Security Threats Awaits OS X Yosemite And iOS 8
By Naveena Joy | June 11, 2014 4:52 PM EST
Apple has introduced a series of new features and technologies in the Worldwide Developers Conference. Those that brought huge applause are OS X Yosemite and iOS 8 operating systems.
iOS 8 brings in new openness to the operating system. The company's press release said it's their biggest developer release ever with more than 4,000 new application programming interface calls.
Apple wrote "iOS 8 allows developers to further customize the user experience with major extensibility features." But the openness invites security challenges as CNET reported more openness in Apple's mobile operating system that is great for developers and an enticement for hackers.
Richard Henderson, a security strategist at Fortinet's FortiGuard Threat Research and Response Labs, suggested the focus on continuity or seamless integration between OS X and iOS user experience may potentially be problematic for organizations and users.
Security Watch highlighted security challenges that can be faced by anyone thinking of participating in the public beta program.
1. Where is the Data Getting Stored?
The Handoff feature allows users to start working on something on iPad exactly from where they left off on the Mac. This process leads to many questions such as how exactly would Apple transmit information from one machine to another, whether Apple encrypts the data stored on iCloud servers and whether Apple can be asked to hand over information when faced with a National Security Letter or court order.
Henderson suggests an ideal situation where Apple would use end to end encryption since devices could generate private and public keys when setting up everything.
2. Password Free Hotspots Are a Threat
The Instant Hotspot helps users to share Internet connections without any password. This could be problematic especially in a public area, where anyone who can see and connect to the phone can wind up stealing bandwidth. Also, putting all these behind the iCloud account for security means only devices gets authenticated and Apple can take advantage of the hotspot feature.
3. Health Data is Not That Private
The HealthKit and Health app monitor heart rate, blood pressure, blood glucose levels and smart weigh scales. The health emergency ID screen, which also includes medications, can be accessed from the lockscreen easily. These features could be abused as it is visible to anyone who touches the phone.
4. Spotlight Data Has no location
Spotlight on both OS X Yosemite and iOS 8 will search data from sources like Wikipedia, Maps, Yelp reviews and news articles. It is unsure where Spotlight data are being stored, whether it is locally or on iCloud servers so that other devices can access the data. If Apple is building customer activity profiles similar to what Google does, then Apple should remove the profile when it is not in the Apple ecosystem.
To contact the editor, e-mail:
Most Popular Slideshows
Join the Conversation
- Motorola Droid Turbo v. Sony Xperia Z3: Camera Details, Battery Life And Durability
- ‘GTA V': 1.18 Update, Zombie DLC Release Date To Welcome Halloween
- Motorola Droid Turbo vs. Samsung Galaxy S5: Apps And Services, Camera Features, Battery Life And Durability
- Google Nexus 6 Sold-Out Inventory: Android 5.0, Motorola-Nexus Branding, Network Carriers, Competitive Price
- ‘Destiny' Leaks Reveal Redesigned Ships, New Armour, Sparrow Shaders
- Marvel Announces Release Dates Of 11 Upcoming Movies From 2015 To 2019
- Xiaomi Becomes World’s Third Largest Smartphone Manufacturer By Dethroning Huawei
- Entry Of Peshmerga Fighters From Iraq Boosts The Kobani Battle Against ISIS: Turkey Provides Transit
- Nexus 6, 9 Buyers on November Release Will Enjoy These 3 Killer Lollipop 5.0 Features First
- Nokia Lumia 730 v. Sharp Aquos Crystal – Specifications, Features And Price Showdown
- Woman Hanged In Iran Talks Abuse In Prison, Left Chilling Message To Family
- Australia Special Forces Await 'Delayed' Iraqi Visas Before Joining ISIS Fight