RSS

Monthly Archives: April 2016

iOS 8 bug deletes iCloud Drive documents

iOS 8 setting the trend:

Apple has released its latest and updated version of its operating system (iOS), the iOS 8, and this has been awaited for a longtime by the gadget lovers. You will have new updates in apps that we use every day with new way to exchange messages and clicks with friends and family. A new set of connections between apps and devices and also between different apps and between different devices. Also with extra inclusions and exclusions onto the device, helps the users and the developers to use this smart piece of gadget with a deeper range of access. iCloud and Touch ID, have made the iOS 8 the iPhone as the most peculiar version for the digital lovers.

Simply said, iOS 8 lets the user to reach things beyond the universe

iCloud – Masterpiece of iOS 8:

iCloud, an iOS 8 app gives you the liberty to work on any files from any devices, As with iCloud, the users can store his/her important documents be it spreadsheets, presentations images, PDFs and any other documents in any form in the iCloud drive safely. By doing the user can gain access to those safely stored documents through any of his/her iPad, iPhone, iPad, Mac, iPod touch or through PC.

Uploading files in iCloud:

Do you know to upload files in the iCloud Drive, Here is how it works, few easy and simple steps,

To save files in the iCloud Drive, Drag and drop the file to be stored in the iCloud Drive folder either on your PC running Windows 7 or on your Mac running OS X Yosemite.

It can also be done by starting a new document using an app on your iOS device, that is enabled by iCloud. this helps you to access all the documents from any of your devices.

Swapping devices to create and edit documents:

You can edit the documents on device and can view the edited version through the other device.

It is simple to understand, You would have been to take up a presentation at work, and that you have less time to finish the presentation that you have started at home on your Mac device, iCloud gives you hand to support, save the presentation on the iCloud drive, the next day at work you can do some additions and changes to your presentation on your iPad that gets saved on the iCloud drive, make it perfect instantly and here you go with the perfect presentation to present in front of your managers.

iCloud also helps the files to be shared through different apps.

Here comes the Mystery!

A kind of flaw has been found in the move through the iOS 8, hence deleting documents that have been stored in the iCloud Drive without the knowledge of the users.

This was found after so many complaints from the users from forums. The bug is found to trigger through the option to “Reset All Settings”

The “Reset All Settings” option is found in the Settings option under the General category. On clicking this option, it helps the user to reset the iOS settings not disturbing the data and media. But some of the users have found the deletion of documents that are saved in the iCloud drive after clicking the Reset All settings option.

On the call of these complaints, developers started to act upon this flaw. After a good amount of research, it was found that the bug was specific to iWork apps namely Pages, Numbers and Keynotes and other documents in the iCloud remained the safe.

Well this sounds embarrassing to Apple!

Apple has worked on a feature called the Time Machine this enables to instantly back up files that can be used to restore when the files are lost due to mishap. But some of the users have complained that the Time Machine feature did not help them retrieve their lost files back, but some have found to retrieve the lost iCloud drive files using the Time Machine feature. This seems to be mysterious, Hence developers are seriously working on this down fall that Apple is facing at the moment.

MacRumors, a website with a collection of Apple related news, reports and rumors, tested the bug and issued a following report.

During the phase of testing, iWork apps’ documents that safely saved in the iCloud drive on the iPhone and on the iCloud.com were deleted by choosing the “Reset All Settings”. Some time was allotted to sync the files to a Mac OS X Yosemite, while doing this, all the documents got disappeared from the device. The TextEdit documents that has a disabled access level over the iPhone was found to remain untouched on the Mac device.

iCloud Drive is as equal as Google Drive and other online based cloud storage services. It not just about storing files on the iCloud drive, its also about accessing and retrieving them from any device.

Hence Apple has to look on to this issue, to maintain its symbol of prestige, that the users are after it.

Related Security Source:

Internet Security Suitehttps://www.comodo.com/home/internet-security/free-internet-security.php

Antivirus for Windows: https://antivirus.comodo.com/windows-7/

 

Advertisements
 
Leave a comment

Posted by on April 29, 2016 in Mac OS X

 

Tags: ,

4 Steps to Create an Effective Data Breach Recovery Plan

How to Recover from Data Breach? A Step-by-Step Guide to Create an Effective Response Plan

In U.S., over 48% of organizations fall victim to data breach incidents each year. Such damages inflict a losses worth millions of dollar, incur uncertain downtimes corporates to suffer, severe business opportunities and may put a lasting dent to their brand reputation.

As quickly as a data breach takes place in any organization, the first response from the enterprise is usually to curb any further financial damage. Ideally though, security experts suggest that the response should be about limiting the scope of damage holistically; protecting the data from being lost further, containing the attack, complying with regulatory bodies and coming up with reputation management strategies for your business.

In order for a corporate business to apply these recovery measures, your business should draft a response plan that addresses a rehearsed approach to mitigate greater loss. The contingency plan should be so designed, and internalized by the employees, that in case of a data breach incident your company should be able to control the situation from worsening within the first 24 hours from the breach.

To encourage you to adopt a similar response plan, here is a break-up of what steps to take in the critical aftermath of the data breach.

