Apple Allows Uber to Record Your iPhone Screen, General Electrics Chooses AWS for Cloud Transformation and More in This Week’s News

Uber Can Record Your iPhone Screen Activity

Security researcher Will Strafach recently found that the Uber app can secretly record user activity on iPhone devices.

The feature, also known as “entitlement”, is selectively granted by Apple and for now there’s no information on any other apps having such large permissions granted. Entitlement is a powerful feature from the newly introduced screen-recording API which allows apps to record a user’s screen and all the information even if the app is closed (recording passwords, monitoring users and collecting personal data).

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

The main issue is that vast amounts of such sensitive data would become very vulnerable if someone managed to hijack Uber’s software. A representative of Uber also said that the entitlement was only used for an old version of the Apple Watch app because the original Apple Watch lacked map rendering capabilities.

It is still unclear for how long the Uber app has had these permissions. However, since the disclosure, Uber said it would proceed to remove the code from its iPhone app’s codebase.

A close-up of a smartphone screen displaying various app icons,including the Uber app.

Read More:

Hacker News, Gizmodo

General Electric Partners With AWS to Complete Cloud Migration

Since the start of the company’s digital transformation in 2014, General Electric has used AWS for most of their cloud needs. As of recently, GE has chosen Amazon’s cloud branch as their “preferred cloud provider”.

Over 2,000 GE apps will be hosted on AWS, including those by GE Power, GE Aviation, GE Healthcare, GE Transportation, and GE Digital divisions.

“Adopting a cloud-first strategy with AWS is helping our IT teams get out of the business of building and running data centers and refocus our resources on innovation as we undergo one of the largest and most important transformations in GE’s history.

Chris Drumgoole, CTO and Corporate VP @ General Electric

AWS said that cloud migrations as the one by GE are something it regularly encounters across various industries and sectors. An increasing number of companies is looking for safe, adaptable and flexible platforms to host critical infrastructure elements.

Read More:

Cloud Pro, Business Wire

NGINX Launches Open Source WAF

The NGINX team announced their Web Application Firewall (WAF) platform, which will operate on top of their open-source ModSecurity software.

The new NGINX WAF has four main components:

  1. Layer 7 attack prevention
  2. Custom regex-based rules for developers and engineers on a given network
  3. Automated DDoS protection
  4. Tracking of all traffic activity and transactions for future analysis

The NGINX WAF is hardware-free, fully open source and can be deployed in any network or infrastructure. The open-source approach is meant to bolster collaboration and data sharing to prevent malicious attempts across entire sectors and networks.

The logo of NGINX,displayed in green letters on a dark background.

Read More:

Bizety

Russian Hackers Stole NSA Secrets Through Kaspersky According to Wall Street Journal

A recent article from the Wall Street Journal states that the 2015 NSA data breach was executed through a security program by Russia-based Kaspersky Lab.

In what is described as a Russian state-sponsored attack, hackers stole classified NSA data from a contractor back in 2015 whereas the breach was discovered later in 2016. It’s important to note that there are no firm evidence on the involvement of Kaspersky.

“As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight.”

Eugene Kaspersky, CEO @ Kaspersky Lab

The NSA contractor reportedly downloaded a cache of classified data to a personal computer where it was accessed by hackers.

It is still not clear how the files were stolen. Speculations suggest that the company’s server, based in Russia, may have granted the Russian government access. The details are unclear, and we are yet to see how the “most significant data breach in recent years” will unfold.

Illuminated sign of Kaspersky Lab during nighttime.

Read More:

Hacker News, Wall Street Journal

Disqus Discloses 2012 Hack

Disqus, the well known commenting system, disclosed a massive security breach dating back to 2012.

The web-based comment plugin company admitted a breach from 5 years ago when cybercriminals stole data about over 17.5 million users. The stolen data included: email addresses, usernames, sign-up dates and login dates. Hackers also got their hands on passwords for about one-third of the affected users.

The company became aware of the breach when Troy Hunt, an independent security researcher obtained a copy of the information on 5th October and then proceeded to notify Disqus.

The vector of the breach is still unclear and the San Francisco-based company is still actively investigating this security incident.

Logo of Disqus with a blue background and a speech bubble containing the letter D.

Read More:

Hacker News, Disqus Blog

 

Latest Articles

Three Ways CISOs Can Combat Emerging Threats in 2025

73% of CISOs fear a material cyberattack in the next 12 months, with over three-quarters convinced AI is advancing too quickly for existing methods to combat it. But what can CISOs do to prepare for the coming wave – and access the resources they need to deal with this evolving threat landscape? To find out, […]

11th November, 2024
How Optimizing Kafka Can Save Costs of the Whole System

Kafka is no longer exclusively the domain of high-velocity Big Data use cases. Today, it is utilized on by workloads and companies of all sizes, supporting asynchronous communication between even small groups of microservices.  But this expanded usage has led to problems with cost creep that threaten many companies’ bottom lines. And due to the […]

Itay Tal Head of Cloud Services
29th September, 2024
Migrating Volumez RedHat VMs into Amazon Linux 2 for higher effective discounts rate of Saving Plan

A cloud data infrastructure company relied on extensive use of multiple instance types to test its products. But this made it difficult to optimize costs – a fact which had begun to impact their ability to scale the business.   The GlobalDots team helped the company identify and implement a new infrastructure configuration that both saved […]

Itay Tal Head of Cloud Services
19th September, 2024
How Yuki Achieved SOC 2 Compliance 6x Faster

Overview A fast-growing Snowflake optimization platform was missing out on customers because they didn’t have the right data security compliance. Through multiple consultations and extensive vendor-testing, the GlobalDots team selected a solution to provide both tech and human support, helping the company achieve SOC 2 compliance within just 3 months – and win new customers […]

Itay Tal Head of Cloud Services
16th September, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services