Visible is back with another way to save customers money. It’s called Party Pay and it can lower your bill.
Yesterday during Apple’s earnings call one of the announcements was about iPhone financing. Apple Card customers can get 24-month financing.
T-Mobile is offering the customers of other carriers a deal: A free mobile hotspot with a free data plan lasting 30 days or 30 GB, whichever comes first.
The attorneys general of every state along with 12 carriers announced a plan to end robocalling. But it’s not legally binding, nor is there a deadline.
Every carrier at one point seems to be crowned “America’s Best Network” but which one is actually the best? It turns out that the companies that perform these tests use different methodologies and so reach different conclusions.
In recent weeks, three key studies have reached conflicting conclusions about the top four nationwide carriers, which includes Sprint. But reports by RootMetrics, OpenSignal, and PCMag that, respectively, gave top honors to Verizon, T-Mobile, and AT&T aren’t wrong—not if you understand how they were put together.
A new Sprint BYOD deal offers customers unlimited wireless for US$25/month if you bring your own iPhone or Android phone.
Major carriers in the U.S., like AT&T, T-Mobile, and Verizon claim they’ve stopped selling user data. AT&T says it also wasn’t illegal.
The FCC is calling on carriers to start automatically blocking robocalls by default, for free. So far the agency this isn’t a requirement.
Carriers oppose a recently passed bill that would stop them from throttling the data of public safety—like firefighters—during emergencies.
In response to a letter from Senator Ron Wyden, T-Mobile has come forth with more location data abuses by third parties.
Three security flaws found in 4G and 5G networks could be used to intercept phone calls and track peoples’ location.
Most smartphones coming out are designed to work on higher frequency cellular bands. But there aren’t any current phones that work on the 600MHz band.
Keiran Dennie tweeted an interesting chart that compares the security of various smartphone operating systems.
Wondering about Android and Apple phone security? Here’s an objective chart to help you decide.
It’s a well known fact of Android that people have to rely on their carrier to push out security updates. This can take weeks, months, and sometimes they don’t get released at all.
You might have heard of the term “phone tethering” before. In case you didn’t know what it meant, David Nield put together a guide explaining the term and how to use it.
We’re going to focus largely on wifi tethering here—creating a wifi hotspot from your phone or tablet—but you do have other options. If you’ve got a spare USB cable you can create a more stable connection between laptop and mobile device, or you can tether via Bluetooth, which is significantly slower but less taxing on battery life.
I’ll put an addendum here. Tethering depends on your carrier, and some carriers don’t allow it, like prepaid carriers. I used to use Net10 and I couldn’t use create a Wi-Fi hotspot.
Verizon doesn’t want you to remember when it throttled the cellular data of first responders during the California wildfires.
Hiya, a spam-blocking app analyzed 450,000 of its users to figure out how big of a problem robo calls are.
There’s more to the bounty hunter location data story that Motherboard reported on earlier this month. One of the data brokers involved was Zumigo.
The Korean FTC has found Apple guilty of unfair practices in its dealings with carriers, but it will let Apple respond.
AT&T, Sprint, and T-Mobile sell access to customers’ location data. As an experiment, Joseph Cox paid a bounty hunter to locate a phone, and it worked.
The bounty hunter did this all without deploying a hacking tool or having any previous knowledge of the phone’s whereabouts. Instead, the tracking tool relies on real-time location data sold to bounty hunters that ultimately originated from the telcos themselves, including T-Mobile, AT&T, and Sprint, a Motherboard investigation has found. These surveillance capabilities are sometimes sold through word-of-mouth networks.
The technology apparently works on all mobile networks, but there was some issue with Verizon. Shady practices like this are why we need an American GDPR, as well as a better FCC.