Back to Top

Tech, Web, Cloud & Cabling Services

Category: iPhone

Telecommunication / iPhone Category

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Apple CEO Tim Cook: FBI asked us to build a back door into iOS

The most important Tech Case in a Decade

Customer Letter – Apple

February 16, 2016

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

Answers to your questions about privacy and security

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

Tim Cook

Answers to your questions about privacy and security

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Safari on iOS and Mac crashing, bug related to Safari Suggestions, here’s how to fix

A strange bug is affecting many Safari users today, causing crashes on iPhone, iPad and Mac. For many users, simply tapping in the URL bar will cause the browser app to crash completely.  The exact issue causing the crashing has not been locked down, but it appears to be related to Apple’s Safari Suggestions service. It’s a very annoying bug that is affecting a lot of people all of sudden today.

sjt-blog-safari-crash-ios

When you type a URL, Apple sends what you type to its servers, returning a response with autocomplete search queries, Top Sites and other info. There appears to be a bug in this server request that is causing Safari to randomly crash. Users are discovering some potential workarounds until Apple fixes the problem properly …

Disabling Safari Suggestions seems to be helping resolve the bug for many people on iOS. On your iPhone or iPad, go into Settings, tap Safari, and toggle off the ‘Safari Suggestions’ switch. This will fix the crashing, obviously its only a temporary fix until Apple sorts its servers out as it will disable the Safari Suggestions functionality.

Another option is to enter Private Browsing mode. In private browsing, by design Safari does not contact the suggestions server for intelligent completion options, so the server is never contacted and the crash never arises.

The bug is affecting users in many countries, but not all. It also depends on the state of your Safari, whether it has certain data cached already. The crash has been seen on iOS 8, iOS 9 and OS X 10.11. The bug could be even more widespread beyond these platforms however. It is pretty crazy flaw that is affecting so many people this morning, with many reports across European iOS customers.

We have contacted Apple about the issue for clarification, but it’s such a serious functional flaw that we expect a fix very shortly. Please note: this is an unrelated incident to the prank site CrashSafari.com.

Update: The Safari crash bug has now been fixed, according to Apple.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Apple Updates iPod Touch

New iPod uses same chip as iPhone 6 and will come in an array of colors

Varieties of the new iPod Touch

Apple Inc. introduced its updated iPod Touch that features the same chip used in the iPhone 6 and other upgrades that bring the device’s capabilities more in line with those of its smartphones.

The update also includes a new color lineup—including space gray, silver, gold, pink and blue—for the iPod Touch, as well as the iPod Nano and iPod Shuffle models.

The iPod was a breakthrough portable music player when it was introduced in 2001, but it has been displaced by smartphones in recent years.

Starting at $199, Apple said the iPod Touch has 10-times faster graphics performance and improved fitness tracking. The company said the upgraded iPod also offers three-times faster Wi-Fi connectivity.

Apple also touted the iPod Touch’s new 8-megapixel iSight camera and an improved FaceTime HD camera, with features including slo-mo and burst mode, as well as improved face detection for higher quality selfies.

Have questions?

Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read thsi article in its entirety click here.

Apple HomeKit is on its way for a June launch

Devices based on Apple Inc.’s HomeKit will appear in stores next month, the company said.

HomeKit, which is built into Apple’s iOS 8 mobile operating system, provides software so makers of garage door openers, light switches and other home devices can be controlled with an iPhone or iPad.

“HomeKit has been available for just a few months and we already have dozens of partners who have committed to bringing HomeKit accessories to market and we’re looking forward to the first ones coming next month,” Trudy Muller, a spokeswoman for Cupertino, California-based Apple, said Thursday in a statement.

Apple Homekit

IDevices has said it will begin selling in the fourth quarter a HomeKit-compatible switch to control doors, lights and other products.

“We’re testing the software, and it works very well,” Chris Allen, chief executive officer of Avon, Connecticut-based iDevices, said Thursday.

Fortune reported earlier Thursday that HomeKit had been delayed by a few months, until August or September.

apple

Have questions?

Our small business team is here to help.
Call us at: 856-745-9990

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Microsoft Office Mobile

ios-office365-hero2Microsoft released Office Mobile in the Apple Store for free to all Office 365 users on June 14, 2013.  Office Mobile has a lot of stipulations and only provides the basic document editing capabilities.  Integrating Office Mobile with SkyDrive and Office 365 is a smooth process.

