New stunning renderings of the vividly colorful Apple iPhone 6c

After the success of the iPhone 5c many customers have been daydreaming of the moment when Apple can confirm the newer iPhone 6c. Although as time goes on the release of a new colorful and affordable iPhone seems less and less likely. But that doesn’t stop us from hoping and patiently waiting. To spur on our dreams, artist Kiarash Kia, has recently released some magnificent renderings of what the iPhone 6c might look like.

The renderings feature a non-integrated design, aluminum frame and high quality polycarbonate. Although similar to the look and feel of the iPhone 6, these digital images feature the iPhone 6c in vivid color, a stark contrast to the silver, gold and space gray. The iPhone 6c shows off a colorful range of red, blue, yellow, black, white and green. Check out the designs below and let us know what color you would choose.

Red iPhone 6c
Red iPhone 6c
Yellow iPhone 6c
Yellow iPhone 6c
Green iPhone 6c
Green iPhone 6c
White iPhone 6c
White iPhone 6c
Black iPhone 6c
Black iPhone 6c
Blue iPhone 6c
Blue iPhone 6c

Lessons learned for Mac users from Black Hat and Def Con conferences

News from the recent Black Hat and Def Con security conferences in Las Vegas was…not good. We’ve come to expect bad tidings for our cherished electronic devices at around this time every year. And indeed, these conferences often reveal startling vulnerabilities and exploits that malicious actors and “frenemy” states have probably been privy to for some time. And though, as Buzzfeed tech writer Joe Bernstein points out, Black Hat is the equivalent of a burglar breaking through your windows, entering your home, and then asking for commendation for proving that your windows could use some reinforcement — it’s still an event with a noble goal. In the depraved and paranoid world of the internet, this is what security looks like.

Black Hat and Defcon are places where people take notes on paper, not on electronic devices, and many probably leave their wallets at home, because everyone is too scared about some nut swiping their info with an RFID scanner or cracking into their devices through Bluetooth. Joe Bernstein’s account of his time at Black Hat are prescient. “This event radiates distrust, like a mean old croupier”, Bernstein writes. Between the depressing backdrop of Las Vegas, and the feverish paranoid hallways, it sounds like a bleak event. Bernstein draws a compelling parallel between the city of Vegas, destined to be reclaimed by the desert, and the fragility of our business, our culture, and our lives structured around increasingly complex and still fallible technology.

Among the shocking unveilings at Black Hat and Def Con, Thunderstrike 2 aside, was bad news for new-model car owners. According to Charlie Miller and Chris Valasek, there’s a variety of ways to take control of new Chryslers remotely, brakes, accelerator, and all. This, in the wake of keyless entry scandals plaguing Land Rover and many others, is scary news.

But we’re here for Mac news, and the news is grim. According to former National Security Agency employee Patrick Wardle, Mac’s protection against malware rates only a “C+”. The reason Apple isn’t experiencing large scale issues is the same as its always been, there just still aren’t enough people devoting time to crack Macs. While this is a good thing, it is increasingly becoming a good thing of the past. As Apple devices continue to proliferate, especially iPhones and iPads, Apple will have a day of reckoning soon, security experts fear.

Everyone, countries, commercial users, car drivers, business using contactless payment tech, Apple users, Windows users, Android users, are all, in Bernstein’s words, “fucked”. “It’s enough to make a person long for a little regulation, and a little enforcement, just to put a stop to all the unmitigated fucking”, Bernstein continues to lament. Buzzfeed’s tech writer tells of a speech given by Leonard Bailey, special council for National Security in the Department of Justice. After his “very smart, very clear, very measured” talk, Bernstein realizes that Bailey isn’t as above the fray as he’d like. In fact, as a federal employee his personal information has almost definitely been leaked in the massive Office of Personnel Management hack. Good luck trying to charge whatever state or states were responsible for that with a Computer Fraud and Abuse Act violation.

Well, if you haven’t already built a Faraday cage around your house or chucked all your electronics into the proper recycling bins, what is to be done? Unfortunately, conferences like Black Hat and Def Con are our best weapon against truly malicious forces. One big takeaway from the whole ordeal is for companies to redouble efforts to catch these vulnerabilities early, for Apple to devote more time to security, and for us all to either become OK with the tenuous electronic world we live in, or flip the script like the paranoids in Vegas, and ditch the iPads for notepads, paper notepads.

