apple

  1. Friend

    Illegal Deepfake Sites and Their Connection to Google and Apple: The WIRED Investigation

    Tech giants are on the side of those who create fake images. Big tech companies such as Google, Apple, and Discord are facilitating users' quick access to malicious sites that use artificial intelligence to "strip" people in photos, creating images of naked bodies without their consent. For...
  2. Dilling

    Настраиваем iPhone для Работы

    Всем привет. Не для кого не секрет, что самым чистым для антифрода устройством является телефон. Качественно настроенный iPhone может послужить хорошим помощником в успешном вбиве, верификации или любом другом направлении Подготовка iPhone к настройке В идеале покупной iPhone нужно сбросить до...
  3. Friend

    The rise of attacks on macOS: why Apple is no longer synonymous with security

    More and more hackers want to take a bite of the cherished apple. MacOS - based devices are increasingly being targeted by hackers. Intel 471, a cyber intelligence company, has identified more than 40 hacker groups that are interested in malware and exploits for the Apple platform. Since last...
  4. Friend

    Apple boosts Gatekeeper Protection in macOS Sequoia

    The new version will make it harder to bypass Gatekeeper. Apple announced an update to the next version of macOS, which will make it harder for attackers to bypass Gatekeeper protection. Gatekeeper is an important line of defense in macOS, ensuring that only trusted applications run. When you...
  5. Carding Forum

    Apple announces homomorphic encryption package for Swift

    Cloud services will revolutionize privacy. Apple introduced a new package for homomorphic encryption in the Swift programming language. This package, which is publicly available, allows you to perform calculations on encrypted data without having to decrypt it. This solution provides a high...
  6. Carding Forum

    BeaverTail: Beaver Spy chews its way into the Apple ecosystem

    How can a simple job interview turn into a data theft operation? Cybersecurity researchers at Objective-See discovered an updated version of a well-known malware linked to hackers from North Korea, which is used for cyber espionage targeting job seekers. The malicious file identified by...
  7. Carding Forum

    Apple has released a guide to account protection

    Learn how to recognize fake messages and secure your devices. Recently, cases of fraud using social engineering aimed at users of Apple products have become more frequent. The company has released a detailed guide on how to detect fraud attempts and protect your data. The tips provided by...
  8. Tomcat

    Apple Intelligence: An AI that will never betray its user

    How does the company protect our data and ensure our privacy? Apple has introduced Apple Intelligence, a set of features that bring generative AI capabilities, such as rewriting draft emails, summarizing notifications, and creating custom emojis, to the iPhone, iPad, and Mac. During the...
  9. Tomcat

    Apple запускает частные облачные вычисления для обработки данных с помощью искусственного интеллекта, ориентированного на конфиденциальность

    Компания Apple объявила о запуске "новаторской облачной интеллектуальной системы" под названием Private Cloud Compute (PCC), которая предназначена для обработки задач искусственного интеллекта (ИИ) с сохранением конфиденциальности в облаке. Технический гигант описал PCC как "самую совершенную...
  10. Tomcat

    Say No to Apple: Elon Musk protects user privacy

    The head of SpaceX believes that the new Apple update violates the security of his companies. Elon Musk announced his intention to ban the use of Apple devices in his companies after Apple announced plans to integrate OpenAI technologies into the iPhone. The innovation, which allows the voice...
  11. Tomcat

    Apple banned the release of PC emulators for iPhone and iPad

    Opt-out for UTM The App Review group from the Apple App Store rejected the application of the developers of UTM, a universal PC system emulator for iPhone and iPad. This was announced in early June 2024 by the publication 9to5mac. The Executive Review board (ERB) sets policies for Apple's...
  12. Tomcat

    Apple refused to pay Kaspersky $1 million as a reward for the vulnerability search program

    Kaspersky Lab identified serious vulnerabilities in the iPhone, but did not receive anything from Apple under the Apple Security Bounty program. The reward could be up to $1 million. Payments were denied Apple refused to pay Kaspersky Lab a reward for vulnerabilities discovered in 2023 in iOS...
  13. Tomcat

    Apple biometric systems and their security

    Today, most people have a passcode on their mobile devices - this can be either a short PIN code or a password using letters and numbers. But it would simply be inconvenient to enter it several dozen times a day. Therefore, many companies have come up with ways to simplify the process of...
  14. Father

    Apple and Starlink merge the location data of billions of devices

    A recent study uncovered surveillance on an unprecedented scale. Researchers from the University of Maryland have identified serious security and privacy issues in the geolocation systems of Apple and Starlink. In the course of the study, it became clear that the data that companies collect and...
  15. vaineo mayne

    Apple pay to buy in physical stores.

    there will be an amount where im gonna need a PIN to buy something? any tips on this? I can use a USA cc in another store's countries?
  16. Father

    Apple и Google запустили кроссплатформенную функцию для обнаружения нежелательных устройств отслеживания Bluetooth

    Apple и Google в понедельник официально объявили о запуске новой функции, которая уведомляет пользователей как на iOS, так и на Android, если устройство отслеживания по Bluetooth используется для скрытого наблюдения за ними без их ведома или согласия. "Это поможет снизить риск неправильного...
  17. Father

    There are no more hidden trackers: a new feature from Apple and Google protects against espionage

    The joint specification introduces a new security standard for Bluetooth trackers. Apple and Google announced the launch of a new feature that notifies iOS and Android users if a Bluetooth tracker is being used to secretly spy on them without their knowledge or consent. The Detecting Unwanted...
  18. Father

    Apple vs Meta, Google and Spotify: how the battle for user privacy will end

    How tech giants use digital fingerprints of devices without our knowledge. Apple tightening its policy to combat digital tracking of users of iOS devices, requiring app developers, starting from May 1, 2024, to justify the use of certain APIs that can be used to identify devices. Apps without...
  19. Father

    Cuckoo: New macOS spy selectively attacks Apple computers

    How did CIS users manage to get full immunity from malware exposure? Researchers from Kanjii have identified a new malware called Cuckoo, aimed at Apple macOS systems. This malicious software not only provides a permanent presence in infected systems, but also performs a number of dangerous...
  20. Father

    Roskomnadzor recommends blocking Google, Apple and other bots on Russian websites

    The agency is concerned about data leaks and the collection of critical information. In late April, Roskomnadzor's Public Communications Management Center sent a letter to companies from the registry of hosting providers with recommendations for setting up restrictions on access to information...
Top