Tag Archive: Iphone


iOS 8 ‘Reset All Settings’ Bug Could Delete Your iCloud Files

 

 

 

 

 

” At the beginning of the month, Apple was criticized for the security flaw in its iCloud file storage service that, according to multiple media outlets, allowed hackers to allegedly retrieve nude photos of a number of high-profile celebrities. And Now, the company’s newly launched iOS 8 has been reportedly found vulnerable to another critical bug that is troubling Apple iOS 8 users.
  After the launch of iOS 8, some minor bugs was reported in its operating system which was quickly fixed in Apple’s iOS 8.0.1. But, the critical vulnerability discovered in iOS 8.0.1 seems to be deleting data stored in iCloud Drive without the user’s permission.
  The bug was uncovered by MacRumors after its forum members complaint about the issue triggered by the option to “Reset All Settings,” which is typically supposed to reset your network settings to give your iOS device a clean slate to work with, but it turns out the feature is also deleting all your files from iCloud Drive. “
More details at Hacker News

The Police Tool That Pervs Use To Steal Nude Pics From Apple’s iCloud

 

 

 

 

 

” As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

  On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on iCloud.com. And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.”

 

Wired

 

 

 

 

 

 

 

 

 

 

Smartphone Add-Ons Offer Thermal Imaging

 

 

 

 

” Thermal imaging, a long-costly technology that lets soldiers see in the dark and firefighters see through smoke, is rapidly moving toward the mainstream with phone add-ons that cost hundreds of dollars rather than thousands.

  Flir Systems Inc., FLIR +0.26% one of the best-known manufacturers in the field, in July introduced a $349 iPhone accessory that allows the smartphone’s display to show glowing heat signatures of people, animals, lights and other objects. Its Flir One looks a bit like a standard protective case for a smartphone. The camera-equipped black sleeve wraps around an iPhone 5 or 5s, allowing a user to point at objects while viewing images on its display.

   Meanwhile, a group of industry veterans at a startup called Seek Thermal this fall plan to begin selling an add-on camera for smartphones for about $100 less. Rather than a sleeve, the company plans to sell a small thermal-camera module that plugs into the bottom of a smartphone. In a recent demonstration, a prototype Seek Thermal camera generated color thermal images that can be contrasted with conventional images using a split-screen feature.”

 

 

The interested reader can find reviews of the Flir One here and here

 

 

 

WSJ has more

 

 

 

 

 

 

 

 

 

 

 

 

How The NSA Could Bug Your Powered-Off iPhone, and How To Stop Them

 

 

 

 

 

” Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.

  Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?

They can absolutely turn them on with the power turned off to the device,” Snowden replied.

  Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.”

 

 

Learn mored at Wired

 

 

 

 

 

 

 

 

 

 

Fueled Presents: 40 Years Of Cellphone

 

 

” Starting with the DynaTAC in 1974 and ending with a side-by-side comparison between the iPhone 5s and the Galaxy Note, Fueled’s designers and animators crafted the 40-year history of the mobile cell phone. For some it will be a walk down memory lane, for others a history lesson.

  Fueled’s Design Team describes the short video as Art Deco, a style characterized by its bold geometric shapes and rich colours. It’s a very eclectic style, deriving taste from a broad range of sources — some representing the machine age. You’ll notice the snappy animation style reflects the lightning fast transformation and evolution of cellphones.

  While the film may have ended with the first model of an iPhone, Fueled decided to dig into the evolution of Apple’s iPhone and compare it to top Android phones. It’s remarkable how little the iPhone’s aesthetic has changed in contrast to Android models, which are becoming larger and changing constantly.

  What will the next 40 years look like? Fueled’s Founder Rameet Chawla says, “While I don’t know exactly when, it’s only a matter of time before the cellphone will be completely obsolete.”

  If you recognize the voice in the script, you’ll know it’s from an old advertisement from 1980s for DynaTAC. At the time, no one knew how big mobile would become and that this one man’s prophecy would come true.”

 

 

 

 

 

 

 

 

Let’s Build A More Secure Internet

 

 

 

 

” Can we ever trust the Internet again?

  In the wake of the disclosures about the National Security Agency’s surveillance programs, considerable attention has been focused on the agency’s collaboration with companies like Microsoft, Apple and Google, which according to leaked documents appear to have programmed “back door” encryption weaknesses into popular consumer products and services like Hotmail, iPhones and Android phones.

