The Latest in IT Security

Posts Tagged ‘Touch ID’

As you may have heard, Apple unveiled several new products this September, including the iPhone 8, iPhone 8 Plus, and iPhone X, as well as the latest version of Apple’s mobile operating system, the new iOS 11. As usual, user interest was focused on the platform’s new features: A new way to browse the file […]

Read more ...

A design constraint of #touch id limits its applicability to authorised actions on a device. Here’s what app developers and end users need to know. #apple‘s Touch ID recognises fingerprints and tells you whether the fingerprint on the sensor has been registered. Every fingerprint authorised on a device is equivalent; this is an important design […]

Read more ...

Developers and savvy fans have already gotten their hands on the early builds of iOS 8, but there’s still plenty we don’t know about Apple’s next big update to its mobile platform. Over the weekend, iOS 8 user Gabriel Nevado documented on Vine his use of a Safari extension made by 1Password that allowed him to […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments