Security News This Week: A Teenager Refuses To Tell Apple How He Hacked MacOS

Location data scandals, a Zcash bug, and other security-related headlines from the past week.

AT THE END OF THIS LONG WEEK, IT IS REALLY DIFFICULT TO DEVOTE MUCH MENTAL ENERGY TO ANY NEWS OTHER THAN Jeff Bezos’s war with the National Enquirer, BUT STAY WITH US! There are numerous intriguing developments in the investigation of special counsel Robert Mueller.

Before we continue, however, please take a moment to update to iOS 12.1.4, which fixes that very serious FaceTime group chat bug as well as a few other previously unknown vulnerabilities. Got it? Good, thank you! Consider this new Google Chrome extension that will prevent you from using passwords that have been exposed in data breaches. Those who prefer less expensive Android devices will be pleased to know that Google has also found a way to bring full disk encryption to less powerful hardware.

We also examined the US Census, which will be here before you know it, but hopefully, after the initial risks of going digital have been mitigated. Congress wants to hear from Facebook, Google, and Apple regarding Facebook’s efforts to monitor the iPhone activity of children as young as 13 without Apple’s knowledge.

Two researchers believe they have a better solution for Twitter’s bot abuse problem, despite Twitter’s inability to keep up. And renowned security expert Bruce Schneier argues that any faith you have placed in the blockchain is misplaced.

However, there is more! Each week, we compile the news that we did not break or extensively cover. Click on the headlines to view the complete articles. And remain safe outside.

A Teen Hacks Apple and Won’t Share How

This week, Apple had multiple encounters with adolescents! In the second instance, an 18-year-old German hacker demonstrated a vulnerability in macOS that allows an attacker to steal keychain passwords. Perhaps even more importantly, he has expressly chosen not to reveal his method. This is a protest against Apple’s lack of a macOS bug bounty program, a system that rewards hackers for discovering and disclosing vulnerabilities. Apple has an invite-only bug bounty program for iOS, but not for its desktop operating system.

The Zcash cryptocurrency had a flaw that permitted “infinite” forgery

Zcash is a promising cryptocurrency that prioritizes privacy. Until a small team of engineers patched it in October, it was also home to a pretty hilarious, potentially catastrophic vulnerability. The issue stems from a flaw in a cryptographic paper that describes the “zero-knowledge proofs” that enable the privacy features of Zcash. The Zcash team asserts that they found no evidence that anyone exploited the bug, although they cannot be certain. At the very least, no one appears to have printed an infinite quantity of digital currency.

The SIM Swapper Crackdown Has Finally Commenced

SIM swap attacks, in which cybercriminals use stolen phone numbers to circumvent two-factor authentication and break into your online accounts, have become a plague. However, there appears to be some progress in identifying the perpetrators. Last week, Joel Ortiz accepted a plea bargain to become the first person convicted of SIM-swapping, and recently unsealed indictments in California indicate that the federal government has built a case against two additional alleged hackers. Hopefully, the increased law enforcement action will have a greater deterrent effect.

For years, Bounty Hunters Could Track U.S. Smartphone Locations

Motherboard revealed that approximately 250 bounty hunters could purchase access to location data from AT&T, Sprint, and T-Mobile, including ultra-precise GPS data intended for emergency responders. All of these carriers promised they would stop sharing location information with third parties, then failed to do so, and then promised again. A single company submitted over 18,000 individual smartphone location requests in a single year, according to data obtained by Motherboard.

Why Trust Us?

Best Top Reviews Online was established in 2018 to provide our readers with detailed, truthful, and impartial advice on what to buy. We now have millions of monthly users from all over the world and annually evaluate over a thousand products.

The above article was written by the BestTopReviewsOnline team, which consists of some of the most knowledgeable technical experts in the United States. Our team consists of highly regarded writers with vast experience in smartphones, computer components, technology apps, security, and photography, among other fields.

Related Stories

  • All Post
  • Best Picks
  • Explainers
  • How To
  • News
  • Versus
iPhone 13: 7 Major Upgrades To Look For

January 2, 2021

The iPhone 13 is said to have a better design, a longer battery life, 120Hz displays, and much more. The iPhone 13 is expected to be unveiled in 2021 during its usual September launch window and based on early rumors…

Get more info



Best Products

Buying Guides

Contact Us

About Us

We provide a platform for our customers to rate and review services and products, as well as the stores that sell them. We research and compare the most popular brands and models before narrowing it down to the top ten, providing you with the most comprehensive and reliable buying advice to help you make your decision.

Disclaimer is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to As an Amazon Associate I earn from qualifying purchases.


Address & Map

20 S Santa Cruz Ave, Suite 300, Los Gatos, CA 95030, United States

© 2022 Pty. Ltd. All Rights Reserved. Licensing: All third-party trademarks, images, and copyrights used on this page are for comparative advertising, criticism, or review. As this is a public forum where users can express their opinions on specific products and businesses, the opinions expressed do not reflect those of