Latest leaked iPhone 6s / iPhone 7 images

As the widely rumored September 9th release date for the next iteration of iPhone approaches, so do the leaks! MacManiack obtained and released suspected images of the new iPhone.

It has been reported that the most significant changes to this new iPhone are coming in the form of a better user-facing camera, and new Force Touch technology for the screen, which was first debuted a month ago for new trackpads. The dimensions and aesthetics of the phone appear to be largely the same, which is the usual route for an “S” iteration, with larger changes coming for the “number” models. The sizes of the phones, 4.7-inch and 5.5-inch are supposed to be the same this year.

iPhone-6s
via MacManiack
via Macmaniack
via MacManiack

A lot has been written about Force Touch, and leaked images of the iPhone’s new flex cable arrangement seems to validate the new technology’s presence in the phone. KGI Securities, which pretty accurately assess and reports on Apple news, say that Force Touch will indeed be in this new phone. An analyst for KGI, however, also suggested that this new iPhone might not be a huge winner for the company, as it is projected to sell fewer units than Apple sold last year.

Perhaps the biggest change Apple is likely to make to its new phone is Force Touch. Force Touch allows a device to sense more exact pressure, by determining more exactly the area of the finger pushing against it. This technology is already in use on the Apple Watch, where a weak tap on email opens up the message, and a stronger push leads directly to a message reply. On the iPhone this will allow the user to skip long menus, like initiating navigation, or managing messages.

Another major improvement in the new iPhone will probably be the camera. The iPhone 6s or iPhone 7’s user-facing camera will have to be upgraded in order to keep pace with rival smartphones with more powerful cameras from 2015. The new “selfie-cam” is rumored to be capable of shooting slow-motion 240 fps video, and 1080p video at normal speed.

Other probable chances to the new device will be a better aluminum frame and higher resolution screen. Apple’s competitors, like Samsung’s Galaxy 6 and Edge, stepped up the hardware battle this year with hard metal cases and an innovative edge-display. Sources suggest that Apple has been eyeing using the aluminum alloy developed for the Apple Watch on its phones. For those who dislike the plastic bands on the back of iPhone 6, Apple has been working on a fix, although it likely won’t be ready by September launch. TechRadar reported in June that Apple had filed a patent for a new blend of metal oxides that would look like metal but allow radio waves to pass through. This technology would eliminate the need for the plastic strips, necessary in the iPhone 6 to allow radio signals into the phone.

 

Yet another possible upgrade to the phone could be a higher resolution screen. Apple has consistently improved upon their screens, from the iPhone 4’s “Retina” screen, to the iPhone 6’s “Retina HD Display”. Reports from IT Pro suggest that Apple’s new smaller model phone may feature a five-inch display with 400ppi resolution.

No matter what the details are, bigger phone, smaller phone, no plastic, new metal, whatever, global markets and customers alike eagerly await the new redesign.

Where were the iPad’s at the All England Club?

At Wimbledon 2015 lead sponsor IBM was on display everywhere. From banners and screen ads, to television spots, IBM’s domineering sponsorship was felt. When the casual fan (myself included) watched these games it appeared that umpires were aided in officiating by not just IBM’s Hawkeye technology, but Apple iPads to display it. This was originally going to be a post about the presence of iPads at Wimbledon. However, as Mark Reschke of T-Gaap.com reported, the tablets at the All England Club were not iPads, but rather Panasonic’s Toughpad, running Windows.

Apple and IBM are well into a hundred million dollar partnership, one that has included such far ranging deals as IBM promoting iPads to elderly Japanese, IBM/Apple’s many business apps, software designed for banks, telecom, and utilities, issuing Apple’s products to employees, and even a brand new service for IBM clients that allows faster and more seamless integration of MacBooks within large companies. So with all that abundant and very public support and cooperation, why no iPads at Wimbledon? The answer is probably a boring one about All England Club contracts with other companies and legacy business deals. But it could just as easily be a serious marketing misstep.

