After previous attacks on Github, Google, Yahoo and Microsoft, the Chinese authorities are now staging a man-in-the-middle (MITM) attack on Apple’s iCloud.
In the early 00s, Finland’s two biggest industries were paper manufacturing and cell phones, led by the then-dominant Nokia. A decade later, both industries are in trouble — and as the country’s prime minister suggested in a recent interview, Apple might be to blame in both cases. “One could say that the iPhone killed Nokia and the iPad killed the Finnish paper industry, but we’ll make a comeback,” Prime Minister Alexander Stubb told CNBC on Monday. “We just have to keep at it.”
A lot of advice is thrown at women to be considered equals in the workplace — lean in, speak up, be confident, demand raises and promotions, don’t dress “slutty” — which in itself is problematic because it places the onus on women to correct the culturally entrenched male dominance in workplaces.
(Companies should be the ones working to demolish the “old boys club,” and putting practices into place including strict policies on sexual harassment, equal pay, mentorship and paid maternity and paternity leave, for starters.)
However, advice given by Microsoft CEO Satya Nadella hit a new level of terrible: Don’t ask for raises, trust that your “super powers,” “the system” and “karma” will get you what you want. I’m not sure what mystical world Nadella is living in, but I imagine that there, raises gallop magically into a woman’s bank account via a unicorn.
Update: Microsoft CEO Satya Nadella issued an apology, which an be read here.
Steve was too limited when he said it:
“The only problem with Microsoft is they just have no taste. They have absolutely no taste. And I don’t mean that in a small way, I mean that in a big way, in the sense that they don’t think of original ideas, and they don’t bring much culture into their products.”
Because, really. If you’re trying to rephrase something that came out inartfully the first time, don’t try to fit it into one tweet. Take up all the goddamn space you need so that it comes out better the second time. A petri dish has more culture than Microsoft..
The seemingly ongoing battle between Google and Apple has been well-documented, but it’s always at its best when the CEOs start trading blows. In an interview with Charlie Rose last month, Tim Cook took Google to task for its data collection practices. Unsurprisingly, Eric Schmidt wasn’t too pleased with Cook’s representative of his company, so he took the time to respond on a CNN Money segment this week.
“Someone didn’t brief him correctly on Google’s policies,” Schmidt quipped. “It’s unfortunate for him. In the first place, in Google’s case, we have always been the leader in security and encryption. Our systems are far more secure and encrypted than anyone else, including Apple. They’re catching up, which is great.”
First, Tim Cook wasn’t talking about how well they protect data from others – he was talking about how well they protect data from themselves… here’s what he said:
Cook said Apple makes most of its profits by selling hardware, unlike many of its Silicon Valley neighbors that profit from advertising targeted at their users.
“Our business is not based on having information about you. You’re not our product,” Cook said. “I think everyone has to ask, how do companies make their money? Follow the money. And if they’re making money mainly by collecting gobs of personal data, I think you have a right to be worried.”
So, Let me summarize this back-and-forth:
“You’ve been spying on your users!”
“That’s not true! We protect our users from being spied on by other people all the time!”
So, Schmidt, you’re a deceptive little douche.
I have a long running bash instance (inside a screen session) that is executing a complex set of commands inside a loop (with each loop doing pipes, redirects, etc). The long command line was written inside the terminal – it’s not inside any script. Now, I know the bash process ID, and I have root access – how can I see the exact command line being executed inside that bash?
Microsoft had a few internal builds calling it “Windows 9″, and they started testing all kind of third party software and ran in to this.
And that’s when they decided to call it Windows 10….
Late last night, Microsoft unveiled the next version of the Windows operating system, Windows 10. The company says that the new operating system is designed to run across a wide range of devices, including desktops, laptops, smartphones, tablets, servers, as well as tiny Internet of things devices. “Windows 10 will deliver the right experience at the right time on the right device,” Microsoft’s operating systems chief Terry Myerson said. However, Windows 10 isn’t fully designed yet. At the event, Microsoft demonstrated several new features of the operating system, but noted that this is just the scratch of the surface it plans to ship with the final version of Windows 10, which ships next year.
In that case, you’d better not install it on your surface, right?
Microsoft is to put some numerical distance between its poorly received Windows 8 operating system and its replacement by calling the new version Windows 10.
The new operating system, expected to be released next year, comes three years after the launch of Windows 8. It was announced at an event aimed at business users in Seattle.
“Windows 10 will be our most comprehensive platform ever,” Terry Myerson, head of the operating systems group, told the audience. “It wouldn’t be right to call it Windows 9.”
If you thought people waiting in line to buy an iPhone 6 was batshitinsane, check this:
Apple invited people to check out the new Apple Watch in person — for one day only — in Paris during Fashion Week, at the Colette boutique on Rue Saint Honoré.
If you use enough force to bend an iPhone, or any phone, it’s going to deform.”
No, the latest iPhone software does not allow for the device to be quickly charged by heating it up in the microwave, despite some convincing, but very fake online ads.
Microwaving the phone will not only ruin the device, it could cause a fire or explosion, authorities said.
But a hoax floating around the Internet seemed so legitimate to some that even police are spreading the warning, as noted by the Los Angeles Police Department communications unit on Twitter.
