A testimonial from our iphone repair customer, Pooja Arora
Such a fantastic service experience. Cracked my iPhone screen. Called the guys at FYND, and someone came home within 3...
Posted by Pooja Arora on Monday, September 14, 2015
A testimonial from our iphone repair customer, Pooja Arora
Such a fantastic service experience. Cracked my iPhone screen. Called the guys at FYND, and someone came home within 3...
Posted by Pooja Arora on Monday, September 14, 2015
Taken from: https://www.facebook.com/getfynd/posts/1632461003701138
Just changed my cracked screen! Under 20 min!!!!
Friendly, fast and reliable service from Vicky! Thank
This article first appear in Mashable
Most iPhone owners know the heart-sinking feeling of watching their beloved device fall to the ground, seemingly in slow motion, as they sit by powerless to prevent a dent, broken screen or — worst of all — a plunge in the toilet bowl.
A brand new iPhone in particular seems to be a magnet for everything from minor scratches and scuffs to more serious damages, such as a dreaded cracked screen.
Luckily, there are measures you can take to prevent such tragedies. Below, we've spoken to tech experts and iPhone owners about the inventive ways they keep their devices safe, secure and scratch-free.
A large percentage of increasing the longevity of your iPhone comes from taking preventative measures, such as keeping up with software upgrades consistently and optimizing your settings to ensure that you aren't inadvertently draining battery or harming your device.
"There are three major areas [of your phone] to protect," says Jeff Clemmensen, the MiPhone Doctor of Fresno and an expert on iPhone maintenance and repairs. The first of these areas is battery life, followed by ports and screens, he says.
For preserving battery life, Clemmensen suggests reducing the amount of time you keep your phone plugged in and charging. "How often and when you charge your phone affects the battery life. [Many users think they can] charge their phones whenever without a downside. But what we see now is that when you're constantly charging your phone, the battery never gets a chance to rest. In extreme cases, this can cause the battery acids to produce gases that expand the battery and reduce its life. It can also place pressure on the back of the screen assembly and make it more susceptible to breaking," he says.
There are also some measures you can take to optimize your phone's battery life, such as not using the device while it's charging, letting the battery drain down to 5% before plugging it in and reducing the use of "battery killer" apps and functions, including GPS or video streaming.
In addition to preserving battery life, below are a few suggestions for how to most effectively maintain your iPhone.
One of the first things you should do after purchasing a new device is affix a screen protector. Follow the directions for adhering the protector so that no bubbles form and so that it is securely applied. A new, sturdy case is also a must, particularly when purchasing a new device.
If you're prone to keeping your phone on hard surfaces, turn off any sort of vibrating notifications. If your phone is precariously perched on a table or railing, the vibrations could cause it to fall off.
Protect your ports by gently cleaning them every once in a while. "An old toothbrush and a little rubbing alcohol go a long way. Use a small amount of alcohol on the brush and then lightly brush grime away from the openings," suggests Clemmensen. "Do not pour alcohol into the device," he adds.
Clean your phone daily with a dedicated screen-cleaning solution and a soft microfiber cloth that won't scratch the surface. Not only does this help keep your phone looking shiny and new, it's a good idea from a hygiene perspective (many smartphones house more germs than a toilet).
Sometimes, keeping your phone screen intact and the exterior scratch-free comes down to simple common sense. Don't keep your phone in your back pocket, for example — nearly one in five smartphone users drop their phones in the toilet at some point, in case you wondered about the statistics — or precariously balance your phone on a balcony ledge when you're trying to set up the perfect city-scape Instagram. If you live an active lifestyle or have your phone consistently on your person, take proper measures to protect it with a case, screen protector, etc.
If you're outside and in direct sunlight often, or leave your phone in a hot purse or car, you're risking overheating your device — which can be harmful for your phone in both the long and short-term. Luckily, your iPhone will warn you if it's becoming overheated. "Remember, if your phone feels hot on the outside, it's hot on the inside," says Clemmensen. Make sure your phone is protected by some kind of shield from the sun if you're hanging out outside or sitting in a hot car.