Equally as odd as the lack of iPads at an IBM event, as Mark Reschke pointed out, is IBM’s under utilization of iPads in their high profile TV adverts. All current IBM ads show students or doctors using Windows equipment. Reschke says, justifiably, “perhaps someone in IBM corporate will inform their sports analytics team, marketing department, and advertising agency” about their current partnerships with Apple. Contacts with other companies, namely Sony, aside, there shouldn’t be a huge barrier to IBM using the littlest amount of leverage to get iPads into Wimbledon, or simply putting them in their minute-long TV spots seen by millions of people across the globe.

wimbledon-ipad
Wimbledon App on the iPad

The only place Apple products were seen at Wimbledon? In the stands of course. Hoards of fans filmed the tennis action on their iPads and iPhones, uploading great quality video. Fan videos sometimes show, among other things, how Sony’s “Hawk-Eye” was getting some calls wrong. Hawk-Eye has a history of criticism, some from the Australian media regarding its use in cricket, another relating to a controversial call during Nadal-Federer in Wimbledon 2008, in which Hawk-Eye declared a ball in by 1mm, less than its 3.6 mm margin for error, and numerous peer-reviewed journal pieces calling into question the technology’s stated ability to predict trajectory. Tennis experts have also questioned whether or not the technology ignores factors like distortion of the ball on bouncing, and the human errors inherent in a court painted on the ground by people.

This is all to bring up another valid point, why has the much beleaguered Sony system, with a 3.6mm margin of error, not been replaced with better software and better cameras, like those sometimes found on Apple products? Prior contracts and commitments no doubt, but the sporting world is being short changed, and so is Apple.

Thunderstrike 2, New Zero-Day Vulnerability

The Bad News: With every Black Hat season comes new vulnerabilities and zero-day exploits for our precious devices. According to TechCrunch.com, Xeno Novah and Trammell Hudson have found a serious exploit that potentially impacts all Apple devices. TechCrunch reports that this “firmworm” helps malware completely disable Apple devices, leaving users with no way to reboot their machines.

Thunderstrike 2 targets a device’s firmware through potentially any Thunderbolt linked accessory. Through receiving malicious code in an email or online link the malware looks for connected Thunderbolt accessories and infects them with its Option ROM. If the infected Thunderbolt accessory is connected when the device turns on, the malicious code targets firmware Basic Input/Output System (BIOS) for booting the device. The Extensible Firmware Interface (EFI) will execute Option ROM on Thunderbolt attachment before it boots OSX. The malicious code will infect the EFI itself and the device can be rendered inert and unfixable. If EFI is compromised, there is no way to reboot OSX, update firmware and remove malicious code. Additionally, the infected accessory device remains infected, and will infect other devices if connected.

This exploit news is not totally unexpected, a deluge of exploits is normal during Black Hat conference season, afterall. Uncomfortably, perhaps, it also comes in the wake of another Mac exploit last month. Stefan Esser found the DYLD exploit that allowed attackers to gain root privilege. There has been some evidence of adware creators using this vulnerability to install unwanted adware applications like VSearch, Genieo, and MacKeeper on users devices, also disabling the Mac App Store.

https://youtu.be/Jsdqom01XzY

 

Apple has already fixed DYLD in El Capitan’s beta but not in Yosemite, and has also already added applications using these exploits to the malware blacklist.

The Good News: According to a recent report from Ars Technica Apple have already partially patched this vulnerability in OS X 10.10.4, so fully updated users should be OK. Per Ars Technica Hudson has posted more information about the exploit here. According to Hudson, thanks to the update Macs are no longer “trivially vulnerable” but insists there are several vulnerabilities still. The pair of researchers will present more on the topic tomorrow at the Black Hat conference. To be extra careful until the fixes are formalize, be careful downloading (as always) and unplug any Thunderbolt accessories before booting your device. As Ars Technica‘s Andrew Cunningham points out, the real trouble with firmware-level malware is that most virus scans and anti-malware services search only in RAM and files stored on the desk. An infected accessory is difficult to detect, and just as tough to remove. Cunningham demonstrates that “You can’t use Thunderstrike to remove Thunderstrike” because, amazingly, the infected firmware patches the original security flaw.

thunderstrike-2
Photo by Trammell Hudson

Lastly, these exploits don’t only impact Apple’s devices. The exploits are common to most EFI firmware, including PCs by Dell, HP, Lenovo, Samsung, and more. However, numerous vulnerabilities also applied to Mac’s firmware, and Apple has only succeeded so far in partially fixing these issues.