Latest Entries »

Just a quick update for our clients in the Fraser Valley and surrounding areas.  We are open for business between 9AM and 6PM.  If you need a device repaired feel free to pop by between business hours, no need for an appointment but a phone call ahead is always a good idea.

Over the last month we have increased our inventory for cell phone and computer accessories dramatically.  We have the biggest selection of phone cases and cell phone adapters in town for sure!  New stock arriving everyday and we do accept special orders for items you want but can’t find anywhere else.

Don’t forget guys, we will beat any cell phone repair price, be sure to mention you were quoted a price by a competitor and we will beat the price! (Hope – Langley Area Competitors only)

If you are looking for a great deal on a PC Tune-Up for $89.99 we are now offering multi operating system options including:

  • Windows 7 Ultimate
  • Windows 8.1
  • Windows 10 Pro
  • Linux Mint
  • Ubuntu
  • Mac OS X

Our tune-up special includes a full line of software including a fully customized TV & Movies app installed. You will be blown away by the work we do compared to our competitors, trust me! – Ryan


We get lots of customers calling to ask us if we do cell phone and smart phone repair, most frequently iPhone repair.  Yes indeed we do all major cell phone repairs for most makes and models including Apple, HTC, Samsung, Motorola, Huawei, BlackBerry and Sony Ericsson.  Unlike most of the repair shops in town just doing simple iPhone repairs like glass screens, we provide our clients extremely technical repairs most shops turn down.  We also provide our customers with pickup and drop off services in case they can’t make it in to the shop.  Our clients always get a 6 month warranty on the parts and labour so you can trust your getting the best quality parts and service in town.

We also repair all iPad, iPad Mini and iPad Air Glass Screen or LCD’s, Samsung Galaxy Tab 2 or 3 Glass or LCD Replacement, Charging Port Replacements, Battery Replacements, Antenna Repairs, Dead Motherboard Repairs, JTAG Repair Services and so much more!  Call us today! (778) 245-0780.


For all my clients coming from Chilliwack  and Hope – there is now an incentive to come to our shop!  Not only will we beat ANY and ALL price quotes from all Chilliwack iPhone repair shops.  We guarantee our parts are real OEM and not knockoff like we have been seeing a lot of from out that way.  Ask about our free gift with purchase! (Mention this Blog Post)

One customer named Bob came in earlier today and mentioned he has been to another iPhone repair place in Chilliwack on Unsworth.  His screen lasted two days after the replacement was put in, upon further inspection, we informed Bob the part was a fake knockoff and very low quality.. The screen wasn’t even set properly and was practically coming off the LCD.  UV glue was not properly used.

At Ryan’s PC Repair Shop, we provide our customers with real original OEM parts (You get what you pay for), a 6 month warranty on the parts and labour and after sale service you can always depend on.  Ryan’s been in the industry for over 10 years and fix just about any issue you may have.

If you’ve been to another shop and they’ve told you the phones not repairable, bring it by my shop and I’ll get it working for you.  There is no charge to look at the device if its not repairable! No diagnostic fees charged ever!

600 million Apple devices contain secret backdoors, researcher claims

Apple-iconA security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

A man shows a photograph he took on his iPhone of an Apple store in Beijing

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”


Source: RT

iPad is an iFAD: Now we know why Apple went running to IBM

Apple fell over itself to talk up strong Mac and iOS device sales in its latest quarter – but the real news is a slump in iPad numbers.

The Cupertino giant said the three-month period ending June 28 was its best ever fiscal third quarter on record. Its $37.4bn revenues, up six per cent year on year, led to a $7.7bn net income up from $6.9bn a year ago [PDF]. Apple’s $1.28 profit per diluted share, up from $1.07 in Q3 fiscal 2013, was slightly above Yahoo! Finance and Marketwatch average estimate of $1.23.

Boss Tim Cook said that the best-ever Q3 report was driven in part by Mac and iPhone sales, which were also records for that quarterly period. Apple said that it sold 35.2m iPhones (up 13 per cent), bagging $19.75bn in revenue (up nine per cent), and 4.4m Macs (up 18 per cent), bringing home $5.5bn (up 13 per cent).

Though iPhone and Mac sales were strong, the iPad had a rough quarter as tablet revenues at Apple were down 8 per cent, year on year, to $5.8bn from 13.2m units sold (down 9 per cent). Cook credited the drop in part to inventory reduction over the quarter.

The Apple CEO also expressed hope that the iPad business will be bolstered by the recently announced mobile mega-deal with IBM. He noted that the partnership with Big Blue will allow for tablet-specific apps to be written rather than just adapted from desktop software.

“We think there is a substantial upside in business,” Cook said.

“We think that the core thing that unleashes this is a better go-to-market, but even more importantly, apps that are written with mobile first in mind.”

Apple’s CEO is also hoping to get a boost from the company’s developer and content partners on its iTunes and App Store services. The company reported $4.4bn in quarterly revenues from the iTunes, Software and Services unit, up 12 per cent on Q3 fiscal 2013.

