Pokémon Yellow is reborn on Apple Watch

By

Don't expect to see this on your own Apple Watch just yet.
Don't expect to see this on your own Apple Watch just yet.
Photo: Gabriel O’Flaherty-Chan

Pokémon fans, prepare yourself for the coolest Apple Watch hack to date.

One of the most popular titles from the original Pokémon series has been reborn on watchOS. This Game Boy Color emulator hack dismisses the idea that Apple’s wearable is no good for gaming by running fan-favorite Pokémon Yellow.

Old iPhone exploit opens Nintendo Switch to jailbreaking

By

The Nintendo Switch's flexible Joy-Con controllers work just fine with a Mac (but not an iPhone).
The Switch might be jailbroken soon.
Photo: Killian Bell/Cult of Mac

Nintendo Switch owners may soon be able to install third-party applications on the new gaming console thanks to an old Apple security flaw.

Although the Nintendo Switch doesn’t have a web browser, it uses Apple’s WebKit in order to render web pages. Noted iPhone jailbreaker qwertyoruiop recently discovered that the Switch could be easily hacked just by running the Pangu jailbreak tool for iOS on it.

Apple: We’ve patched ‘many’ iOS vulnerabilities exposed by WikiLeaks

By

These apps' iOS widgets will give your iPhone superpowers.
Keep your iPhone up to date to ensure it's as safe as can be.
Photo: Gilles Lambert/Unsplash CC

Apple insists it has already patched “many” of the iOS vulnerabilities that were exposed in WikiLeaks’ CIA document dump Tuesday.

Cupertino says it is working to address any identified holes that weren’t already patched, and the company reminds fans that the software built for iPhone boasts the best data security available to consumers.

Popular iOS apps vulnerable to spilling your sensitive data

By

iPhone 7 front
Be wary when using Wi-Fi.
Photo: Ste Smith/Cult of Mac

Dozens of popular iOS apps are vulnerable to spilling your sensitive data through silent “man-in-the-middle” attacks, according to a reliable mobile security expert.

During testing, Will Strafach, one of the first to hack open the iOS platform, found 76 apps that were guilty of accepting invalid certificates that could be used to intercept data.

Expel water from your iPhone speaker grille using only sound

By

iPhone 7 soaked in water
A crafty Redditor discovers a simple and free way to clear trapped water from your iPhone 7's speaker grille.
Photo: Apple

Apple touts the new iPhone 7 as being water-resistant enough to take into the shower. There’s really no good reason to bathe with your smartphone, but the point is that iPhone 7 owners don’t need to worry about a little rain or spilled tea.

Naturally, some people waltzed into their shower stalls with their expensive new phones in hand — just cuz — and some found a weakness in the iPhone 7’s water-resistance. Luckily for foolhardy iPhone owners everywhere, a Redditor discovered a simple hack for getting the water out.

iOS bug exposes photos and messages on locked iPhones

By

photos in ios 10
It's shockingly easy to get into someone's photos.
Photo: Ste Smith/Cult of Mac

Hackers have discovered a new method to unlock photos and messages on any iPhone, thanks to an iOS security flaw that utilizes Siri and VoiceOver.

iPhones running iOS 8 software and newer are vulnerable to the flaw, which was discovered by EverythingApplePro and iDeviceHelp. The group revealed the hack in a new video that shows you don’t need any coding experience or special hardware to pull it off. All you need is a few minutes alone with a victims iPhone and some help from Siri.

Hackers can use this tiny $5 device to attack your locked Mac

By

PoisonTap is tiny but deadly.
PoisonTap is tiny but deadly.
Photo: Samy Kamkar

The next time you leave your Mac unattended, make sure to turn it off.

A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.