The trucking industry is worth hundreds of billions of dollars per year. Uber is going after this market with Uber Freight, an online platform that matches truckers with...Technologyread more
Drone strikes attacked an oil processing facility at Abqaiq and the nearby Khurais oil field on Saturday.Marketsread more
Trump said oil would be released if needed to keep the market well supplied and he would expedite the approval of pipelines in Texas and other states.Marketsread more
Saudi Aramco is aiming to restore by Monday about a third of its crude output that was disrupted after drone attacks on two key oil facilities, The Wall Street Journal...Marketsread more
Apple's new iPhones can still send texts, download apps, and make video calls, but the company spends a lot of time and effort marketing its new phones as powerful photography...Technologyread more
Some U.S. manufacturers say tariffs, if targeted, will help address longstanding unfair trade practices like intellectual property theft.Traderead more
Supporters of a $15 minimum wage ballot initiative in Florida argue the state's inflation-tied pay hikes have not gone far enough.2020 Electionsread more
Saudi Arabia shut down half its oil production Saturday after drone strikes hit the world's largest oil processing facility in an attack claimed by Yemen's Houthi rebels.Politicsread more
Trusii's hydrogen water machines were supposed to help users with their health problems, but customers claim the company is involved in a giant scam.Technologyread more
The decoupling of the world's two weightiest economies seems as inescapable as its extent and global impact remains incalculable.Politicsread more
BlackBerry has reinvented itself to become a leader in securing mobile communications and in embedded communications. Next year it plans to roll out new products. CEO John...Evolveread more
Google Project Zero, a group that examines and publishes security and privacy exploits it finds in public software, said Thursday evening that there were huge security holes in iPhone software that existed for two years. The exploits gave attackers access to photos, location information, private messages and more.
Apple has recently emphasized iPhone privacy with a big marketing campaign. At CES 2019, just across from the main conference center that was plastered with Google Assistant logos, Apple posted an ad that read: "What happens on your iPhone, stays on your iPhone." The company has also run commercials touting the privacy features of the iPhone.
The flaws were fixed in February when Apple released iOS 12.1.4 after Google notified the company, which is why Google is now talking about the flaws publicly. But Google said the attack could be used against iPhone owners who visited a "small collection of hacked websites" and could have affected "thousands of visitors per week."
According to the Project Zero's Threat Analysis Group, there were 14 different exploits that hackers were using to take private information from iPhones. "Seven for the iPhone's web browser, five for the kernel and two separate sandbox escapes," the group said.
Google said it wasn't targeted at specific people, all you had to do was visit an infected site.
One flaw let attackers gain access to private messages. "The implant has access to all the database files (on the victim's phone) used by popular end-to-end encryption apps like WhatsApp, Telegram and iMessage," TAG explained, noting that the attackers could get database files with "unencrypted, plain-text of the messages sent and received using the apps."
Attacks could also give hackers access to contacts, Gmail messages, photos and real-time location information, the group said, noting that attackers could also install apps.
"The implant has access to almost all of the personal information available on the device, which it is able to upload, unencrypted, to the attacker's server," TAG explained. "The implant binary does not persist on the device; if the phone is rebooted then the implant will not run until the device is re-exploited when the user visits a compromised site again. Given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device."
The flaws are fixed now, but Google said that "for this one campaign that we've seen, there are almost certainly others that are yet to be seen."
An Apple spokesperson was not immediately available to comment.
Follow @CNBCtech on Twitter for the latest tech product news.