Monday, May 16, 2016

iOS 9.3.2

iOS 9.3.2 fixes bugs and improves the security of your iPhone or iPad. This update:

  • Fixes an issue where some Bluetooth accessories could experience audio quality issues when paired to the iPhone SE
  • Fixes an issue where looking up dictionary definitions could fail
  • Addresses an issue that prevented typing email addresses when using the Japanese Kana keyboard in Mail and Messages
  • Fixes an issue for VoiceOver users using the Alex voice, where the device switches to a different voice to announce punctuation or spaces
  • Fixes an issue that prevented MDM servers from installing Custom B2B apps

For information on the security content of Apple software updates, please visit this website:

Sunday, April 24, 2016

SS7 and your cellphone

America's digital adversaries may have spent years eavesdropping on officials' private phone conversations through vulnerabilities in the global cell phone network, according to security experts.

A recent "60 Minutes" segment displayed the extent of the weakness, spurring government into action this week. Federal agencies vowed to investigate and Capitol Hill has begun looking into the issue.

Specialists believe countries like China, Russia and Iran have all likely exploited the deficiency to record calls, pilfer phone data and remotely track high-value targets.

"I would be flabbergasted if these foreign governments were not monitoring large numbers of American officials on their cell phones," Rep. Ted Lieu (D-Calif.) told The Hill.

Lieu, who hold's a bachelor's degree in computer science, offered up his phone to German computer scientist Karsten Nohl to test the extent of the vulnerability on "60 Minutes." Hackers were able to record Lieu's calls, view his contacts and monitor his movements, armed with just the Los Angeles Democrat's phone number.

Despite the government's pledges to rectify the problem, Lieu and security researchers insist officials have lost valuable time.

The vulnerabilities have been known for several years, and even bubbled up in the media in late 2014. After the flaws came back into the spotlight, Lieu said the government failed to take basic steps.

For instance, he said, "I am still dumbfounded as to why I have yet to see an alert go out to members of Congress."

Most telecom companies use decades-old protocols known as Signaling System No. 7 or SS7 to direct mobile communications around the world.

It is these protocols that are seen as insecure.

"The SS7 network was never designed to be secure," explained Les Goldsmith, a researcher with Las Vegas security firm ESD. "It was originally a cable in Europe. It had no encryption."

But SS7 serves a vital purpose. The network helps keep calls connected as users bounce from cell tower to cell tower, and routes text messages to their final location. It's also how people get service when they travel to another country, outside the reach of their normal carrier.

The problem is that anyone who can gain entry to the SS7 system can also repurpose these signals and intercept calls and texts.

The attack surface is vast. There are over 800 cell phone networks around the world, each with roughly 100 to 200 interlocking roaming agreements with other networks, Goldsmith said.

That means virtually every cell phone network is interconnected, allowing hackers to potentially tap any phone, regardless of location. Lieu's phone, for example, was infiltrated from Germany.

"The smallest carrier in the Middle East … can actually reach into AT&T and Verizon's network," said Christopher Soghoian, principal technologist for the American Civil Liberties Union (ACLU).

And the problem is not going away. SS7 will continue to be used for well over a decade, experts predict.

The system's shortcomings are not news to many security researchers and even to some government officials.

Goldsmith spoke about SS7 vulnerabilities at an industry conference last month, and his firm, ESD, has been briefing governments and telecom carriers on the issue since January of 2015. The first rumblings of the weaknesses appeared in 2010, Soghoian said.

ESD tests carriers' networks to determine the extent of malicious SS7 tracking. One European telecom carrier, Goldsmith said, had one third of its subscriber base being monitored. He suspects a nation state was behind the snooping.

At a House hearing this week, Lieu pressed a top Department of Homeland Security (DHS) cyber official, Andy Ozment, on whether his agency was aware of these SS7 flaws.

Ozment said the DHS had known about the issue since 2014, but could only warn telecom companies about the dangers since the DHS is not a regulatory agency.

After the "60 Minutes report," the Federal Communications Commission (FCC), which does regulate the telecom industry, did announce it would examine the SS7 security concerns.

