Feeds

iPhone spontaneously combusts on CCTV

Apple takes the heat

Security for virtualized datacentres

We all know iPhones are hot property - as their owners generally tell you. However, when one blows up in your pocket, you know its probably time to stop bragging.

That's what happened to 17-year-old Henri Helminen, whose three-month-old iPhone started smoking profusely of its own accord, causing the Finn to quickly reach for the handset and toss it away, Finnish publication Kauppalehti reports.

iPhone explodes

Source: Kauppalehti

The entire incident was very conveniently caught on CCTV camera, so you can make your own assumptions as to its authenticity. It's difficult to imagine exactly how you would really react in such a situation, though.

Either way, the video should be enough to make a claim against Apple for a compensation fee. Failing that there's always £250 up for grabs on You've Been Framed, right?

Fortunately for Apple, its biggest iPhone rival, the Samsung Galaxy S III, has been criticised for overheating too, with similar burnout issues reported.

Still, regardless of manufacturer, it's always good to remember that if you ever find your own phone in need of extinguishing... there's a tap for that. Badum tish. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.