Researchers from Georgia Tech have discovered an alarming iOS security hole, and even managed to sneak malware past Apple’s App Store review process. Called Jekyll, in a nod to Robert Louis Stevenson’s novella, the malware was disguised as a Georgia Tech news app. Once installed, it could post tweets, send messages, take photos, retrieve personal information, and even direct Safari to install more malware. The researchers could also control the app remotely, adding more commands and capabilities. It even phoned home, revealing that Apple spent only a few seconds reviewing the app before approval. After testing the app briefly on their own devices, the researchers pulled it from the App Store. follow link
Option-Click AirPort Menu for Network Details
If you hold down the Option key while clicking the AirPort menu in Mac OS X 10.5 Leopard, you'll see not just the names of nearby Wi-Fi networks, but additional details about the selected network. Details include the MAC address of the network, the channel used by the base station, the signal strength (a negative number; the closer to zero it is, the stronger the signal), and the transmit rate in megabits per second showing actual network throughput. If you hover the cursor over the name of a network to which you're not connected, a little yellow pop-up shows the signal strength and type of encryption.
- ExtraBITS for 19 August 2013 (19 Aug 13)
Georgia Tech Researchers Sneak Malware into the App Store