So clearly, as if there was any doubt, iPhone users are not smarter than average.
Comic legend Joan Rivers has been dead for over a week now, but apparently that hasn’t stopped the Fashion Show star being chuffed to bits with her new iPhone 6-feet-under.
In a warning to PR companies everywhere, sponsored scheduled posts appeared on Rivers’ Facebook and Instagram accounts on Friday morning – before they were quickly taken down.
When Apple published its first Transparency Report on government activity in late 2013, the document contained an important footnote that stated:
“Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us.”
Writer and cyber-activist Cory Doctorow at the time recognized that language as a so-called “warrant canary,” which Apple was using to thwart the secrecy imposed by the Patriot Act.
Warrant canaries are a tool used by companies and publishers to signify to their users that, so far, they have not been subject to a given type of law enforcement request such as a secret subpoena. If the canary disappears, then it is likely the situation has changed — and the company has been subject to such request.
Now, Apple’s warrant canary has disappeared. A review of the company’s last two Transparency Reports, covering the second half of 2013 and the first six months of 2014, shows that the “canary” language is no longer there.
Some rivalries will never die — chocolate vs peanut butter, Yankees vs Red Sox, and iPhone vs Android, just to name a few. With the announcement of the iPhone 6 and iPhone 6 Plus, many Android users took to the Internet to loudly exclaim how underwhelmed they were by the devices. Its new features were things they’d already had for years, except for all the ones that weren’t, of course. Rivalries are fun, but the musings of voices on the Internet aren’t nearly as important as the voices of the buying public. And when you compare the launch numbers of various Samsung Galaxy S phones to the iPhone 6 and earlier iPhones, there’s absolutely no competition.
And still the overall market share of Android is higher. I think it’s because people who get an iPhone make a conscious choice to do so, and (most) people who get an android do so because they walk into a store and tell the sales rep they want “a phone”. They will make calls, use facebook, make a selfie, and that’s it. They never download an app unless recommended by a friend (“get snapchat!”), and just use the phone as a phone and are very happy with it.
According to a new report from The Financial Times, Apple stands to make quite a bit of money from its payments service. Banks and payment networks will be forking over 0.15 percent of each purchase to Apple, which equates to 15 cents out of a $100 purchase.
They are also paying hard cash for the privilege of being involved: 15 cents of a $100 purchase will go to the iPhone maker, according to two people familiar with the terms of the agreement, which are not public. That is an unprecedented deal, giving Apple a share of the payments’ economics that rivals such as Google do not get for their services
According to bank executives, Apple was able to negotiate with so many partners and receive choice deals because the industry didn’t see anything threatening in Apple Pay. One executive suggested that Apple’s payment model continued to put banks “at the centre of payments.” Apple may also have been able to negotiate better deals due to the tight security it has in place for Apple Pay. Payments will be made via NFC with a one-time token, and also secured with a Touch ID fingerprint.
There’s not much time now before the announcement, and some pictures of the apple wearables have leaked. These are confirmed as having come from Apple.
2. http://i.imgur.com/5aAu9h.jpg (apple logo clearly visible)
3. http://i.imgur.com/XrFzih.jpg (showing range of colors)
4. http://i.imgur.com/PpLv1h.jpg (hinting at a future google glass competitor?)
Apple Inc has invited top fashion editors and bloggers in unprecedented numbers to its Tuesday launch gala, further evidence that the iPhone maker is preparing to take the wraps off a smartwatch.
According to a designer who works at Apple, Jonathan Ive, Apple’s design chief, in bragging about how cool he thought the iWatch was shaping up to be, gleefully said Switzerland is in trouble — though he chose a much bolder term for “trouble” to express how he thought the watchmaking nation might be in a tough predicament when Apple’s watch comes out.
As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.
On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on iCloud.com. And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.
The fact that Apple isn’t complicit in law enforcement’s use of Elcomsoft’s for surveillance doesn’t make the tool any less dangerous, argues Matt Blaze, a computer science professor at the University of Pennsylvania and frequent critic of government spying methods. “What this demonstrates is that even without explicit backdoors, law enforcement has powerful tools that might not always stay inside law enforcement,” he says. “You have to ask if you trust law enforcement. But even if you do trust law enforcement, you have to ask whether other people will get access to these tools, and how they’ll use them.”
Apple issued a media advisory related to recent celebrity photo theft, saying the accounts were compromised by a very targeted attack on users names, password and security questions and was not related to any breach of Apple’s systems, including iCloud.
Over the weekend a number of nude celebrity photos appeared online. Jennifer Lawrence, Kate Upton, Lea Michele, Victoria Justice and Kirsten Dunst all had their photos comprised, among others.
We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.
To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website athttp://support.apple.com/kb/ht4232.
If you are a celebrity, it’s more likely that people know the name of your first pet, or your mothers maiden name…
Rumors are pretty solid about the iPhone 6, but it’s unclear if there’s going to be any wearables, iWatches, or similar.
And the rumors about them are as varied as the rumors were about the original iPhone. So, how accurate are those rumors? Take a look at what people predicted the iPhone will look like, and take that as a reference…