Cook said that over its life to date, the App Store has served up 75 billion downloads and paid out $20bn in revenues to app developers.

As for revenues broken down by region, China romped home with 28 per cent growth on Q3 fiscal 2013; the Americas and Japan has flat revenue growth, year on year, of one per cent; and Europe and the rest of the Asia Pacific grew six per cent. Retail store sales were also flat at one per cent, year on year.

The Apple head honcho also talked up the coming tie-up with Beats Electronics, which is set to become the 30th Apple acquisition of the year when it is expected to close in the coming quarter.

With the back-to-school shopping season kicking off and the release of OS X Yosemite and iOS 8 looming, Apple is predicting an even stronger quarter, ending late September. The biz is estimating that its Q4 numbers will see revenues between $37bn and $40bn, putting the company on track to surpass $175bn in revenues for the full fiscal year.

Source: The Register

Here’s why many people want their BlackBerrys back after switching to iOS and Android

Following the release of the original iPhone in 2007 and the subsequent launch of Android, many people with work-issued phones spent years asking for their employers to switch away from BlackBerry smartphones to more modern devices. Finally, as Apple and Google increased their focus on security and BlackBerry hit dire straights a few years ago, workers began getting what that wanted and bring your own device (BYOD) policies became more common.

More recently, however, an interesting trend is being observed: Workers want their BlackBerry’s back.

CIO’s Tom Kaneshige reports on an interesting phenomenon that we’ve heard rumblings of in the past. At companies where employees were permitted to ditch their work-issued BlackBerry phones and bring their own iPhones and Android handsets, they’re now begging their IT departments to move back to BlackBerry.

Why? It turns out there are a few reasons.

For one thing, there are privacy concerns. When workers use their own iOS and Android devices, IT departments gain access to all of their private data in addition to any corporate apps that might be on the devices. It’s never a good thing when you have to hand over a smartphone packed full of naked selfies so that IT can fix an issue with email not syncing properly.

Beyond that, IT professionals Kaneshige spoke with say they are having some serious problems with mobile device management (MDM) software, and the related on-device apps often cause issues like battery drain and device bogging.

Source: BGR

Android and Windows smartphones to get ‘kill switch’

Google and Microsoft have both revealed that they will integrate a ‘kill switch’ into the next versions of their smartphone operating systems, allowing customers to disable their devices if they are lost or stolen.

Google told Bloomberg that it will add a “factory reset protection solution” to its next version of Android

Meanwhile, Microsoft’s vice president for US government affairs, Fred Humphries, said that the company would be adding new anti-theft capabilities to its Find My Phone feature in Windows Phone before July 2015.

“With these additional features, we’re hopeful that technology – as part of a broader strategy – can help to further reduce incentives for criminals to steal smartphones in the first place,” Humphries said in a blog post.

The news comes after Apple introduced ‘activation lock’ and ‘delete phone’ to its Find My iPhone app in September 2013.

As a result, robberies involving the company’s products reportedly decreased by 19 per cent in New York in the first five months of this year. San Francisco and London have also seen Apple-related robberies drop.

New York attorney general Eric Schneiderman said the statistics illustrate the “stunning effectiveness of kill switches”, and has called for other smartphone companies to add theft-deterrence features to their devices.

US Senator Amy Klobuchar, a Minnesota Democrat, and Jose Serrano, a New York Democrat, have both introduced bills that would require phones sold in the US to include kill-switch technology.

Last summer, the Mayor of London Boris Johnson also wrote to eight companies – including Apple, Samsung and Google – stating that about 10,000 handsets are stolen every month in London, and manufacturers have a “corporate responsibility” to help tackle thefts.

“If we are to deter theft and help prevent crimes that victimise your customers and the residents and visitors to our city, we need meaningful engagement from business and a clear demonstration that your company is serious about your corporate responsibility to help solve this problem,” Mr Johnson told manufacturers.

“Each of your companies promote the security of your devices, their software and information they hold, but we expect the same effort to go into hardware security so that we can make a stolen handset inoperable and so eliminate the illicit second-hand market in these products.

“We hope you would support this objective. Customers and shareholders surely deserve to know that business cannot and must not benefit directly from smartphone theft through sales of replacement devices.”

Source: The Telegraph

The Heartbleed bug: Am I at risk and do I really have to change my password?

The discovery of Heartbleed, a flaw in one of the most widespread encryption standards used online, has panicked webmasters and users alike.

The bug has gone unnoticed for more than two years and could have potentially given hackers access to an unlimited array of secure data — everything from passwords and login details to credit card numbers and addresses.

Although it’s difficult to say exactly how many websites have been exposed, the lower estimates are around 500 million with a large number of major web companies (Google, Facebook, Yahoo, etc) all forced to update their software to protect against the bug.

However, there have been quite a lot of mixed messages as to whether or not users should change their passwords, with some outlets urging that you should create new ones immediately while others are advising that you wait.