Soghoian is doubtful the investigation will produce meaningful outcomes. The FCC has made similar pledges previously, he said, and told the ACLU in a meeting last year that it was open to a sit-down with the German researcher from the "60 Minutes" segment. But Soghoian said the agency has since dragged its feet on setting up such a briefing.

In a statement, FCC spokeswoman Kim Hart said the agency had simply decided to refer the SS7 investigation to an FCC-affiliated council composed of industry leaders and federal officials.

That group will offer the FCC recommendations on how it can protect cell phone networks from SS7-related spying, Hart added.

Still, Soghoian feels the FCC "is basically asleep at the wheel." Not because of "ineptitude," he said, but because of "conflicting missions."

The agency is tasked with securing phone networks, but is also under pressure from law enforcement and the intelligence community to preserve America's ability to exploit SS7 for its own surveillance efforts, Soghoian said.

Soghoian pointed to SS7 references in documents leaked by former government contractor Edward Snowden that indicate the National Security Agency has likely used the flaws to its benefit.

"This is a problem that needs to be solved and I suspect will only be solved through congressional attention," Soghoian said.

At least two House committees are considering launching investigations.

Lieu pressed his House Oversight Committee to look into the matter, and Rep. Greg Walden (R-Ore.), who chairs a key technology subcommittee, told The Hill he was also being "briefed up" on the issue.

But the SS7 flaws are still at the periphery for many Congressional cybersecurity leaders. Several key cyber lawmakers acknowledged to The Hill this week that the topic was either low on the priority list or something they were not yet aware of. 

John Marinho, the vice president of cybersecurity and technology for CTIA, an industry group representing wireless communications firms, said hackers need "extraordinary access" to get into the SS7 system.

"That is the equivalent of giving a thief the keys to your house; that is not representative of how U.S. wireless operators secure and protect their networks," he said.

Lieu called the response "bizarre."

"The notion that somehow this flaw is not a big deal because … your average hacker might not be able to access it?" Lieu said. "That's just a ludicrous response."

Lieu and other privacy advocates like Soghoian want the government to push for officials and members of Congress to adopt end-to-end encrypted chatting apps, such as WhatsApp, which only allow the sender and receiver of a message to see the content. Numerous apps also allow for encrypted phone conversations.


Homeowners Are Furious With Their Power Company

By Home Solar Programs

There is a new policy in 2016 that qualifies homeowners who live in specific zip codes to be eligible for $1,000's of dollars in Government funding to install solar Read More

These solutions would prevent much of the SS7 eavesdropping, although they would still leave GPS data exposed.

"After I watched the '60 Minutes' episode," Lieu said, "I went and downloaded WhatsApp," adding that he had encouraged others to do the same.

"Now I do text messages to the extent possible on WhatsApp."

Saturday, April 16, 2016

Changing Passwords

Many US gov agencies force employees to regularly change passwords, even though experts recommend against it.

Monday, April 11, 2016

Location Services

Location Services allows Apple and third-party apps and websites to gather and use information based on the current location of your iPad to provide a variety of location-based services. For example, an app might use your location data and location search query to help you find nearby coffee shops or theaters, or your iPad may set its time zone automatically based on your current location. To use features such as these, you must enable Location Services on your iPad andgive your permission to each app or website before it can use your location data. Apps may request limited access to your location data (only when you are using the app) or full access (even when you are not using the app). For safety purposes, however, your iPad's location information may be used for emergency calls to aid response efforts regardless of whether you enable Location Services.

Location Services uses GPS and Bluetooth (where those are available) along with crowd-sourced Wi-Fi hotspot and cell tower locations to determine your iPad's approximate location. If Location Services is on, your iPad will periodically send the geo-tagged locations of nearby Wi-Fi hotspots and cell towers in an anonymous and encrypted form to Apple, to be used for augmenting this crowd-sourced database of Wi-Fi hotspot and cell tower locations. By enabling Location Services, location-based system services such as these will also be enabled:

