Stories
Slash Boxes
Comments

Dev.SN ♥ developers

posted by LaminatorX on Sunday February 23 2014, @06:00PM   Printer-friendly
from the damned-if-you-do-damned-if-you-don't dept.

l3g0la5 writes:

"Apple released iOS 7.0.6 to patch a vulnerability which, if unpatched, could allow attackers to capture or modify data in sessions protected by SSL/TLS. However, quite a few users have reported that the upgrade didn't go as planned and their iDevices have been bricked after the update or during the update process. Users have flocked to Twitter as well as Apple support forums voicing their concerns and frustrations as quite a few users have tried updating their iOS 7 devices while on the move and once bricked, their iPhone, iPad or iPod Touch requires a connection to iTunes to restart."

 
This discussion has been archived. No new comments can be posted.
Display Options Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by mrbluze on Sunday February 23 2014, @06:06PM

    by mrbluze (49) on Sunday February 23 2014, @06:06PM (#5334)

    Just goes to show, Apple shouldn't boast that their stuff "just works" but is prone to all the same faults of any other software product.

    --
    Do it yourself, 'cause no one else will do it yourself.
    Starting Score:    1  point
    Moderation   +4  
       Insightful=3, Informative=1, Total=4
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 5, Funny) by Ethanol-fueled on Sunday February 23 2014, @06:41PM

    by Ethanol-fueled (2792) on Sunday February 23 2014, @06:41PM (#5345) Journal

    It's really a security feature to prevent terrorists from getting your data. Or perhaps you were holding the phone the wrong way during upgrade.

    • (Score: 1, Funny) by Anonymous Coward on Sunday February 23 2014, @07:46PM

      by Anonymous Coward on Sunday February 23 2014, @07:46PM (#5378)

      I rang up Applecare, and the nice man on the line said I could use my iPhone as a paperweight while I wait for my son to drive over from Kansas and bring me some tunes to listen to. I'm so happy!

  • (Score: 1, Insightful) by Anonymous Coward on Sunday February 23 2014, @06:55PM

    by Anonymous Coward on Sunday February 23 2014, @06:55PM (#5352)

    Compared to random (fake antivirus) APK drive bys - I'd take iOS any day.

    • (Score: 3, Funny) by Marand on Monday February 24 2014, @03:39AM

      by Marand (1081) on Monday February 24 2014, @03:39AM (#5654)

      Compared to random (fake antivirus) APK drive bys - I'd take iOS any day.

      I'd rather have an apk drive by, personally; all it would do is edit my hosts file, and it's kind of a mess anyway right now.

      • (Score: 3) by dilbert on Monday February 24 2014, @10:01AM

        by dilbert (444) on Monday February 24 2014, @10:01AM (#5803)
        My hosts file on cyanogen currently has 35124 lines, fewer than 40 of which are comments.
  • (Score: 5, Informative) by mrbluze on Sunday February 23 2014, @07:48PM

    by mrbluze (49) on Sunday February 23 2014, @07:48PM (#5380)

    This bug applies to OSX also. [forbes.com] Also to iMessage, Factime, Mail, Twitter...

    --
    Do it yourself, 'cause no one else will do it yourself.
    • (Score: 1) by captain normal on Monday February 24 2014, @03:11AM

      by captain normal (2205) on Monday February 24 2014, @03:11AM (#5635)

      "Apple’s newly discovered security flaw, dubbed “gotofail†by the security community due to a single improperly used “goto†command in Apple’s code that triggered it..." From the Forbes article.

      Why...oh why do I think "goto" = "gotosee" (goatse)...?