-
Face, the future: the new touch-less ID of iPhone XFour years after introducing Touch ID to radically enhance iOS users' privacy and security, today's Apple is doing exactly what Steve Jobs would do -…
... apps could use, but not abuse. Touch ID panic: This all ... -
Apple reportedly 'looking into' pair of iPhone 8 Plus with split screen from swollen batte...After reports circulated on social media about two iPhone 8 Plus exhibiting a swollen battery out of the millions shipped, Apple is reportedly lookin…
... manufacturing defects and not from abuse in shipping or by the ... -
Three more reports of swollen batteries in iPhone 8 Plus surface, still not statistically ...Three more reports of swollen iPhone 8 Plus batteries have surfaced in international markets, but the current rate of failure is still well within in…
... to either user mishandling or abuse during the shipping process. There ... -
Facebook's attempted 'revenge porn' solution: Trust us with your nude picsSocial networking giant Facebook is trialing a unique and likely controversial solution for the internet's "revenge porn" problem -- asking some user…
... looking to curb "image-based abuse" before it even occurs. In ... -
Google faces UK class action lawsuit over 2012 Safari privacy settings bypass scandalGoogle faces the prospect of paying out compensation to iPhone owners in the United Kingdom if an attempted class action lawsuit goes against the fir…
... rarely seen such a massive abuse of trust where so many ... -
Apple CEO Tim Cook talks Chinese supply chain, censorship and more in interviewApple CEO Tim Cook continued his China tour on Wednesday with an appearance at the Fortune Global Forum, where he discussed a range of topics from su…
... of supply chain partners who abuse labor laws. Cook also visited ... -
How the FCC's repeal of net neutrality could affect AppleThe Federal Communications Commission's roll-back of net neutrality rules take effect on June 11, re-igniting a firestorm of debate and speculation o…
... punish internet service providers who abuse open access. Supporters of net ... -
South Korean prosecutors seeking extended 12-year sentence for Samsung heir apparent Jay Y...Prosecutors have appealed a lesser five-year sentence, and are requesting that the South Korean court system extend the prison term for Samsung execu…
... will be facing charges of abuse of power, coercion and bribery ... -
All Mac & iOS CPUs affected by 'Meltdown' and 'Spectre' chip flaws, some fixes already in ...Following the news that both Intel- and ARM-based processors can be susceptible to various hacks, Apple issued a statement on Thursday announcing tha…
... Meltdown and Spectre exploitation techniques abuse speculative execution to access privileged ... -
Apple's iOS Addiction already has a solution on the MacApple is vexed with the problem of excessive customer satisfaction, particularly in the troublesome demographic of young users. That's the latest hot…
... that regularly splashes suicide-inducing abuse and depraved, explicit content from ... -
First look: IOGear USB-C Compact Docking Station returns legacy ports to MacBook, MacBook ...The IOGear USB-C Compact Docking Station with Power Delivery Pass-Thru is a port-replacement peripheral for USB 3.1 type C gear -- but isn't perfect …
... what happens with use and abuse, given its portable nature. Without ... -
Grayshift becomes second service to promise forensic unlocks for Apple's iPhone 8 & XAdding to the evidence that Apple's latest iPhones are no longer safe from hackers -- legal or otherwise -- a second company has come forward selling…
... potentially help governments -- and corporations -- abuse their reach. -
If you don't want to delete your Facebook account, here's how to cut backFacebook tests the limits of people's tolerance for use of private information, as well as over regular changing of privacy settings for their users …
... talk about cracking down on abuse of user data. They don ... -
How to keep your Mac data secure from visitors by using Guest AccountsIn situations where a visitor wants to use your Mac for a task, providing them access via your personal account may be an unwise move, especially if …
... for visitors to use and abuse, Apple has included the ability ... -
Ill-informed YouTuber bemoans Apple repair policies after breaking iMac ProA YouTube video is generating over a million views and myriad social media complaints about Apple "refusing" to fix an iMac Pro destroyed after taken…
... customers as a result of abuse in years gone by. Shops ... -
