Skip to main content

Mat Honan

See All Stories

Apple responds to iPhone 6 Bendgate controversy, says only 9 customers have complained

Site default logo image

Apple has officially issued a statement regarding the iPhone 6 bending controversy saying the issue is rare during real world use and that it’s only received complaints from 9 customers (via CNBC). Apple adds, according to the reports, that the “new iPhones feature steel/titanium inserts to reinforce stress locations and use the strongest glass in the industry.” Apple also commented that bending is “extremely rare” during normal use and that it performs a number of strength and durability tests (as you’d expect) before it ships new devices (via WSJ):

Since going on sale Friday, Apple said only nine customers have contacted the company about a bent iPhone 6 Plus—the larger and more expensive of its two new iPhones. Apple said both the iPhone 6 and iPhone 6 Plus passed a series of tests meant to check the products’ strength and durability to withstand every day, real-life use.


Expand
Expanding
Close

Apple comments on Gizmodo/Wired writer’s account hacking, here’s how it went down…

Site default logo image

We reported over the weekend on the hacking of the digital life of Wired’s Mat Honan.

Mat Honan wrote up his whole story over at Wired. The scariest part is that they were able to reproduce the hack using two pieces of publicly available information and a phone call.

We talked to Apple directly about its security policy, and company spokesperson Natalie Kerris told Wired, “Apple takes customer privacy seriously and requires multiple forms of verification before resetting an Apple ID password. In this particular case, the customer’s data was compromised by a person who had acquired personal information about the customer. In addition, we found that our own internal policies were not followed completely. We are reviewing all of our processes for resetting account passwords to ensure our customers’ data is protected.”

On Monday, Wired tried to verify the hackers’ access technique by performing it on a different account. We were successful. This means, ultimately, all you need in addition to someone’s email address are those two easily acquired pieces of information: a billing address and the last four digits of a credit card on file. Here’s the story of how the hackers got them.

Scary. Scary. Scary.
Expand
Expanding
Close

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications