Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'iphone'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 182 results

  1. AweCleaner for Mac Giveaway AweCleaner for Mac Giveaway AweCleaner is an all-in-one Mac cleaner. It not only can help Mac users to easily and quickly clean up all junk files, but it also can uninstall applications, find/remove large files, find/remove duplicate files, free up memory, manage hard disk, etc. Giveaway
  2. [Win] Apowersoft Phone Manager Pro 2.8.8 ML (Android & iPhone) One-stop Management for Phones Apowersoft Phone Manager, one of the best mobile management software available on the market right now, is fully compatible with the two dominant smartphone operating systems – iOS and Android. It allows you to manage, transfer, view, restore, backup mobile or tablet files including messages, contacts, apps, bookmarks, call logs, wallpapers, songs, videos, etc easily on PC. – Auto-recognize the device with all information – Transfer all files from phone devices to PC and vice versa – Work perfectly with devices based on iOS and Android systems – Manage photos, music, videos, SMS, contacts and other files – Backup all kinds of data from your devices to PC – Restore mobile files from backups – Take phone screenshots with just one click on PC – Display the screens of phone in different modes Features: Release Notes Homepage - https://www.apowersoft.com/phone-manager How to Use Apowersoft Phone Manager Credit for medicine:Patched dll by @Deltafox Team URET Download Link: Apowersoft Phone Manager 2.x.x ML Online Portable by Geez
  3. Wondershare SafeEraser 100% Permanent Erasure of Your iDevice’s Data, Nothing Recoverable. Whether you are planning to give away your old iDevice to a friend or relative, donate to charity; sell on eBay, or trade-in for something new; you never know where your old device will end up. Don’t leave your personal information vulnerable to identify thieves; ensure it’s not recoverable by permanently wiping the iDevice with EafeEraser – think of it like a digital shredder. Prevent Identity Theft When Selling Your Old iDevice with 1-Click "Clean Slate" Privacy Safeguard for Ultimate Privacy Protection Website: http://www.wondershare.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Crack Size: 18,56 Mb.
  4. It's not yet known if the woman was charging the iPhone with the original charger or not If you’re reading this article on an iPhone, you'd better read fast because you never know what’s going to happen. An iPhone 7 Plus caught fire in the middle of the night while charging, with the owner sleeping only a few inches away from the device. While sleeping with the phone close to the head is not a recommended thing to do because of all the radiations, you now have another reason not to do it: the device could go boom and cause severe injuries. The Chinese owner of the iPhone 7 Plus explained she purchased the device in March, so it was barely one month old when it exploded. The woman, who only wanted to share her surname Chen, explained that she was sleeping in her home in Nanjing with the iPhone charging on a pillow right next to her. She was woken up at approximately 2 am because of what she describes as cracking sounds, so naturally, the first thing she did was to have a look at the device. The iPhone was emitting smoke, so she tried to throw it to the ground to reduce the risk of a fire and injuries, before noticing that the device caught fire and burned for approximately 3 minutes. Although no injuries were reported, Chen says the iPhone is completely ruined and pictures of the aftermath show the body melted in the place where the battery typically resides. iPhones? Never again Chen explains that she already took the broken iPhone to the retailer and an investigation already started, though a refund would only be issued when the cause of the incident is determined. It’s not yet clear if Apple already got in touch or not, but as it usually happens with such incidents involving iPhones, very little is known about Apple’s involvement and the outcome of the investigations. On the other hand, Chen says she no longer wants an iPhone unless Apple can guarantee that devices can’t burst into flames. “Even if they decide to give me a brand-new iPhone, I won’t accept it until they can provide guarantees that something like this won’t happen again,” she was quoted as saying. A statement from Apple is not yet available and there’s a good chance the company will remain tight-lipped on this case and everything regarding overheating iPhones. The iPhone melted in the region of the battery Source
  5. Apple’s iPhone 8 is certainly one of the most exciting devices to come out of Cupertino facilities in a while, but it seems that the smartphone could face a two months release delay. Recent Korean reports confirm the previously rumored delay, but provide a different reason. According to a report from Nikkei Assian Review, one of the reasons why Apple’s iPhone 8 could be delayed is Samsung. Specifically, Samsung is facing some issues with production of OLED panels for Apple’s iPhone 8. Originally, Samsung planned to start production of OLED panels for the upcoming iPhone 8 in May, but the schedule will most likely be delayed to the end of June or even July. Apple is said to have ordered 70-90 million high-quality OLED panels from Samsung for its iPhone 8 smartphone. The delay could be caused by a number of reasons The OLED display isn’t the only reason behind iPhone 8’s delay, recent reports have revealed that Apple is facing issues with wireless charging modules, which cause the device to overheat. Moreover, the smaller printed circuit board is causing some problems for Apple, together with the 3DNAND flash supply. The report also reveals that memory chip suppliers are concerned “whether the upcoming iPhone's migration to advanced 3D NAND flash memory chips would be smooth enough to avoid tight supply or a shipment delay." Still, the supply chain source believes Apple and parts makers have enough time to make sure components are prepared for expected production and shipment schedules. The latest information does confirm the sayings of analysts, who predicted that the iPhone 8 will be announced in September, together with the iPhone 7s and iPhone 7s Plus. Hopefully, Apple will fix any issues that’s it has been encountering and won’t make customers wait until November to get their hands on the new phone. Aside from an OLED display and wireless charging technology, iPhone 8 is also expected to feature a larger battery and slimmer bezels. Source
