Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'iphone'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 169 results

  1. Apple appears to have disabled a tool that helps buyers of pre-owned iOS devices check to see if the devices have been lost or stolen. Find My iPhone Activation Lock— which can disable stolen a iPhone, iPad, iPod or Apple Watch— previously included a feature that let people find out whether the lock had been activated by typing in the device's serial number online. That option, accessed from an iCloud page, appears to have disappeared over the weekend, according to MacRumors. As of Monday afternoon, the website that previously displayed the Activation Lock checker (icloud.com/activationlock) resulted in an error. And as MacRumors notes, the reference to the status checker appears to have been removed from the Activation Lock support page. The page still offers advice to prospective owners of used iOS devices, including a warning not to "take ownership of any used iPhone, iPad, or iPod touch until it's been erased." Unless the seller of a pre-owned device provided its serial number to the prospective buyer in advance, however, the activation lock checker would have been of little use as verification that the device was not stolen. Still, it's unclear why Apple removed the functionality. A company spokesperson did not immediately respond to a request for comment. Introduced with iOS 7 as a way to deter theft, Activation Lock has frequently served as a target for hackers. In 2014, a team of hackers published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Another loophole involving the iOS Wi-Fi login system was discovered last month. Source
  2. How to Opt Out of iOS Beta Updates and Reinstall iOS 10.2.1 on Your iPhone/iPad The tutorial also applies to iPod touch devices iOS 10.2.1 is the first point release to the iOS 10.2 series. It received a total of four Beta/Public Beta versions during its entire development cycle since mid-December last year. The last one was seeded only ten days ago. Like many of us running the iOS 10.2.1 Public Beta 4 release, it turns out you'll not receive the final version of iOS 10.2.1, which some will say it's identical with the last Beta, but what if your device is not working properly and you are still experiencing bugs. For example, we found out that, since we've installed the last Public Beta versions of iOS 10.2.1 on our iPhone 6 device, some applications were very slow to load and not so responsive like they used to be. Also, we noticed major battery drains. Removing the iOS Public Beta profile If you're experiencing the same issues on your iPhone, iPad, or iPod touch device, it's time to refresh it by reinstalling the operating system. First off, make sure that you have a recent iCloud backup, or at least a local backup in iTunes. It's time to remove the Public Beta profile (you can always reinstall it at a later time if you still want to use upcoming Beta versions), so open the Settings app, go to General, scroll down to the Profile section and click it. Then, remove the iOS Beta profile by pressing the red "Delete Profile" button. Restoring the device and reinstalling iOS Connect your device to your personal computer, where the latest version of iTunes needs to be installed (make sure you have the latest version installed, 12.5.5 at the moment of writing). With the device connected to your PC, enter DFU mode. Entering DFU Mode is as simple as pressing and holding both the Power and Home buttons on your device until you see the Apple logo on the screen. Release the Power button but keep holding the Home one until the "Connect to iTunes" logo appears. iTunes will soon offer you the option to "Restore and Update" the device. Click the "Restore and Update" button and the application will tell you that iOS 10.2.1 is available. Click OK and let it download the update. Once iTunes completes downloading iOS 10.2.1 from Apple's servers, it will soon begin installing it on your device. You don't have to do anything at this point, just don't touch anything and make sure your computer has enough battery or that it's plugged in. Reset and erase the device to restore it from a backup Just before iOS 10.2.1 finishes installing, iTunes will display a message saying "Congratulations, your iPhone has been unlocked. To set up and sync this iPhone, click Continue." Click the "Continue" button and iTunes will immediately detect your device. At this point, you need to set up your device by pressing the Home button. Choose your preferred language and region. On the next screen, you'll have to connect to your Wi-Fi network. Then, enable the location services, or simply don't. It doesn't matter, because we're going to reset and erase the device anyway, so there's no need to set up Touch ID now. When you reach the home screen, open the Settings app, go to the Reset section and press on "Erase All Content and Settings." Erase your device, which will bring you to the setup screen again. So, this time, make sure that you set up everything correctly, including Touch ID, location services, etc., and, after entering your Apple ID, you can finally choose to restore from a backup. Select the restore method you want (we prefer the iCloud backup) and let your device restore the backup, which can take a few good minutes. Once everything is restored, you can unlock your device and access the home screen. Most of the apps will continue to download and install in the background, so you'll have to wait a little longer for everthing to be exactly like it was before you've started all this. Congratulations, you refreshed your device and have the final iOS 10.2.1 installed, too. Source
