Apple's new ResearchKit could turn the Apple Watch into a medical research tool for the pharmaceutical industry, observed Vivek Wadhwa, a fellow at the Rock Center for Corporate Governance at Stanford University.
Black Box, a robotic "PIN typing" device that uses a USB connection to inject screen taps virtually, can be used to brute force iPhone PINs, warned security researcher Paul Ducklin on the NakedSecurity blog
Google on Tuesday launched its Calendar app for the iPhone, reports VentureBeat.
Faced with Apple's intransigence over data encryption, the U.S. government appears to have taken matters into its own hands, working on its own methods for getting into data on Apple devices.
For those who can't wait for their caramel flan latte, Starbucks has got you covered. You can order your favorite beverage, pay for it and pick it up at the store without waiting in line.
Attackers are launching phishing attacks against victims of iPhone and iPad theft to track victims into supplying iCloud log-in credentials, according to security firm Symantec.
Shifts for iOS enables users to keep track of irregular work shifts on their iPhone, according to a TechRepublic article.
IT security types prefer Apple devices because of their reputation for strong security, but the recent discovery of the Thunderstrike bootkit could call into question that security reputation.
Check out the hottest mobile IT stories for Jan. 6, including a potential iPhone that is meant to bend, wearables hit or miss depending on the market, the likely path of the small drone industry, how Samsung plans to get connected and what Amsterdam is doing to better inform its citizens.
The release of a new hacking tool targeting iCloud's Apple ID dictionary is not reassuring for iPhone users and others who store data, knowingly or unknowingly, on iCloud.