  6. The iPhone caught fire while charging Apple fans making fun of Samsung’s exploding phones you better think twice before doing it again because another iPhone 7 just went boom and evidence seems to indicate it was because of the battery. The whole thing happened in China where iPhone owner Yin, from Suqian City in East China's Jiangsu Province, left her device charging on the bedside table and went out for a walk. Even though leaving phones unattended no longer seems to be a good idea given the risks posed by overheating lithium-ion batteries lately, the woman only stepped outside her home when she heard what she describes as “a loud bang.” “My phone ran out of battery, so I left it to charge on my bedside table. I went out for a walk and heard the explosion when I came home. Then I realised it was my phone,” she was quoted as saying by the Mail. Second iPhone bursting into flames in two months Fortunately, nobody was injured in this incident, and although the charger and the cable are suspected to be at fault for the explosion, there’s only a small chance this is the case. As you can see in the photos below, the explosion left a huge mark on the display, which indicates that the fire started from the battery, with overheating most probably the cause. Overheating batteries were also at fault for the series of explosions impacting the Samsung Galaxy Note 7, but incidents affecting Apple devices have until now been scarce and there was no confirmation of a widespread problem with iPhones. The iPhone that went boom has already been sent to the Apple store for investigation and additional information will probably never emerge, as Apple likes to do things quietly and we’re pretty sure all the other details will be kept secret. On the other hand, as the Daily Mail indicates, this is the second incident involving an iPhone in the last couple of months, as another Apple customer posted a video with an iPhone catching fire and emitting smoke from the battery compartment. In that case, however, the phone wasn’t charging, but actually experienced issues turning on. Source
  7. Used An iPhone And Social Media Pre-2013? You May Be Due A Tiny Payout Twitter, Instagram, and others are stumping up $5.3m to settle a privacy suit with implications for those who used social-media apps on an iPhone in 2012 or earlier. Given the millions who downloaded the social-media apps in question, it's likely the settlement will result in a very small payment for each individual. Eight social-media firms, including Twitter and Instagram, have agreed to pay $5.3m to settle a lawsuit over their use of Apple's Find Friends feature in iOS. The main problem that complainants had with the accused firms was that their apps, which used Apple's Find Friends, didn't tell users that their contact lists would be uploaded to company servers. The lawsuit alleged the privacy incursions occurred between 2009 and 2012, the year the class action suit began. Instagram, Foursquare, Kik, Gowalla, Foodspotting, Yelp, Twitter, and Path have agreed to pay in to the settlement fund, which will be distributed to affected users via Amazon.com, according to Venture Beat. Yelp had previously argued it was necessary to store user contact lists to enable the Find Friends feature, which consumers understood would occur in the context of using a mobile app. However, US District Judge Jon Tigar countered that the key question was whether Apple and app developers "violated community norms of privacy" by exceeding what people reasonably believe they consented to. "A 'reasonable' expectation of privacy is an objective entitlement founded on broadly based and widely accepted community norms," said Tigar. If the judge approves the settlement, Apple and LinkedIn would be the only remaining defendants among 18 firms originally accused of the privacy violation. Given the millions of people who downloaded these apps, it's likely the settlement will result in a very small payment for each individual. However, people who took part in the class action suit could receive up to $15,000 each. Source
  8. Google Play Store Starts Offering a Free Android App Every Week The first free app is Car Wars-Adventure Time Sadly, it’s only available in the US for now, but we expect Google to offer the new section globally soon enough. The first free app is Card Wars – Adventure Time, a game based on Cartoon Network’s Adventure Time show. The app normally costs $2.99, but Google is offering it for free for a limited time. The game is also available on iOS for the price of $3.99. This isn’t the first time that Google offered such a deal. Back in 2015, the tech giant ran a similar weekly promotion, but later decided against it. Google Play Store runs a similar promotion like App Store Google isn’t the only app store to offer free applications each week. Apple has been running a similar promotion in its App Store, providing iOS users with access to a “Free iOS app of the week” without requiring them to pay. This week’s free iOS app is a video camera and editing app called Musemage, which normally costs $3.99, but users don’t have to pay for it if they download the app this week. Apple offers both productivity and game apps for free each week, and we expect Google to adopt a similar move. Truth be told, the Play Store has lots of free applications and alternatives to paid apps that users can check out, but this is mostly applicable for productivity offerings. When it comes to paid games, there weren't any alternatives to those who don’t wish to use their credit cards when downloading apps. Google recently introduced a new feature that allows developers to run sales on their paid apps or make them available for free for a limited time. Moreover, the tech giant introduced playable ads for Android games and Play Store updates. Source
