Feeds

Hacker springs latest iPhone OS from Jobsian jail

Mac users need not apply

Beginner's guide to SSL certificates

One of the world's foremost iPhone hackers has just released software for jailbreaking the latest firmware released for the Apple smartphone.

Geohot's Blackra1n lets Windows users jailbreak iPhone OS 3.1.2 on all iPhone and iPod Touch models regardless of their hardware generation. The tool, which in 30 seconds allows handset users to run software not authorized by Apple, doesn't work on Macs. Those users will have to continue using an older version of the firmware.

This weekend's release by Geohot, the hacker whose real name is George Hotz, continues the race among iPhone users providing ways to get around the artificial restrictions Apple places on the popular smartphone. The other leading contender has been the Pwnage Tool, designed by the iPhone Dev Team. At time of writing, that group was still warning iPhone users to hold off installing the latest iPhone OS.

But unlike the Pwnage Tool, Blackra1n can't be used to unlock iPhones so they work on unauthorized cellular networks. If you've already unlocked your phone, don't use Blackra1n on it. If you do, your device will be jailbroken but won't work with unauthorized carriers.

Unofficial reports from iPhone users suggest Blackra1n works as advertised. For successful results, users will have to upgrade to the latest version of iTunes. From there, plug the iPhone or iPod Touch using the standard USB cable and follow the directions and the device should be sprung from the Apple-imposed lock-down in about half a minute.

Geohot was the first hacker to jailbreak the iPhone shortly after its official debut in mid 2007. He was also among the first to jailbreak the iPhone GS model. ®

Internet Security Threat Report 2014

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.