  • Routing & Traffic.  If you are physically moving (for example, walking or traveling in a car), your iPad will periodically send GPS locations and travel speed information in an anonymous and encrypted form to Apple. This crowd-sourced data is used to provide services such as real time traffic display and routing.
  • Popular Near Me.  Your iPad will periodically send locations of where, and when, you have purchased or used Apps in an anonymous and encrypted form to Apple, to improve a crowd-sourced database that may be used to offer geographically-relevant Apps and other Apple products and services.
  • Frequent Locations.  Your iPad will keep track of places you have recently been, as well as how often and when you visited them, in order to learn places that are significant to you. This data is kept solely on your device and will not be sent to Apple without your consent. It will be used to provide you with personalized services, such as predictive traffic routing.
  • Location-Based iAds.  Your iPad will send your location, including its travel speed and direction, to Apple in order to provide you with geographically relevant iAds.
  • Safari & Spotlight Suggestions.  When you use Spotlight or Spotlight Suggestions in Safari, the location of your iPad at the time you open Spotlight or submit a search query to Spotlight or Safari will be sent to Apple to make Spotlight Suggestions more relevant and to improve other Apple products and services. If you turn off Location Services for Safari & Spotlight Suggestions, your precise location will not be sent to Apple. To deliver relevant search suggestions and news, Apple may use the IP address of your internet connection to approximate your location by matching it to a geographic region.
  • Location-Based Alerts.  Your iPad will use your location in order to provide you with geographically-relevant alerts, such as a reminder to call someone when you get to a specific place, when to leave for your next appointment, or an app recommendation based on where you currently are.
  • Share My Location.  You can choose to share your current location with others, on a temporary or ongoing basis, from within certain apps such as Messages and Find My Friends.
  • HomeKit. Your iPad will use your location to enable accessories to turn on or off when you arrive or leave a specific location, such as turning on your lights when you get home.

The crowd-sourced location data gathered by Apple does not personally identify you.

By enabling Location Services on your iPad, you agree and consent to the transmission, collection, maintenance, processing, and use of your location data and location search queries by Apple and its partners and licensees to provide and improve location-based and road traffic-based products and services.

You may choose to disable Location Services at any time. To do so, open Settings, tap Privacy, tap Location Services, and either turn off the global Location Services switch or turn off the individual location switch of each location-aware app or feature on your iPad by setting it to "Never". To disable Location Services for all websites, set the Location Services setting for Safari to "Never". You may also disable location-based system services on your iPad by tapping on System Services and turning off the switch for each location-based system service on your iPad.

If you allow third-party apps or websites to use your current location, you are subject to their terms and privacy policy and practices. You should review the terms, privacy policies, and practices of such apps and websites to understand how they use your location and other information.

Information collected by Apple will be treated in accordance with Apple's Privacy Policy, which can be found at

Encrypt Encrypt


12 Hours Ago

How Governments Spy on You, and What You can Do About It

by Arthur Baxter

Technology has brought great advances and conveniences, but it also comes with the cost of privacy. You;ve seen many examples in the news. The NSA has been caught spying on German chancellor Angela Merkel and her closest advisers for years. WikiLeaks co-founder Julian Assange says the NSA intercepts 98 percent of South American communications.

Youfd fight for free speech if anyone threatened to take it away. Yet ISPs, technology companies, and the government are all threatening to take away our privacy, and wefre standing by and letting it happen. Even if you have nothing incriminating to hide, you still have sensitive information on the internet, and the right to privacy.

Here are some of the organizations that are spying on you, and some of the simple steps you can take to protect yourself and your information.

Whofs spying on us?

Few organizations have caught as much of the spotlight as the National Security Agency (NSA). But even outside of the States, many governments have their own version of the NSA.

The most prominent ones are:

  • UKfs Government Communications Headquarters (GCHQ) 
  • Communications Security Establishment Canada (CSEC)
  • Australian Signals Directorate (ASD)
  • New Zealandfs Government Communications Security Bureau (GCSB)

Together with the NSA, they form the Five Eyes alliance. These government organizations regularly collaborate on spy programs with silly code names, but their work is no laughing matter.

The government can call upon technology companies to learn about you. Although technology companies wouldnft want to rat out their own customers, they may simply have no choice. Yahoo CEO Marissa Mayer said executives faced jail if they revealed government secrets. Google has even made a petition for greater transparency.

So technology companies are forced to work with the government. Yahoo has complied with government requests for information.

Technology companies know quite a bit about you

Google snuck code into advertisements that would install tracking cookies into usersf devices without their knowledge. Through Android, Google knows nearly every Wi-Fi password in the world.

