Tuesday, 24 September 2019

Apple says a bug may grant ‘full access’ to third-party keyboards by mistake

Apple is warning users of an iOS bug involving third-party keyboards.

In a brief advisory posted Tuesday, the tech giant said the bug impacts third-party keyboards which have the ability to request “full access” permissions.

Third-party keyboards can either run as standalone, or with “full access” they can talk to other apps or get internet access for additional features, like spell check. But “full access” also allows the keyboard maker to capture keystroke data or anything you type — like emails, messages or passwords — to its servers.

This bug, however, may allow third-party keyboards to gain full access permissions — even if it was not approved

Apple didn’t say much more about the problem. A spokesperson did not comment beyond the advisory. But the advisory said that the bug doesn’t affect iOS’ in-built keyboard.

The bug will be fixed in an upcoming software update.



from Apple – TechCrunch https://ift.tt/2moWHYf

Apple says a bug may grant ‘full access’ to third-party keyboards by mistake

Apple is warning users of an iOS bug involving third-party keyboards.

In a brief advisory posted Tuesday, the tech giant said the bug impacts third-party keyboards which have the ability to request “full access” permissions.

Third-party keyboards can either run as standalone, or with “full access” they can talk to other apps or get internet access for additional features, like spell check. But “full access” also allows the keyboard maker to capture keystroke data or anything you type — like emails, messages or passwords — to its servers.

This bug, however, may allow third-party keyboards to gain full access permissions — even if it was not approved

Apple didn’t say much more about the problem. A spokesperson did not comment beyond the advisory. But the advisory said that the bug doesn’t affect iOS’ in-built keyboard.

The bug will be fixed in an upcoming software update.



from iPhone – TechCrunch https://ift.tt/2moWHYf

iOS, iPadOS and tvOS 13.1 updates are now available

Apple has just released iOS 13.1. This updated brings everything new in iOS 13 in case you haven’t updated yet, as well as many bug fixes. I would recommend updating to iOS 13.1 to get a more stable phone.

But that’s not all. iPadOS and tvOS are finally making the jump to version 13 with iPadOS 13.1 and tvOS 13.1 also available today.

The update is currently rolling out and is available in the Settings app on your device. iOS 13.1 is compatible with the iPhone 6s or later, the iPhone SE or the 7th-generation iPod touch. iPadOS is compatible with any iPad, iPad mini and iPad Pro that was released in 2014 or later. tvOS 13.1 is compatible with any Apple TV that can run tvOS 12.

It’s also worth noting that today’s release of iPadOS and tvOS marks the launch of Apple Arcade on the iPad and Apple TV. For a $4.99 monthly subscription fee, you can access dozens of games across your Apple devices. You can also pair a PlayStation 4 or Xbox One controller with your Apple devices to play those games.

But first, backup your device. Make sure your iCloud backup is up to date by opening the Settings app on your iPhone or iPad and tapping on your account information at the top and then on your device name. Additionally, you can also plug your iOS device into your computer to do a manual backup in iTunes (or do both, really).

Don’t forget to encrypt your backup in iTunes. It is much safer if somebody hacks your computer. And encrypted backups include saved passwords and health data. This way, you don’t have to reconnect to all your online accounts.

Once this is done, you should go to the Settings app as soon as possible to get in the queue. Navigate to ‘Settings,’ then ‘General’ and then ‘Software Update.’ Then you should see ‘Update Requested…’ It will then automatically start downloading once the download is available.

Here’s a quick rundown of what’s new in iOS 13. This year, in addition to dark mode, it feels like every single app has been improved with some quality-of-life updates. The Photos app features a brand new gallery view with autoplaying live photos and videos, smart curation and a more immersive design.

This version has a big emphasis on privacy as well, thanks to a new signup option called “Sign in with Apple” and a bunch of privacy popups for Bluetooth and Wi-Fi consent, and background location tracking. Apple Maps now features an impressive Google Street View-like feature called Look Around. It’s only available in a handful of cities, but I recommend… looking around, as everything is in 3D.

Many apps have been updated, such as Reminders with a brand new version, Messages with the ability to set a profile picture shared with your contacts, Mail with better text formatting options, Health with menstrual cycle tracking, Files with desktop-like features, Safari with a new website settings menu, etc.



from Apple – TechCrunch https://ift.tt/2muRtdb

Adobe’s next-gen Fresco drawing and painting app launches on iPad

Adobe today announced that Fresco (previously also known under its codename Project Gemini), it’s long-awaited next-generation drawing and painting app, is now available on the iPad. If you’re a Creative Cloud subscriber, you should be able to download it right now, but unlike some of Adobe’s other products, Fresco will also come in a free version that has some limitations, but should still give you access to the overall experience of using the app. You’ll also be able to purchase Fresco as a stand-alone app.

As Adobe’s Kyle Webster notes, one of the areas the team really focused on was the variety of brushes that are available in the app, including all of your favorite Photoshop brushes. Given that Webster sold his company KylesBrushes to Adobe in 2017, that doesn’t come as a surprise. Similarly, the fact that Fresco makes good use of the Apple Pencil is very much expected.

