Categories
iOS iPad iPad mini iPhone iPod Touch News security Software

Apple releases iOS 8.3 update

It’s a day of muchos updates for OS X and iOS users. On Wednesday, Apple released version 8.3 of its iOS operating system. The new version, a 487 megabyte download, contains a massive helping of fixes and changes. Among them are more than 300 new emoji symbols, a scrolling keyboard, additional languages for Siri and […]

Categories
Hardware iPad iPhone News

Intel, Micron 3D NAND partnership could allow for larger, faster memory modules in Macs, iOS devices

Via the combined forces of Intel and Micron, NAND flash memory could get even faster. This, in turn, could make the memory in your iOS devices even faster and allow for more storage space. The two companies are apparently working on a 3D NAND flash technologies wherein 3D NAND is stacked in 32 vertical layers. […]

Categories
iOS iPad News Software

Ulysses 2.0 writing app in works for Mac, iPad

If you were a fan of the Ulysses writing app for Mac and iOS, version 2.0 is just around the corner. Major changes to Ulysses 2.0 for the Mac include the following: – New name: Ulysses for Mac is now called just that. No more Roman numerals. – Seamless sync with Ulysses for iPad: That’s […]

Categories
News security Software

OS X malware on the rise, tips posted as to how to remove it

This is worth a gander. A recent piece on How-To Geek points out the dramatic rise in malware for Mac OS X, the article highlighting a spike in spyware, adware and overall malware that comes with clicking the wrong items during an installation. Once installed, the adware injects itself directly into your browser, analyzing your […]

Categories
iOS News security Software

Hacker group may have hidden within the NSA for 14 years, successfully compromised OS X, iOS devices among other efforts

This goes into the category of “man, it’s long, but you’ve got to read it”. An article on Ars Technica discusses the Equation Group, a group of hackers that had an incredible amount of success, were able to use revolutionary methods in their work and may have been embedded within the National Security Agency. In […]