Category: iOS


For all my clients coming from Chilliwack  and Hope – there is now an incentive to come to our shop!  Not only will we beat ANY and ALL price quotes from all Chilliwack iPhone repair shops.  We guarantee our parts are real OEM and not knockoff like we have been seeing a lot of from out that way.  Ask about our free gift with purchase! (Mention this Blog Post)

One customer named Bob came in earlier today and mentioned he has been to another iPhone repair place in Chilliwack on Unsworth.  His screen lasted two days after the replacement was put in, upon further inspection, we informed Bob the part was a fake knockoff and very low quality.. The screen wasn’t even set properly and was practically coming off the LCD.  UV glue was not properly used.

At Ryan’s PC Repair Shop, we provide our customers with real original OEM parts (You get what you pay for), a 6 month warranty on the parts and labour and after sale service you can always depend on.  Ryan’s been in the industry for over 10 years and fix just about any issue you may have.

If you’ve been to another shop and they’ve told you the phones not repairable, bring it by my shop and I’ll get it working for you.  There is no charge to look at the device if its not repairable! No diagnostic fees charged ever!

iPad is an iFAD: Now we know why Apple went running to IBM

Apple fell over itself to talk up strong Mac and iOS device sales in its latest quarter – but the real news is a slump in iPad numbers.

The Cupertino giant said the three-month period ending June 28 was its best ever fiscal third quarter on record. Its $37.4bn revenues, up six per cent year on year, led to a $7.7bn net income up from $6.9bn a year ago [PDF]. Apple’s $1.28 profit per diluted share, up from $1.07 in Q3 fiscal 2013, was slightly above Yahoo! Finance and Marketwatch average estimate of $1.23.

Boss Tim Cook said that the best-ever Q3 report was driven in part by Mac and iPhone sales, which were also records for that quarterly period. Apple said that it sold 35.2m iPhones (up 13 per cent), bagging $19.75bn in revenue (up nine per cent), and 4.4m Macs (up 18 per cent), bringing home $5.5bn (up 13 per cent).

Though iPhone and Mac sales were strong, the iPad had a rough quarter as tablet revenues at Apple were down 8 per cent, year on year, to $5.8bn from 13.2m units sold (down 9 per cent). Cook credited the drop in part to inventory reduction over the quarter.

The Apple CEO also expressed hope that the iPad business will be bolstered by the recently announced mobile mega-deal with IBM. He noted that the partnership with Big Blue will allow for tablet-specific apps to be written rather than just adapted from desktop software.

“We think there is a substantial upside in business,” Cook said.

“We think that the core thing that unleashes this is a better go-to-market, but even more importantly, apps that are written with mobile first in mind.”

Apple’s CEO is also hoping to get a boost from the company’s developer and content partners on its iTunes and App Store services. The company reported $4.4bn in quarterly revenues from the iTunes, Software and Services unit, up 12 per cent on Q3 fiscal 2013.

Cook said that over its life to date, the App Store has served up 75 billion downloads and paid out $20bn in revenues to app developers.

As for revenues broken down by region, China romped home with 28 per cent growth on Q3 fiscal 2013; the Americas and Japan has flat revenue growth, year on year, of one per cent; and Europe and the rest of the Asia Pacific grew six per cent. Retail store sales were also flat at one per cent, year on year.

The Apple head honcho also talked up the coming tie-up with Beats Electronics, which is set to become the 30th Apple acquisition of the year when it is expected to close in the coming quarter.

With the back-to-school shopping season kicking off and the release of OS X Yosemite and iOS 8 looming, Apple is predicting an even stronger quarter, ending late September. The biz is estimating that its Q4 numbers will see revenues between $37bn and $40bn, putting the company on track to surpass $175bn in revenues for the full fiscal year.

Source: The Register

Apple Fixes “Fundamental” SSL Bug in iOS 7

Apple quietly released iOS 7.06 late Friday afternoon, fixing a problem in how iOS 7 validates SSL certificates. Attackers can exploit this issue to launch a man-in-the-middle attack and eavesdrop on all user activity, experts warned.