To add to the confusion there’s also been reports of hackers sending out phishing emails related to Heartbleed — in order to trick users into giving up passwords that have yet to be compromised. Be on the look out for these and don’t follow any links in suspicious looking emails – if you want to change a password go to the site directly.

Which sites are affected?
Most Google sites and services (including Gmail and YouTube – but not Chrome) were affected, as were sites maintained by Yahoo (including Tumblr and Flickr). Facebook was also hit by the bug although Twitter and LinkedIn were not.

Other big sites that have confirmed that they weren’t affected include Amazon, Hotmail and Outlook, eBay, PayPal and all of Apple’s properties — including iCloud and iTunes. If you want to check whether or not a site you use is still affected then you can do so here — just enter the URL.

Another big worry is for online banking, but thankfully we have some good news in that department. Lloyds, HSBC, RBS, Natwest, Santander and the Co-Op have all confirmed that they were not affected by the bug (they were using different encryption standards). Barclays has yet to issue a statement.

However, this does not mean that your credit card details are completely safe — as they could have been compromised via your Gmail or another third-party site. The security of mobile banking apps is still a developing situation as well.

So do I need to change my passwords?
In a word: Yes. For the sites we’ve listed above as being affected (including Gmail, Yahoo, Tumblr, Flickr, Facebook) it definitely won’t hurt to change your password some time in the next couple of weeks.

Although security experts have warned that you shouldn’t be too quick to change passwords, this is because not all website have patched their servers and changing your password before this happens could make matters worse. The sites we’ve listed above have patched their servers and if you want to check one we’ve not mentioned — click here and enter the URL.

Unfortunately, some sites (including Google) have specifically said that users don’t need to change their passwords. While it’s true that some sites are confident that they fixed the bug a while back, as most of us are guilty of changing our passwords less frequently than we should do (aka never) we think that this is as good an opportunity as ever to be a bit more security-conscious.

What should my new password be?
In lists of the most frequently used passwords online there’s some obvious clangers that we know you’re too smart to use (these include old standbys such as ‘123456’ and ‘password’ itself) but just because a password doesn’t look obvious to you that doesn’t make it safe.

This means that you shouldn’t really use any single words that are found in the dictionary, any words connected to you (place of birth or pets’ names), nor should you use any obvious ‘substitutions’ (eg pa55w0rd — more complicated variations are required) or patterns derived from your keyboard layout (eg ‘1qaz2wsx’ or ‘zxcvbnm’).

It’s wise to use a variety of characters in your password (including upper and lower case as well as numbers) but an easy way to get more secure is to start thinking of your password as a passphrase.

The easiest way of increasing the difficulty of a password is by simply making it longer — so try combining multiple words together and then adding in numbers between them.

You could pick a number of some significance to you (for example a loved one’s birthday, ie 12/08/1970) and then splicing this with a nonsensical phrase (‘shoesplittingwatchwizard’) to get a suitably difficulty password: Shoe12Splitting08Watch1970Wizard.

Other suggested methods for making a strong and memorable password include taking a sentence or a favourite line from a song as a starting point. So you might take the line “When you call my name it’s like a little prayer” and turn it into wuCmNilaLP. Madonna is optional of course, but we think this a fun method — especially if you can work in numbers somewhere.

You should also use different passwords for your different accounts (perhaps the most difficult piece of advice to follow of all) and if you want to be really secure you should also set up two-step authentication where available.

Ryan says: I recommend everyone on any of the sites mentioned in this article to change their passwords ASAP.

New Microsoft Word Zero-Day Used in Targeted Attacks

Microsoft warned on Monday of a remote code execution vulnerability (CVE-2014-1761) in Microsoft Word that is being actively exploited in targeted attacks directed at Microsoft Word 2010.

“The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer,” Microsoft explained in the advisory.

If successfully exploited, an attacker could gain the same user rights as the current user, Microsoft said, noting that users whose accounts are configured to have fewer user rights on the system could be less impacted than accounts with administrative privileges.

Applying the Microsoft Fix it solution, “Disable opening RTF content in Microsoft Word,” prevents the exploitation of this issue through Microsoft Word, Microsoft said.

Specifically, the issue is caused when Microsoft Word parses specially crafted RTF-formatted data causing system memory to become corrupted, giving a potential attacker the ability execute arbitrary code on the affected system.

“In a web-based attack scenario, an attacker could host a website that contains a webpage that contains a specially crafted RTF file that is used to attempt to exploit this vulnerability, Microsoft explained. “In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker’s website.”

The vulnerability could be exploited through Microsoft Outlook only when using Microsoft Word as the email viewer, Microsoft warned. By default, Word is the email reader in Microsoft Outlook 2007, Microsoft Outlook 2010, and Microsoft Outlook 2013.

Microsoft did not share any details on the attacks that leveraged the vulnerability, but did credit Drew Hintz, Shane Huntley, and Matty Pellegrino of the Google Security Team for reporting it to Microsoft.

 Source: Security Week