<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Orbis Blog &#187; security</title>
	<atom:link href="http://blog.orbissolutions.com/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.orbissolutions.com</link>
	<description>Business and Technology Advice</description>
	<lastBuildDate>Thu, 29 Aug 2013 01:49:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Don&#8217;t forget to setup Find My iPhone</title>
		<link>http://blog.orbissolutions.com/2012/11/27/dont-forget-to-setup-find-my-iphone/</link>
		<comments>http://blog.orbissolutions.com/2012/11/27/dont-forget-to-setup-find-my-iphone/#comments</comments>
		<pubDate>Tue, 27 Nov 2012 19:15:19 +0000</pubDate>
		<dc:creator><![CDATA[Alex]]></dc:creator>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://blog.orbissolutions.com/?p=948</guid>
		<description><![CDATA[<a href="http://blog.orbissolutions.com/2012/11/27/dont-forget-to-setup-find-my-iphone/"><img align="left" hspace="5" width="150" src="http://blog.orbissolutions.com/wp-content/uploads/2012/11/findmyiphone_hero-300x238.jpg" class="alignleft wp-post-image tfe" alt="Find My iPhone" title="Find My iPhone" /></a>It was almost a year ago that somebody smashed the passenger side window of my car and stole my messenger bag which contained, among other things, my month old iPad. I was parked right outside the Trader Joe’s on 22nd Street where there were plenty of people walking around (it was 6:30pm). There was even [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It was almost a year ago that somebody smashed the passenger side window of my car and stole my messenger bag which contained, among other things, my month old iPad. I was parked right outside the Trader Joe’s on 22nd Street where there were plenty of people walking around (it was 6:30pm). There was even a guy from Trader Joe’s directing traffic around their parking lot. Yet nobody saw or heard anything. And of course there weren’t any security cameras monitoring the area where I was parked. I was pissed. My Trader Giotto’s Tomato Basil Marinara sauce never tasted so bitter.</p>
<p><a rel="attachment wp-att-953" href="http://blog.orbissolutions.com/2012/11/27/dont-forget-to-setup-find-my-iphone/findmyiphone_hero/"><img class="alignleft size-medium wp-image-953" title="Find My iPhone" src="http://blog.orbissolutions.com/wp-content/uploads/2012/11/findmyiphone_hero-300x238.jpg" alt="Find My iPhone" width="300" height="238" /></a>But I was most angry at myself for not setting up Find My iPhone. Had I taken a few minutes to set this up, I would have at least had a fighting chance to recover my iPad. So if you’ve got an iPhone, iPad, iPod touch or Mac make sure you enable Find My iPhone, which will help you locate your device on a map, play a sound, display a message, remotely lock your device, or even erase all the data on it.</p>
<p>In order to setup Find My iPhone, you’ll need to first setup iCloud on your device. This can be done by tapping the Settings icon on the Home screen, selecting iCloud, and entering your Apple ID. You can use the same one you use for iTunes or setup a new account. (<a href="http://www.apple.com/icloud/setup/ios.html" target="_blank">detailed instructions here</a>) Once iCloud is setup, make sure Find My iPhone is set to On.</p>
<p>Now, if your device is ever lost or stolen, you can download the free <a href="https://itunes.apple.com/us/app/find-my-iphone/id376101648?mt=8" target="_blank">Find My iPhone app</a> on another iOS device. Then login using the same Apple ID you used to setup iCloud. If your device is online, it will locate it on a map and allow you to play a sound on the device (useful if you’ve misplaced your phone or iPad). If you’re running iOS 6, you can enable Lost mode, which will allow you to enter a message that will be displayed on the device, a phone number where you can be reached, and a four digit passcode to remotely lock the device (if you already set a passcode on the device, it will be used). For even greater security, you can remotely erase all data on the device. If you get the device back, you restore your data from a backup (which conveniently can also be done through iCloud).</p>
<p>I have a new iPad now, and Find My iPhone was the first thing I setup. And if I’m ever craving Trader Ming’s Pot Stickers, I make sure to lock my bag in the trunk.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.orbissolutions.com/2012/11/27/dont-forget-to-setup-find-my-iphone/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Apple and Amazon Security Flaws</title>
		<link>http://blog.orbissolutions.com/2012/08/08/apple-and-amazon-security-flaws/</link>
		<comments>http://blog.orbissolutions.com/2012/08/08/apple-and-amazon-security-flaws/#comments</comments>
		<pubDate>Wed, 08 Aug 2012 22:39:37 +0000</pubDate>
		<dc:creator><![CDATA[Alex]]></dc:creator>
				<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://blog.orbissolutions.com/?p=909</guid>
		<description><![CDATA[<a href="http://blog.orbissolutions.com/2012/08/08/apple-and-amazon-security-flaws/"><img align="left" hspace="5" width="150" height="150" src="http://blog.orbissolutions.com/wp-content/plugins/thumbnail-for-excerpts/tfe_no_thumb.png" class="alignleft wp-post-image tfe" alt="" title="" /></a>Recently, tech journalist Mat Honan was the victim of an &#8216;epic hack&#8217; as a result of some pretty serious security flaws at Amazon and Apple. First, his Google account was taken over and deleted. Then his Twitter account was compromised, his AppleID account broken into, and all of his data on his iPhone, iPad and [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Recently, tech journalist Mat Honan was the victim of an &#8216;epic hack&#8217; as a result of some pretty serious security flaws at Amazon and Apple. First, his Google account was taken over and deleted. Then his Twitter account was compromised, his AppleID account broken into, and all of his data on his iPhone, iPad and MacBook were remotely erased. Pretty scary stuff.</p>
<p>How was this accomplished? Well, <a href="http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/" target="_blank">Honan got the details from the hacker</a> in exchange for promising not to press charges. Strong passwords are important but they are not enough; flaws in many customer service systems can allow hackers to reset your password and access your data. Ultimately, all they needed was Honan&#8217;s email address, a billing address (which they got from the Whois information for a domain registered under his name) and the last four digits of a credit card on file.</p>
<p>Turns out that all you needed to get into an iCloud account was a billing address and the last four digits of a credit card on file. The hackers called Amazon and told them they were Honan and wanted to add a credit card to the account. All you needed to do this is the name on the account, an associated email address, and the billing address. Amazon then allows you to input a new credit card number. After doing this, the hackers called back and told them that they lost access to the account. By providing the new credit card number and the billing address, they were able to add a new email address to the Amazon account. After this, they went to Amazon&#8217;s site and sent a password reset to the new email address, which allowed them to see all of the credit cards on the account &#8212; not the entire numbers, just the last four digits.</p>
<p>Pretty scary stuff. <a href="http://consumerist.com/2012/08/apple-and-amazon-quietly-change-security-procedures-after-epic-hack.html" target="_blank">Apple and Amazon have quietly closed these security flaws</a>, but you can be sure more holes will be discovered. Honan&#8217;s main recommendations are:</p>
<p>1. Don&#8217;t link together key services (i.e., your iCloud and Google accounts)</p>
<p>2. Don&#8217;t use the same email prefix across multiple accounts (i.e., mhonan@gmail.com, mhonan@me.com, mhonan@wired.com)</p>
<p>3. Backup your data &#8212; Honan lost photos covering the entire lifespan of his daughter, in addition to documents and emails that were stored in no other location.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.orbissolutions.com/2012/08/08/apple-and-amazon-security-flaws/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