  3. PhoneClean 4 - Full Version - 1 Year[365 Days] Promo by iMobile Overview: Enjoy a cleaner, faster and better iPhone, in almost every way By bringing you the hands-free cleaning, in-depth privacy protection, ultimate speed-up and an array of innovative iOS maintaining features, PhoneClean 4 comes to elevate your iPhone, iPad experience, even at a whole new scale. More Info: Product Homepage Links: Offer: https://www.imobie.de/promotion/2016-weihnachtsgiveaway.htm Note: Limited Period Offer. Page in German. Translated Page here. Current Status: Open. Steps: Visit the offer page link above. Enter name and email in the required fields. Click on "Gratis holen " or "Free get" Check email for license key. Downloads: https://dl.imobie.com/phoneclean-setup.exe More Advent Kalender Giveaways:
  4. Tenorshare iCareFone (iPhone Care Pro) - Full Version Promo by BitsDuJour Overview: Tenorshare iCareFone (iPhone Care Pro) is a PC-based tool to tuneup your iOS Devices in top performance. This tool is further divided into 6 small tools specializing in fixing 90% iPhone issues. Instantly repair iOS system problems and the new iOS 10 update problems. More info: Product Homepage Links: Offer: http://www.bitsdujour.com/software/tenorshare-iphone-care-pro/buy=true Note: Limited Period Offer. Offer ends in 24 hours. Current Status: Open. Downloads: http://download.tenorshare.com/downloads/iPhoneCareProtrial503.exe
  5. A Russian security firm is casting doubt on just how big of an ally Apple is when it comes to consumer privacy. In a new report, the company alleges that Apple's iCloud retains the entire call history of every iPhone for as long as four months, making it an easy target for law enforcement and surveillance. The firm, Elcomsoft, discovered that as long as a user has iCloud enabled, their call history is synced and stored. The log includes phone numbers, dates and durations of the calls, and even missed calls, but the log doesn't stop there; FaceTime call logs, as well as calls from apps that utilize the "Call History" feature, such as Facebook and WhatsApp, are also stored. There is also apparently no way to actually disable the feature without disabling iCloud entirely, as there is no toggle for call syncing. "We offer call history syncing as a convenience to our customers so that they can return calls from any of their devices," an Apple spokesperson told The Intercept via email."Device data is encrypted with a user's passcode, and access to iCloud data including backups requires the user's Apple ID and password. Apple recommends all customers select strong passwords and use two-factor authentication." But security from unauthorized eyes isn't what users should be worrying about, according to former FBI agent and computer forensics expert Robert Osgood. "Absolutely this is an advantage [for law enforcement]," Osgood told The Intercept. ""Four months is a long time [to retain call logs]. It's generally 30 or 60 days for telecom providers, because they don't want to keep more [records] than they absolutely have to." If the name Elcomsoft sounds familiar, it's because the company's phone-cracking software was used by many of the hackers involved in 2014's massive celebrity nudes leak. Elcomsoft's "Phone Breaker" software claims the ability to crack iCloud backups, as well as backup files from Microsoft OneDrive and BlackBerry. Article source
  6. The fact that the lab can test up to eight different samples at once is what differentiates it from other smartphone-based spectrometers, as well as giving it the capability of a 99% accuracy rate. While it currently uses an iPhone 5, Li says the current device is an early model, and he is attempting to design one that can rely on any smartphone. http://www.slashgear.com/researchers-use-iphone-to-develop-mobile-cancer-detection-lab-23461212/
  7. Apple’s Newly Released iOS 10 Has Hardcore Porn Hiding In It (NSFW) iOS 10 has actual hardcore porn GIFs in iMessage You couldn’t have expected this from Apple. Its newly released iOS 10 operating system seems to be hiding real porn inside. iOS 10 has a new GIF search feature to help iPhone users post GIFs directly into iMessage. But somehow, hardcore porn seems to be baked into the same. If you type the word “butt” into iOS 10’s new, baked-in GIF search, it leads you to a certain My Little Pony in a fairly compromised position. The issue was first noticed by Deadspin who noted down in a blogpost. Deadspin says that Apple immediately fixed the butt search issue but the iOS 10 Porn problem persists. For example, if you type in “huge” into the new GIF feature, and you’ll find an unpixelated version of this: It seems that the Apple engineers have somehow baked in NSFW hardcore porn into iOS 10’s new messaging App. Another woman emailed The Verge explaining a similarly embarrassing situation. She said that her eight-year-old daughter while trying to send a message to her dad, was presented with “a very explicit image” of “a woman giving oral sex to a well-endowed male.” Her daughter had also searched for “huge”and got the image shown above. The lady, Tassie Bethany was contacted over the phone by Verge and she told