“An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS,” Apple said in its advisory.

Users should update immediately.

Watch Out for Eavesdroppers
As usual, Apple didn’t provide a lot of information about the issue, but security experts familiar with the vulnerability warned that attackers on the same network as the victim would be able to read secure communications. In this case, the attacker could intercept, and even modify, the messages as they pass from the user’s iOS 7 device to secured sites, such as Gmail or Facebook, or even for online banking sessions. The issue is a “fundamental bug in Apple’s SSL implementation,” said Dmitri Alperovich, CTO of CrowdStrike.

The software update is available for the current version of iOS for iPhone 4 and later, 5th generation iPod Touch, and iPad 2 and later. iOS 7.06 and iOS 6.1.6. The same flaw exists in the latest version of Mac OS X but has not yet been patched, Adam Langley, a senior engineer at Google, wrote on his ImperialViolet blog. Langley confirmed the flaw was also in iOS 7.0.4 and OS X 10.9.1

Certificate validation is critical in establishing secure sessions, as this is how a site (or a device) verifies that the information is coming from a trusted source. By validating the certificate, the bank website knows that the request is coming from the user, and is not a spoofed request by an attacker. The user’s browser also relies on the certificate to verify the response came from the bank’s servers and not from an attacker sitting in the middle and intercepting sensitive communications.

Update Devices
It appears Chrome and Firefox, which uses NSS instead of SecureTransport, aren’t affected by the vulnerability even if the underlying OS is vulnerable, Langley said. He created a test site at https://www.imperialviolet.org:1266. “If you can load an HTTPS site on port 1266 then you have this bug,” Langley said

Users should update their Apple devices as soon as possible, and when the OS X update is available, to apply that patch as well. The updates should be applied while on a trusted network, and users should really avoid accessing secure sites while on untrusted networks (especially Wi-Fi) while traveling/

“On unpatched mobile and laptop devices, set ‘Ask to Join Networks’ setting to OFF, which will prevent them from showing prompts to connect to untrusted networks,” wrote Alex Radocea, a researcher from CrowdStrike.

Considering recent concerns about the possibility of government snooping, the fact that iPhones and iPads were not validating certificates correctly can be alarming for some. “I’m not going to talk details about the Apple bug except to say the following. It is seriously exploitable and not yet under control,” Matthew Green, a cryptography professor at Johns Hopkins University, posted on Twitter.

Check out this video from News Loop:

 

Source: PC World Security Watch

iPhones, iPads vulnerable to hacking: Apple

A major flaw in Apple software for mobile devices could allow hackers to intercept email and other communications that are meant to be encrypted, the company said Friday.

If attackers have access to a user’s network, such as by sharing the same unsecured wireless service offered by a restaurant, they could see or alter exchanges between the user and protected sites such as Gmail and Facebook, experts said.

“It’s as bad as you could imagine, that’s all I can say,” said Johns Hopkins University cryptography professor Matthew Green.

Apple did not say when or how it learned about the flaw in the way iOS handles sessions in what are known as secure sockets layer or transport layer security, nor did it say whether the flaw was being exploited. But a statement on its support website was blunt: The software “failed to validate the authenticity of the connection.”

Apple released software patches and an update for the current version of iOS for iPhone 4 and later, 5th-generation iPod touches, and iPad 2 and later.

Without the fix, a hacker could impersonate a protected site and sit in the middle as email or financial data goes between the user and the real site, Green said.

Apple did not reply to requests for comment.

The flaw appears to be in the way that well-understood protocols were implemented, an embarrassing lapse for a company of Apple’s stature and technical prowess. The company was recently stung by leaked intelligence documents claiming that authorities had 100 percent success rate in breaking into iPhones.

Friday’s announcement suggests that enterprising hackers could have had great success as well if they knew of the flaw.

Ryan:  Kinda told you Apple lovers that this gear is very insecure.. did ya listen to me?

