Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Saturday, 1 June 2013

Verizon Cloud iPhone backup software launches on Apple's App Store

Verizon Cloud iPhone backup software launches on Apple's App StoreGet the lowest prices anywhere on Macs and iPads with exclusive coupons: Apple Price Guide updated May 25th. (Get the lowest prices anywhere) AppleInsiderHomeReviewsBackpagePrice GuidesNew MacsMacs with AppleCarePrevious MacsiPadsApple Wireless DevicesBid on New & Used Apple ProductsFollow UsTwitterFacebookGoogle+RSS Feeds & QriusiPhone AppTip UsSend us a tiptip us anonymouslyContact us by e-mailForumsAAPL: 445.15 ( +3.01 )Never miss an update Follow AppleInsiderFollow @AppleInsiderRSS –A+
Friday, May 24, 2013, 11:39 am

Verizon Cloud iPhone backup software launches on Apple's App StoreBy AppleInsider Staff

Verizon this week launched a new iPhone application for its subscribers that gives access to the carrier's cloud-based syncing and backup service.

Verizon
The official Verizon Cloud application is now available as a free download on the App Store. It requires iOS 5.0 or later, and is optimized for the 4-inch display on the iPhone 5.

Customers can sign up for the Verizon Cloud service, which debuted last month, by visiting the carrier's website. The entry-level 500-megabyte plan is free, while 25 gigabytes are available for $2.99 per month, 75 gigabytes for $5.99 per month, or 125 gigabytes for $9.99 per month.

Features of the newly released iOS application, according to Verizon, include:
Keep your phone's content safe and secure in your own private cloud storage
Access your content when you need it, even on the go, on any compatible device, your computer or the web
Sync photos and videos from Verizon Cloud to your device, and then share that synched content with your friends and family
Stream music and access documents stored in Verizon Cloud on your phone
Backup content from your computer's hard drive to your Verizon Cloud using the downloadable computer app. You can then access that content on your mobile devices.Tags:VerizonApp StoreJump to comments (16)Categories:iOS(function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs);}(document, 'script', 'facebook-jssdk'));Tweet!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); On Topic: VerizonVerizon Cloud iPhone backup software launches on Apple's App StoreVerizon confirms $100 iPhone 5 for featurephone customers [u]ESPN interested in subsidizing mobile data plans to ensure users can stream videoSupply shortages delay Samsung Galaxy S4 launch at Sprint, T-MobileSlowing iPhone growth may be function of smartphone industry, not restricted to AppleToday's' HeadlinesFoxconn may sell own branded accessories after Apple profits dipApple's iPhone sales tactics in Europe under antitrust investigationRelated ArticlesMicrosoft releases Kinectimals game, SkyDrive storage for iOSAmazon launches Cloud Player app on iOS App StoreLegal issues prompt Apple to remove Amazon Cloud music player from App StoreGoogle Drive launches with 5GB of free cloud storageAmazon takes on Apple's Photo Stream with Cloud Drive Photos iOS appPrevious Comments View Alljack mac2013/05/24 12:03pm

You really going to trust Verizon?

dasanman692013/05/24 12:14pm

Quote:Originally Posted by Jack Mac?

You really going to trust Verizon?
This seems pretty straightforward.
Quote:Keep your phone's content safe and secure in your own private cloud storage

tallest skil2013/05/24 12:18pm

Originally Posted by dasanman69?View Post
This seems pretty straightforward.

?

How in the world do you think that's an answer?

rcoleman12013/05/24 12:26pm

No thanks. Lol

bdkennedy12013/05/24 12:38pm

No thank you.

jblongz2013/05/24 12:44pm

No thanks. I'll stick with the new dropbox killer http://goo.gl/KRJdT

dasanman692013/05/24 12:58pm

Quote:Originally Posted by Tallest Skil?

How in the world do you think that's an answer?
I'd question it if it were free, and they've had Backup Assistant for a few years now so I think that they have some good experience with cloud backups.

macologist2013/05/24 01:11pm

How is this different from these: iCloud, Drop Box, and various other Online Backups?

Privacy and Competence are Major Concerns too!

I don't see how Verizon's, or any Cell Carrier's Support for Apple's Products is better than AppleCare!