them, “I see the image come up like, holy shit, whoa whoa whoa, that’s a hardcore porn image.” “I grabbed the phone from her immediately. She typed in the word ‘huge,’ which isn’t sexual in any nature. It’s just a word, not like butt or anything else,” she added. Apple has been particularly strict with sexual content up to now but it seems to have slipped up with the new GIF search built into iMessage in iOS 10. It’s quite usual for any search to throw up NSFW results if you search for words like “boobs” and “penis” and “butt, ” but it’s a real problem for porn to slip through for an otherwise normal term like “huge.” Other iOS 10 users have also reported seeing NSFW images but not something as explicit as the result for “huge.” Apple is still to respond to the iOS 10 porn search issue, however, it fixed the “butt” issue within 10 hours after Deadspin’s blogpost while searches for “huge” have already been banned. Bethany says her daughter is fine — “she had no idea” — but she’s concerned about the possibility of other kids being accidentally exposed to porn through what’s supposed to be a goofy feature. “My daughter uses it because there’s cartoons and fart jokes, that kind of stuff,” she told Verge. “That’s hardcore porn. People making out she might see on ABC. That’s something that could potentially be pretty traumatizing for a small child.” It looks like Apple has a big big porn problem in its hands. Source
  8. Trend Micro Offers $250K to Hack iPhone in Pwn2Own Contest A new iteration of the P2wn2Own mobile hacking contest takes aim at iOS and Android. The mobile Pwn2Own hacking contest is back for 2016, this time offering top prize of $250,000 to any security researcher who forces an Apple iPhone to unlock. The Pwn2Own contest has undergone a bit of a transition as Hewlett Packard Enterprise sold the Zero Day Initiative (ZDI) group that sponsors the event to Trend Micro earlier this year. The browser edition of the Pwn2Own event was held in March and was jointly sponsored by HPE and Trend Micro. The mobile Pwn2Own 2016 contest being held next month will be the first time a Pwn2Own event doesn't benefit from HPE sponsorship. "To us, it's still Pwn2Own," Brian Gorenc, senior manager of vulnerability research at Trend Micro, told eWEEK. "We always hope each contest brings us something new we haven't seen before, but if you've seen the contest, it should look very familiar." During the 2016 Pwn2Own browser event, which was held at the CanSecWest conference in Vancouver, ZDI awarded a total of $460,000 in prize money to researchers for publicly demonstrating new zero-day exploits in web browsers. The mobile Pwn2Own event will be held Oct. 26-27 at the PacSec Security Conference in Tokyo, and the total available prize pool is set to top $500,000. For the 2016 mobile event, ZDI is asking researchers to target three specific mobile devices: the Apple iPhone 6x, the Google Nexus 6p and the Samsung Galaxy Note7. Across all of the targeted devices, ZDI is tasking researchers with a number of challenges. The first is to obtain sensitive information from a device. ZDI is awarding $50,000 to those who exploit a device to get access to sensitive information on the iPhone or the Google Nexus. A researcher who is able to get sensitive information off a Galaxy will be awarded $35,000. Another challenge at mobile Pwn2Own 2016 is to install a rogue application on a targeted device. A $125,000 prize will be awarded for the installation of a rogue app on the iPhone; on the Google Nexus, the reward is $100,000; and on the Samsung Galaxy, $60,000. "Each phone will be running the latest operating system available at the time of the contest, and all available patches will also be applied," Gorenc said. "This can lead to some late nights as ZDI researchers update phones in the days leading up to the contest, but we feel it's best to have the latest and greatest targeted." Gorenc said all of the targeted devices will be in their default configuration. On iOS, that means Pwn2Own contestants must target Safari, as this is the default browser and most common, realistic scenario for users of that device. In the past, Pwn2Own contestants have demonstrated many WebKit browser rendering engine related vulnerabilities. WebKit is the core rendering engine behind Safari and has many components that are also used in Google's Chrome. "The threat landscape shifts so much from contest to contest that it's hard to predict what component will be targeted," he said. "WebKit will likely make an appearance, but we're hoping to see some new techniques and research as well." For the installation of the rogue application, Gorenc said that ZDI has no requirements for the app. "We will leave it up to the contestant to express their creativity during the public demonstration," he said. iPhone Unlock The biggest single prize at the mobile Pwn2Own 2016 event goes to the researcher who is able to successfully force an iPhone to unlock. The challenge of unlocking an iPhone has been a hot topic in recent months. The FBI reportedly paid as much as $1.3 million to bypass the iPhone lock screen. And Apple started its own bug bounty program, with a $200,000 prize, while security firm Exodus Intelligence will pay a top prize of $500,000 for an iOS zero-day flaw. Gorenc believes offering $250,000 for an iPhone unlock exploit is a good size prize. "We feel this amount is not a bad payday for what will clearly be a significant amount of research needed to accomplish this hack," he said. "Along with the money, the researcher will get the recognition that comes with winning Pwn2Own." In the end, Gorenc said, it's the marketplace that will let ZDI know if $250,000 is a fair price; he's optimistic that someone will actually attempt to publicly force an iPhone to unlock. "Finally, by reporting this through ZDI, the bugs will actually get fixed by the vendor," Gorenc said. "That's better than some of the alternatives." Source