The first stipulation is Office Mobile is designed for iPhone.  The app is not optimized for iPad use; older iPad(s) receive errors.  The second stipulation is Office Mobile requires an Office 365 subscription.  A large percent of businesses have not switched to Office 365 which excludes potiential Office Mobile users.

For Office 365 subscribers, Office Mobile is a free app that provides the ability to view, edit and save Office documents.  All users that are not Office 365 subscribers can continue to use Office-compatible mobile apps that provide the same functionality.

Office Mobile has a similar interface to Windows phone.  After installing Office Mobile, users can view, edit and save Word, Excel and Powerpoint documents.  Users may be surprised with the limited editing abilities.  SkyDrive, SkyDrive Pro and SharePoint are ways to access documents.  ”Recent Documents” tracks the most recent documents that you viewed or changed and makes them easily accessible.

For more information on Hosted Services and Office 365

 please contact us 856-745-9990 or click here.

 

RingCentral Mobile Users Without A Digital Line

Ring Central allows your employees to communicate anywhere, anytime on any device. In the past, Ring Central has not been enforcing licenses for employees that are using the system on mobile devices without a digital line. That is about to change. 

 

RingCentral Mobile Users FAQ

 

Why are you now charging for Mobile Users without a digital line?
Mobile Users without a digital line can make and receive calls and have access to many of the same capabilities as users with digital lines. These include RingCentral Glip, RingCentral Meetings, integrations and more. With this advanced functionality, these users have begun using the product the same way they would a digital line.

Consequently, Mobile Users using the system without a digital line will now be considered part of the total licensed users and will be charged based on their account’s current cost per digital line.

Will I be charged for using the Mobile App?
No. Mobile Users with a digital line are not affected, and can continue to use the Mobile App for no additional charge. This change only affects Mobile Only Users without a digital line.

When does this take effect?
Please refer to the email notification for the timing of this change for your account.

What will be the cost?
The cost for each Mobile User without a digital line will be the same as users who have a digital line. If you want to add digital lines for your Mobile Users at no additional cost (excluding taxes and fees), please contact your RingCentral account manager.

What are the benefits to Mobile Users of adding a digital line?
By adding a digital line, the Mobile User will get full access to RingCentral’s softphone (inbound and outbound) and the ability to use a desk phone if needed. If you are interested, please contact your account manager by calling  800-591-7973.

How do I know which Mobile Users without a digital line will be billed at any given time?
System administrators can log into their RingCentral account and see this information under the billing tab. See more details here. If a mobile user without a digital line is inactive or is only used for internal company calls, within a given month, there will be no charge.

 

Introducing RingCentral Cloud Touch

I’m excited to announce the launch of our new RingCentral Cloud Touch platform, the first and only phone system that enables businesses to set up, manage and use their phone system from smartphones and tablets.

We’ve completely re-imagined the phone system, enabling businesses to turn any location into an office while giving employees the flexibility and freedom to access the system from any connected device. We help businesses, administrators and end users work the way they want to – from anywhere and on any device.

Our new platform includes three key components:
1. RingCentral Touch – Fully touch-powered platform for phone systems, enabling full management capabilities from any tablet or smartphone. Intuitive customizable settings for administrators and users provide unmatched flexibility and control.

2. RingCentral Presence – Presence is extended beyond desk phones, enabling users to see availability based on smart mobile devices. Enabled with simple controls, users can access from everywhere. Employees are better connected with presence that integrates mobile users.

3. RingCentral Connect – RingCentral integrates with Dropbox, Box and Google Docs, enabling customers to share documents and files in the cloud, providing enhanced productivity.

We’d love to hear how RingCentral Cloud Touch enables you to work from anywhere and manage your phone system with ease!

Apple iOS 7

FINALiOS7.2

Apple iOS 7 is expected to be released this Fall for both, iPhone and iPad users.  Apple created a simple and more useful experience with iOS 7 that includes many new features.

Control Center

Control Center allows access to common controls and apps from any screen with just one swipe.  Controls included are turning on/off Wi-Fi, turning on/off Bluetooth and adjusting the display brightness.  Apps included are Camera, Flashlight, Calculator and many more.

