While Apple claimed that its iOS 8 operating system cured any iCloud security issues with two-factor authentication, a researcher recently found a bug that could enable an attacker to steal iCloud passwords from the latest version of the operating system, iOS 8.3, reported Ars Technica.
Apple may finally be on the road to success with its cloud applications. That is if the rumors are true that the company is building a high-speed network and changing the way it designs its data centers. Considering the company joined the Open Compute Project a few months ago, it seems like we should bet on the rumors being true.
Attackers are launching phishing attacks against victims of iPhone and iPad theft to track victims into supplying iCloud log-in credentials, according to security firm Symantec.
Microsoft is opening the door to more integration between Office and third-party cloud storage companies. At one time, these moves could have made life a lot easier for mobile workers trying to get a grip on accessing and managing their files. At this point though, it could be a bit too late.
Apple has expanded the use of two-factor authentication to its iMessage and FaceTime apps after introducing it last year for iCloud following the breach of compromising celebrity photos.
The release of a new hacking tool targeting iCloud's Apple ID dictionary is not reassuring for iPhone users and others who store data, knowingly or unknowingly, on iCloud.
Despite the bad publicity resulting from the iCloud breach that exposed personal celebrity photos, Apple's new Mac operating system Yosemite uploads documents to iCloud servers by default, even if the files are closed without being saved, reports Slate.
Windows users will be able to use Apple's iCloud as a full cloud storage drive ahead of Mac users, after the company released the iCloud Drive for Windows app.
The top news stories for Sept. 22, 2014.
Connecticut Attorney General George Jepsen has asked to meet with Apple executives to discuss privacy concerns he has about the new Apple Watch, which tracks user's health information and collects other sensitive data.