  9. Who doesn’t know about Siri? Being an iPhone, iPod or any Apple product user, you must be aware of Siri. If you know about Siri, then this article will let you know much more about Siri. Siri is a computer program that acts as an intelligent personal assistant and knowledge navigator for iOS operating system. Siri is integrated with voice control system and performs tasks according to your voice commands, lets you to use your voice to make or receive call, send messages, schedule alarms or meetings and more. This personal assistant understands what you say, not only that she understands what you mean and even talks you back just like a real personal assistant. You can ask Siri whatever you want to get a plausible answer. Most of the people find it amusing to ask Siri funny questions and Siri is as amusing to give unexpected replies. Here is a list of some really funny questions you can ask to Siri and even funnier replies that you would get. Are you stupid? I’m smart enough to know not to answer that question. How do I look? My instructor told me never to answer this. Which came first, the chicken or the egg? Siri has smart answers to that. Siri, “I checked their calendars. They both have the same birthdays”. “Chicken, egg, chicken, egg, chicken, egg, chicken egg. Oops. Stack overflow.” “Some believes an ancient ‘proto-chicken’ laid an egg containing a DNA mutation that resulted in a chicken hatching from said egg. Hope that helps”. 25+ Funniest Questions to ask to Siri – Hilarious Siri Replies
  10. Apple releases 'important security update' for iPhone after spyware discovery The patch comes after the discovery of spyware circulating in the Middle East. Apple has released a security fix for iPhones and iPads following the discovery of malware targeting the platform that was found circulating in the Middle East. The iPhone and iPad maker released the patch, iOS 9.3.5, on Thursday, calling it an "important security update". The patches fix three vulnerabilities, dubbed "Trident" by security firm Lookout, which could be used to access the device's location, read contacts, texts, calls, and emails, as well as turn on the device's microphone. The company said that spyware that exploited the vulnerabilities were developed by an Israel-based company specializing in zero-day exploits. Citizen Lab explained in a blog post that it had uncovered an operation by the security services of the United Arab Emirates to try to get into the iPhone of a renowned human rights defender, Ahmed Mansoor. The Canada-based security lab said that the UAE, which has long been criticized for its poor human rights record, could turn an affected iPhone into "a sophisticated bugging device", adding: "They would have been able to turn on his iPhone's camera and microphone to record Mansoor and anything nearby, without him being wise about it. They would have been able to log his emails and calls -- even those that are encrypted end-to-end. And, of course, they would have been able to track his precise whereabouts," said the blog post. Lookout said that the flaws included a memory corruption flaw in WebKit, which would let an attacker exploit a device when a user clicks on an affected link. Two other kernel vulnerabilities would let an attacker jailbreak the device, and then the attacker can silently install malware to carry out surveillance. Apple fixed the vulnerabilities within 10 days of being informed by Citizen Lab and Lookout. A spokesperson for Apple said in an email to ZDNet: "We advise all of our customers to always download the latest version of iOS to protect themselves against potential security exploits." Users can install the update over the air through the phone or tablet's settings. Source
  11. Upcoming iPhones Could Collect Fingerprints and Photos of Thieves Apple is working on enhanced security tools Apple filed a patent application for a method of storing biometric information of an unauthorized user, so that smartphone security would be enhanced. The patent surfaced over at Patently Apple and it will apparently make it very easy for authorities to identify thieves. iPhones will be able to capture pictures and record videos of thieves, as well as collect their fingerprints. The patent states that the feature could be triggered by repeated failed attempts to unlock the device or if the phone owner enables protections using Find My iPhone feature from another device. The patent also mentions that smartphones will be able to capture more than one fingerprint, photo or video of the thief, as well as audio files, forensic interface use information and more. Apple also offers Activation Lock and Find My iPhone security features This new feature would join all other tools that Apple has for helping users find their phones. The Find My iPhone feature helps users mark their devices as lost and their locations tracked, so that they could have a strong chance at recovering them. Aside from this, Apple also offers Activation Lock feature that doesn't allow anyone to reset smartphones without the approval of the owner using their Apple ID and password. Apple also offers its users the option to remotely wipe phones in case of loss or theft or to secure information using high end encryption. One must take into consideration that smartphone manufacturers often patent various projects and ideas, but that doesn't necessarily mean that they will be implemented into future products. However, considering that this is a security feature, Apple would have all the more reasons to actually incorporate this tool into its devices. Source
