Everyone loves free. If it doesn\’t cost anything, someone
will likely take it. But, as we know, nothing is actually free. And with smartphone and tablet apps
the cost is usually personal information.
Imagine hackers sitting right in front of your computer — a programming bug called Bash Bug is making certain operation systems vulnerable and experts warn it\’s time to take steps to protect computers.
With all the hubbub over whether the new iPhones can be bent — by mistake or on purpose — Men\’s Health\’s Gregg Stebben has some things not to do.
With all of the issues iOS 8 has had, is there any reason to take the update? Ken Colburn with Data Doctors has the answer.
You may want to refrain from putting the newest iPhone in
your back pocket after reports of the phones bending.
Are you addicted to your iPhone? A new app tracks the time you spend on your screen in hopes you\’ll spend a little more time off it.
It hasn\’t been confirmed, but Apple seems headed toward releasing two larger iPhones. Men\’s Health tech guy Gregg Stebben describes why big phones are such a big deal.
Is your iPhone as secure as it can be? Most iPhone users aren\’t aware of simple steps they can take to protect their mobile devices from hackers.
Apple\’s new iOS 8 is said to work better with Mac devices and enable more multitasking capabilities.
We learned last week that hackers were able to unlock the data from iPhones through iCloud, and now we\’re learning what the hackers are doing with the access.
Dutch hackers tried to warn the company, but they didn\’t pay attention.
Apple\’s latest version of its mobile operating system has improved the phones\’ battery life.
A recently-released hearing aid is the first compatible with iPhone, iPad, and iPod Touch. ReSound LiNX streams any sound from the iOS devices directly into the user\’s hearing aids.
Starting this week, Apple is testing its new CarPlay system, which allows drivers to access iTunes hands-free. See which cars will have the service initially.
The latest form of cellphone messaging goes back to one of the earliest forms of communication – and it\’s free, totally secure and doesn\’t depend on finding reception: smoke signals.