Categories
Hardware iPhone Pictures Rumor

Additional iPhone 6 production, comparison photos leaked

The iPhone 6 leaks and early images continue… Over on the Weibo photo sharing service, a user with the handle “dreamerJimmy” has posted additional shots of the supposed iPhone 6 design, including a comparison shot of the upcoming handset against the iPhone 5s. Apparently, dreamerJimmy was able to get early shots of the iPhone 5 […]

Categories
iOS News security Software

iOS 7 Lock Screen bug discovered, Apple says fix is en route

Per Forbes and AllThingsD, the first iOS 7 security bug has appeared and may be worth noting. The bug is currently found in the iOS 7 Lock screen and Control Center implementation that could allow a person to bypass the device’s passcode and access the photo library. This bug is more of a potential security […]

Categories
Hardware iPad Pictures

Leaked iPad 5 component image points toward thinner, lighter design

It’s a leaked component shot, but it might say something about the design of the next-gen iPad. Per AppleInsider and Apple.pro, a new image has emerged that shows what looks to be a full-size fifth-generation iPad’s front panel, again showing design cues taken from the iPad mini. The image shows the rear side of what […]

Categories
Hardware iPhone Rumor

Rumor: Next-gen iPhone could incorporate sapphire crystal Home button, built-in fingerprint sensor

It’s a rumor, so it kinda sorta has to be true… Per Cult of Mac, the next-gen iPhone 5S handset could come with a sapphire crystal capacitive touch home button that incorporates a new fingerprint sensor, according to supply chain sources in Taiwan and TechNews.tw. Apple is expected to do away with the traditional physical […]

Categories
Hack iOS News security Software

Lockscreen bypass available in iOS 6.1, contacts vulnerable through hack

Ok, they’re probably going to need to fix this. Per The Verge, a security flaw in Apple’s iOS 6.1 lets anyone bypass your iPhone password lock and access your phone app, view or modify contacts, check your voicemail, and look through your photos (by attempting to add a photo to a contact). The method, as […]