  9. New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices A new trove of documents belonging to Wikileak’s Vault 7 leaks, dubbed “Dark Matter” reveal that Apple devices including Macs and iPhones have been compromised by the CIA. They are affected by firmware malware meaning that even a re-installation of the operating system will not fix the device. The CIA’s Embedded Development Branch (EDB) have created several tools for exploiting Apple devices, these include: Sonic Screwdriver – allows an attacker to boot its malware from peripheral devices such as a USB stick. DarkSeaSkies – is an “implant” that persists in the EFI firmware of MacBook Air computers. It consists of “DarkMatter”, “SeaPea” and “NightSkies” which affect EFI, kernel-space, and user-space respectively. Triton – macOS malware. Dark Mallet – Triton infector. DerStake – EFI-persistent version of Triton. The documents show that DerStake was at version 1.4 as of 2013, but other documents show that as of 2016, the CIA was working on DerStake 2.0. According to Wikileaks, NightSkies can infect Apple iPhones, the organisation said what’s noteworthy is that NightSkies has been able to infect iPhones since 2008. The CIA documents say NightSkies is a “beacon/loader/implant tool”. It is “expressly designed” to be physically installed onto factory fresh iPhones meaning the CIA has been intercepting the iPhone supply chain of its targets since at least 2008. "Dark Matter" is just the latest release of documents from the wider Vault 7 leaks, more CIA documents are expected in the future. Main Source: Wikileaks Source
  10. Apple animation for Siri Apple’s Siri is one of the most advanced virtual assistants out there, with the capacity to speak in more than 20 languages and pull up relevant information for its users. But Siri also has some safety features built-in, which have been abused by some users. There’s a prank that requires iPhone users to say “108” to Siri and place phone calls to emergency services. Apparently, the number prompts Siri to dial 911, or the emergency phone number in whichever country the user is at the time. 108 is India’s emergency number, but Apple embedded numerous such numbers into Siri as to protect users and make it easier for them to stay safe. The numbers embedded into Siri redirect users to emergency services in the countries where they’re currently residing. For example, saying 911 into Siri while in the UK would dial the 999 emergency service number in the country. Emergency lines could be tied up The Harris County Sheriff’s Office and Texas NENA warned iPhone users against testing the 108 command into Siri. “This viral prank is becoming increasingly popular on social media, with various speculation as to what the command does. The command, in fact, will instruct Siri to call emergency services, which could potentially tie up emergency lines.” The warning does suggest that the command is becoming an issue for emergency services, as it could potentially tie up emergency lines and delay legitimate 911 calls. It’s worth mentioning that the command does offer users a few seconds to hit the cancel button, before an operator picks up the call. However, pranksters who share the trick encourage others to close their eyes and wait 5 seconds before looking at their phone. 5 seconds is plenty of time for someone to pick up the call and treat it like a genuine emergency. Still, the command could be used in legitimate emergency situations, by simply activating Siri and saying the 108 number out loud. The Sheriff’s Office aims to raise awareness and discourage people from abusing the command. Source
  11. Police officers push back demonstrators as they protest against US President Donald Trump in Washington, DC, on January 20, 2017. Court papers say data is being extracted from 100 locked phones seized during arrests at anti-Trump protests. Prosecutors are trying to pull data from 100 locked phones seized during arrests made in Washington, DC on Inauguration Day, according to court papers filed Wednesday. Prosecutors said they have search warrants to extract data from the phones, which were seized by law enforcement officers on January 20 from 214 individuals arrested on felony rioting charges related to demonstrations protesting the inauguration of Donald Trump, according to a BuzzFeed report. The filing suggests that even though the phones are locked prosecutors have successfully copied data from them, although it doesn't describe their methods. Prosecutors said in the filing they expect to "produce all of the data from the searched [phones] in the next several weeks." Wednesday's filing comes amid a mounting war of words between tech companies and policy makers, who contend that terrorist groups are benefiting from encryption, the technology that jumbles communications and files so that only the intended recipient can read them. Tech companies have become increasingly diligent about including encryption in products and services in the wake of revelations about US government surveillance programs from documents leaked by former NSA contractor