The highlight of Fresco, though, is Adobe’s Live Brushes, which can recreate the feeling of painting with oils and watercolors. These brushes — and the way they interact with the virtual paper — are powered by some of the company AI smarts, courtesy of its Sensei platform.

In addition to oil and watercolor, Fresco also features vector brushes. Since Adobe already offers a vector drawing app in the form of Adobe Illustrator, you’ll also be able to use Fresco to create a first draft of your drawing and then take it to Illustrator to finish it up.

The iPad app is out now. Android and Windows users will have to wait a little bit longer.

Village J.C. Park



from Apple – TechCrunch https://ift.tt/2mSDdvn

Adobe’s next-gen Fresco drawing and painting app launches on iPad

Adobe today announced that Fresco (previously also known under its codename Project Gemini), it’s long-awaited next-generation drawing and painting app, is now available on the iPad. If you’re a Creative Cloud subscriber, you should be able to download it right now, but unlike some of Adobe’s other products, Fresco will also come in a free version that has some limitations, but should still give you access to the overall experience of using the app. You’ll also be able to purchase Fresco as a stand-alone app.

As Adobe’s Kyle Webster notes, one of the areas the team really focused on was the variety of brushes that are available in the app, including all of your favorite Photoshop brushes. Given that Webster sold his company KylesBrushes to Adobe in 2017, that doesn’t come as a surprise. Similarly, the fact that Fresco makes good use of the Apple Pencil is very much expected.

The highlight of Fresco, though, is Adobe’s Live Brushes, which can recreate the feeling of painting with oils and watercolors. These brushes — and the way they interact with the virtual paper — are powered by some of the company AI smarts, courtesy of its Sensei platform.

In addition to oil and watercolor, Fresco also features vector brushes. Since Adobe already offers a vector drawing app in the form of Adobe Illustrator, you’ll also be able to use Fresco to create a first draft of your drawing and then take it to Illustrator to finish it up.

The iPad app is out now. Android and Windows users will have to wait a little bit longer.

Village J.C. Park



from Android – TechCrunch https://ift.tt/2mSDdvn
via IFTTT

Xiaomi’s 108MP Mi Mix Alpha has a display that wraps around the back

As Samsung and Huawei double down on their foldable smartphone lineups, and other handset vendors try to hide the notch, Chinese giant Xiaomi today chalked out a different path altogether. The company unveiled the Mi Mix Alpha, a smartphone with a front display that fully wraps around the back, save for a strip.

The Mi Mix Alpha’s body is made of a single piece of sapphire glass with ceramics and aerospace-grade titanium alloy. So what does the extra display gets you? Nothing much. The back display lights up and takes over the front screen’s duties when you flip the phone. Otherwise, it just sits there doing nothing.

Xiaomi says the Mix Alpha is a concept phone, so it is going to have a limited production run for the device. The smartphone will go on sale in China in December for 19,999 yuan (~$2,800).

The innards of the phone are no slouches either.

While the size of the display remains unknown, it boasts a 180.6% screen-to-body ratio, Xiaomi said at an event in China. The Mi Mix Alpha is powered by Qualcomm’s latest and greatest Snapdragon 855+, coupled with 12GB of RAM, and 512GB UFS 3.0 storage. And it supports 5G connectivity.

The handset is housing 4,050 mAh battery and supports 40W wired fast charging, the company said. The Mi Mix Alpha is running Android Pie-based MIUI 11 software.

Which brings us to the strip: The front side of the Mi Mix Alpha does not have any camera sensors. Instead the back side sports a three-camera system: 108MP primary sensor it developed in collaboration Samsung, 20MP wide-angle sensor, and 12MP telephoto sensor.

At the sidelines of today’s event, Xiaomi also launched the Mi 9 Pro, follow up to the Mi 9 handset that the company unveiled earlier this year. The Mi 9 Pro, priced at roughly $520, now features support for 5G connectivity, becoming one of the low-cost handsets to support the networking technology. It also supports 40W fast charging, the company said.



from Android – TechCrunch https://ift.tt/2lk1IRp
via IFTTT

Tibetans hit by the same mobile malware targeting Uyghurs

A recently revealed mobile malware campaign targeting Uyghur Muslims also ensnared a number of senior Tibetan officials and activists, according to new research.

Security researchers at the University of Toronto’s Citizen Lab say some of the Tibetan targets were sent specifically tailored malicious web links over WhatsApp, which, when opened, stealthily gained full access to their phone, installed spyware and silently stole private and sensitive information.

The exploits shared “technical overlaps” with a recently disclosed campaign targeting Uyghur Muslims, an oppressed minority in China’s Xinjiang state. Google last month disclosed the details of the campaign, which targeted iPhone users, but did not say who was targeted or who was behind the attack. Sources told TechCrunch that Beijing was to blame. Apple, which patched the vulnerabilities, later confirmed the exploits targeted Uyghurs.