  12. 'Touch Disease' Breaking Apple iPhone 6 And 6 Plus Screens -- Millions Of Devices At Risk The iPhone is a great device, but a growing number of users are reporting a problem that affects the iPhone 6 and 6 Plus. Nicknamed "Touch Disease" by repair specialists iFixit, the problem starts with a flickering gray bar at the top of the screen and reduced touch functionality. Over time the bar spreads and eventually the whole screen stops responding to touch. iFixit spoke to several repair professionals who confirmed they had seen numerous devices exhibiting the same flaw. It isn’t known how many of the millions of iPhone 6 and 6 Plus devices are affected, but Jason Villmer, owner of Missouri board repair shop STS Telecom told iFixit "This issue is widespread enough that I feel like almost every iPhone 6/6+ has a touch of it (no pun intended) and are like ticking bombs just waiting to act up". There are pages of complaints regarding the issue to be found on Apple’s support forums. Replacing the screen doesn’t fix the problem as the flaw appears to relate to the touch screen controller chips inside the device. So what’s the cause of the problem and why is it coming to light now, two years after the iPhone 6 and 6 Plus launched? One theory is it relates to Bendgate. The iPhone 6 and 6 Plus are susceptible to bending (a problem fixed in the 6s and 6s Plus) and this could be what is causing the controller chips to lose contact. The problem seems to mostly affect the iPhone 6 Plus, and that was also the phone most affected by the bending issue. The 6s and 6s Plus were strengthened, and the Touch IC chips moved from the logic board to the display assembly, which is why the problem doesn’t affect them. So how do you fix a device afflicted with "Touch Disease"? The options appear to be replacing the phone, replacing the logic board, or replacing both Touch ICs (the cheapest option). Have you experienced this problem with an iPhone 6 or 6 Plus? Source
  13. New 'Pokémon GO' Cheat for iOS, iPhone: 'Choose Your Ride' while You're on Your Couch; Hack Claims You won't Get Banned The new Pokémon GO cheat lets players to fake their ride while they are sitting on the couch New 'Pokémon GO' Cheat for iOS, iPhone: Fake Your Ride while You're on The Couch; Hack Claims You won't Get Banned The previous Pokémon GO cheat that has gone viral is when a player shows how to unban the softban using a few easy steps. This time, Pokémon GO cheat gets you walk around undetected. "Pokémon GO" for cheat jailbroken iPhone to walk around the map without even moving from your couch A YouTube video below, posted by iCrackUriDevice, shows how to install the "Pokémon GO" cheat software inside a jailbroken iPhone. The user stresses a few times that he has tried the method and it does not get him banned. He ensures that this method is safe since there is a joystick to trick the AR game. First of all, the user states that your iPhone has to be jailbroken to install the "Pokémon GO" hack in the device, Game n Guide wrote. Once you download and launch the game, you will notice there is a joystick appearing to help you move anywhere you want. The hack setting includes customizing speed - which means you can actually pretend to ride a bike, a car, or just walking on foot. This method will help you to transport (not teleport like the other hacks) to another place, far away from where you are without being considered as GPS spoofing. The user ensures players that they won't get banned by using the Pokémon GO cheat According to the hacker, who thanked Pangu jailbreak for making his iPhone able to download the cheat, said that this hacking software is compatible with any updates that Niantic will roll out in the future. Although this may not guarantee that Pokémon GO players will not get caught, it is worth to note that Niantic is serious about permanently banning your account in case you are catching them all using GPS spoof apps. Since not everyone is able to walk and catch them all, the "Pokémon GO" cheat has a great advantage if you want to grow your monster collections. However, as the user said it before, you need to be willing to sacrifice your iPhone to be jailbroken for this. Aside from the claims, let's be careful while playing Pokémon GO since Niantic is constantly fighting the bots and spoofs. Source