1. Take a Stock of the Damage

Assessing the nature and intensity of the data breach should be the number one priority of the recovery plan. Instead of only focussing on calculating the financial loss, your business should check if any security loopholes still persist in your network. If, for example, a wireless device has been stolen or compromised during the breach, the IT team should work towards disconnecting it from the network and wiping corporate data from its storage. If your servers suffered from a Distributed Denial of Service (DDoS) attack, your IT department should enforce automation control to redirect trusted web traffic to a backup server while your firewall keeps combating the bad traffic from the malicious source.

2. Designate Roles

Just like the IT team is supposed to automatically start cleaning up the security mess, your company should assign individuals and team who can automatically assume their respective duties to handle legal affairs, containment issues, communication with the stakeholders, financial assessment, etc. This process-oriented step will save time and minimize confusion among the team about how to go about controlling the breach.

3. Log Facts and Investigate

Documenting is an often overlooked step in the data loss course correction, and yet – one of the most important ones. To avoid breaches from taking place again, or to better prepare for impending threats in the future, your organization should log every detail in a chronological draft, fact by fact, and have it for record. Your company’s board members, the forensic investigators and your clients will expect a detailed explanation and reasoning behind the attack, and how was it made possible. Logging facts will also give you an opportunity to identify possible loopholes in your security chain and patch the problem accordingly.

4. Rebound

After the careful assessment of data damage, the investigation of its cause and effects and implementation of remedial steps, it’s time for your network to get up to the speed again. To ensure the timely recovery, your team should carry out a thorough review to make changes in the team, privileges to data access, existing security policy, individual roles and so on. This can be implemented for time-being or permanently, depending on what course your company wants to take for the future to ensure stricter security rules.

Besides the above mentioned steps, your organization should also value the lessons learned during the breach incident, impart knowledge to empower your employee pool and enforce a routine audit on your network’s security to ensure best practices. It’s true that your servers can never be fully immune from a breach attack, but with the help of well-laid security policies and practice, you can save a lot of time and money to recover from the otherwise-devastating damages.

Comodo antivirus for the desktop and the enterprise is the best solution for preventing such breaches and Comodo Securebox will actually allow you to operate business as usual on an infected computer.

 
Leave a comment

Posted by on April 18, 2016 in Data Breach, Internet Security

 

Tags: , , ,

The War Over Encryption and Privacy

Apple is standing up against the FBI and the US Department of Justice over unlocking of an iPhone used by a terrorist involved in the December 2015 deadly massacre at San Bernardino. Google, Microsoft, Facebook, Twitter and other major IT giants are supporting Apple in what is touted to be a highly complex national-security issue that could have a major impact on encryption and preservation of privacy.

On 29th Feb, a NewYork judge ruled in favor of Apple in a typically similar case where the US government wanted Apple to unlock another iPhone – model 5S running iOS 7. This phone was owned by a drug dealer who had agreed to his offence. The US government was attempting to use the All Writs Act (AWA), a 1789 law, – with a boundless interpretation that would allow it to obtain all information that it desired. The judge found that the 1994 Communications Assistance for Law Enforcement Act exempted Apple from abiding with this government request. The FBI would probably appeal this ruling.

Early surveys revealed that the American public were divided in their support for Apple over accessing the terrorist’s phone. Later polls seem to add support to Apple’s stand against privacy intrusion, which could possibly allow the government to spy on phones.

It is not that Apple has not supported the government earlier in unlocking iPhones. In those models, there were backdoors to get into the phone. Apple has in recent models enhanced security, encrypted all data on the phones and without any backdoors. If it has to comply with the government’s request , then it has to develop new iOS firmware for specifically removing the passcode lockout feature on iPhones. In the iOS, more than 10 incorrect passcode attempts could erase the contents on the device. The new firmware – nicknamed “Govt OS” would be able to disable this feature, and additionally allow rapid entry of passcodes, and also remove the time delays that the iOS triggers when incorrect attempts are made. A brute-force tool would then be able to open access into the device.

Apple states that the software for the Govt OS requirements is non-existent as of now. In the eventuality that it does have to create the software, then it would have to allocate considerable amount of technical resources and time. The resulting Govt OS, which is a backdoor, could be a drastic weapon if it falls into the wrong hands. If the ruling had favored the FBI, then it would basically gain statutory approval to demand technological companies such as Apple to actively cooperate in criminal investigations. When Apple obliges the US government, then other countries would also demand access to bypass the passcode lockout feature. The result could be all-round spying on devices.
In this war, the US Congress has still not stepped in. It is waiting for event to play out in the courts. Legislators do not want to be linked to a ruling that would be unpopular with the public. The New York Judge had passed the ruling based on the fact that the Congress had forbidden acquiring what the government needed.
Opening a facility for a backdoor would affect the protective mechanisms of the iOS, which Apple customers have relied and are relying on. Not only would Apple incur significant cost to devalue its own product, but it would also lose massive business. This could set precedence for governments to demand IT companies to create known backdoors for their devices. In the era where systems without backdoors are being hacked, wantonly creating backdooors, however confidential they may be, would lead to massive theft and breach of data.

If such back-doors are created, then an effective antivirus and firewall (or) internet security suite could somewhat help prevent unauthorized access to devices and systems.

 
Leave a comment

Posted by on April 15, 2016 in Encryption, Internet Security

 

Tags: , , ,