Apple spying on customers

 

At Apple , we respect your privacy and protect it with strong encryption, plus strict policies that govern how all data is handled.

Explore the world of Mac . Check out the new MacBook Pro, MacBook, iMac, and more. Visit the Apple site to learn, buy, and get support.

I canceled the OnStar subscription on my new GMC vehicle today after receiving an email from the company about their new terms and conditions.

Apple spying on customers

"Our daughter stole our truck, bank cards, credit cards and the phone. The only way to find her was by tracking the SMS with your software. The police were able to catch her with the messages. We would not have caught her as fast as we did without Mobile Spy."
- Adam D

"I love this program it is working great and helping me monitor all the text messages from the monitored phone. I am trying to prevent pornography from getting to my child's phone."
- Mike

"That far exceeds what I would consider good product support! Thank you very much and you can count on my support and references on your other products, which by the way, are more stable and generally work better than those of your competitors."
- Robert

At Apple , we respect your privacy and protect it with strong encryption, plus strict policies that govern how all data is handled.

Explore the world of Mac . Check out the new MacBook Pro, MacBook, iMac, and more. Visit the Apple site to learn, buy, and get support.

I canceled the OnStar subscription on my new GMC vehicle today after receiving an email from the company about their new terms and conditions.

The television maker agreed to pay $US2.2 million ($2.9 million) to settle a case with the FTC and the New Jersey attorney-general's office after the agencies accused it of secretly collecting - and selling - data about its customers' locations, demographics and viewing habits.

Samsung's Family Hub refrigerator sends pictures of the food inside to your phone, but this feature worries security experts.

Fair Work Ombudsman Natalie James is questioned by a Senate committee over their investigation into underpayment at Domino's Pizza.

Jonathan Zdziarski, an iOS forensic examiner, may know more about iPhones than any other non-Apple employee. Yet even he can't find a reason for some of the mystery features buried within the iOS operating system, which look an awful lot like security backdoors that bypass user-designated data protections. 

The features could be there to let Apple — or even the National Security Agency or the FBI — get access to most of your iOS device's data without you knowing it.

In a presentation Friday (July 18) at the HOPE X hacker conference here, Zdziarksi detailed his discoveries about the data-collection tools hidden on iOS devices. Some tools are listed by name, yet not explained, in the Apple developer manual and do far more than advertised. Others are undocumented and buried deep within the iOS code.