  14. Snowden Presents Anti-Spying iPhone Case Attachment Device was specifically designed for journalists The device is nothing more than a case extension that gets plugged into the iPhone's SIM card slot and connect's to the phone's internal wiring. The device, which is only a design right now and is referred to as an "introspection engine," has a slot where the user can place his SIM card and continue to use the phone's mobile calling features, if ever needed. Snowden and Huang designed the device for journalists The role of the introspection engine, as Snowden and Huang explain in a researcher paper also embedded at the end of this article, is to provide an accurate status of the phone's radio signals. The two designed the device specifically for frontline journalists that want to avoid having their smartphones tapped and used to track them. In the past, it was proven that nation-states used surveillance malware to infect a target's phone and turn on the phone's radio signaling component, while not alerting the phone owner of the component's real status. This had allowed threat actors to track the phone's location via cell towers and secretly transmit data from the phone when the user thought his device was in airplane mode or shut down. Snowden's interested in protecting journalists comes from his role as Director at the Freedom of the Press Foundation. Device will alert the user when the phone starts broadcasting radio signals The introspection engine will detect electrical signals going through the phone specific to the activation and usage of the radio signaling component, and alert the user via loud beeps. By having a phone that doesn't snitch on their position at every few minutes, reporters can go in sensitive locations and record audio and video with their phone without giving away their position. Visually the device is nothing more than an bulky iPhone case extension, with a monochrome screen on the back of the phone that shows the owner's "dark" status. Plans exist to incorporate a "kill switch" functionality to shut down the phone in case the radio broadcasting features come to life out of the blue. Furthermore, the two announced that the source code for the device's firmware would also be available online, under an open source license, for anyone to inspect and audit. Against the Law: Countering Lawful Abuses of Digital Surveillance [Scribd. - 16 Pages] Source
  15. Wondershare Dr.Fone for iOS 3.5.0.25 ML + Key Freaking out cause you accidently deleted photos, text messages or other crucial stuff on your iPhone, iPad or iPod touch? iPhone is broken or damaged and now the data’s gone? Failed updates kill your data? Whatever the problem, the doctor is in! Wondershare Dr.Fone for iOS is an easy-to-use tool that can help you easily recover data that you thought you’d lost forever, such as photos & videos, contacts, SMS, call logs, memos and more! It offers you two kinds of recovery mode: to recover data directly from the iOS device and to retrieve previous data by extracting it from iTunes backup! Extract iTunes Backup for all iOS Devices, including iPhone 5/4S Supported iOS devices: iPhone 5/4S/4/3GS, iPad mini, iPad with Retina display, The new iPad, iPad 2/1 & iPod touch 5/4. Recover 11 kinds of files: Contacts, Messages, Call history, Calendar, Notes, Reminder, Safari bookmark, Camera Roll, Photo Stream, Message attachments and Voice memos. Recover deleted data: Recover not only existing data in the backup, but also those data deleted from your device before you made the backup, as long as they were not overwritten. Supported data loss circumstances: Accidently deleted files on your iOS device; your device is crashed, smashed or broken; the device is locked by a forgotten password; your device is lost or wiped (eg. freshly upgraded to a new iOS, restored to factory settings, jailbroken or refurbished). Preview What You’ve Lost before Recovery Preview all photos one by one in camera roll, photo library and photo stream.Check the contacts in detail, including address, job title and custom tags, etc., and recover them as a VCF, CSV or HTML file.Read SMS contents including iMessages, photos, videos, etc. to save them as a HTML file on your computer.View the call history containing FaceTime records.Re-sync Recovered Data to Your iOS Device Import the recovered contacts in VCF format to your iOS device.Put the recovered photos and videos back to your iOS device.Homepage: http://www.wondershare.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Tablet: Key Size: 38,81 MB
  16. Here's How Secret Voice Commands Could Hijack Your Smartphone Google's voice assistant activation screen A muffled voice buried in a YouTube video can take over your phone, researchers say Kitten videos are harmless, right? Except when they take over your phone. Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. The researchers describe the threat in a research paper to be presented next month at the USENIX Security Symposium in Austin, Texas. They also demonstrate it in this video. Voice recognition has taken off quickly on phones, thanks to services like Google Now and Apple's Siri, but voice software can also make it easier to hack devices, warned Micah Sherr, a Georgetown University professor and one of the paper’s authors. The team found that they could mangle voice commands so that humans can barely recognize the words but software still can. The result condenses the words into a demonic growl. "Ok Google, Open XKCD.com," the voice says, and a nearby phone opens that URL. It's easy to imagine how a hacker could direct a phone to a website containing malware, or instruct the phone to take a photo. It might not work every time, but it's a numbers game. If a million people watch a kitten video with a secret message embedded, 10,000 of them might have have their phone nearby. If 5,000 of those load