Notification Center

Notification Center allows you to view new messages, mail, to-dos and missed calls from any screen with just one swipe.  The Notification Center has a new feature called Today.  Today allows you to view everything for “Today” including weather, appointments and local traffic.  Also, this feature gives you a glance at Tomorrow. 

Multitasking

Multitasking is smart way to switch between apps quickly.  To access “Multitasking” press the “Home” button twice.  Multitasking with iOS 7 is more efficient because it learns how you use your apps.  If you check a specific app every day at the same time, your app will be waiting for you.

AirDrop

AirDrop allows you to easily share photos, videos, contacts with the app and a Share button.  AirDrop transfers are encrypted and use Wi-Fi or Bluetooth to share data securely.

Siri

Siri has a redesigned user interface with a new sound and many new capabilities.  Siri has a more natural sounding voice (female/male) and is easier to understand.  Siri’s great new look fades on top of your screen.  Additionally, Siri can answer questions using Bing and Wikipedia, control iTunes radio, return phone calls, play voicemails and many more.

Mail

Mail has a redesigned user interface with many new features and controls.  New features  include the ability to view PDF comments and annotations, add/reorganize the mailbox list, and Mac and PC users with Microsoft Exchange 2010 can also now sync notes.

 

Set Up Microsoft Exchange E-Mail on iPhone

Set Up Microsoft Exchange E-Mail on an Apple iPhone, iPad, or iPod Touch3

You can set up Exchange e-mail on an Apple iPhone, iPad, or iPod Touch. When you set up an Exchange account on your device, you’ll be able to access and synchronize your e-mail, calendar, and contacts. If you have a different device, or if you want to connect using POP or IMAP.

How do I set up Microsoft Exchange e-mail on an Apple iPhone, iPad, or iPod Touch?


  1. Tap Settings > Mail, Contacts, Calendars > Add Account.
  2. Tap Microsoft Exchange.
  3. You don’t need to enter anything in the Domain box. Enter the information requested in the Email,Username, and Password boxes. You need to enter your full e-mail address in the Email and Usernameboxes (for example, tony@contoso.com).
  4. Tap Next on the upper-right corner of the screen. Your iPhone will try to find the settings it needs to set up your account. Go to step 7 if your iPhone finds your settings.
  5. If your iPhone can’t find your settings, you’ll need to manually look up your Exchange ActiveSync server name. For instructions for how to determine your Exchange ActiveSync server name, see the Finding My Server Name section below.
  6. In the Server box, enter your server name, and then tap Next.
  7. Choose the type of information you want to synchronize between your account and your device, and then touch Save. By default, Mail, Contacts, and Calendar information are synchronized.
    Caution:
    If you’re prompted to create a passcode, tap Continue and enter a numeric passcode. If you don’t set up a passcode, you can’t view your e-mail account on your iPhone. You can set up a passcode later in iPhone Settings.

Finding My Server Name


If your email program isn’t able to automatically find your Exchange ActiveSync server name, you may need to look it up.

  1. Sign in to your e-mail account using Outlook Web App. For help signing in, see How to Sign In to Outlook Web App.
  2. If you’re connecting to an Exchange mailbox, your Exchange ActiveSync server name is contained in the address bar in your browser when you are signed in to Outlook Web App, but without the leadinghttps:// and without the trailing /owa. For example, if the address you use to access Outlook Web App is https://mail.contoso.com/owa, your Exchange ActiveSync server name is mail.contoso.com.
  3. If you’re unable to connect to your mailbox using the information earlier in this section, you can try using the server name value that you can view in Outlook Web App options. Do the following:
    1. In Outlook Web App, click Options > See All Options > Account > My Account > Settings for POP, IMAP, and SMTP access.
      Note:
      Although you’re not setting up a POP3 account, you will use this value to determine your Exchange ActiveSync server name.
    2. Under POP setting, view the value for Server name.
    3. Try setting up your email using the server name listed on your options page. For example if the value for Server name under POP setting is mail.contoso.com, try using mail.contoso.com as your Exchange server name.

What else do I need to know?

  • If you’re prompted to create a passcode and don’t create one, you won’t be able to send and receive e-mail.

CALL US NOW!