Net neutrality ends June 11, Senate Democrats force last-minute voteA "Restoring Internet Freedom" order ending net neutrality, approved in a 3-2 vote in December, will finally take effect on June 11, the U.S. Federal…
... punish internet service providers who abuse open access. Supporters of net ... -
First details emerge about new batch of Intel processor security flaws [u]Details of the first of the second wave of Spectre-style vulnerabilities in Intel processors has been published earlier than expected, with the "Lazy…
... centers around the use and abuse of the Floating Point Unit ... -
Google's Gmail, other services let third parties read user emails, report saysJust over a year after promising to no longer scan user emails in Gmail for personalized ads, Google is allowing outside developers to do just that, …
... as investigating a bug or abuse," while Google "lets any user ... -
Apple pulls 'QDrops' from App Store, for-pay app pushed wild conspiracy theoryCiting App Store guidelines, Apple has pulled "QDrops," an app meant to alert adherents to new developments in the fringe conspiracy theory. <div…
... Democrats were running a sex abuse ring out of a Washington ... -
Apple responds to Congress on privacy, reaffirms 'the customer is not our product'Apple's government affairs chief has written a letter defending the company's practices on privacy and data collection, calling them "radically diffe…
... Privacy, and the Use and Abuse of Data." Those hearings, held ... -
How to keep notifications in iOS 12 under control with Instant TuningSome iPhone and iPad apps abuse notifications, using them for glorified advertising or bombarding you with so much information that it becomes pointl…
Some iPhone and iPad apps abuse notifications, using them for glorified ... -
FBI makes suspect unlock iPhone X in first confirmed instance of forced Face IDThe FBI recently ordered a suspect to unlock his iPhone X via Face ID, in the first known example of police doing so anywhere in the world. <div …
... Columbus, Ohio during a child abuse investigation, Forbes reported on Sunday ... -
Apple urges Australian government not to weaken encryption with backdoorsApple has submitted its formal response to a draft bill undergoing debate by the Australian government, with the iPhone maker calling for "increasing…
... for the purpose of reporting abuse. "If an engineer working for ... -
Forensics firm urges police not to look at screens of iPhones with Face IDWhile U.S. police are now sometimes forcing suspects with Face ID-ready iPhones to unlock their devices, Apple's technology is simultaneously making …
... as part of a child abuse investigation. He cooperated, helping to ... -
iOS 12.1 Group FaceTime bug allows viewing of a locked iPhone's contact detailsA bug has been discovered in the way iOS 12.1 handles Group FaceTime calls, one which can allow a hacker to access the details of a contact stored on…
... appears to be susceptible to abuse, including when the iPhone itself ... -
Apple axed Tumblr from App Store because of failed child pornography filtersTumblr's sudden disappearance from the iOS App Store on Friday -- still unresolved -- was because material slipped through the blogging network's c…
... database of known child sexual abuse material, and images that are ... -
DriveSavers launches passcode-beating iPhone cracking service for the publicData recovery firm DriveSavers is now selling a "passcode lockout recovery" service claimed to be the first for the general public able to crack any …
... such as thieves don't abuse its service, DriveSavers is promising ... -
Australia passes contentious encryption bill opposed by Apple, other tech companiesThe Australia parliament on Thursday passed a set of new cybersecurity measures that compels technology companies to furnish law enforcement agencies…
... as critics warned of potential abuse by government agencies. Of immediate ... -
Apple, other US tech giants denounce Australian 'anti-encryption' billApple and a cadre of U.S. tech companies on Monday signed a letter condemning Australia's recent passage of a cybersecurity bill that bolsters law en…
... vague and could lead to abuse. For example, the bill says ... -
Apple's manufacturers: Qualcomm's 'China Ban' just a distraction techniqueQualcomm's patent infringement suit seeking an import ban on Apple's iPhones in China is a desperate distraction staged by the imperiled chipmaker in…
... monopolistic practice, excessive pricing, and abuse of the law must stop ...