  But while such vulnerabilities are worrisome, equally important — and because of their technical nature, far less widely understood — are the weaknesses that the N.S.A. seems to have built into the very infrastructure of the Internet. The agency’s “upstream collection” capabilities, programs with names like Fairview and Blarney, monitor Internet traffic as it passes through the guts of the system: the cables and routers and switches.

  The concern is that even if consumer software companies like Microsoft and telecommunications companies like AT&T and Verizon stop cooperating with the N.S.A., your online security will remain compromised as long as the agency can still take advantage of weaknesses in the Internet itself.

  Fortunately, there is something we can do: encourage the development of an “open hardware” movement — an extension of the open-source movement that has led to software products like the Mozilla browser and the Linux operating system.

  The open-source movement champions an approach to product development in which there is universal access to a blueprint, as well as universal ability to modify and redistribute the blueprint. Wikipedia is perhaps the best-known example of a product inspired by the movement. Open-source advocates typically emphasize two kinds of freedom that their products afford: they are available free of charge, and they can be used and manipulated free of restrictions.

  But there is a third kind of freedom inherent in open-source systems: the freedom to audit. With open-source software, independent security experts can scrutinize the code for vulnerabilities — whether accidentally or intentionally introduced. The more auditing by the programming masses, the better the security. As the open-source software advocate Eric S. Raymond has put it, “given enough eyeballs, all bugs are shallow.”

 

 

Source: Mercatus.org

 

 

 

 

 

APP TURNS SMARTPHONE INTO PERSONAL PANIC BUTTON,ALERT SYSTEM

 

 

” A “panic button” smartphone app that can alert friends and family if you are in trouble or feel threatened has been released, its British developers say.

PanicMe, created by developer DataMe in consultation with local police forces, allows a user to set up a personalized response network of friends and family to be contacted when a panic alert is activated, The Daily Telegraph reported Friday.

A traffic light system offers three panic options — green, amber or red — depending on the seriousness of the event, and as many as 30 numbers in the phone’s contact list can be selected for each panic option.”

 

 

 

 

 

 

 

Motorola Launches The Moto G Smartphone

 

 

” Earlier today, Motorola launched the followup to its slow-selling Moto X: a cheaper sibling, the Moto G. Almost three months after launch of the Moto X, Motorola hopes to reach the untapped lower and midrange markets where its first Google-powered handset couldn’t reach. 

Although this is officially the “cheap” version of the Moto X, the Moto G isn’t a device to be taken lightly. The smartphone comes stock with Android 4.3 Jelly Bean with Motorola promising an Android 4.4 upgrade by January. The smartphone also has a 1.2GHz quad-core CPU, 1GB of RAM, and 8GB or 16GB of internal storage. There’s a 5-MP camera with a 1.3-MP front-facing camera, which is a noticeable dip from the Moto X but still capable of good picture quality. During the launch event, Motorola said the device will give “all-day battery life,” but didn’t get into specifics. The G is rumored to have a 1950-mAh battery. “

 

    It’s about time someone released a good , relatively inexpensive , no-strings attached smartphone . Does anyone believe that these $800 iPhones and Galaxy’s are really worth that kind of expenditure ? The smartphone market is one area of the tech industry where we have yet to enjoy the continually declining costs inherent in the mass circulation of goods that has governed the electronics market . It’s about time . Let’s hope that the phone is a good one and that it’s presence on the market drives the competitors to reduce their price tags as well .

 

 

 

 

 

 

 

 

 

 

 

 

Where To Shoot

iPhone Screenshot 2

 

 

” Search for shooting ranges near you, view video shooting tips and find other resources for shooters. Managed by the National Shooting Sports Foundation (NSSF), Where To Shoot is the web’s most comprehensive directory of shooting ranges in the U.S. and Canada. This app brings that directory into the palm of your hand. A great resource for all gun owners, hunters and shooters. “

 

 

 

 

 

 

 

The Voice Of Siri Is Susan Bennett

 

 

 

 

” “I’m the original voice of Siri.” That’s the quote CNN attributes to Susan Bennett, a voice talent that says her voice was used for Apple’s virtual assistant. “I wasn’t sure that I wanted the notoriety,” Bennett tells CNN, explaining her delay in coming forward, “and I also wasn’t sure where I stood legally.” In fact, it was The Verge‘s article on synthesized speech that prompted her to come forward.”