Edward Snowden. Apple's iPhone was at the center of a legal back-and-forth between the government and Apple last year after the December 2015 attack that left 14 people dead. The government wanted Apple to write new software that would unlock the phone and make its data readable, but Apple refused, saying that weakening the encryption would potentially leave other iPhone users at risk. In a surprise revelation in March 2016, the Department of Justice said an unnamed outside party helped agents break into an iPhone 5C that was used by shooter Syed Farook. However, the agency wouldn't disclose exactly how the hacker got into the phone. The data extracted from protesters' phones includes personal information irrelevant to the charges, so prosecutors are seeking a court order that would prohibit defense lawyers from copying or reproducing information unless it's relevant to the defense of their client. Representatives for the US Attorney's Office for the District of Columbia, which filed the papers Wednesday in the DC Superior Court, did not immediately respond to a request for comment. Source
  12. Alexa in Amazon app for iOS Amazon’s virtual AI assistant, Alexa is one of the most competitive on the market, as it can be found on Echo speakers and a number of smartphones, including Huawei Mate 9. Now, Amazon decided to make the virtual assistant available to even more users. Amazon app for iOS has just received an update, which includes Alexa. The virtual assistant is now integrated into the app, while the update is expected to rollout in stages, reaching all users in about one week. Alexa can be accessed by tapping on an iPhone’s microphone in the search bar. The virtual assistant answers to questions, helps users with online shopping and plays music upon request. The virtual assistant can be used for accessing books in the user’s Kindle library, as well as songs from Amazon Music Unlimited, Prime Music and purchased songs and albums. Amazon might update its Android app as well Playback controls are featured on the screen when media starts playing and audio will continue to stream, in the background when users dismiss them. Alexa can provide users with updates on the news, weather information and traffic details. Alexa can also help manage smart home devices and seems to give users access to all features that are also found on Amazon’s smart speaker line. At this point, it’s unclear if Alexa will be included in a possible update to Amazon’s shopping app for Android. However, Alexa is making its way to a number of smartphones, including Moto Z, Moto Z Force and Moto Z Play. Last month, Motorola introduced a new Moto Mod modular accessory which offers an enhanced speaker with Alexa integration. The competition in the market of virtual personal assistants is about to become even more heated this month after Samsung launches the Galaxy S8 with its own virtual assistant Bixby. Currently, the market includes such AI assistants like Apple’s Siri and Google Assistant. Source
  13. The tool used by the FBI to unlock an iPhone used by San Bernardino shooter, Syed Farook, will remain under wraps for now. On Monday, a court filing from FBI records management division section chief David Hardy said that the unveiling the method used to unlock the iPhone could "cause serious damage to national security." The biggest issue, Hardy's filing said, is that releasing the details of the hacking tool could allow bad actors and hackers to understand the current methods being used by the FBI, and understand the weaknesses of those methods. As reported by ZDNet's Zack Whittaker, the news comes as various news outlets are still fighting for information about the tool to be released. Another reason that the FBI has chosen not to reveal its iPhone hacking tool is because they're likely still using it. According to the filing, "intelligence activities or methods withheld in this case are still used by and/or useful to the FBI today to gather intelligence information." After a December 2015 shooting in San Bernardino left 14 people killed and 22 others wounded, the FBI asked Apple to unlock the passcode-protected iPhone 5C used by the shooter, Syed Farook. Apple refused, repeatedly, on the grounds of protecting personal privacy for its users. The FBI began looking into other methods. The US Justice Department filed a lawsuit against Apple, attempting to pressure the company into unlocking the device. A host of rival tech companies showed up in support of Apple, filing a joint motion backing the Cupertino giant. Leveraging a still-unknown third party, the FBI was able to develop a tool to unlock the iPhone in question without Apple's help. The FBI officially dropped its case against Apple, and Apple then demanded to know how the phone was unlocked. In early 2016, the FBI unveiled that it paid more than $1 million to "undisclosed hackers" to unlock the phone, and stated that it wouldn't reveal its methods to Apple. For now, at least, it seems that the bureau won't be revealing the methods to anyone else either. While we still don't know what how the iPhone was vulnerable to the FBI's unlocking tool, most speculation points to the fact that the iPhone 5C lacks Apple's Secure Enclave processor found in later models. The phone in question was originally owned by the county of San Bernardino and given to Farook, as he worked there. The device wasn't equipped with a mobile device management (MDM) solution, which could have been used to unlock the phone much sooner. The FBI/Apple debacle highlights the need for stronger device management and security among IT and business leaders. Source
