I believe it's been there for a while. I haven't used ApplePay since upgrading, but as far as I can tell, all my credit card info is correct after upgrading. Use a cable to back up to your Mac, set the backup to "This Computer," give it a password--write that down!!!--click backup, download any stuff that's on the iDevice but not on the computer, then run the backup twice, just to make sure it got everything. Now you can take the phone to an Apple Store and if they replace it, when you set up the new one, just plug it in to the computer and restore from backup. An extra benefit is that the restore won't take all day like restoring from iCloud.
HTH
thanks for that - the last fix i had from apple was a defective speaker (ear) i usually back up to computer - but the encrypted way is cool if it even saves passbook ( especially when you sometimes have to add cards twice - phone then watch)
Many Google apps have pretty good ratings on the App Store, and most criticism I see (failure to comply with interface guidelines, and the need to log in to an account for almost everything) is a) valid and b) at least partially shared by reviews on Android sites. But I bet you that not a single reviewer of the "move to ios" app has actually used it to move content from an Android to an iOS device. I see a difference here.
Sure, but that is called looking into the details, rather than SirTolls99 who just says "both sides are equally bad".
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
Doesn't this require a wired or cabled connection, and iTunes? Can a 'restore from backup' be done wirelessly, between only two iPhones ?
You don't need iTunes, you can backup to the iCloud. Of course this way is slower because downloading over the Internet all your Apps and whatnot will take longer then local storage, but it works.
I love the disclaimer at the bottom "Bring your Android phone to an Apple Store and we'll recycle it for you" which is basically code for "toss that pice of sh!t in the trash where it belongs!"
Or sell them off to some 3rd world country that Apple isn't in. making a few dollars is better then a 100% loss.
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
For the "vast majority" of phones out there, how many will realistically be patched? And please don't respond about Nexus phones as we know that Google will do it for that extremely slim share.
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
For the "vast majority" of phones out there, how many will realistically be patched? And please don't respond about Nexus phones as we know that Google will do it for that extremely slim share.
You are clearly asking a question that I can't answer. Keep in mind this security flaw in particular only affects phones running 5.x that use the stock dialer with the user using a password to unlock instead of a PIN or pattern. That is not many phones and far from a "vast majority" of phones out there.
I understand your sentiment about patching. Apple clearly does it better with the ability to patch all devices versus Android and the carriers/manufacturers. One of my friends 3 year old Samsung phone just got the Stagefright security patch a few days ago. Far too long to wait for that kind of security flaw in my opinion, but hey at least it finally got patched. It is a serious bug especially considering that the hack does not require physical access of the phone. Although I still haven't seen any news of anyone getting bitten by Stagefright in the wild, and its arguably one of the worst security flaws to be discovered in while.
My point was that this security flaw in particular that the original poster mentioned is hardly something to be worried about as it will affect nearly no one given the circumstances involved. It's more of a proof of concept than anything. Lock screen security flaws crop up nearly every time there is a new release of both Android and iOS. Yet they affect nearly no one in the real world other than maybe the jailbreakers who are looking for a bug to exploit.
All of that being said, I can't know if a "vast majority" of the phones running 5.x that use the stock dialer will be patched eventually for this security flaw in particular.
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
Yet the Droids won't shut up about TouchID being vulnerable.
Yet the Droids won't shut up about TouchID being vulnerable.
Requiring:
1. The physical iPhone
2. A copy of the owner's fingerprint.
I think he has the right to talk sh**.
Not sure why anyone would think that applies to only TouchID.
It seems that would likely be true for just about any fingerprint ID on a phone/tablet.
Also I wouldn't be surprised that if you get physical access to someones phone or tablet, then there would be a fingerprint on it from the owner. Still the chances of that happening to anyone is extremely unlikely. Sounds like a job for a three letter agency, not your average thief.
Regardless, I was simply trying to be helpful with some additional information.
Comments
I believe it's been there for a while. I haven't used ApplePay since upgrading, but as far as I can tell, all my credit card info is correct after upgrading. Use a cable to back up to your Mac, set the backup to "This Computer," give it a password--write that down!!!--click backup, download any stuff that's on the iDevice but not on the computer, then run the backup twice, just to make sure it got everything. Now you can take the phone to an Apple Store and if they replace it, when you set up the new one, just plug it in to the computer and restore from backup. An extra benefit is that the restore won't take all day like restoring from iCloud.