Another high-risk place for your iPhone is inside a purse or bag that doesn't have a dedicated smartphone pocket. "If you put your phone in the same pocket or purse compartment that you keep coins or keys in, you're asking for a scratched screen," says Jeremy Irons, a design engineer at Creative Engineering, a product development firm in New York. "To best protect your screen from scratches, the main thing you can do is keep it away from metal, or anything that is harder than glass."
It's also a good idea to avoid distracting situations in which you're more likely to fumble or drop your phone. For example, if you're a multitasker who consistently finds yourself balancing your phone between your shoulder and ear while on a call, while simultaneously washing dishes, walking the dog or getting in a workout, consider purchasing a hands-free device or putting your call on speaker.
There are many products on the market that adequately protect your devices without detracting from the sleek aesthetic appeal that Jony Ive and Steve Jobs worked so hard to create. The type of case you choose for your phone will depend on personal preferences, but make sure that some key areas are covered and protected.
"When your screen cracks after dropping your phone, notice how the cracks usually spider out from one of the four corners," says Irons. "This is because the corners are the points that will always hit the ground first because they stick out farther than the flat sides." He suggests that iPhone owners choose a phone covering that is equipped to adequately protect these sensitive areas.
In addition to protecting your phone's exterior, consider purchasing an armband for running or your daily commute, especially if you're consistently pulling your phone out of your pocket to check emails or browse through apps. Look for a model that will allow you enough room to keep your phone's protective screen cover or case on while exercising for added security.
"For screen protection, the best defense is a great offense. Keep it off the ground," says Clemmensen. "However, if it's too hard to hold onto all the time, we insist on a case and screen protector."
It's easy to forget that our phones are $600 devices — that is, until you're walking into the Apple store to shell out a hefty sum for repairs. Your phone is an investment; treat it as such. Taking simple precautions and performing regular maintenance can help you squeeze extra weeks or even months out of your device.
How do you protect your iPhone? Tell us in the comments.
Very impress with the service! By far, the most epic good service provider! Price is competitive, technican (Sky) is super competent. Thumbs up!! WIll reco my friends if they need such service!
Posted by Ang Kian Wee on Wednesday, July 8, 2015
A testimonial from Ang Kian Wee, a happy customer who repaired his Samsung Note 2 phone:
Very impress with the service! By far, the most epic good service provider! Price is competitive, technican (Sky) is super competent. Thumbs up!! WIll reco my friends if they need such service!
PMed and messaged Fynd, very impressed by the fast response on my queries... Fixed an appt online and received a call to...
Posted by Joanna Chia on Wednesday, September 2, 2015
PMed and messaged Fynd, very impressed by the fast response on my queries... Fixed an appt online and received a call to confirm a date and time... The technician James arranged on time, chatted and asked ant other mobile repair queries while he fixed my boss' cracked iPhone 6+ screen fat and efficient... The payment link was rather slow though, came via sms but convenient as payment was thru PayPal and received the e-invoice the next day... Thumbs up for the great service and will fix an appt to replace my iPhone/iPad batteries soon... Thanks again to Fynd and James...
Testimonial from our Customer Vivian Yow, Manager at Renergy Engineering LLP
Fynd provide door-to-door service it save my time,and i want to thank you Vicky, she is a nice lady very professional....
Posted by Vivian Yow on Friday, August 28, 2015
Fynd provide door-to-door service it save my time,and i want to thank you Vicky, she is a nice lady very professional. My iPhone 6+ have very bad screen cracked and others problem and Vicky explain to me and it solve my problem they service quick and they charge are fair and i satisfied with they service. Thank You Fynd & Vicky, thumb up for you and please always keep the services standard like what your have .
f you are CLUMSY and BUSY like me, and happened to land yourself with a shattered iPhone screen whilst jogging, do check the screen fixing service out Fynd.
