Apple to pay up to $500 million for deliberately slowing older iPhones

Towards the end of 2017, Apple fessed up, admitting that it had been deliberately and secretly slowing older models of iPhone in order to eke out extra life from their aging batteries. Understandably, the company’s customers weren’t happy and the stealthy throttling led to several lawsuits.

Now, the Cupertino firm has filed a settlement in a California court, agreeing to pay up to $ 500 million (with a minimum of $ 310 million) in the form of payments to affected US customers.

This includes $ 25 to anyone who owned one of the affected iPhones (listed below) and sums of either $ 1,500 or $ 3,500 to members of the class action lawsuit. 

These amounts will vary depending on how many people claim, as individual payouts will decrease if they exceed the maximum total of $ 500 million. However, if fewer people claim, the $ 310 million will go further for each individual (after $ 93 million is taken off for legal fees, of course).

Affected smartphones are considered any of the following, so long as they were running iOS 10.2.1 or later or, in the case of iPhone 7 and 7 Plus, it could have been running iOS 11.2 or later so long as it was doing so before December 21, 2017.

The case against Apple claimed that, due to the processor speeds slowing, consumers were being led to believe their current smartphone was nearing its end of life earlier than it actually was.

This prompted them to upgrade to a newer model, at considerable cost, when they could have simply replaced the battery had they known that was the cause of the issue.

The settlement allows Apple to deny that it did anything wrong in the legal sense, and the individual compensation has been described as “fair, reasonable, and adequate” by lawyers representing the consumers, according to Reuters.

TechRadar – All the latest technology news

Read More

FBI: Over $140 million handed over to ransomware attackers

By analyzing bitcoin wallets and ransom notes, the FBI has determined that cybercrime victims paid over $ 140m to ransomware operators over the past six years.

At this year's RSA security conference, FBI Special Agent Joel DeCapua presented in his findings during two sessions in which he explained how he was able to use bitcoin wallets and ransom notes collected by the FBI, shared by private partners or found on VirusTotal to figure out how much victims paid in ransom payments.

According to DeCapua, between October 2013 and November 2019, approximately $ 144,350,000 was paid in bitcoins to ransomware actors. However, this figure does not include operation costs related to these attacks but just the ransom payments that were made.

When it came to the most profitable ransomware families, Ryuk brought in the most money for ransomware operators at $ 61.26m followed by Crysis/Dharma at $ 24.48m and Bitpaymer at $ 8.04m. It's worth noting that the actual amount of payments made over these six years is likely much higher as the FBI does not have access to all of the data surrounding ransomware attacks, as many businesses keep them secret to prevent hurting their stock prices.

Defending against ransomware

During his sessions at RSA, DeCapua also provided some tips on how companies and individuals can avoid falling victim to ransomware attacks.

DeCapua revealed that the Windows Remote Desktop Protocol (RDP) is the most common method that ransomware attackers are able to gain access to a network before deploying ransomware. In fact, RDP accounts for 70-80 percent of network breaches which is why he recommends that organizations use Network Level Authentication (NLA) for additional protection. 

With NLA, clients are required to authenticate themselves with the network before they can actually connect to the remote desktop server. This provides increased security against preauthentication exploits though, DeCapua also suggested that unique and complex passwords should be used for RDP accounts.

Additionally, DeCapua suggests that businesses and individuals be careful of phishing attacks, install software and operating system updates, use complex passwords, monitor their networks and have a contingency plan with backups to prevent falling victim to a ransomware attack.

Via BleepingComputer

TechRadar – All the latest technology news

Read More