Posted by: Lucas Nolan | Breitbart
May 21, 2022
Researchers have developed a method to run malware on iPhones even when the devices appear to be powered off. The Bluetooth chip in all iPhones has no way to digitally sign or encrypt the firmware it runs, researchers have now developed a method to exploit the lack of security on the chip and run malicious firmware allowing the researchers to track the iPhone’s location or run new features.
Click here for full report
Recently, I was unable to complete an iOS 15 update to my iPhone, so I used the following tip to locate and delete the download file that took up over 5 gb of disk space.
To record incoming business calls that originate in the United States, I maintain a Nextiva account that I opened several years ago when I set up one of my WordPress websites.
You bought a USB mic to make live audio recordings with your computer and it works great! At the same time, you are often disappointed by the quality of the recordings that you can produce using the built-in mics in your iPhone and iPad. You ponder whether there is a way to connect your USB mic to your iOS devices. Read on to find out how it’s done using a pocket-sized adapter.