Rumors of an Apple-Nordstrom partnership on mobile payments are surfacing just before the release of the iPhone 6.
Check out the hottest mobile IT stories for Sept. 2, including the credit card companies teaming with Apple for mobile payments, the global realization of LTE, the replacement of in-car entertainment by tablets, growth in the WLAN market and Amazon's plans for native mobile ads.
Various reports point to a failure in Apple's iCloud security system, ultimately leading to the leak of several celebrities' personal photos to the Internet. The flaw appears to be with iCloud's Find My iPhone service, explains Owen Williams with The Next Web.
This past quarter saw a 26 percent increase in the number of shartphone shipments worldwide, topping 290 million devices, according to new data from Juniper Research.
Apple is defending the undocumented services resident on iOS devices, which security researcher Jonathan Zdziarski says can be used as a backdoor to sensitive data, as a diagnostic tool for enterprise IT departments, developers and AppleCare service personnel.
Apple has inserted backdoors into iPhones that could enable an unauthorized person to harvest pictures, text messages and other sensitive data from the device without the user's knowledge, Jonathan Zdziarski, an iOS jailbreaker and forensic expert, told attendees of the Hope X conference held in New York over the weekend.
Check out the hottest mobile IT stories for July 7, including the top five selling phones of the first quarter, The companies utilizing mobile-social campaigns most effectively, the expected battery boost for the iPhone 6, the group of UK businesses that unilaterally banned Google Glass and the latest on browser adoption.
The survey of IT managers by Dimensional Research on behalf of JAMF Software finds that the percentage of Apple devices in the enterprise has more than doubled over the last three years.
A user called Daniel has discovered a new lock screen bug in iOS 7 and posted a YouTube video demonstrating the exploit. Unlike earlier flaws that opened up access to the entire device, however, only the last app used by the user prior to locking the device is exposed this time.