Both Apple and Google track your phonefs movements with location-based services. Google scans your emails in order to serve you more relevant advertisements. Apple stores your iMessages. Dropbox reads your files.

As if jail wasnft compelling enough, the government is also rumored to spy on technology companies.

gItfs really outrageous that the National Security Agency was looking between the Google data centers, if thatfs true,h said Googlefs Executive Chairman Eric Schmidt to the Wall Street Journal. gThe steps that the organization was willing to do without good judgment to pursue its mission and potentially violate peoplefs privacy, itfs not OK.h

Even if you have nothing to hide, you have the right to your privacy. Herefs how you can protect your data from prying eyes.

How can you protect ourselves from people spying on you?

Before we proceed, itfs important to hammer this point home: there is no protection or system that is completely, 100 percent guaranteed, safe from hackers. Given enough time and money, an experienced hacker can hack into any system. (There are people attempting to create a system that canft be hacked for 100 years.) 

Surveillance organizations and technology companies have both time and money. That means yes, they could hack into your computer if they were specifically targeting you. However, itfs unlikely theyfd dedicate their resources to zero in on the average citizen. It would cost them too much time and money if they scaled that up across the board.

Imagine if every citizen made it more difficult (and therefore expensive) for these organizations to spy on them. It would become more expensive for these programs to keep an eye on everyone. That would make it more difficult for them to keep a close eye on the majority of people.

A simple, but fundamental, step to privacy is to encrypt your data. Whether itfs the government or some hacker spying on you, encryption makes your information way harder to read.

Encryption codes the information thatfs transferred between you and the website youfre visiting. Any prying eyes (e.g., the government, hackers, etc.) have to put more time and energy into decoding the encrypted information before they can read it.

The next time you use your Web browser, have a look at the URL bar. You can tell your communication with a website is encrypted when therefs a green padlock and an ghttps://h preceding the website address.

Although many sites support HTTPS, some of them may not enable it by default (keeping you on an unencrypted http:// connection). Use a plugin like HTTPS Everywhere to ensure you connect via HTTPS as often as possible.

Some padlocks also feature a companyfs name beside it (like PayPal, Inc.). That means the company has an extended verification certificate, which provides the strongest encryption level available (and requires more rigorous testing and validation).

You can add an extra layer of encryption to your data by browsing through a Virtual Private Network (VPN). gThe first thing Ifd recommend to the average person on the street is whenever youfre out in the publiccuse a VPN service,h says former gMost Wanted Hackerh Kevin Mitnick in an interview.

gIt takes your data and puts it in an encrypted envelope so people canft really intercept it and spy on that.h

Also, put your data in the hands of technology companies that encrypt it. Edward Snowden, for example, recommends using SpiderOak instead of Dropbox (or at least protect your Dropbox folders with Truecrypt). You could use DuckDuckGo instead of Google. (If you miss Googlefs powerful search algorithm, just use the !g function in DuckDuckGo.) Chat with OTR instead of Skype.

There are tons of alternatives that likely protect your data better than the software youfre using.

Have a look at this privacy pack put together by Reset the Net. Keep your eyes peeled for technology that uses end-to-end encryption. End-to-end encryption ensures that your data only gets decrypted once itfs opened by the recipient, meaning that the technology companies wouldnft be able to read the data in transit even if they were forced to pass it along to the government. You know itfs probably effective as the FBI and Department of Justice want companies to ease off end-to-end encryption.

How do the pros protect their information? 

Itfs tough to find people that protect their privacy well as they donft tend to advertise themselves online. There are certain experts like journalists and security specialists that work with sensitive information.

As such, theyfve set up systems to protect their information as much as possible. You can use their methods to set up a more secure system of your own.

The NSA canft read the information on your computer if youfve never been connected to the Internet. If you have extremely sensitive information, consider investing in a computer thatfs never touched the Internet (known as an gairgaph).

Columnist Bruce Schneier writes at The Guardian: 

Since I started working with the Snowden documents, I bought a new computer that has never been connected to the Internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my Internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but itfs pretty good.

If you plan to use an airgap, you might also want to remove any network chips, bluetooth chips, or even microphones and webcams from your new computer before using it.