Researchers describe hacking iOS devices with malicious charger

Researchers from the Georgia Institute of Technology will be demonstrating a proof-of-concept method of hacking an iPhone using a malicious USB charger. Billy Lau, Yeongjin Jang, Chengyu Song announced the demonstration for Black Hat USA 2013, an annual conference for hackers and security researchers that begins on July 27th in Las Vegas.

The short version is the three researchers found a way to use USB protocols to bypass some of Apple’s security features in iOS that prevent unauthorized software from being installed on your iOS device. The three built a charger based on a BeagleBoard (see below)—a US$125 computer-on-a-circuit-board—that was able to successfully insert malware onto an iPhone plugged into it.

Worse, they can do so in under a minute.

“Despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software,” the researchers wrote on their BlackHat presentation description. “All users are affected, as our approach requires neither a jailbroken device nor user interaction.”

In the demonstration, they said will discuss Apple’s existing security mechanisms that protect against “arbitrary software installation,” which in layman’s terms essentially means malware. They will then describe how standard USB capabilities can be, “leveraged to bypass these defense mechanisms.” To finish it off, they will demonstrate how this same process can be used to then hide the resulting malware from the user the same way Apple hides its own built in software.

The three researchers named their malicious charger “Mactans.”

The BeagleBoard it is based on is an off-the-shelf circuit board that can be used to create all manner of tiny computing devices running Angstrom (Open Embedded), Debian, Ubuntu, and Gentoo. There are other BeagleBoard products as well, including a slightly larger model with a 1GHz Sitara ARM Cortex-A8 processors that can run Android.

The point the researchers are making is that their method can be accomplished with readily available technology.

“While Mactans was built with limited amount of time and a small budget,” they wrote, “we also briefly consider what more motivated, well-funded adversaries could accomplish.”

The researchers will offer methods for protecting yourself against such an attack—we’ll throw out that you should probably be choosy about using a charger whose provenance you can’t verify—and what Apple can do to make this attack, “substantially more difficult to pull off.”

Source: UPI

Most of you know about our PC repair services, but did you know we fix/repair/unlock cellphones & tablets? Did you also know that we offer the lowest prices in the Fraser Valley and will price match and BEAT any competitor price? Now you do.

We repair all Smartphones / iPhones for :

* Broken LCD Screens & Touch Screen Replacement
* Water and other Liquid Damage Repair / Corrosion Clean Up
* Phone Data Recovery – Photos, Music, Text Messages
* No Power / Phone does not turn on
* Charging Problems / Charging Controller / Charging Port Replacement
* Battery Replacement (200+ Batteries in stock)
* Staticky, Crackling Speakers & Microphones
* Home Button / Power Lock Button Replacement
* Malfunctioning button, Trackball, Trackpad and Keypad
* Malfunctioning SIM card readers / NO SIM Reading Fix
* Software problems, upgrades and reflashing (All Models)
* Language change
* JTAG Service (Android Phones)
* Unknown Baseband, IMEI missing
* Password Protected / Disabled Phones / Pattern Lock Reset (Samsung)
* Jailbreaking — iPhone, AppleTV 1 & 2 + FREE TV & MOVIES + FREE APPS
* Rooting — Most Android Models — Custom Rom Reflashing Available

We unlock ALL Smartphones For :

* iPhone 2G/3G/3GS (Most iOS Versions)
* iPhone 4/4S – Factory unlock Fido/Rogers/Telus/Koodo/AT&T/Bell
* iPhone 5 – Factory unlock Telus/Koodo/AT&T/Rogers/Fido
* iPhone 4S/5 unlocking for iOS 5.x, 6.1.3 and below!
* BlackBerry, Samsung, LG, HTC
* Nokia, Motorola, Sony Ericsson, Huawei, Alcatel and other Overseas Models.

– iPhone Factory unlock for USA, UK, Brazil, Australia, France, Spain, Ireland, Netherlands, Denmark, Norway, Chile, Switzerland, Sweden, Saudi Arabia, Norway, Romania, Japan, etc.

