Slideshow


4

Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text 


3

Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text 

2

Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text 

1

Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text  Text Text 

Unsecured Calls, 5.0

New with iOS 5, the “unsecured call” call warning seems like a direct response to presentations like “Practical Cellphone Spying” at DEFCON, which demonstrated the ability of attackers to set up a phony GSM base station and intercept cellphone calls. iPhone users who are communicating over an unencrypted network will receive a warning and the option to end the call immediately.

Despite all the hype about a coming wave of mobile device viruses and worms, lost and stolen mobile phones are the biggest security threat to consumers and employers, too. To address the “scatterbrain” threat, Apple introduced ‘Find My iPhone’ application for the iPhone 4 in June, 2010. Part of Apple’s me.com online service, Find My iPhone uses the iPhone’s GPS features to locate the device on a map. For devices that can’t be recovered, Find My iPhone allows bereft owners to remotely set up a password or, if the situation becomes desperate, even remotely wipe the phone of its data.

Perhaps in an attempt to edge out Microsoft’s Windows Phone or to court to the enterprise-focused in the business sphere, the release of iOS 4 brought SSL and VPN connectivity. The feature, available through applications from Juniper Networks and Cisco Systems, came along with the operating system’s mid-2010 revamp. Users can leverage the companies’ services to access their corporate resources securely via certificate-based authentication.

Restrictions

The iPhone, like the many smartphones that have debuted in its wake, includes a variety of powerful applications and features. Many of these functions and apps, including the camera, the Safari browser, FaceTime and others, can have privacy and security implications, depending upon how they’re used and what permissions they have. The Restrictions option under Settings in iOS gives users the ability to control what permissions each app on the phone has.