iphone

Read More
Less
Silhouettes of mobile users next to the Whatsapp logo, March 28, 2018.

What's new with WhatsApp? Messenger gets facelift with iOS update

WhatsApp's new update includes animations and changed privacy formatting

The Telegram logo is seen on a screen of a smartphone in this picture illustration

Your Whatsapp chat history can now be exported to Telegram

The application is now rivaling WhatsApp regarding which cross-platform messaging service the general public prefers to use.

01/02/2021
An attendee uses a new iPhone X during a presentation for the media in Beijing, China, 2017.

Apple reveals security flaws in iOS that 'may have been actively exploited'

Patch notes for the iOS 14.4 update announced that the vulnerabilities were found in both the previous versions of the iPhone and iPad operating systems.

Update your smartphone or lose out on WhatsApp update

This is not the first time Whatsapp was updated

By BARUCH MOORE
28/12/2020
Iran Supreme Leader Ayatollah Ali Khamenei, July 2020

Iran's supreme leader tweets against iPhone imports on iPhone

While many foreign technologies and services are banned in the Islamic Republic, Iranian officials have been caught using them themselves multiple times.

24/08/2020

Israeli photographer wins international iPhone photography contest

The 22-year-old photographer, won second place in the Nature category for his photo of a majestic New Zealand bird.

Cellcom overcharged customer NIS 3,000 for new iPhone

Instead of the original agreed upon amount of NIS 4,986, the customer was charged NIS 7,884 by the cellular company.

Apple

Apple: 'No evidence' that hackers exploited flaw in iPhones, iPads

Avraham said he found evidence that an attacker was taking advantage of the vulnerability as far back as January 2018, but that he could not determine who the hackers were.

By REUTERS
24/04/2020
Iphone

iPhones, iPads may have had flaw allowing hackers to steal data for years

Avraham, a former IDF security researcher, said he suspected that the hacking technique was part of a chain of malicious programs that could have given an attacker full remote access.

By REUTERS
23/04/2020
Subscribe for our daily newsletter
Subscribe for our daily newsletter

By subscribing I accept the terms of use and privacy policy