Search

Filter:

Search Results

Apple's iPhone 6 finally goes on sale; From cell phone bans to BYOD;

(@dchou1107) September 19, 2014 iPhone 6 Plus Teardown Reveals a Battery Nearly as Big as an iPhone 5S: You ...

Apple defiant about protecting iPhone data even in the face of government warrant

Flaw in Apple iCloud's Find My iPhone blamed for leak revealing celebrity photos ...

Apple reportedly releasing iPad Air 2, new iPad mini at mid-October event

fingerprint sensor. The TouchID sensor first appeared with the iPhone 5S. TouchID tech is available ...

Mobile drags down Sony; Not the iPhone 6;

Mobile drags down Sony >> Sony Increases Loss Forecast to $2.14 Billion, as Mobile Growth Slows (New York Times) Not the iPhone 6 >> This Is Not the iPhone 6 (Re/code) Increase mobile game ad revenue >> 5 ways to increase advertising revenue from your game (VentureBeat) Apple adds ...

News Scan: BBM's new mobile payment features; Swrve pockets $10M;

in iPhone 6 a decade behind Japan] >> Chinese firms to drive growth in white-box mobile devices, ...

Cisco aims to differentiate OpenStack with its Metacloud buy

As Perilli told the story of attending a press day event at the 2013 OpenStack Summit, when unnamed vendors ...

Oldest malicious macros still exploit flaws in our digital society

I don't do a story like this and essentially state how a malicious agent works, because I give people too ...

Adobe finally releases critical updates for Reader, Acrobat

Adobe has finally released a security update for its Adobe PDF Reader and Acrobat products that resolves at least eight critical vulnerabilities, including some that could be exploited to infect computers with malware. The new 10.1.12 and 11.0.09 versions of Adobe Reader and Acrobat released on Tuesday ...

Government requests for customer information are on the rise, says Google

Report Related Articles: Spotlight: Wired on the real Edward Snowden story Spotlight: NSA surveillance ...

Apple's iOS 8 and the enterprise

introduced with iPhone 5S. These can be used as part of an enterprise authentication system in addition ...