Categories
iPhone iPod shuffle Rumor Software

Additional Perks, Features Emerge in iPhone OS 3.0 Firmware Betas

Developers working with recent betas of Apple’s iPhone OS 3.0 software have uncovered some impressive new features such as changes to Safari’s user interface, new battery status indicators and notification preferences, as well as the advent of data detectors in certain apps. According to AppleInsider, the following changes have been the most prominent: Safari: Safari […]

Categories
Software

TechTool Pro 5.0.4 Released

Over the weekend, Micromat released version 5.0.4 of TechTool Pro, its best-selling utility software for the Mac. The new version offers features and changes such as the eDrive, which allows users to create an emergency startup partition that includes TechTool Pro on one of your hard drives without the need to reinitialize your hard drive. […]

Categories
Software

Tweetie for Mac Coming Soon!

Who would have thought such a simple thing would become such a huge phenomenon? In a matter of months, it seems like Twitter has become a household name and “the next big thing”? You know it must be big, even Oprah is on Twitter now. News even broke that Ashton Kutcher beat out CNN to […]

Categories
iPhone

Verizon CEO Claims iPhone Deal More Likely with 4G Network in Place

Even though Verizon snubbed Apple when iPhone wireless carriers were initially being chosen, Verizon’s chief executive Ivan Seidenberg has now stated that the chances of an iPhone on the company’s network will be improved once 4G technology is in place. The CEO explained to the Wall Street Journal on Thursday that Apple is ‘more likely’ […]

Categories
iPod security

Mac Hacker Charlie Miller Locations Additional Security Hole in iPhone

Mac hacker Charlie Miller, a principal security analyst at Independent Security Evaluators and the winner of the the CanSecWest security conference hacking contest two years straight, has detailed his latest find wherein he was able to run shellcode on an iPhone. According to Macworld UK, it was widely believed by many security researchers that it […]