Along a similar vein, you could also use an operating system thatfs bootable from a USB drive, and browse incognito. Tails is an operating system which forgets your activities after you unplug. Journalists working with Edward Snowden relied on it for secure communication.

gPrivacy and encryption work, but itfs too easy to make a mistake that exposes you,h writes journalist Barton Gellman. gTails puts the essential tools in one place, with a design that makes it hard to screw them up. I could not have talked to Edward Snowden without this kind of protection. I wish Ifd had it years ago.h

Tails allows you to use GPG encryption when you are emailing and/or OTR encryption while instant messaging, with little setup required. These types of encryption come recommended by CDTfs senior staff technologist, Joe Hall.

GPG and PGP encryption are standards that allow you to encrypt and decrypt files and emails using a public/private keypair. (Herefs an intro to how PGP and cryptography work.)

Tails also allows journalists to work on sensitive documents, edit audio and video, and store all their files in an encrypted format. Additionally, Tails routes your web connections through the Tor network by default. The Tin Hat explains Tor pretty simply: 

Tor offers a great degree of anonymity and privacy by encrypting your Internet connection and sending it through three servers placed around the globe.

In case youfre curious to learn more, wefd suggest going deeper into how journalists and security specialists handle sensitive information. For example, learn from this article how Edward Snowden leaked his information to the world. (Herefs another one.)

If you have some sensitive information that you want to share with the press, use an encrypted service like SecureDrop.

Start with the basics

Therefs a lot of information in this piece. Donft drive yourself crazy with paranoia. Just remember that it all starts with making your information a bit more difficult to read through encryption. Use software that has end-to-end encryption built-in. VPNs are a simple solution that quickly ensure your information is at least a bit more challenging to read.

If you ever do want to turn your privacy up a notch, encrypt emails with crypto technology and use airgaps and encryption-focused operating systems.

Even if you have nothing to hide, you have the right to privacy. Itfs your responsibility to protect it while you still can.

Arthur Baxter is an Operations Network Analyst at ExpressVPN, a VPN provider offering over 97 different servers in 78 countries.

Read next: How to stop hackers from stealing your information on public Wi-Fi

View Original Webpage

iOS 9.3

iOS 9.3

With this update your iPhone, iPad and iPod touch gain improvements to Notes, News, Health, Apple Music and a new feature called Night Shift that may even help you get a better night's sleep by shifting the colors in your display to the warmer end of the spectrum at night. New features, improvements, and bug fixes include:

Night Shift

  • When enabled, Night Shift uses your iOS device's clock and geolocation to determine when it's sunset in your location, then it automatically shifts the colors in your display to the warmer end of the spectrum and may even help you get a better night's sleep.

Notes improvements

  • Protect notes that contain your most personal data with Touch ID or a passcode
  • Sort notes alphabetically, by date created, or by date edited
  • When sketching, quickly bring up a fresh canvas with a two finger swipe, or by tapping the New Sketch button
  • A new checklist button at the bottom of every note makes it easier to create lists
  • Show thumbnails instead of large images and attachments by long-pressing on any image or attachment in a note
  • Choose whether photos and videos taken within Notes are stored only in Notes, or also added to Photos
  • Long-press on an Evernote Export file to import its contents into Notes

News improvements

  • New Top Stories section in For You highlights the most important stories of the day
  • Discover something great to read in Editors' Picks, a selection of channels and topics handpicked by our Apple News editors
  • Swipe left on stories in For You on iPhone to quickly share or save or swipe right for more options
  • Play video stories right from For You — without opening the article
  • Read stories and watch videos in landscape orientation on iPhone
  • Change the text size in articles to make reading easier

Health improvements

  • Related third-party apps for select data types such as weight, workouts and sleep are displayed in the Health app
  • Health dashboard adds support for move, exercise, and stand Activity data and goals from Apple Watch
  • Easy access to Dashboard and Medical ID using 3D Touch Quick Actions from the Home screen
  • Third-party apps now have access to Activity rings and summaries from Apple Watch through HealthKit

Apple Music improvements

  • Add songs from the Apple Music catalog to playlists without having to add them to your library
  • Watch music videos on iPad in full screen
  • See what's playing on Beats 1 directly from the Radio tab — without having to tune in
  • Tap the name of the currently playing song in Now Playing to go to the album
  • See which songs are most popular on albums in the Apple Music catalog

