This update just killed $20 of lighting cables
I just bought from CVS last couple weeks. They were 10' long and light...
I just bought from CVS last couple weeks. They were 10' long and light...
Got it. However, in urgent cases like this I think they should not spend even a minute on updating beta versions as long as there are still vulnerable release products (OS X Mavericks) out there ...Clearly I didn't mean to push out the fix just to beta, but to beta as well as to the release versions given that patching a beta is generally an even simpler thing (unless perhaps they are close to being done with another build and would just put the patch there).
Sure, not at the cost of publicly released products. However the team that would do it for Mac OS would be different than the one that would do it for iOS, so it's not likely one would interfere with the other. Let's hope they patch all of the affected software/products much sooner than later.Got it. However, in urgent cases like this I think they should not spend even a minute on updating beta versions as long as there are still vulnerable release products (OS X Mavericks) out there ...
Time for Cook to stop rolling out half baked software.
is it just me or is the phone heating very quickly after the update? anyone?
i just updated a 5
Love how Apple updates their software so often. iOS 7 is only getting better and better...fix the bugs first before adding a bunch of new features.
I think you are exaggerating a bit. What issue are you referring to? Is it the tab issue on the Air's? I've heard if you have a few tabs open, it crashes. Regardless, this hasn't stopped others from using their Air.
If so, you can always download 7.1 Beta 5 right now. Guides are online on how to do so.
I'm kinda of sick of people saying they were forced on to iOS 7. No you wern't, to get iOS 7 you had to ... <snip>
Seems like it affects iOS 6 as well since they even released an iOS 6 update to address it.Does this affect you if your still on iOS6? or is this for iOS7 only.
Seems like it affects iOS 6 as well since they even released an iOS 6 update to address it.
Yes, it does affect iOS 6.Does this affect you if your still on iOS6? or is this for iOS7 only.
VPN protects from the most likely exploit (in an unsecure Wifi network), but does not completely remove the vulnerability (since an attacker could in theory intercept your traffic after the VPN tunnel, i.e. between the VPN gateway and the server).So would vpn eliminate the vulnerability? I updated iOS but the Mac I intend to buy will have mavericks
This bug will be fixed within days.I updated iOS but the Mac I intend to buy will have mavericks
The article talks about iOS 6.1.6 being released to address this issue for devices that support it but don't support iOS 7. So in the case of iPhone 4 it would seem you are almost forced to go with iOS 7 to get this fix, which is kind of unfortunate for some I'm sure.Are you sure?? I don't want iOS7 on my iPhone 5.
Well, if you want the fix for this huge security flaw, you're pretty well forced to iOS 7 now...
Um, No, there is an update for iOS 6.
Only for devices that don't actually support iOS 7 (like 3GS) it would seem.Um, No, there is an update for iOS 6.
They did, just not for those devices that support iOS 7.Well...what a perfect way for Apple to get 100% pretty color graph showing everyone is now on iOS7.
hmmmm...makes you think about it huh???
Why not just release a separate update for iOS6 users only?
This affects iOS 6. Do you consider that half baked software?
This actually is a pretty major security issue. In some cases, connections that were secured using TLS (aka SSL, used by HTTPS web browsers and many other apps) did not actually check whether the certificate provided by the server actually matched the server's name. In effect it trusts any certificate that is valid for any site (issued by a real certificate authority and not expired). For example, foo.com using a valid certificate for foo.com could pretend to be gmail.com and iOS would just say OK sounds good! A malicious (or curious) ISP/DNS provider/Mobile carrier/wireless hotspot/etc could pretend to be gmail.com (or any other destination) and silently read (or modify) everyone's encrypted traffic.
Depending on which apps you mean, it's probably not even Apple's fault. You need to aim this annoyance at the app's developer.