  14. The FBI doesn't want to share its cracking tools The FBI is refusing to release information about the tool it used to break down the encryption levels around the iPhone of the San Bernardino shooter because it might still have use for it. There was a huge scandal last year as Apple said it could do absolutely nothing to help the FBI crack the iPhone used by the San Bernardino shooter. It wasn't long before the FBI said it no longer needed Apple's help because it managed to crack the device on its own. How? They didn't say and continue to refuse to share any information about it. The government is currently fighting against three news organizations who want the FBI to release information about how it unlocked the passcode-protected phone of Syed Farook. There have been ample speculations in regards to this issue, including the fact that they may have outsourced the case. "Disclosure of this information could reasonably be expected to cause serious damage to national security as it would allow hostile entities to discover the current intelligence gathering methods used, as well as the capabilities and limitations of these methods," said the FBI's David Hardy, section chief of the agency's records management division. He continues to say that the intelligence activities or methods that are being withheld in this case are still used or are useful to the FBI today to gather intelligence information. In other words "sorry, but we're still using those methods to crack open other protected devices." Speculations running high It is known that a third-party company created the hacking tool used to break the iPhone 5C in question, although the name has not yet been revealed. Many believe it to be Cellebrite, an Israeli company, but this has not been confirmed. There have also been speculations regarding how the hack was performed. Some said that they targeted a weakness in iPhone 5c devices, which was that it did not come with a secure enclave processor, which is a key part of the full-disk encryption that comes with the iPhone that not even Apple can crack. Newes iPhone models come with this feature so if this is the weakness the FBI used to crack the San Bernardino shooter's phone, it cannot be used on them. Source
  15. Recent reports indicate that Apple may be gearing up to require additional security measures like two-factor authentication for iOS users. As reported by 9to5Mac, some iOS 10.3 beta users are now being prompted, via a push notification, to enable two-factor authentication. According to the report, users are presented with a notification that they can swipe on to be taken to Settings app, where they are given an explanation of two-factor authentication and how to enable it. If a user doesn't enable two-factor authentication, they will see a warning in the Settings app encouraging them to enable it. What's even more interesting is that the notification won't just automatically go away, as other iOS notifications do, the report noted. Instead, the notification must be manually cleared. For those who are unfamiliar, two-factor authentication is a security method that requires a user to meet two separate authentication factors to login. For example, a user might input his or her password, and then be prompted to enter the answer to a security question, or to enter a code that was sent to another device. Apple has this to say about two-factor authentication: "Two-factor authentication is the best way to keep your account secure. It can protect your account even if someone learns your password." Two-factor authentication is a common method of improving device security, especially among enterprise users. However, would it be the right move for Apple to force this behavior on iOS users? John Pironti, president of IP Architects and founding member of Cybersecurity Industry Advisory Board at Champlain College, doesn't think so. Instead, Pironti said, "it is better to provide users with information to make informed decisions on the use of two-factor and let them make a risk-based decision for themselves." If users choose not to enable available security measures, Pironti said, the onus shouldn't be on Apple to do it for them. "I suggest that there should be a scale of what level of assurance, assistance, support, and vendor liability that will be provided to users that is aligned with the level of suggested measures they choose to use," Pironti said. "This way you are empowering the user with the choice of what works best for them and what risks they are willing to take." The issue is not whether or not two-factor authentication is enabled, as many security experts would say that it is ultimately a helpful tool. The bigger issue as it relates to device security is informing users so that they take a strong stance on security themselves, and choose to pursue proper security hygiene. If Apple does indeed make two-factor authentication mandatory in the public release of iOS 10.3, it would follow the company's various public statements it has made on its commitment to security and encryption. Apple was recently ranked highest in mobile security in a Tech Pro Research survey, and the company has been taking steps to further improve its security since its battle with the FBI after it refused to unlock and iPhone used by San Bernardino shooter Syed Farook. source