a URL with malware on it,"you have 5,000 smartphones under an attacker’s control," Sherr said in a statement. If the hackers know the ins and outs of the voice recognition software itself, and know its internal workings. they can create voice commands that are even harder to decipher by humans. The researchers have uploaded samples of a scrambled voice command. In our tests with an Android phone, the commands sometimes went undetected or were misheard. When an audio sample asked "What is my current location," Google Now heard it as "procrastination." But other attempts worked fine. Another audio sample tells the phone to turn on airplane mode, which it did. To defend against the threat, developers of voice recognition software could incorporate filters to differentiate between human and computer-generated sounds, the paper said. Source
  17. Why Is There A Tiny Black Hole Between Your iPhone Camera and Flash? Do you know why there is a tiny black hole between your iPhone camera and flash? You may be using an iPhone since its launch but there are somethings that you know about Apple’s flagship product. In fact, you may be calling yourself a pro in using and understanding iPhone, there are still certain features on your smartphone and their uses that you may not know. One such feature is on the camera on your iPhone. Have your ever noticed the tiny black hole between your iPhone camera and flash? Basically, every iPhone since the iPhone 5 has had a tiny black dot between the lens and flash. Have you ever wondered why it is there and what does it do? This tiny hole is basically a microphone. Yeah, you read it right. Technically, it is not a microphone that would listen to your voice but it is for noise cancellation. This microphone can nearly eliminate background noises so that the caller on the other end hears only crystal clear voice. It also helps to record your voice without any filler, make Siri’s recognition of your accent even better and while recording HD videos. The iPhone actually has three microphones, one at the bottom, one on the back and one at the front often hidden under the same grill for the phone speaker, as it is not active during normal phone conversation. The reason behind putting two microphones at two end of the phone is stereo audio recording while recording videos, which gives a better audio judgment while playing it on a stereo sound system. So, you may wonder why there are three microphones. While the bottom and front ones are used for own voice and hearing purpose, the one at the back is useful for video recording and for digitally removing background noise when you’re on a phone or FaceTime call. It also helps a little bit when clicking pictures, by eliminating pixel noise. Source
  18. Free Lots of Storage Space on Your iPhone With This Easy Trick This trick will free more storage in your iPhone without deleting a thing If you are an owner of an iPhone, clearing storage space is a constant concern for people with iPhones. It can be a fight to keep deleting apps and pictures to try and keep freeing up space, whether it’s to install the latest software update or to download new apps, particularly when they don’t come with expandable storage, and have limited amount of free iCloud storage, and still, understandably, produce units with only 16 GB of space. In this article, we show quick and easy tips you can use to clear the temporary files (cache)from your phone, leaving you with more storage. You can see the trick in action in this video from YouTuber iTwe4kz titled “one weird trick” garbage. Let’s go through the full process that was tested on an iPhone 6 Plus. This method works best if you have less than 1GB of storage left. The iPhone 6 Plus had only had 479 MB of internal storage available. Open Settings > General > Storage & iCloud Usage to check how much you have left. Open the iTunes Store, select Films and attempt to rent a lengthy film. For this article, the movie Creed has been used for demonstration. However, you can use any movie with a file size that exceeds your available storage. You may think of choosing a long movie like Gone with the Wind or the extended cut of The Lord of the Rings: The Return of the King. Unfortunately, iTunes doesn’t seem to carry Logistics, the longest movie ever made (clocking in at an unimaginable 857 hours). When you click on Rent HD Movie, a notification will appear warning you the file is too big to download. Don’t worry, you won’t be charged anything for this. Open up Settings > General > Storage & iCloud again to find out how much space you have. It gave 68MB of cleared up space. This successfully clears the temporary files created while you are using apps, like videos buffering on YouTube or tweets loading on Twitter. This method clears them as a handy side effect, as there’s no direct way to delete them from an iPhone. The best thing about this trick is that it can be repeated multiple times. After repeating the process seven more times before it outdid, it left a total of 3.5GB of available space — 3GB more than started with. You may have to carry out this trick a different number of times depending on what type of apps and files you have on your iPhone. Just continue doing it until you are not clearing out any more space. The storage space will remain available even if you reboot your phone. It’s not precisely clear which files are being removed from your phone, but it’s probably the notorious “other” files that can take over your iPhone’s storage. Source