Photos improvements

  • Extract the still image from a Live Photo by tapping Duplicate which will give you the option to duplicate the Live Photo, or just the still image
  • Improved download performance of full size original photos or videos stored in iCloud Photo Library
  • Share Live Photos between iOS and OS X through AirDrop and Messages

iBooks improvements

  • Adds the ability for iBooks to store your PDFs in iCloud, making them available across all of your devices
  • Adds support for downloading previously purchased audiobooks from the iBooks Store
  • Adds the ability to share your audiobook purchases with any of your family members using Family Sharing
  • New controls for reading Manga more comfortably with faster page turns and simple controls for enlarging text
  • Adds Apple Pencil support to highlight and save your favorite passages for later

Education improvements

  • Introduces a preview of Shared iPad that enables multiple students to use the same iPad at different times throughout the day
  • Adds support for signing into iCloud with Managed Apple IDs
  • Adds compatibility for the new Classroom app
  • New configuration options to control the organization of apps on the Home Screen
  • New controls to determine which apps to show or hide on the Home Screen
  • Adds support for new restrictions for iCloud Photo Library and Apple Music

CarPlay improvements

  • Apple Music members now have access to their For You and New content in CarPlay
  • New Nearby screen in Maps to quickly find Gas, Parking, Restaurants, Coffee, and other driving essentials 
  • Siri speaks more concisely when reading back and composing messages in CarPlay
  • Equalized sound levels between different audio sources in CarPlay

Dolby Digital Plus

  • Adds support for playing video encoded with Dolby Digital Plus audio streams with support for multichannel output using the Apple Lightning Digital AV Adapter

Hardware keyboard improvements and fixes

  • Enables the use of arrow keys to navigate through lists in Spotlight, Mail and Safari
  • Enables the use of space bar to scroll in Mail
  • Improves performance when using the space bar to scroll in Safari
  • Adds the ability to bring up the software keyboard from the Shortcut Bar when a hardware keyboard is connected
  • Fixes an issue that could prevent unlocking an iPad using the hardware keyboard
  • Fixes an issue that caused hardware keyboards to become unresponsive in captive login pages
  • Fixes an issue that could cause the Messages input field to disappear behind the Shortcut Bar when connected to a hardware keyboard

Other improvements

  • Maps adds support for getting a highlighted view of destinations and stops for a specific transit line by tapping on it 
  • Maps now displays whether there are multiple transit line options for each route suggestion 
  • Wallet app adds the ability to view the app related to a card or pass in the Wallet app by tapping an icon on the card or pass
  • Apple Pay adds support for signing up for store rewards programs with Apple Pay at point of sale terminal
  • Podcasts adds support for fullscreen video playback
  • Activity app adds a new Workout tab with monthly summaries of key metrics and the ability to filter by workout type
  • Move to iOS now offers app suggestions from the App Store based on apps installed on your Android device 
  • iCloud Storage adds proactive status information and in-app notifications to let you know before you run out of space 
  • Two-factor authentication is now available for all iCloud accounts
  • Support for Spanish (Latin America) system language
  • Siri support for Finnish (Finland), Hebrew (Israel), and Malay (Malaysia)

Enterprise bug fixes

  • Resolves an issue that could prevent some VPP purchased apps from launching after being updated
  • Adds iCloud backup support for device-assigned VPP apps
  • Addresses an issue that could prevent certificates from installing correctly when updating configuration profiles
  • Fixes an issue for some IPSec VPN configurations that could cause the internet connection to be interrupted after a VPN session was ended
  • Fixes an issue to prevent iBooks from emailing enterprise managed PDFs from unmanaged accounts
  • Resolves an issue for some Exchange users that caused Calendar to send multiple responses to the same invitation
  • Improves reliability for devices connecting to OS X Caching Server

Accessibility bug fixes

  • Improves 3D Touch reliability with Switch Control Accessibility option
  • Fixes an issue where VoiceOver interferes with speech after dictation
  • Fixes an issue where VoiceOver users could not write a review on the App Store
  • Resolves an issue where VoiceOver becomes unresponsive when receiving a phone call with a Bluetooth headset
  • Fixes an issue where large text was unreadable in Reminders