Benefits:
-You pick a timing and place at your own convenience
-They come to you to fix your phone! GENIUS
-Reasonable pricing as compared to the rest. ($132)
-Vicky (the lady who fixed my phone) did the job in less than 20 min, professional service and friendly. She probably could have done it way faster if I didn't ask her so many questions.
Yay to no more shattered screen!!
#fynd
Cloud computing is on the rise, as it has become a virtual storage pace for millions of users around the globe. The number of cloud users increases every year and is expected to rise even further in the coming years. The cloud has become a place where all our data is stored so that it can be accessed from anywhere in the world. Now even our office documents, personal pictures, IDs and confidential papers are stored on the cloud over the internet. Since the information is stored virtually, security is a major concern for many users.
Even though there are many laws all over the world, none of them can be held legally binding over information that is virtual. Since information is stored over servers of one country and accessed elsewhere, no one can be sure what law to apply to this cross border flow of communication. However, there are some ways that cloud data can be protected by the users themselves.
To keep the data secure on the cloud and prevent it from easy access, users need to decide how confidential the information is and then choose a method of privacy. Paying for cloud protection is the most trusted way to keep it safe from access. However, any of the above mentioned methods can be used to keep cloud data safe.
Computer crime is any criminal activity that involves computers. In such crimes, the computer is used as a means to carry out the crime. Net-crime is abusing the internet for criminal means. Cybercrime is a combination of both, and is generally defined as immoral acts, which target an individual or a group of individuals with a criminal intention to destroy the individual’s reputation, inflict mental turmoil or cause physical harm. This may be achieved directly or indirectly with the help of modern communication methods including email, chat rooms, social media networks and mobile phone communication.
To simplify the definition, cybercrime includes any unlawful activity, which makes the use of a computer as the means to perpetrate it. The U.S. Department of Justice has amended the definition to include any unlawful activity that employs a computer for storing evidence. Cybercrimes
Cybercrime can be classified into two sub-categories based on the definition. The first one includes crimes where the computer is the target, malware, viruses or denying service attacks. The other category is crimes that use computer devices or networks as a means of facilitation. Examples are cyber-stalking,
The scale of
Cybercrime now includes activities whose repercussions ripple across international borders, and which can be described as a global epidemic. The international legal system has laws to protect victims of
In most cases, the victims of
The importance of international cooperation cannot be stressed enough for finding a solution and effectively responding to global cybercrime. Every nation cannot stand alone in this fight. Most computer-related crimes are started “off-shore” which complicates the problem as the territory does not lie within a nation. Agencies from all over the world should band together to draw up a plan to locate and follow the criminal eventually leading to an arrest and prosecution.
Testimony from Edwin Kheng, Senior Associate Group Director of OrangeTee.com Pte Ltd
Taken from: https://www.facebook.com/edwin.kheng/posts/10205396965856576
Before AfterAll within one day! Cracked my iPhone at 11am. Repairman came to my house to repair at 9pm. Voila. Done! I highly recommend them! You only pay via paypal after the repair, which comes with a one month warranty. Go to getfynd.com/phone if you ever drop your mobile phone and crack your screen. They also do other handphone/laptop repairs.
Testimonial from Mr Louis Ng, Founder & Chief Executive of Animal Concerns Research and Education Society (Acres)
Taken from: https://www.facebook.com/LouisNgKokKwang/posts/1181994191827722:0
Dropped my phone today and the screen cracked! But along came my saviour Vicky (from www.getfynd.com) who repaired it!