 

 

 

 

 

 

 

 

 

11 Tips To Keep iOS 7 From Destroying Your Battery Life

 

 

 

” While your iPhone’s new operating system comes with plenty of advantages, iOS 7’s not without its drawbacks. Battery life just ain’t quite what you’d want it to be, but we’ve got some tips to squeeze the most out of that sucker and stay juiced all day long.

Many of iOS 7’s fancy new features are handy if you need/want them. If you don’t, they’re just eating away at that precious battery life behind the scenes, and give you exactly zero help for your trouble. So shut ’em down.”

Vatican City And Taipei Are The Two Other Cities Listed In The World Clock Without A Country In New Operating System

 

 

” Apple’s new iOS 7 operating system, like its predecessor, lists Jerusalem without a country.

Jerusalem is one of only three cities to be listed in the World Clock without a country, The Blaze reported this week. The others are Vatican City and Taipei.”

 

 

 

 

 

 

 

 

 

Footage Surfaces Of People Using Toes, Cats’ Paws And Nipples To Unlock The iPhone 5s

 

 

 

” It was heralded as a major step forward in smartphone security, grabbing the headlines when Apple unveiled its newest iPhone earlier this month.

Yet the fingerprint sensor on the iPhone 5s has become the subject of stifled giggles after videos emerged showing users unlocking the handset with big toes, cats’ paws and even their own nipples.

Already questions have been raised about the security implications of the new technology after a group of German hackers claimed to have bypassed Apple’s TouchID by taking prints from a glass surface.

Throughout the weekend technology bloggers found weird and wonderful ways to use the sensor. Here are five of the weirdest, accompanied with video footage.”

 

 

See more …

 

 

 

 

 

 

 

 

 

 

The Latest iPhone Is An Ode To Biometrics, Spying, And The Big Brother Control Grid

 

 

 

” The latest series of Apple’s iPhone will not only continue to cultivate numerous apps that track your location through GPS and transmit data directly back to corporations and government, but contain a fingerprint sensor that stores your fingerprint in order to purchase apps and unlock the phone for use.

And that’s really just the beginning. As millions will most likely continue through the Apple food chain and purchase this phone, the NSA and bloated federal government at large will be beyond ecstatic. Because after all, it’s a real dream come true for the Big Daddy government spy state. No longer will you actually need to be arrested to gather your fingerprints — we’re talking about millions nationwide willingly submitting their biometrics to a database that most certainly is accessible by Apple and big government.”

 

 

 

 

 

 

 

WARNING!!!! If You Take Photos With Your Smart Phone You Need To See This

 

Apple Investigates China iPhone Death Allegations

” Apple Inc. AAPL -0.27%said Monday that it is investigating a case in which the family of a 23-year-old woman alleges that she was electrocuted by her iPhone.

  Though details about the case remain sketchy, it has caught the imagination of social media users in China, who have been spreading word about the case and warning not to use devices while they are charging.ReutersA visitor tries an iPhone at an Apple store in Beijing March 28, 2013.

  According to a report in China’s official state-run Xinhua news agency, relatives of the woman in China’s western Xinjiang Uighur Autonomous Region are alleging the woman died after trying to answer a call while her iPhone was charging.

   An officer with the local Public Security Bureau said Monday that an “elementary inspection” showed the woman, named Ma Ailun, was electrocuted.

“Her neck had an obvious electronic injury,” he told China Real Time.”

Almost Half Of iPhone Apps Peek At Your Private Stuff

 

 

” Computer scientists at the University of California, San Diego discovered that nearly half of the mobile apps running on Apple’s iOS operating system have gained access to private data. These findings are based on a study of 130,000 users of jailbroken iOS devices, where users have removed restrictions that keep apps from accessing the iPhone’s operating system.

One might assume that the results are skewed because the study participants were using a jailbroken iPhone. However, the majority of applications in the study were downloaded through Apple’s App Store and were able to access the same information on locked phones as well.

In March, Apple stopped accepting new applications or app updates that access these “unique identifiers,” or privacy invaders. However, the findings suggest that although this update was made to the App Store policy, many apps can still get that information. Unique identifiers allow the creators of the app and advertisers to track a user’s behavior through all the different apps on their devices. Some apps even associate the unique identifier with the user’s email and other personal information.

