Cell Phone Tech Bytes
Why do iPhone and iPad users jailbreak? Freedom !
Summary: Millions are jailbreaking their iOS devices in order to add much-needed features to their iPhones and iPads. But jailbreaking opens up a whole world of pirated apps to owners, which is a bad situation for Apple and iOS developers.
The new iOS jailbreak tool evasi0n has been used by millions of iOS owners to remove the limitations that Apple placed—for security and anti-piracy reasons—on the mobile platform.
But what are jailbreakers hoping to achieve from jailbreaking their iPhones and iPads?
Look at the numbers. It has been reported that the evasi0n jailbreak tool was used to unlock more than 7 million devices in the first four days following its release.
That’s a lot of new jailbreakers, but it is not unexpected given that evasi0n was the first tool to be able to unlock the iPhone 5, iPad 4, iPad mini, and the fifth-generation iPod touch.
Unlock Your Cell Phone Spend 5 years In Prison, Plus Pay $500,000 Fine!
The Most Ridiculous Law of 2013 (So Far): It Is Now a Crime to Unlock Your Smartphone
BY DECREE OF THE LIBRARIAN OF CONGRESS
IT SHALL HENCEFORCE BE ORDERED THAT AMERICANS SHALL NOT UNLOCK THEIR OWN SMARTPHONES.
PENALTY: In some situations, first time offenders may be fined up to $500,000, imprisoned for five years, or both. For repeat offenders, the maximum penalty increases to a fine of $1,000,000, imprisonment for up to ten years, or both.*
BlackBerry 10 is Going to Have the Best Web Browser of Any Mobile Platform
Posted by Techvibes Newsdesk
One of the biggest drawbacks of current BlackBerry devices is their mediocre mobile web experience. Most have small screens, low resolutions, and no touch functionality. That makes browsing via the mobile web a real pain.
Research In Motion never anticipated how big the mobile web would be, which is why it fell behind Google’s Android and Apple’s iPhone, who offer vastly superior browsing experiences: bigger screens, higher resolutions, and responsive multi-touch gestures. RIM still offers great email, but people want more
4-iPhone 5 DAMAGE!:
iPhone 5 gets a solid review:
Megaupload founder at it again:
A new nook? Who cares!
Office 2013: Half Of A Good Thing
I see the same problem with Office 2013 that I see with Windows 8 generally. Its biggest changes are aimed at people who might never use Office in the first place — namely, tablet users.
Windows 8 has made itself out to be Microsoft’s bid at creating a touch-oriented version of the OS, coupled with a push on the part of hardware makers to give the touch part of the OS something to work with.
Warning about online fraud as information theft rises
Fraudsters traded 12 million pieces of personal information online between January and April this year, according to research.
The figure represents a threefold increase on 2010.
Credit-checking company Experian, which produced the figures, said the increase was partly due to consumers having a growing number of online accounts….
Yahoo Password Breach: 7 Lessons Learned
What should businesses, users, and regulators take away from the Yahoo password breach? Start with encryption for all stored passwords.
Stop the password breach madness: If it seems as if every week brings a new password breach to light, that’s because hackers have been hard at work, releasing passwords with aplomb.
Recently, an attacker uploaded a subset of hashed passwords from LinkedIn to an online security forum,
Google’s Nexus 7 tablet ships this week
By Doug Gross, CNN
Google says the Nexus 7, its hotly anticipated new tablet computer, is shipping to customers who preordered it this week, amid reports of heavy demand.
In an e-mail to customers, the company said some versions of the 7-inch tablet are in the mail and others would be on the way to customers by Thursday evening.
Hacker claims to have breached & backdoored antivirus software firm Trend Micro
A hacker claims to have breached and backdoored security and antivirus software firm Trend Micro due to ‘pseudo-security’ as well as SYKES which runs support services for Trend Micro.
According to Pastebin and a dump for ‘proof’ of the breach, the hacker claims to still be in control of a backdoor into the security firm