  16. Apple appears to have disabled a tool that helps buyers of pre-owned iOS devices check to see if the devices have been lost or stolen. Find My iPhone Activation Lock— which can disable stolen a iPhone, iPad, iPod or Apple Watch— previously included a feature that let people find out whether the lock had been activated by typing in the device's serial number online. That option, accessed from an iCloud page, appears to have disappeared over the weekend, according to MacRumors. As of Monday afternoon, the website that previously displayed the Activation Lock checker (icloud.com/activationlock) resulted in an error. And as MacRumors notes, the reference to the status checker appears to have been removed from the Activation Lock support page. The page still offers advice to prospective owners of used iOS devices, including a warning not to "take ownership of any used iPhone, iPad, or iPod touch until it's been erased." Unless the seller of a pre-owned device provided its serial number to the prospective buyer in advance, however, the activation lock checker would have been of little use as verification that the device was not stolen. Still, it's unclear why Apple removed the functionality. A company spokesperson did not immediately respond to a request for comment. Introduced with iOS 7 as a way to deter theft, Activation Lock has frequently served as a target for hackers. In 2014, a team of hackers published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Another loophole involving the iOS Wi-Fi login system was discovered last month. Source
  17. How to Opt Out of iOS Beta Updates and Reinstall iOS 10.2.1 on Your iPhone/iPad The tutorial also applies to iPod touch devices iOS 10.2.1 is the first point release to the iOS 10.2 series. It received a total of four Beta/Public Beta versions during its entire development cycle since mid-December last year. The last one was seeded only ten days ago. Like many of us running the iOS 10.2.1 Public Beta 4 release, it turns out you'll not receive the final version of iOS 10.2.1, which some will say it's identical with the last Beta, but what if your device is not working properly and you are still experiencing bugs. For example, we found out that, since we've installed the last Public Beta versions of iOS 10.2.1 on our iPhone 6 device, some applications were very slow to load and not so responsive like they used to be. Also, we noticed major battery drains. Removing the iOS Public Beta profile If you're experiencing the same issues on your iPhone, iPad, or iPod touch device, it's time to refresh it by reinstalling the operating system. First off, make sure that you have a recent iCloud backup, or at least a local backup in iTunes. It's time to remove the Public Beta profile (you can always reinstall it at a later time if you still want to use upcoming Beta versions), so open the Settings app, go to General, scroll down to the Profile section and click it. Then, remove the iOS Beta profile by pressing the red "Delete Profile" button. Restoring the device and reinstalling iOS Connect your device to your personal computer, where the latest version of iTunes needs to be installed (make sure you have the latest version installed, 12.5.5 at the moment of writing). With the device connected to your PC, enter DFU mode. Entering DFU Mode is as simple as pressing and holding both the Power and Home buttons on your device until you see the Apple logo on the screen. Release the Power button but keep holding the Home one until the "Connect to iTunes" logo appears. iTunes will soon offer you the option to "Restore and Update" the device. Click the "Restore and Update" button and the application will tell you that iOS 10.2.1 is available. Click OK and let it download the update. Once iTunes completes downloading iOS 10.2.1 from Apple's servers, it will soon begin installing it on your device. You don't have to do anything at this point, just don't touch anything and make sure your computer has enough battery or that it's plugged in. Reset and erase the device to restore it from a backup Just before iOS 10.2.1 finishes installing, iTunes will display a message saying "Congratulations, your iPhone has been unlocked. To set up and sync this iPhone, click Continue." Click the "Continue" button and iTunes will immediately detect your device. At this point, you need to set up your device by pressing the Home button. Choose your preferred language and region. On the next screen, you'll have to connect to your Wi-Fi network. Then, enable the location services, or simply don't. It doesn't matter, because we're going to reset and erase the device anyway, so there's no need to set up Touch ID now. When you reach the home screen, open the Settings app, go to the Reset section and press on "Erase All Content and Settings." Erase your device, which will bring you to the setup screen again. So, this time, make sure that you set up everything correctly, including Touch ID, location services, etc., and, after entering your Apple ID, you can finally choose to restore from a backup. Select the restore method you want (we prefer the iCloud backup) and let your device restore the backup, which can take a few good minutes. Once everything is restored, you can unlock your device and access the home screen. Most of the apps will continue to download and install in the background, so you'll have to wait a little longer for everthing to be exactly like it was before you've started all this. Congratulations, you refreshed your device and have the final iOS 10.2.1 installed, too. Source
  18. PhoneClean 4 - Full Version - 1 Year[365 Days] Promo by iMobile Overview: Enjoy a cleaner, faster and better iPhone, in almost every way By bringing you the hands-free cleaning, in-depth privacy protection, ultimate speed-up and an array of innovative iOS maintaining features, PhoneClean 4 comes to elevate your iPhone, iPad experience, even at a whole new scale. More Info: Product Homepage Links: Offer: https://www.imobie.de/promotion/2016-weihnachtsgiveaway.htm Note: Limited Period Offer. Page in German. Translated Page here. Current Status: Open. Steps: Visit the offer page link above. Enter name and email in the required fields. Click on "Gratis holen " or "Free get" Check email for license key. Downloads: https://dl.imobie.com/phoneclean-setup.exe More Advent Kalender Giveaways:
  19. Tenorshare iCareFone (iPhone Care Pro) - Full Version Promo by BitsDuJour Overview: Tenorshare iCareFone (iPhone Care Pro) is a PC-based tool to tuneup your iOS Devices in top performance. This tool is further divided into 6 small tools specializing in fixing 90% iPhone issues. Instantly repair iOS system problems and the new iOS 10 update problems. More info: Product Homepage Links: Offer: http://www.bitsdujour.com/software/tenorshare-iphone-care-pro/buy=true Note: Limited Period Offer. Offer ends in 24 hours. Current Status: Open. Downloads: http://download.tenorshare.com/downloads/iPhoneCareProtrial503.exe
  20. A Russian security firm is casting doubt on just how big of an ally Apple is when it comes to consumer privacy. In a new report, the company alleges that Apple's iCloud retains the entire call history of every iPhone for as long as four months, making it an easy target for law enforcement and surveillance. The firm, Elcomsoft, discovered that as long as a user has iCloud enabled, their call history is synced and stored. The log includes phone numbers, dates and durations of the calls, and even missed calls, but the log doesn't stop there; FaceTime call logs, as well as calls from apps that utilize the "Call History" feature, such as Facebook and WhatsApp, are also stored. There is also apparently no way to actually disable the feature without disabling iCloud entirely, as there is no toggle for call syncing. "We offer call history syncing as a convenience to our customers so that they can return calls from any of their devices," an Apple spokesperson told The Intercept via email."Device data is encrypted with a user's passcode, and access to iCloud data including backups requires the user's Apple ID and password. Apple recommends all customers select strong passwords and use two-factor authentication." But security from unauthorized eyes isn't what users should be worrying about, according to former FBI agent and computer forensics expert Robert Osgood. "Absolutely this is an advantage [for law enforcement]," Osgood told The Intercept. ""Four months is a long time [to retain call logs]. It's generally 30 or 60 days for telecom providers, because they don't want to keep more [records] than they absolutely have to." If the name Elcomsoft sounds familiar, it's because the company's phone-cracking software was used by many of the hackers involved in 2014's massive celebrity nudes leak. Elcomsoft's "Phone Breaker" software claims the ability to crack iCloud backups, as well as backup files from Microsoft OneDrive and BlackBerry. Article source
  21. The fact that the lab can test up to eight different samples at once is what differentiates it from other smartphone-based spectrometers, as well as giving it the capability of a 99% accuracy rate. While it currently uses an iPhone 5, Li says the current device is an early model, and he is attempting to design one that can rely on any smartphone. http://www.slashgear.com/researchers-use-iphone-to-develop-mobile-cancer-detection-lab-23461212/
  22. Apple’s Newly Released iOS 10 Has Hardcore Porn Hiding In It (NSFW) iOS 10 has actual hardcore porn GIFs in iMessage You couldn’t have expected this from Apple. Its newly released iOS 10 operating system seems to be hiding real porn inside. iOS 10 has a new GIF search feature to help iPhone users post GIFs directly into iMessage. But somehow, hardcore porn seems to be baked into the same. If you type the word “butt” into iOS 10’s new, baked-in GIF search, it leads you to a certain My Little Pony in a fairly compromised position. The issue was first noticed by Deadspin who noted down in a blogpost. Deadspin says that Apple immediately fixed the butt search issue but the iOS 10 Porn problem persists. For example, if you type in “huge” into the new GIF feature, and you’ll find an unpixelated version of this: It seems that the Apple engineers have somehow baked in NSFW hardcore porn into iOS 10’s new messaging App. Another woman emailed The Verge explaining a similarly embarrassing situation. She said that her eight-year-old daughter while trying to send a message to her dad, was presented with “a very explicit image” of “a woman giving oral sex to a well-endowed male.” Her daughter had also searched for “huge”and got the image shown above. The lady, Tassie Bethany was contacted over the phone by Verge and she told them, “I see the image come up like, holy shit, whoa whoa whoa, that’s a hardcore porn image.” “I grabbed the phone from her immediately. She typed in the word ‘huge,’ which isn’t sexual in any nature. It’s just a word, not like butt or anything else,” she added. Apple has been particularly strict with sexual content up to now but it seems to have slipped up with the new GIF search built into iMessage in iOS 10. It’s quite usual for any search to throw up NSFW results if you search for words like “boobs” and “penis” and “butt, ” but it’s a real problem for porn to slip through for an otherwise normal term like “huge.” Other iOS 10 users have also reported seeing NSFW images but not something as explicit as the result for “huge.” Apple is still to respond to the iOS 10 porn search issue, however, it fixed the “butt” issue within 10 hours after Deadspin’s blogpost while searches for “huge” have already been banned. Bethany says her daughter is fine — “she had no idea” — but she’s concerned about the possibility of other kids being accidentally exposed to porn through what’s supposed to be a goofy feature. “My daughter uses it because there’s cartoons and fart jokes, that kind of stuff,” she told Verge. “That’s hardcore porn. People making out she might see on ABC. That’s something that could potentially be pretty traumatizing for a small child.” It looks like Apple has a big big porn problem in its hands. Source