The researchers developed an app called ProtectMyPrivacy (PMP) that is able to detect what data the other apps running on an iOS device are trying to access. Their application enables users to selectively allow or deny access to information on an app-by-app basis, based on whether they feel the apps need the information to function properly.

The team has also added notifications and recommendations for when an app accesses other privacy-sensitive information, such as a devices’ front and back camera, microphone and photos.”

“We wanted to empower users to take control of their privacy,” said Yuvraj Agarwal, a research scientist in the Department of Computer Science and Engineering at UC San Diego who co-authored the study. “The choice should be in users’ hands.”

 

 

 

 

 

 

 

9 Top Tech Myths Debunked

 

 

Jailbreaking and Rooting are Illegal

” Smartphone owners can jailbreak their iOS devices and root their Android phones to get around the restrictions of manufacturers and carriers. But is this ominous-sounding practice legal? The word itself—jailbreaking—makes it sound like the process is illegal. In actuality, it’s more complicated: The technique both is and isn’t illegal under U.S. copyright law. Last fall, when the Library of Congress updated the rules for 2013 through late 2015, it decided that you can legally jailbreak your smartphone (though you’ll void your Apple warranty) but not necessarily your tablet, because, the Library says, “tablets” is an ill-defined category. What is definitely not legal is unlocking your phone. The Library’s ruling prohibits tinkering with your device so it works on different cellular networks without your wireless carrier’s permission, which is subject to as much as $2500 in fines, or even jail time. 

Legal questions aside, is jailbreaking worth the trouble? Nearly 7 million iOS users who cracked their devices using the latest jailbreak since it became available in February say yes. And as for the riskiness of jailbreaking an iPad, just consider: Despite the law, absolutely no one has (yet) been prosecuted or fined.”

Read the other 8 here

 

 

 

 

 

 

 

10 Things BlackBerry Z10 Does That iPhone Can’t

 

 

” One solid sign that the Z10 is getting some attention in the United States is the number of inquiries I’m currently receiving from readers, colleagues, coworkers, friends and family about the Z10. The inquiries usually go something like this: “You have the new BlackBerry, right? [Insert name of somebody they know here; Joe Schmo, for example] has one too, and he really likes it. But I don’t know if I can switch from my iPhone. I’m due for an upgrade, but the new iPhone is coming out soon, and I might just play it safe. What can the new BlackBerry do that my iPhone can’t?”

Before I get started, I’ll state that this post is in no way saying the BlackBerry Z10 is “better” than the iPhone. You should do a lot more research before buying a new phone than just reading one article.

With that said, here’s a list of 10 BlackBerry Z10 features that you will not find in any iPhone.

(For more on the first BlackBerry 10 smartphone, read my Z10 guide, which includes a review, tips, tricks, best apps and more.)”

 

Continue Reading

 

 

 

 

 

 

Does Decreasing A Smartphone’s Brightness Increase Battery Life?

 

” A physicist has conducted a number of experiments on his mobile phone to see how the battery life can be extended. He came up with some interesting results.

 
Rhett Allain is a physicist and, like most people, a smartphone user. Frustrated by the common situation of getting towards the end of the day and his smartphone battery moving rapidly from green, to amber, and then to red, he looked at how the battery life could be extended.

 

The outcomes of his study are shown on his Wired Science page, accompanied by various equations and neat looking charts. He carried out his experiments using an iPhone 4. In terms of the outcomes of his study, the most important finding was that if the brightness level is adjusted downwards the battery on the phone lasts for longer.”

 

 

 

 

 

Meet The Groundbreaking New Encryption App Set To Revolutionize Privacy And Freak Out The Feds.

” For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds.

“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.”

Just in time for the revolution … truly secure comms

HT/Instapundit

Mr. Cool

“Tech challenge: Obama has trouble with iPhone”

  “The president had stopped at a campaign office in Port St. Lucie, Fla., to thank volunteers. Then, for the cameras, Mr. Obama was supposed to call two campaign workers who were out working on his behalf.

But when White House trip director Marvin Nicholson handed the president his personal iPhone, Mr. Obama couldn’t get it to work. A reporter who witnessed the scene said the president looked “befuddled.”

“It’s not clear he knows how to dial on an iPhone,” the reporter wrote in a pool report.”