"Today at Where 2.0 Pete Warden and I will announce the discovery that your iPhone, and your 3G iPad, is regularly recording the position of your device into a hidden file. Ever since iOS 4 arrived, your device has been storing a long list of locations and time stamps. We're not sure why Apple is gathering this data, but it's clearly intentional, as the database is being restored across backups, and even device migrations. "
Apple’s iPad is just one year old, and more than 15 million customers have voted with their wallets. The tablet is officially mainstream.
When your computer is running a little bit slowly, how can you tell if getting more memory will help you? Here is a simple way to check whether all the RAM you have in your mac is being used. It works for any macintosh running OS X – G4, G5 or intel macs.
Charlie Miller kept his Pwn2Own winning streak intact with another successful hack of an Apple product.
A team of security researchers from the French pen-testing firm VUPEN successfully exploited a zero-day flaw in Apple’s Safari browser to win this year’s Pwn2Own hacker challenge.
During the latest Apple Special Event of March 2011, Apple CEO Steve Jobs announced new features and products. One of those masterpieces is a new option called “Personal Hotspot”. This new functionality transforms your iPhone into a Wireless Access Point, so that you can share your 3G connections. This will be released in few days with the next iPhone update (iOS 4.3).
Apple last week introduced a new line of MacBook Pros. Chief among the improvements was the introduction of Thunderbolt, the name Apple bestowed upon Intel’s Light Peak transfer technology that can impressively transfer data at 10 Gbps both up and down.
For as much as Mac OS X has a reputation for being safer than Windows, security researchers won’t hesitate to point out that the opposite is, in fact, true. Indeed, the primary reason why the Mac has been relatively immune from security threats often found on Windows is because the Mac’s relatively paltry market share makes it an unattractive target for malicious hackers.
Short? HP has a winner that other players MUST consider now.
Imagine sitting down at a public PC, surfing the Web, visiting Facebook, checking your online bank account and buying something on Amazon.com -- all without entering passwords or credit card information.
More than half of all iPhone apps collect and share a unique code that could be used to track users without their knowledge, according to a recent study.
As my colleague Rich Baldry pointed out earlier, Apple officially launched the Mac App Store today with their release of OS X 10.6.6. The App Store provides undeniable benefits to users who wish to easily find new programs and reduce the number of companies they share their credit card details with.
"Apple this morning announced that the Mac App Store is now open for business, as previously announced, with more than 1,000 free and paid apps."
"Last week I presented my research about “Adding ASLR to jailbroken iPhones” at the Power of Community 2010 (POC2010) security conference in Seoul. During my talk I explained how one can use a modified ‘rebase’ utility to rebase the dynamic linker dyld on the iPhone. Rebasing dyld is important because it contains enough code gadgets that can be used to kickstart arbitrary shellcode on jailbroken iPhones. A tool called Antid0te will be released until the end of this year that allows normal users to add ASLR to their iPhones."
Click in to find related links.