As always, we DO NOT charge for repairs that cannot be performed.

180 Warranty on ALL parts & Labour – We ONLY use OEM Factory Parts.

Call the shop if you need a price quote, make sure to ask for Ryan.

Apple finally fixes App Store flaw by turning on encryption

Apple has finally fixed a security flaw in its application store that for years has allowed attackers to steal passwords and install unwanted or extremely expensive applications.

The flaw arose because Apple neglected to use encryption when an iPhone or other mobile device tries to connect to the App Store, meaning an attacker can hijack the connection. In addition to a security flaw, the unencrypted connections also created a privacy vulnerability because the complete list of applications installed on the device are disclosed over Wi-Fi.

It also allows the installation of apps, including extremely expensive ones that top out at $999.99, without the user’s consent, which can create serious consequences because Apple doesn’t give refunds. To do this, an attacker needs to be on the same private or public Wi-Fi network, including, for example, a coffeeshop, hotel, or airport network.

Security researcher Elie Bursztein discovered the vulnerability and reported it to Apple last July. Apple fixed the problem in a recent update that said “content is now served over HTTPS by default.” Apple also thanked Bernhard Brehm of Recurity Labs and Rahul Iyer of Bejoi.

Bursztein, who works at Google, in Mountain View, Calif., but emphasized this was work done at home in his spare time, published a personal blog post today that described details about the App Store vulnerability and included videos of how an attacker was able to steal passwords or install unwanted apps.

Publicizing this flaw, Bursztein said, highlighted how necessary encrypted HTTPS connections were. “Many companies don’t realize that HTTPS is important for mobile apps,” he said. But if they rely on Web connections or Webviews, he added, they are vulnerable to attacks: “Providing a concrete example seems a good way to attract developer attention to the issue.”

As a postdoctoral researcher at Stanford University, Bursztein published research that included demonstrating flaws in Captchas and the Web interfaces of embedded devices. At the Defcon conference in Las Vegas two years ago, he demonstrated how to bypass Windows’ built-in encryption that Web browsers, instant messaging clients, and other programs used to store user passwords.

Bursztein’s blog post comes a day after Apple’s marketing chief, Phil Schiller, took a security-related swipe at Google on Twitter by pointing to a report on the rise of Android malware.

 

Source: CNET

Apple Is Beta-Testing A Fix For Evasi0n Jailbreak

All good jailbreaks must come to an end.

Late last week Apple released an update for iOS to developers in beta that prevents the use of the popular jailbreak software evasi0n, according to one of evasi0n’s creators who tested the patch over the weekend, David Wang.

Wang tells me that he’s analyzed the 6.1.3 beta 2 update and found that it patches at least one of the five bugs the jailbreak exploits, namely a flaw in the operating system’s time zone settings. The beta update likely signals the end of using evasi0n to hack new or updated devices after the update is released to users, says Wang, who says he’s still testing the patch to see which other vulnerabilities exploited by the jailbreak might no longer exist in the new operating system.

“If one of the vulnerabilities doesn’t work, evasi0n doesn’t work,” he says. “We could replace that part with a different vulnerability, but [Apple] will probably fix most if not all of the bugs we’ve used when 6.1.3 comes out.”

That impending patch doesn’t mean evasi0n’s time is up, says Wang. Judging by Apple’s usual schedule of releasing beta updates to users, he predicts that it may take as long as another month before the patch is widely released.

When evasi0n hit the Web earlier this month, it quickly became the most popular jailbreak of all time as users jumped at their first chance to jailbreak the iPhone 5 and other most-recent versions of Apple’s hardware. The hacking tool was used on close to seven million devices in just its first four days online.

Despite that frenzy, Apple has hardly scrambled to stop the jailbreaking.  Evasi0n has already gone unpatched for three weeks. That’s far longer, for instance, than the nine days it took Apple to release a fix for Jailbreakme 3.0, the jailbreak tool released in the summer of 2011 for the iPhone 4, which was by some measures the last jailbreak to approach Evasi0n’s popularity.