Other bug fixes, performance and stability improvements

  • Fixes an issue where manually changing the date to May 1970 or earlier could prevent your iOS device from turning on after a restart
  • Fixes issues that could prevent some iCloud Backups from completing
  • Fixes an issue for some users where Health data was incomplete after restoring from iCloud Backup
  • Fixes an issue where an inaccurate battery percentage could be displayed
  • Addresses an issue that prevented iMessage or FaceTime activation for some users
  • Addresses an issue that could prevent displaying the Phone interface while receiving a call
  • Fixes an issue that enabled overriding restrictions applied to cellular data toggle 
  • Fixes an issue that caused notification settings to appear in the Watch app for apps that were not installed on Apple Watch
  • Improves reliability when using 3D Touch on the keyboard
  • Improves stability of the Phone app when setting up voicemail
  • Improves stability of the Mail app when your device is low on storage
  • Improves stability in Mail while using Mail Drop to send large attachments 

Some features may not be available for all countries or all areas, for more information visit: and

For information on the security content of this update, please visit this website:

Friday, April 8, 2016

Travel with OLLI

Travel opportunities offered by OLLI or partners


        May 19-31, 2016 – Celebrity Equinox 12-Night Eastern Mediterranean Cruise from Rome to Barcelona. Stops on Amalfi coast (Salerno) and at Sicily, Athens, Santorini and Mykonos, Greece, and Istanbul and Ephesus, Turkey. Veranda cabins $2,336.40 per person, double occupancy. Other categories available. Optional travel insurance, air and gratuities not included. Deposit $450 per person. Hosted by Bill and Judy Blackburn. For more information, call Earth Travel Pals at 843-222-5839.


        Oct. 1-11, 2016 11-day Historic Trains of the Old West with Albuquerque Balloon Fiesta. Start in Denver with an overnight at the historic 1893 Hotel Colorado. Travel to Durango and take a scenic ride through the San Juan National Forest on a legendary stream train. Admire the cliff dwellings in Mesa Verde National Park. Visit the 1,100 year old city of Taos, N.M., and the famous Royal Gorge. In Colorado Springs enjoy a train journey on the cog railway to Pikes Peak. Spend two days at the Albuquerque International Balloon Fiesta, the largest ballooning event in the world. Land tour cost $2,934 per person, double occupancy. Optional travel insurance additional. Tour deposit $250 per person. Estimate air $550 per person. Hosted by Judy and Bill Blackburn. For more information, visit; call Judy at 843-222-5839 or email; call Kathy at 843-450-2032 or email


·         Oct. 21-28, 2016 – Ireland – Eight-day tour from $2,999 per person double occupancy that includes roundtrip airfare, six nights accommodation, luxury motor coach, tour manager throughout, full Irish breakfast daily, welcome dinner, one additional dinner, farewell dinner, sightseeing per itinerary (Achill Island, Connemara, Galway, Dublin, County Wicklow and Glendalough), fuel surcharges/air taxes up to $600. Membership in the OLLI@CCU program is required for this trip. Please contact the OLLI office at 843-349-2767 or 843-349-6584 for OLLI membership details. For more information and reservations, contact World Cultural Tours at 1-877-218- 8687, reference tour code: CCU009.


        March 25-April 2, 2017 – Cuba's Charming Colonial Cities and Havana – People to People program. Experience the real Cuba with its colorful history and lively culture. Begins with one pre night in Miami with two nights in Camaguey, two nights in Trinidad and three nights in Havana. Included:  eight nights hotel, eight breakfasts, seven lunches and six dinners, gratuities, airport transfers, round-trip air from Miami to Cuba, Cuban visa cost and required Cuban health insurance.  Optional cancellation/health travel insurance available for additional $289. Cost is $4,333 per person double occupancy. Single supplement additional $545. Save your space for $250 deposit per person. Hosted by Kathy and Bruce Blackburn. To reserve or for more information, call Kathy at Earth Travel Pals at 843-450-2032 or email