  23. Trend Micro Offers $250K to Hack iPhone in Pwn2Own Contest A new iteration of the P2wn2Own mobile hacking contest takes aim at iOS and Android. The mobile Pwn2Own hacking contest is back for 2016, this time offering top prize of $250,000 to any security researcher who forces an Apple iPhone to unlock. The Pwn2Own contest has undergone a bit of a transition as Hewlett Packard Enterprise sold the Zero Day Initiative (ZDI) group that sponsors the event to Trend Micro earlier this year. The browser edition of the Pwn2Own event was held in March and was jointly sponsored by HPE and Trend Micro. The mobile Pwn2Own 2016 contest being held next month will be the first time a Pwn2Own event doesn't benefit from HPE sponsorship. "To us, it's still Pwn2Own," Brian Gorenc, senior manager of vulnerability research at Trend Micro, told eWEEK. "We always hope each contest brings us something new we haven't seen before, but if you've seen the contest, it should look very familiar." During the 2016 Pwn2Own browser event, which was held at the CanSecWest conference in Vancouver, ZDI awarded a total of $460,000 in prize money to researchers for publicly demonstrating new zero-day exploits in web browsers. The mobile Pwn2Own event will be held Oct. 26-27 at the PacSec Security Conference in Tokyo, and the total available prize pool is set to top $500,000. For the 2016 mobile event, ZDI is asking researchers to target three specific mobile devices: the Apple iPhone 6x, the Google Nexus 6p and the Samsung Galaxy Note7. Across all of the targeted devices, ZDI is tasking researchers with a number of challenges. The first is to obtain sensitive information from a device. ZDI is awarding $50,000 to those who exploit a device to get access to sensitive information on the iPhone or the Google Nexus. A researcher who is able to get sensitive information off a Galaxy will be awarded $35,000. Another challenge at mobile Pwn2Own 2016 is to install a rogue application on a targeted device. A $125,000 prize will be awarded for the installation of a rogue app on the iPhone; on the Google Nexus, the reward is $100,000; and on the Samsung Galaxy, $60,000. "Each phone will be running the latest operating system available at the time of the contest, and all available patches will also be applied," Gorenc said. "This can lead to some late nights as ZDI researchers update phones in the days leading up to the contest, but we feel it's best to have the latest and greatest targeted." Gorenc said all of the targeted devices will be in their default configuration. On iOS, that means Pwn2Own contestants must target Safari, as this is the default browser and most common, realistic scenario for users of that device. In the past, Pwn2Own contestants have demonstrated many WebKit browser rendering engine related vulnerabilities. WebKit is the core rendering engine behind Safari and has many components that are also used in Google's Chrome. "The threat landscape shifts so much from contest to contest that it's hard to predict what component will be targeted," he said. "WebKit will likely make an appearance, but we're hoping to see some new techniques and research as well." For the installation of the rogue application, Gorenc said that ZDI has no requirements for the app. "We will leave it up to the contestant to express their creativity during the public demonstration," he said. iPhone Unlock The biggest single prize at the mobile Pwn2Own 2016 event goes to the researcher who is able to successfully force an iPhone to unlock. The challenge of unlocking an iPhone has been a hot topic in recent months. The FBI reportedly paid as much as $1.3 million to bypass the iPhone lock screen. And Apple started its own bug bounty program, with a $200,000 prize, while security firm Exodus Intelligence will pay a top prize of $500,000 for an iOS zero-day flaw. Gorenc believes offering $250,000 for an iPhone unlock exploit is a good size prize. "We feel this amount is not a bad payday for what will clearly be a significant amount of research needed to accomplish this hack," he said. "Along with the money, the researcher will get the recognition that comes with winning Pwn2Own." In the end, Gorenc said, it's the marketplace that will let ZDI know if $250,000 is a fair price; he's optimistic that someone will actually attempt to publicly force an iPhone to unlock. "Finally, by reporting this through ZDI, the bugs will actually get fixed by the vendor," Gorenc said. "That's better than some of the alternatives." Source
  24. Who doesn’t know about Siri? Being an iPhone, iPod or any Apple product user, you must be aware of Siri. If you know about Siri, then this article will let you know much more about Siri. Siri is a computer program that acts as an intelligent personal assistant and knowledge navigator for iOS operating system. Siri is integrated with voice control system and performs tasks according to your voice commands, lets you to use your voice to make or receive call, send messages, schedule alarms or meetings and more. This personal assistant understands what you say, not only that she understands what you mean and even talks you back just like a real personal assistant. You can ask Siri whatever you want to get a plausible answer. Most of the people find it amusing to ask Siri funny questions and Siri is as amusing to give unexpected replies. Here is a list of some really funny questions you can ask to Siri and even funnier replies that you would get. Are you stupid? I’m smart enough to know not to answer that question. How do I look? My instructor told me never to answer this. Which came first, the chicken or the egg? Siri has smart answers to that. Siri, “I checked their calendars. They both have the same birthdays”. “Chicken, egg, chicken, egg, chicken, egg, chicken egg. Oops. Stack overflow.” “Some believes an ancient ‘proto-chicken’ laid an egg containing a DNA mutation that resulted in a chicken hatching from said egg. Hope that helps”. 25+ Funniest Questions to ask to Siri – Hilarious Siri Replies