Apple’s slow response to Evasi0n is explained in part by the relatively low security risk that the tool poses. Unlike Jailbreakme, which allowed users to merely visit a website and have their device’s restrictions instantly broken, Evasi0n requires users to plug their gadget into a PC with a USB cable. That cable setup makes it far tougher for malicious hackers to borrow Evasi0n’s tricks to remotely install malware on a user’s phone or tablet.

Security researchers have nonetheless pointed out that Evasi0n could give criminals or spies some nasty ideas. The tool uses five distinct bugs in iOS, all of which might be appropriated and combined with other techniques for malicious ends. And F-Secure researcher Mikko Hypponen points out that if a hacker used a Mac or Windows exploit to compromise a user’s PC, he or she could simply wait for the target to plug in an iPhone or iPad and use evasi0n to take over that device as well.

More likely, perhaps, is a scenario described by German iPhone security researcher Stefan Esser. He argues that a hacker could use a secret exploit to gain access to an iPhone or iPad and then install evasi0n, using the jailbreaking tool to hide his or her tracks and keep the secret exploit technique undiscovered by Apple and unpatched. “That way they protect their investment and leave no exploit code that could be analyzed for origin,” Esser wrote on Twitter.

Apple already has a more pressing security reason to push out its latest update. The patch also fixes a bug discovered earlier this month that allows anyone who gains physical access to a phone to bypass its lockscreen in seconds and access contacts and photos.

When Apple’s update arrives, the team of jailbreakers known as the evad3rs may still have more tricks in store. Wang tells me that the group has discovered enough bugs in Apple’s mobile operating system to nearly build a new iOS jailbreak even if all the bugs they currently use are fixed.

But then again, Wang says he hasn’t yet been able to check Apple’s patch for every bug it might fix–either the ones evasi0n employs or those he and his fellow hackers had hoped to keep secret for their next jailbreak. “If they patch most of the bugs,” Wang says. “Then we’re starting from scratch.”

Ryan says:  We’re offering our customers the opportunity to Jailbreak their iPhone 5 for FREE until the end of March! – Call Ryan to book an appointment!

Source: Forbes

Upgrading RAM on the new iMac is practically impossible

The electronics website iFixit on Friday downgraded the new 21.5-inch iMac’s repair score to 3 out of a possible 10, calling servicing the computer “an exercise in disappointment.”

The website urged do-it-yourselfers to look for a leftover 2011 model instead. “Hackers, tinkerers, and repairers be forewarned: Get last year’s model if you’d like to alter your machine in any way,” said Miroslav Djuric, iFixit’s chief information architect, in an email announcing the site’s teardown of the newest iMac.

Apple started selling the redesigned 21.5-inch iMac on Friday at its retail and online stores. The larger, more expensive 27-in. iMac is to ship later this month.

After disassembling the iMac, iFixit assigned the all-in-one desktop a repair score of just 3 out of 10; The 2011 version of the same-sized iMac sported a more DIY-friendly score of 7 out of 10.

The iMac’s new score is in the same low range as Apple’s 15- and 13-inch Retina-equipped MacBook Pro laptops, which earned a 1 and 2, respectively, this summer and fall. In June, iFixit called the 15-inch MacBook Pro “the least-repairable laptop we’ve taken apart.”

Explaining the iMac’s low score, iFixit cited the copious amounts of “incredibly strong” adhesive that bonds the LCD and front glass panel to the frame. Earlier iMacs fixed the display in place with magnets rather than the hard-to-dislodge glue, which is even harder to replace.

Just as damning was an Apple design decision that makes it practically impossible for users to upgrade the iMac’s RAM. The 21.5-in. iMac comes standard with 8GB of memory – and can be upgraded to 16GB – but because the RAM is buried beneath the logic board, owners must “take apart most of the iMac just to gain access,” iFixit said.

Older 21.5-inch iMacs had four external RAM slots that were easily accessed by users.