Although Citizen Lab would not specify who was behind the latest round of attacks, the researchers said the same group targeting both Uyghurs and Tibetans also utilized Android exploits. Those exploits, recently disclosed and detailed by security firm Volexity, were used to steal text messages, contact lists and call logs, as well as watch and listen through the device’s camera and microphone.

It’s the latest move in a marked escalation of attacks on ethnic minority groups under surveillance and subjection by Beijing. China has long claimed rights to Tibet, but many Tibetans hold allegiance to the country’s spiritual leader, the Dalai Lama. Rights groups say China continues to oppress the Tibetan people, just as it does with Uyghurs.

A spokesperson for the Chinese consulate in New York did not return an email requesting comment, but China has long denied state-backed hacking efforts, despite a consistent stream of evidence to the contrary. Although China has recognized it has taken action against Uyghurs on the mainland, it instead categorizes its mass forced detentions of more than a million Chinese citizens as “re-education” efforts, a claim widely refuted by the west.

The hacking group, which Citizen Lab calls “Poison Carp,” uses the same exploits, spyware and infrastructure to target Tibetans as well as Uyghurs, including officials in the Dalai Lama’s office, parliamentarians and human rights groups.

Bill Marczak, a research fellow at Citizen Lab, said the campaign was a “major escalation” in efforts to access and sabotage these Tibetans groups.

In its new research out Tuesday and shared with TechCrunch, Citizen Lab said a number of Tibetan victims were targeted with malicious links sent in WhatsApp messages by individuals purporting to work for Amnesty International and The New York Times. The researchers obtained some of those WhatsApp messages from TibCERT, a Tibetan coalition for sharing threat intelligence, and found each message was designed to trick each target into clicking the link containing the exploit. The links were disguised using a link-shortening service, allowing the attackers to mask the full web address but also gain insight into how many people clicked on a link and when.

“The ruse was persuasive,” the researchers wrote. During a week-long period in November 2018, the targeted victims opened more than half of the attempted infections. Not all were infected, however; all of the targets were running non-vulnerable iPhone software.

One of the specific social engineering messages, pretending to be an Amnesty International aid worker, targeting Tibetan officials (Image: Citizen Lab/supplied)

The researchers said tapping on a malicious link targeting iPhones would trigger a chain of exploits designed to target a number of vulnerabilities, one after the other, in order to gain access to the underlying, typically off-limits, iPhone software.

The chain “ultimately executed a spyware payload designed to steal data from a range of applications and services,” said the report.

Once the exploitation had been achieved, a spyware implant would be installed, allowing the attackers to collect and send data to the attackers’ command and control server, including locations, contacts, call history, text messages and more. The implant also would exfiltrate data, like messages and content, from a hardcoded list of apps — most of which are popular with Asian users, like QQMail and Viber.

Apple had fixed the vulnerabilities months earlier (in July 2018); they were later confirmed as the same flaws found by Google earlier this month.

“Our customers’ data security is one of Apple’s highest priorities and we greatly value our collaboration with security researchers like Citizen Lab,” an Apple spokesperson told TechCrunch. “The iOS issue detailed in the report had already been discovered and patched by the security team at Apple. We always encourage customers to download the latest version of iOS for the best and most current security enhancements.”

Meanwhile, the researchers found that the Android-based attacks would detect which version of Chrome was running on the device and would serve a matching exploit. Those exploits had been disclosed and were “obviously copied” from previously released proof-of-concept code published by their finders on bug trackers, said Marczak. A successful exploitation would trick the device into opening Facebook’s in-app Chrome browser, which gives the spyware implant access to device data by taking advantage of Facebook’s vast number of device permissions.

The researchers said the code suggests the implant could be installed in a similar way using Facebook Messenger, and messaging apps WeChat and QQ, but failed to work in the researchers’ testing.

Once installed, the implant downloads plugins from the attacker’s server in order to collect contacts, messages, locations and access to the device’s camera and microphone.

When reached, Google did not comment. Facebook, which received Citizen Lab’s report on the exploit activity in November 2018, did not comment at the time of publication.

“From an adversary perspective what makes mobile an attractive spying target is obvious,” the researchers wrote. “It’s on mobile devices that we consolidate our online lives and for civil society that also means organizing and mobilizing social movements that a government may view as threatening.”

“A view inside a phone can give a view inside these movements,” they said.

The researchers also found another wave of links trying to trick a Tibetan parliamentarian into allowing a malicious app access to their Gmail account.

Citizen Lab said the threat from the mobile malware campaign was a “game changer.”

“These campaigns are the first documented cases of iOS exploits and spyware being used against these communities,” the researchers wrote. But attacks like Poison Carp show mobile threats “are not expected by the community,” as shown by the high click rates on the exploit links.

Gyatso Sither, TibCERT’s secretary, said the highly targeted nature of these attacks presents a “huge challenge” for the security of Tibetans.

“The only way to mitigate these threats is through collaborative sharing and awareness,” he said.



from iPhone – TechCrunch https://ift.tt/2mnRz6l