Modern cameras include GPS data in photos, and software like iPhoto and Aperture uses this data to provide location info for features like Places. Not only are many people unaware that GPS data is included in the pics they’re taking, but uploading these pics online means that the world knows exactly when and where they were taken.
Apple’s professional photo Mac software, Aperture, is supposed to let you strip location data from your pics before you share them from the app. The problem is that the feature doesn’t exactly work in the current version of Aperture.
Don’t forget your iPhone’s password, because if you do your device might get disabled for a few decades. That’s what happened to this poor fellow’s iPod Touch. After erroneously entering his passcode ten times the iPod locked up and said it can’t be used for another 22,338,550 minutes. That’s 42.5 years he’s going to have to wait to listen to The Biebs new album. The poor sucker.
The longest a time lock on iOS is supposed to last is 60 minutes, so this is obviously a bug. A really bad bug. Should this ever happens to your iPod you can fix it by plugging the device into your Mac and restoring it to your last backup.
You might want to hold off on the sexting via Skype for a bit, as Skype has acknowledge a “rare” bug, which according to complaints on Skype support, appears to send messages to unintended contacts. The Skype team has already responded and plans on pushing out a fix soon.
“We are aware that in rare circumstances IM’s between two contacts could be sent to an unintended third contact. We are rolling out a fix for this issue in the next few days and will notify our users to download an updated version of Skype.”
Get ready to build some crazy contraptions on your Mac.
After landing on Android and iOS yesterday, Rovio has confirmed that Amazing Alexwill be making its way to Mac and PC. The new physics-based puzzler is Rovio’s first break away from the hugely successful Angry Birds series, and it’s already gotten off to a great start, rocketing up to the number one spot in the App Store’s paid charts in several countries.
Apple’s iOS Safari browser has been the source of many vulnerabilities in the past, and a new discovery reveals a scary bug in the latest version of iOS. When browsing the web on iOS 5.1, there’s the potential that you could run into some address bar spoofing.
What does that mean exactly? Basically, a site URL could be displayed in the address bar that doesn’t actually match the webpage you’re visiting.
Apple has been grilled for iOS security problems repeatedly over the last few weeks. Path started the firestorm when it was revealed that the popular iPhone app secretly uploaded a user’s entire address book to its private servers. Despite the fact that Apple is firmly against such practices, many apps continue to take advantage of Apple’s poor guideline enforcement.
The New York Times sounded the bell again earlier today with the revelation that an iOS app can collect your device’s entire Camera Roll (not just the location data) without your permission. A new report claims that Apple has acknowledged the bug and is working to fix it in a future iOS update.
Sources for Cult of Mac have discovered yet another security flaw in Apple’s iOS 5 operating system that provides unauthorized access to your iPhone’s camera roll without the need to enter your passcode. It has been tested on the iPhone 4, but could also affect other iOS devices.
We’re all familiar with how costly data can be on our iOS devices if we’re using them to get on the internet abroad with no access to a Wi-Fi hotspot. To prevent nasty charges, most of us turn off data roaming and avoid using our devices for the internet.
However, there’s a nasty bug in Apple’s iOS operating system that could cost you a fortune while you’re on vacation by allowing you to download apps over a 3G data network even with the feature turned off.
Carrier IQ CEO Larry Lenhart and vice president of marketing Andrew Coward have revealed in an interview that despite the company’s assurance that no personal data is recorded by its software, a “bug” did unintentionally collect users’ text messages. What it does collect intentionally — particularly for the Federal Bureau of Investigation — is yet to be clarified, with the FBI refusing to disclose this information.