Categories
Hardware iPhone Rumor

Rumor: iPhone 7 to feature edge-to-edge display, other features

The idea of an edge-to-edge screen on the iPhone 7 is a concept at this point. But it’s a pretty cool concept, you have to admit. The current rumor has it that the iPhone 7 will sport a very similar look to the iPhone 6s line, an assortment of major form factor changes arriving in […]

Categories
Hack iPhone Legal News security

FBI not submitting San Bernadino iPhone hack for peer review

The FBI is keeping the San Bernadino iPhone hack technique to itself for the time being. A recent report has stated that the FBI will not be submitting the exploit used to break into the iPhone 5c of San Bernardino shooter Syed Rizwan Farook to a review process that could clear it for sharing with […]

Categories
iOS News security

Security hole in iOS 9.3.1 could offer access passcode-free access to photos, contacts under certain conditions

If you’re running iOS 9.3.1 and gave Siri access to your Twitter information as well as yourContacts or Photos, this is something worth looking into. A video surfaced online yesterday purporting to show a vulnerability in iOS 9.3.1 that allows anyone to access photos and contacts on a locked iPhone without having to enter a […]

Categories
iPad iPad Pro iPhone iPhone SE News retail

Apple begins accepting pre-orders for iPhone SE, 9.7-inch iPad Pro

After several hours of downtime last night, Apple’s Online Store is back up and allowing customers to pre-order the iPhone SE and 9.7-inch iPad Pro. The iPhone SE starts at $399 off-contract, while the iPad Pro starts at $599. Deliveries will begin in one week on March 31st. In terms of carrier availability for the […]

Categories
Apple Watch Archive iOS security Software Wearables

Apple releases iOS 9.3 update

Amidst the kerfuffle of the March 21st media event, Apple also dropped the long-awaited iOS 9.3 update. The update, which weighs in around 310 megabytes, adds the following fixes and changes: – A fix for the iMessage encryption bug discovered by researchers at Johns Hopkins University. The exploit can lead to photos and videos sent […]