  19. Source: http://www.thewindowsclub.com/get-free-leawo-itransfer-license-limited-offer Giveaway Page: http://thewindowsclub.tradepub.com/free/w_leaw01/prgm.cgi
  20. Get Better iPhone Music Manager withPrimoMusic Exclusive Giveaway PrimoMusic | Your Best iPhone iPod Music Transfer Software https://www.primosync.com/primomusic/
  21. Apple is preparing to manufacture an "all glass" iPhone according to the chief executive of the company which makes its chassis. Allen Horng, chairman and chief executive of long-standing iPhone chassis maker Catcher Technology said Apple will make its 2017 iPhone using a glass casing, Forbes.com reported. However the glass body will prove expensive, Mr Horng is reported to have told shareholders. There has been speculation for several months that Apple was considering a radical change. KGI Analyst Ming-Chi Kuo, who has successfully predicted previous Apple trends said the design would be incorporated in the iPhone 7s. It is also expected to feature OLED screens, which are brighter than traditional LED screens and use less power. However the iPhone 7s is not expected to be released until early 2017. The next iteration, the iPhone 7, which is due to be released in September, is not anticipated to represent as radical a departure from existing models. It will come at a challenging time for the company with iPhone sales falling for the first time since the product was launched. Revenue for the first quarter of 2016 fell by 13 per cent compared with the same period in 2015. There is a growing belief that sales of iPhones may have reached saturation point with the company also facing stiff competition from manufacturers or cheaper Android devices. ARTICLE SOURCE
  22. Apple Does Not Want iPhone Users to Know If They Were Hacked Apple Deletes the $1 App That Informed Users If Their iPhone is Hacked Apple indulged in worst form of censorship and has removed the $1 App which informed iPhone users whether they were ever hacked and if their iPhone was being spied on. The $1 app called System and Security Info which was available iTunes store has since been removed by Apple. The App was developed by a German IT security researcher Stefan Esser after he found that there is no single App which could inform the iPhone owner whether he/she has ever been hacked. The System and Security Info App could inform users if their iPhone has been secretly hacked, jailbroken or being spied by malicious actors. However, it seems like Apple didn’t like the idea of ”information for all” and deleted the app. The official stereotype reply for the deletion, given by Apple, is that its review team found the System and Security info app isnt in compliance with the App store review guidelines. And as a thank you for pointing this out out app is thrown out of the AppStore. — Stefan Esser (@i0n1c) May 15, 2016 Here. It basically says: we do not want our users to have the impression iOS could have security holes. go away. pic.twitter.com/7II1q96ZMt — Stefan Esser (@i0n1c) May 14, 2016 According to an email sent by Apple, Esser was told that his app provides inaccurate and misleading information to iOS users which may mislead or confuse users. Esser also tweeted that the App was found unfit after 4 bug related reviews. Esser also denied that he would release a jailbreak version just to get back at Apple. Source
  23. Browse the web without being disturbed by intrusive ads Opera VPN on iPhone 6s Opera seems to go all-in on VPN and ad blockers these days and after releasing these services as part of its desktop browser, the company is now aiming for the mobile work with similar solutions. Opera has just launched a free and unlimited VPN service on the iPhone that comes with built-in ad blocker for ads in Safari, Chrome and other apps you use online, but also with a tracker blocker to make sure that your privacy is protected while browsing the web. Setting up Opera VPN on an iPhone is easy. All you have to do is to install the app and then follow the wizard to complete its configuration. The app creates a new VPN profile in settings, which you can enable and disable any time you want (make sure you toggle the connect on demand option for this). You can’t Netflix and chill just yet Once you are connected, you should see the VPN icon in the navigation bar. Configuration settings are available in the app, including options to enable or disable the blockers, but also to choose the location of the VPN – you can choose from multiple locations, including the United States and Europe. Before you ask, no, Netflix doesn’t seem to work, as the Opera VPN service appears to be blocked right now (but there still are ways to use other services if you know where to look). We’ve already tried the app on our iPhones here at Softpedia and everything seems to be working smoothly, but it’s recommended for you to use a VPN that’s as close as possible to your current location for better transfer speed. We’ve also discovered that Opera VPN and a content blocker configured in Safari make for a great duo that block nearly 100 percent of the ads, so the app can really come in handy to those aiming for a cleaner browsing experience. The application requires iOS 8.0 or later and is compatible with iPhone, iPad, and iPod Touch. It can be downloaded free of charge from the App Store using this link. Article source