Apple mentions the impracticality of memory upgrade only in a side note hidden on the iMac’s options page. There, Apple said: “Every 21.5-inch iMac comes with 8GB of memory built into the computer. If you think you may need 16GB of memory in the future, it is important to upgrade at the time of purchase, because memory cannot be upgraded later in this model.”

The not-yet-available 27-inch iMac will continue to sport four external memory slots. Customers can boost the RAM at the time of ordering to 16GB (for an extra $200) or 32GB ($600), but those prices are exorbitant compared to third-party RAM that users install themselves. An additional 8GB of memory – which would raise the iMac’s total to 16GB – costs just $40 at Crucial.com, for example.

iFixit spotted several other changes to the iMac, including a larger, single fan rather than several smaller fans; dual microphones, likely a noise cancellation move for FaceTime video calls; and a vibration-dampening housing around the laptop-sized 2.5-in. hard disk drive.

The teardown also exposed the location where Apple places a “Fusion Drive,” the option that combines 128GB of flash storage with a standard platter-based hard drive.

The new iMacs are priced between $1,299 and $1,999 – $100 more than their precursors – and can be purchased or pre-ordered at Apple’s online and retail stores.

iFixit reduced the repair score of Apple’s iMac from 7 to 3 (out of 10), citing screen-to-chassis glue and the impracticality of upgrading RAM or swapping drives.

Source: TechWorld

iOS 6.0.1 already jailbroken — for some devices

iOS 6.0.1 users can now jailbreak their devices, but there are some bumps in the road.

The latest version of the iPhone Dev Team’s Redsn0w can jailbreak iOS 6.0.1 devices, Redmond Pie confirmed today after testing the update.

However, not everyone can take advantage of the effort at this point.

The jailbreak works only on iOS devices powered by an A4 chip or lower. People who own the iPhone 5, the newest iPads, or the latest iPod Touch are out of luck. The jailbreak takes advantage of the Limera1n exploit, which can’t handle the A5 or later chips.

That leaves just the iPhone 3GS, iPhone 4, and the iPod Touch 4G as prime candidates. The iPod Touch 3G and the original iPad don’t support iOS 6.0 or higher.

The jailbreak is also a tethered one. So after you shut down or reboot your device, you’ll need to connect it to your computer to return it to a jailbroken state.

Apple, or course, isn’t too fond of jailbreaking, a process that allows device owners to unlock certain features and install apps not found in the App Store.

The iPhone maker once tried to argue that the action violates its copyright. The U.S. Copyright Office recently ruled that jailbreaking is illegal on tablets and gaming consoles but not on smartphones.

Source: CNET

iPhone 3G/3GS/4/4S Factory Unlock Now Available at Ryan’s Unlock Shop

Enjoy the freedom of switching carriers locally or while roaming in another country! Save money on roaming fees!

iPhone 3G/3GS/4/4S Factory Unlock starting @ $40 – Carrier Unlock – No SIM Tray / Interposer Required!

Permanent Unlock – Update to ANY iOS.

We can unlock your 3G/3GS/4/4S for most carriers worldwide, please select from the country the iPhone is originally locked to. Factory Unlocking starts @ $40 for AT&T. Call (778) 245-0780 if you have any questions about unlocking your iPhone.

The process for factory unlocking iPhone 4 and 4S models can take between 1 and 2 days depending on server wait times.

We can currently unlock ALL iPhone 3G/3GS/4/4S (GSM or WCDMA) iPhones from Koodo, TELUS, Rogers, Fido, AT&T & Sprint.

The benefits to unlocking your iPhone permanently as opposed to keeping your iPhone unlocked via interposer chip are:

  • Update to any iOS version without losing your unlock.
  • No Modified SIM Tray / Interposer required.
  • No need for instructions to use unlock chip. (no chip required)
  • Higher re-sale value.
  • Use with any carrier that supports iPhone worldwide.

Purchase a factory unlock for your iPhone using our online unlocking website here.