Walking into US Cell Carrier's Stores is the best Advertising for AppleCare! In most cases in those stores they try harder to sell Android Phones. Why? Cause Apple's Products Just Work, and thus puts the Carrier's Employees Out Of Work, cause their "Support" is not needed. That is what I have observed, so I assume that it's like that in most places!

All Carriers should focus on is Reliable Fast Connection at Lowest Price!

Apple lets these Apps in its stores, and Consumers vote with their Money!

I understand that iCloud Backup is not as Complete as Local USB Backup! So is Verizon saying that they have solved that problem, so that Local USB and iCloud iOS Backups are Identical? If yes, I'd love Apple to offer the same capability!

We'll see what News WWDC 2013 has to offer with the New iOS 7 and Mac OS 9 etc.

I'd love to see Apple offer Renewals of AppleCare after the Initial 3 Years! That way one goes to the Source! Obviously, with the Toll Free Phone Support!

dlux2013/05/24 01:12pm

Sure thing, Verizon, I'll back up my files on your network.

And then discover that I can't retrieve them when needed because it will exceed your bandwidth caps...

freshmaker2013/05/24 01:32pm

Quote:Originally Posted by dasanman69?View Post


I'd question it if it were free, and they've had Backup Assistant for a few years now so I think that they have some good experience with cloud backups.

This is a good point - VZ already has experience in the area.? I don't see any reason why they'd be less trustworthy than Apple.? While iCloud has been very good overall, it's not like it hasn't had hiccups.? That said, the 15GB iCloud subscription I already pay for is enough for me.

View all commentsLogin to Comment

Have an opinion? Sign Up to share it.


Latest Apple Headlinesarticle_thumbFoxconn may sell own branded accessories after Apple profits dip~2 hours agoarticle_thumbApple's iPhone sales tactics in Europe under antitrust investigation~2 hours agoarticle_thumbReview: Scosche enters car radio fray with iOS connected controlFREQ~16 hours agoarticle_thumbCradle attachment turns Apple's iPhone into handheld biosensor~16 hours agoarticle_thumbWorking Apple I fetches $671,400 in German auction~17 hours agomore...

Apply to AppleInsiderWant to write for AppleInsider? Submit your application now! Price guide Model WhiteBlack iPad mini (WiFi only) 16GB WiFi WiFi$329.99$329.99 32GB WiFi WiFi $429.99 $429.99 64GB WiFi WiFi $529.99 $529.99 iPad mini (WiFi + 4G)   AT&T Verizon Sprint 16GB 4G White $459.99 $459.99 $459.99 32GB 4G White $559.99 $559.99 $559.99 64GB 4G White $659.99 $659.99 $659.99 16GB 4G Black $459.99 $459.99 $459.99 32GB 4G Black $559.99 $559.99 $559.99 64GB 4G Black $659.99 $659.99 $659.99 See more iPad models in our Price Guides
Active Forum Topics

147

Editorial: Apple's iOS 7 needs exclusive, distinctive features, not just a flat UI

25

iPad shipments could see first ever year-on-year decline in Q2, analyst says

11

Cook: US-built Mac will be refreshed version of existing product

10

2013 Mac mini Wishlist/iMac wishlist

8

ISLAM WATCHmore... Lowest Prices Anywhere!Price guideModelPriceYou Save Core i5 MacBook Pros w/ Retina 13" 2.5GHz/8GB/128GB $1,406.48 $292.52 13" 2.5GHz/8GB/256GB $1,479.99 $519.01 13" 2.5GHz/8GB/512GB $1,699.99 $799.01 Core i7 MacBook Pros w/ Retina 13" 2.9GHz/8GB/256GB $1,599.99 $599.01 13" 2.9GHz/8GB/512GB $1,799.99 $899.01 15" 2.3GHz/8GB/256GB $1,899.99 $299.01 15" 2.6GHz/8GB/512GB $2,299.99 $568.01 15" 2.7GHz/16GB/768GB $2,699.99 $499.01 More configurations ReviewsHot TopicsGeneraliPhoneTaxesiOSGoogleiPadpatentsappsTim CookApp StoreAndroidlawsuitsMapsApple StoreAT&T
Top of pageCopyright ? 2013, AppleInsider.com, Contact UsPrivacy PolicyAdvertise on AppleInsiderDesign: gesamtbild

