Imagine that police arrest an individual for a simple traffic infraction, such as running a stop sign. Under the search incident to arrest doctrine, officers are entitled to search the body of the person they are arresting to ensure that he does not have any weapons or will not destroy any evidence. The search incident to an arrest is automatic and allows officers to open containers on the person, even if there is no probable cause to believe there is anything illegal inside of those containers. What happens, however, when the arrestee is carrying an iPhone in his pocket? May the police search the iPhone's call history, cell phone contacts, emails, pictures, movies, calendar entries and, perhaps most significantly, the browsing history from recent internet use? Under longstanding Supreme Court precedent decided well before handheld technology was even contemplated, the answer appears to be yes.
Adobe Systems has scrapped the "send to FedEx Kinkos" print button in iAdobe Reader and Acrobat Professional, in the face of overwhelming opposition from America's printing companies.
Black Hat Users of Yahoo! Mail, MySpace and just about every Web 2.0 service take note: If you access those services using public Wi-Fi, Rob Graham can probably gain unlimited access to your account - even if you logged in using the secure sockets layer protocol.
If you're at all interested in VMware's Fusion software that lets you run multiple operating systems on a Mac, you may want to pony up for the code now.
A failure will not appear until a unit has passed final inspection.