a security awareness training program that uses clear, concise policies based around business requirements. Organizations should also take a layered approach to email security — requiring a mix of both technology and education — to better defend against email-borne phishing campaigns.
Profitsteigerung ist eine der Maximen jedes Cyberkriminellen. Da wundert es nicht, dass die SophosLabs nun eine neue Machenschaft aufgedeckt haben, die auf der Tatsache beruht, dass Werbetreibende mehr Geld pro Klick zahlen, wenn dieser von vermeintlich wohlhabenderen iPhone- oder iPad-Besitzern kommt. Da der sogenannte Klickbetrug, bei dem kommerzielle Werbeflächen geklickt oder Klicks zur Manipulation der […]