After reading stories about iOS exploits fetching as much as half a million dollars on the black market for software vulnerabilities, you might think the hackers are pretty enticed to make a pitch to the government, the army, or other parties who might be interested in buying.
But they’re not.
In a highly suggestive invitation to an April 4 event sent out on Thursday, Facebook welcomes media to "Come See Our New Home On Android," hinting the social networking monolith will finally reveal a much-rumored purpose-built operating system.
Citing sources familiar with the matter, TechCrunch says the Facebook OS will be a platform built on Android, with deep integration possibly baked into an HTC-manufactured smartphone. Speculation of a true Facebook-developed phone have been floating around for some time, though such a device has yet to appear.
Apple has informed developers that it will begin officially rejecting newly submitted and updated applications that access the iOS device UDID. Apple says that this new policy will begin on May 1st. With iOS 6, Apple began offering developers a new Advertising Identifier system that replicates the use of UDIDs for developers. Apple recommends that developers move over to this new system.
Just a day after Apple released iOS 6.1.3, a new lock screen bug has been discovered that could give an attacker access to private information. The vulnerability is different from the passcode bug(s) addressed by Tuesday's iOS update, but the end result is similar: access to iPhone's contact list and photos.
The new lock screen bug was first documented by YouTube user videosdebarraquito, who posted a video demoing the procedure. The basic gist, seen in the video below, is to eject the iPhone's SIM card while using the built-in voice controls to make a phone call.