Apple starts repairing iPhone 5C screens in stores

Posted by:
Date: Thursday, January 23rd, 2014, 09:28
Category: Apple, AppleCare, Hardware, iPhone, News, retail, Retail Store

AppleGeniusBarBack in November we mentioned Apple’s plans to start offering in-store screen replacements for the iPhone 5S and 5C. This week, Apple started its roll-out of iPhone 5C repairs, so if you’ve got an iPhone 5C with a cracked or broken screen, the Geniuses at the local Apple Store can replace it while you wait, rather than sending it out. This makes two models that can be repaired in-store, the iPhone 5 and now the 5C. The 5S, for now, still needs to be sent into Apple for repairs, possibly due to the added complications of working around the Touch-ID sensor/home button. No news yet on when the 5S plan will get rolled out. As we reported before, the in-store replacement cost should be $150, with the price being $80 if your iPhone is covered by the original warranty or an AppleCare plan. The policy should be rolled out to all stores by the end of this week, but could take a little longer if the store is not in or near a large city.

Chrome bug captures your every word behind your back

Posted by:
Date: Thursday, January 23rd, 2014, 08:37
Category: Announcement, Google, Hack, Opinion, privacy, security, Software, Websites

googlelisten2As if people were not paranoid enough about the amount of data Google captures about them, a recently discovered bug in Google’s Chrome web browser can now capture everything you say in front of your computer without you even knowing about it. And here is the kicker…it’s probably not even Google who is after your voice, it’s random hackers taking advantage of the exploit. According to developer Tal Ater, who discovered the exploit, the bug allows a malicious web site to open another browser window (just like a pop-up ad) behind the main window which continues to record your voice -even after you’ve closed the original site window- and sends the recorded data first through Google for processing, and then on to wherever the hacker wants.

(more…)