Apple on Friday started offering unlocked, SIM-free iPhone 5s units with shipping estimates of 1-2 weeks. For you to compare - those who decide to purchase the device on contract have to wait for about 3-5 weeks. As to the prices, they’re just the same for both SIM-free and locked smartphones. The iPhone 5s with 16GB of memory on board is available for $649; for the model with 32GB and 64GB of memory one will have to pay extra $100 or $200 respectively.
Apple has released iOS 7.0.4 for iPhone, iPad, and iPod touch. The update is a bug fix release with improvements. Apple notes that the update includes a fix for FaceTime calls that could fail for some users. The update is available over-the-air via the Software Update section in the iOS Settings app.
Apple has also released iOS 6.1.5 for fourth-generation iPod touch users. That iOS 6 update is designed to fix the FaceTime bug on the non-iOS 7 capable iPod touch.
U.S. Patent and Trademark Office published another Apple’s patent application on Tuesday. This time it’s a some kind of touch sensitive button that is capable of detecting multiple levels of pressure. The U.S. Patent No. 8,581,870 is entitled "Touch-sensitive button with two levels".
If you use a jailbroken iPhone 5, then this article will be interesting for you. Yesterday, a hacker with a nickname winocm announced that he had successfully jailbroken iOS 6.1.4 on his iPhone 5. And this is crucial since this is the first time this firmware version was hacked.
Apple iOS 7 Beta 4 is finally released and available for developers. It’s been three weeks since the company from Cupertino unveiled the previous - third - version of its new mobile operating system. Such a long delay is caused by the recent hacker attack on Developer Center.
Karsten Nohl claims that some SIM cards feature a flaw in the encryption technology, so that telephones with the cards can be spied on.
This flaw enables the hackers to send a spoof text message to the device. The latter will answer by revealing the 56-bit data encryption standard key (DES). Using the key, the attacker gains possibility to install dangerous software on the device and even listen in on your phone calls, access/send text messages and much more.