        New Lower Price - April 6, 2017 Exclusively for OLLI members from around the USA Old World Prague and the Blue Danube – 13 days, including international airfare from Myrtle Beach from $4,445 (12 days River Cruise Tour only from $3,195). Additional departure cities are available. Included: Three nights in Prague at the moderate first-class Park hotel Praha or similar and eight nights aboard a private Grand Circle river ship in an outside cabin; 28 meals including a farewell reception and dinners; seven exclusive tours with personal headsets: Prague Old Town, Cesky Krumlov, Melk Abbey, Durnstein, Vienna, Bratislava, Budapest; Exclusive Discovery Series events; Apfelstrudel baking demonstration, home-hosted visit; school visit; airport transfers upon arrival and departure; all port charges; gratuities for local guides and motor coach drivers on your main trip, baggage handling for one piece luggage per person, including tips; 5 percent frequent traveler credit toward your next Grand Circle trip. For more information, contact Grand Circle Cruise Line at 800-597-2452, then press 2, please mention this booking code: G7-27123.


·         May 22-June 3, 2017 – 12-night Alaska Land and Sea Tour - Denali Explorer – Five nights from Fairbanks, Alaska, including two nights at the Denali National Park and two at Mt. McKinley Wilderness Lodge, with a seven-day Princess Cruise, Voyage of the Glaciers, with stops in Skagway, Juneau, Ketchikan and Hubbard Glacier Scenic Cruising, ending in Vancouver. Enjoy the beautiful spring blooms, enchanting wildlife and scenic views with a group from Myrtle Beach. Inside cabins, $2,156 per person; oceanview, $2,776 per person; balcony, $3,216 per person (all based on double occupancy). Single rates available. Estimated air from Myrtle Beach $900 per person. Hosted by Judy and Bill Blackburn. Contact Judy at 843-222-5839 or email





Lisa Rickenbrode

Director of Operations

Coastal Carolina University

Litchfield Education Center / Georgetown Education Center

Office of Executive Development and Continuing Education

PO Box 261954, Conway SC  29528

843-349-2025 / 843-349-6584 /

For up-to-date information about Continuing Education, OLLI & Coastal Carolina Kids Camp Programs, visit




Saturday, April 2, 2016

Mac Address tracking

Mac Address tracking using wifi 

iOS 8

Device Tracking: Because they're unique, MAC addresses can be used to track you. When you walk around, your smartphone scans for nearby Wi-Fi networks and broadcasts its MAC address. A company named Renew London used trash bins in the city of London to track people's movements around the city based on their MAC addresses. Apple's iOS 8 will use a random MAC address each time it scans for nearby Wi-Fi networks to prevent this sort of tracking.

The Good Apple Club


How to Change Your Apple ID

iPhone Life magazine
Your Tip of the Day is sponsored by:
Sponsors make free tips & tricks possible. Visit the above link to keep the free tips coming!
Tip of the Day:
How to Change Your Apple ID

Your Apple ID is the key to using your iCloud account and making purchases in the App and iTunes Stores. If you want to change your Apple ID, perhaps because it is an email address for an account you no longer use, you'll need to sign out of everywhere you use your Apple ID on all your iDevices. This includes the iTunes, iBooks, and App Store, Apple Music, FaceTime, iMessages, GameCenter, iCloud, Find My Friends, and Find My iPhone.

Next, go to the Apple ID page on Apple's website. Here, sign in under Manage your Apple Account. (Here's what to do if you've forgotten your password.)




Once you've signed in, click Edit in the Account section at the top of the page.


Then, click Change Email Address…


Enter a new email account and tap continue.


A verification code will be sent to your new email and a window will pop up telling you to enter a verification code. Open the email and find the verification code. Enter the code on the website and click Verify.


Once your new ID is verified you can sign back in on your iDevices to all the services that require an Apple ID. If you forgot to sign out of any service before changing your Apple ID, you will need to sign out and sign in again.


*Please note that Apple email addresses (those ending in,, or are already Apple IDs, so if you want to use one as your ID, there is no need to make any changes to your Apple account.


Got a Tip You Would Like to Share? Let Us Know.

iPhone Life Today:

Get More! Follow iPhone Life On...

iPhone Life
Mango Life Publishing LLC, 402 North B Street, Fairfield, IA 52556
Unsubscribe / Manage Email Preferences