Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it.
A French startup opened a crowdfunding campaign for a paper-thin sticker that adheres to the back of a smartphone or tablet, enabling wireless charging from a pad that handles multiple devices at the same time.
You soon-to-be Verizon iPhone 4 customers can learn from the experiences of others. Take it from iPhone old-timers, you're about to enter a magical world of awesome apps running on the most simplistic, addictive device on the planet.
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
Google's Android operating system is riding a wave of popularity that has rapidly eclipsed Apple's iOS, and by the end of 2010 it's expected to overtake RIM's BlackBerry as the world's leading smartphone platform. However, despite the relative openness and flexibility of the OS, your Android phone still isn't as powerful and customizable as it could be. To unlock all of your phone's potential, you'll need to root it.
Since the advent of the first modern smartphone--arguably the original Apple iPhone in 2007--the power of these mobile computing devices that also happen to make phone calls has advanced by leaps and bounds.
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.
Even by the new standards of cell phone advertising, the run-up to the HTC ThunderBolt -- Verizon's first 4G LTE smartphone -- was elaborate and expensive. Gatefold ads in mass-market magazines and high-profile TV spots on the Oscars, NASCAR and college basketball all proclaimed that there was a new 4G phone coming from Verizon, but not much else. Inquiries made of HTC and Verizon were met with official shrugs. The company spent many millions of dollars advertising a phone and didn't tell anyone when it would be on the shelves.