HTH
thanks for that - the last fix i had from apple was a defective speaker (ear) i usually back up to computer - but the encrypted way is cool if it even saves passbook ( especially when you sometimes have to add cards twice - phone then watch)
Thievery should never win.
Tell George W. Bush that.
Sorry, I must be really slow. I have no clue about what you mean. Care to elaborate?
As in he became president by stealing the election.
I was making a normative -- not a positive -- statement.
I know. I was being facetious.
A large, glowing crucible would be a nice touch at every Apple Store.
they should switch quick, the malware and "professional security" of android is once again under threat.
http://www.engadget.com/2015/09/16/android-lock-screen-bypass-flaw/
they should switch quick, the malware and "professional security" of android is once again under threat.
http://www.engadget.com/2015/09/16/android-lock-screen-bypass-flaw/
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
Some of the reviews on the Play store are hilarious.
I'm going to have to take a peek!!!
Doesn't this require a wired or cabled connection, and iTunes? Can a 'restore from backup' be done wirelessly, between only two iPhones
You don't need iTunes, you can backup to the iCloud. Of course this way is slower because downloading over the Internet all your Apps and whatnot will take longer then local storage, but it works.
I love the disclaimer at the bottom "Bring your Android phone to an Apple Store and we'll recycle it for you" which is basically code for "toss that pice of sh!t in the trash where it belongs!"
Or sell them off to some 3rd world country that Apple isn't in. making a few dollars is better then a 100% loss.
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
For the "vast majority" of phones out there, how many will realistically be patched? And please don't respond about Nexus phones as we know that Google will do it for that extremely slim share.
For what it's worth the chances of that flaw actually being used is quite small and a patch has been issued. While it's not to be ignored, from what I have read the following things need to be satisfied for it to work:
1. The phone has to use the stock dialer. This excludes all Samsung, Sony, LG phones and some others.
2. The phone needs to be running Android 5.x without the security patch. A vast majority of phones are not running the latest version of Android.
3. The phone needs to be using password unlock. Any phone using a PIN or pattern to unlock is not affected.
4. The phone needs to be physically in the hands of the hacker.
So it's highly unlikely to affect many people. If your phone is running Android 5.x unpatched and uses the stock dialer then use PIN to unlock until patched.
For the "vast majority" of phones out there, how many will realistically be patched? And please don't respond about Nexus phones as we know that Google will do it for that extremely slim share.
You are clearly asking a question that I can't answer. Keep in mind this security flaw in particular only affects phones running 5.x that use the stock dialer with the user using a password to unlock instead of a PIN or pattern. That is not many phones and far from a "vast majority" of phones out there.
I understand your sentiment about patching. Apple clearly does it better with the ability to patch all devices versus Android and the carriers/manufacturers. One of my friends 3 year old Samsung phone just got the Stagefright security patch a few days ago. Far too long to wait for that kind of security flaw in my opinion, but hey at least it finally got patched. It is a serious bug especially considering that the hack does not require physical access of the phone. Although I still haven't seen any news of anyone getting bitten by Stagefright in the wild, and its arguably one of the worst security flaws to be discovered in while.
My point was that this security flaw in particular that the original poster mentioned is hardly something to be worried about as it will affect nearly no one given the circumstances involved. It's more of a proof of concept than anything. Lock screen security flaws crop up nearly every time there is a new release of both Android and iOS. Yet they affect nearly no one in the real world other than maybe the jailbreakers who are looking for a bug to exploit.
All of that being said, I can't know if a "vast majority" of the phones running 5.x that use the stock dialer will be patched eventually for this security flaw in particular.
Yet the Droids won't shut up about TouchID being vulnerable.
Requiring:
1. The physical iPhone
2. A copy of the owner's fingerprint.
I think he has the right to talk sh**.
Yet the Droids won't shut up about TouchID being vulnerable.
Requiring:
1. The physical iPhone
2. A copy of the owner's fingerprint.
I think he has the right to talk sh**.
Not sure why anyone would think that applies to only TouchID.
It seems that would likely be true for just about any fingerprint ID on a phone/tablet.
Also I wouldn't be surprised that if you get physical access to someones phone or tablet, then there would be a fingerprint on it from the owner. Still the chances of that happening to anyone is extremely unlikely. Sounds like a job for a three letter agency, not your average thief.
Regardless, I was simply trying to be helpful with some additional information.