iOS 8 is the eighth major release of the iOS mobile operating system designed by Apple Inc. as the successor to iOS 7. It was announced at the company's Worldwide Developers Conference (WWDC) on June 2, 2014. The latest updates to iOS 8 and OS X ...
iPhone 5S Tracks your Every Physical Movements
Apple iPhone 5S can track you even After your iPhone battery dies, their Sensors use built-in chip to collect data when the 5S is 'dead'. The handset can still track your every move. iPhone 5S motion co-processor called M7 Chip that tracks of you...
Untethered iOS 7 jailbreak coming for iPhone, iPad, and iPod devices
After Three months Apple rolled iOS 7 out to the public, an untethered jailbreak tool that's compatible with the new operating system has been made available. It’s been a long wait for those that like to tweak their phones; previous jailbreaks on...
HTML Message Parsing Vulnerability on Linkedin iOS App
Senior CyberSecurity Specialist Zouheir Abdallah @ZuZ, has publicly and responsibly disclosed a vulnerability in LinkedIn’s mobile app. Zouheir is known for reporting a serious vulnerability in DropBox’s 2 Factor Authentication back in July 2013. ...
iCloud Keychain and iOS 7 Data Protection
Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to the passwords stored in the iCloud? Andrey Belenko from PasswordsCon Bergen 20...
Samsung Galaxy S4 and iPhone 5 Vulnerability Released at Mobile Pwn2Own
The Mobile Pwn2Own contest ended with participating researchers winning $117,500 out of a prize pool of over $300,000. A team of security researchers from Japanese company Mitsui Bussan Secure Directions hacked into a Samsung Galaxy S4 device by e...
Instagram Users Accounts Compromising for Likes
Instagram is a fast, beautiful and fun way to share your life with friends and family members. Instagram users compromise their own accounts for Likes Symantec, was discovered that many of Instagram users have willingly shared their usernames and ...
Unbreakable Apple's iMessage Encryption Vulnerability
Apple’s iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference. Apple asserted in June, following disclosures about the ...
New Bug, Bypass Screen Lock in iOS 7.0.2
Mr.Benjamin Kunz Mejriis a security researcher find this vulnerability, and e is from Vulnerability Laboratory. They are climes this vulnerability in iOS v7.0.1 & v7.0.2 both operating systems are allows the hackers to bypass the Sim lock Mode. Mr...
Can Hack the iOS 7 lock screen..!
The IOS 7 Lock screen passcode suffering from a vulnerability that can allow anyone with direct access to the iPhone or iPad to bypass the lock screen and open apps. This vulnerability had been discovered by 36-year-old soldier Jose Rodriguez, he...
How to Check the iPhone Applications
If you want to test or validate different types of fascinating applications, but also get aware of their technical requirements and designs. Applications need to be tested on every available platform to verify its compatibility and functional issu...
The Apple/Google Map Wars: What Comes Next?
As Apple takes plenty of heat for its decision to offer its users a second-rate maps application on their phones (“the maps experience in iOS 6 is a downgrade,” wrote one of the company’s most prominent online fans), plenty of attention is being pa...
An iPhone 5 Review
The early reviews of the iPhone 5 came out last night and they’re glowing—no previous model has received higher praise from Apple's handpicked reviewers than this one. Phrases like “flat-out lovely” and “absolute home run” are fit to run as testim...
How to Jailbreak Your iOS 5 Device
The iPhone Dev-Team has done it again: iOS 5 has been out for only a week or so, but the group has already come up with a tethered jailbreak for devices running Apple's latest software. Here's how to jailbreak your iOS 5 device using the iPhone Dev...
5 Hidden Features in iOS 5
Who knew Apple's iOS 5 mobile operating system held so many secrets? Developers and sleuthing hackers have been hard at work since Apple released the OS in October unearthing a number of hidden features and tweaking the OS to do things it was never...
3D Maps in iOS 6 Hacked to Run on iPhone 4, Doesn't Need Cydia
Developers are working hard to get a solid jailbreak running for iOS 6 on different iPhone, iPod Touch and iPad models, and so far had a little bit of success--there is a jailbreak, but a lot of apps and Cydia don't work just yet.Although one hacke...
Your Facebook Credentials At Risk On Android - iOS Jailbroken Devices
Your Facebook credentials at risk on Android - iOS jailbroken devicesFacebook allows its authentication credentials to be stored in plain text within the Apple iOS version of its mobile app, allowing an attacker complete control over your Facebook ...
5 Basic Mobile Security Tips to avoid Dangerous Application ,McAfee
Now a days, attackers targets smart phones rather than the Desktop. The number of malware application for mobile is increasing. Infected mobile can be used to steal confidential data or send out expensive text messages without a user’s consent....
Android on The iPhone
Android, on the iPhone? We’ve covered iPhone Linux before… and if you look back, we mentioned the possibility of porting Android to the iPhone (even way back in 2008!). Well we are proud to announce that The Future is Now! The details are a little...
Socialize