View the original article here

Thursday, 9 May 2013

About the security content of iOS 6.1 Software Update

About the security content of iOS 6.1 Software UpdateThis document describes the security content of iOS 6.1.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

">ACUtil.setPOD('us~en'); var articleId = "HT5642"; var ACStaticText = { 'more': '…more', 'less': 'less' };KmLoader.akamaiUrl = 'http://km.support.apple.com';//function sendRead()var locale = 'en_US';Event.observe(window, 'load', function() {ACHistory.addKbView('HT5642', 'About the security content of iOS 6.1 Software Update', 'en_US', 'unknown');ACUtil.getMultipleOffers('PL133,PL113,PF22,PP23', 'HOWTO_ARTICLES', 'en_US', 'false');ACUtil.reportView('HT5642', 'en_US');// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){var store = new Persist.Store('FeedStats');if (store.get('resultActivity')=='true'){var time = new Date();// Fix for /*setReadTimer = setTimeout(function(){var feedStats = new ACFeedStatistics();feedStats.updateRead('HT5642', store.get('position'));store.remove('HT5642');store.remove('position');}, 3000);*///store.set('HT5642', time.getTime());store.set('timeStart', time.getTime());}} });Event.observe(window, 'beforeunload', function(){// Apple Instant Feed statistics code if(enableAppleInstant == "yes"){ var store = new Persist.Store('FeedStats'); if (store.get('resultActivity')=='true' && store.get('timeStart') !== null){ var time = new Date();//var timeDiff = time.getTime() - store.get('HT5642');var timeDiff = time.getTime() - store.get('timeStart');var timeSpent = Math.floor(timeDiff/1000);var feedStats = new ACFeedStatistics();// Fix for if (timeDiff About the security content of iOS 6.1 Software Update Summary This document describes the security content of iOS 6.1.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

Products Affected

Product Security, iPad, iPhone, iPod touch

iOS 6.1

Identity Services

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed

Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.

CVE-ID

CVE-2013-0963

International Components for Unicode

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack

Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.

CVE-ID

CVE-2011-3058 : Masato Kinugawa

Kernel

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A user-mode process may be able to access the first page of kernel memory

Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.

CVE-ID

CVE-2013-0964 : Mark Dowd of Azimuth Security

Security

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information

Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates.

StoreKit

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: JavaScript may be enabled in Mobile Safari without user interaction

Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner.

CVE-ID

CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek

WebKit

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.

CVE-ID

CVE-2012-2857 : Arthur Gerkis

CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2012-3621 : Skylined of the Google Chrome Security Team

CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2012-3687 : kuzzcc

CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0951 : Apple

CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team

CVE-2013-0955 : Apple

CVE-2013-0956 : Apple Product Security

CVE-2012-2824 : miaubiz

CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team

CVE-2013-0968 : Aaron Nelson

WebKit

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack

Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content.

CVE-ID

CVE-2013-0962 : Mario Heiderich of Cure53

WebKit

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack

Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking.

CVE-ID

CVE-2012-2889 : Sergey Glazunov

WiFi

Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2

Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi

Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements.

CVE-ID

CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security

 

$('articlecontent').select('img').each(function(element) { if(element.width > 640 ){ var imageDiv = document.createElement('div'); imageDiv.setStyle({ 'display':'block', 'width':'660px', 'overflow':'auto', 'border':'1px solid #dedede','margin-right': '15px'}); element.parentNode.replaceChild(imageDiv, element); imageDiv.appendChild(element); } }); $('articlecontent').select('table').each(function(element) { if(element.width > 660 || element.offsetWidth>660){ var tableDiv = document.createElement('div'); tableDiv.setAttribute("class","kbtablecontainer"); element.setAttribute("style","margin-bottom:0px !important"); element.parentNode.replaceChild(tableDiv, element); tableDiv.appendChild(element); } }); Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. Rate this article:Not helpfulSomewhat helpfulHelpfulVery helpfulSolved my problemOne Moment PleaseThanks for rating this article Not helpful Somewhat helpful Helpful Very helpful Solved my problem Email this article Print this page Share this article