Full SALUTE to Vicky who is a single mum and who learnt how to repair phones by watching youtube videos. Enjoyed talking to her and her
And thank
Mobile phone applications are not just for big businesses and organizations like Walmart; more and more mid-level and small businesses are now investing in this trend, as it is more effective than having a mobile-friendly website. Every company is prepared to take this step to up their marketing game and now coffee shops as well as beauty salons have an application dedicated to their customers. Here are some of the benefits of getting a mobile app for your business:
On average, Americans spend more than two hours every day on their mobile devices. Even though they may only use some of the apps during this time, they still have to unlock their phone and scroll through the screens or scan the page for their favorite app. While browsing, the user’s mind can unconsciously register your app if its logo is eye-catching. This way your business is always in the back of the user’s mind.
Your business’ application has many functions; it can provide general information, relay the prices, and allow users to search for a product, interact with others and get news alerts. With a mobile app, you can make sure your customers receive news of every important sale and promotion. This can be achieved by sending push notification through the app or creating a live news feed. Any important information and reminders that you would like to give your customer can be sent through this channel as well.
The mobile application can improve the loyalty program by making it digital. This is a step up from the old point-collection system as now the rewards are collected in the app and users can view their points or avail rewards any time they want. It is more convenient, as it removes the need to visit the company office to receive the reward. In addition, more customers will download the application and return to you because of the additional value being provided.
To increase general awareness regarding your business, a mobile app is the way to go. The app is like an advertisement for the business. It can be modified and reformed to make it exactly how you want it to be perceived: cool, fun, stylish or helpful. The most important thing is to create an app loaded with features that will be appreciated by your customers as well as making sure it is beautifully designed and promotes the brand.
The app needs to be designed in such a way that it involves the users as often as possible. This will increase their inclination towards buying your product. This strategy is referred to as “effective frequency” which basically states that your brand needs to be seen or heard around 20 times before it will actually get noticed by a potential customer.
Every business, whether it is a flower shop or a bakery, needs a medium through which their customers can communicate with them. The mobile app for your business can incorporate a messaging service or help feature in it to improve customer care and aid communication. More people prefer to communicate through text rather than call, which is why an app will appeal to them as they can lodge their complaints or send their queries by messaging.
Cloud computing is essentially a practice through which data can be hosted, stored, managed and processed on a network of remote servers as opposed to on a local server or a personal laptop or computer. This practice allows applications to be operated by use of the Internet, allowing an individual to access any data he or she saves on that remote network of servers, or ‘the cloud,’ from anywhere as long as one has an internet connection.
Some common household names in regard to cloud services available to the general public include Google Drive, Dropbox, Box, Microsoft OneDrive, and Amazon’s Web Services. Each has various offerings with packages starting from a basic free service to a monthly paid service offering additional storage options. Some taut their accessibility with various products types, while others use highly encrypted security feathers to set themselves apart from the competition.
As more and more individuals and businesses are working remotely in today’s internet-enabled globalized economy, businesses and users have greatly benefited from the use of cloud computing to facilitate collaboration, productivity, and efficiency. With the advancement of tablets and smartphones, it will be even more beneficial. The Cloud has recently been leveraged to boost the overall learning process both from an individual’s perspective as well as that of companies looking to deliver learning and development tools over the cloud.
Imagine that you are working in a group setting for a class project. There are different individuals that are keeping their own different notes. That no longer is the case. You can have a single document share over the cloud that all the members of your group can access and update simultaneously with their input. This level of collaboration over the cloud has allowed for huge gains in productivity, allowing for updates by users from anywhere in the world at anytime reducing the need for face-to-face meetings or other forms of set timelines to collaborate for updates.
Let’s take another specific example, one where the individual has to do research with large amounts of data. Historically students may only be able to conduct such forms of data analysis via college servers requiring a lot of computing power. However, of late they can utilize various cloud companies’ server space basically over then net run their computation analysis using the cloud’s server space and computing power to crunch that data and simply have the results of their experiment or thesis delivered to a professor by simply providing a web link as opposed to a thick stack of papers to review.
What about a layman? Someone who is not in school collaborating on a book report or doing any extensive data mining research? One can be reading something and see something very useful worth make a note of. What would he or she use? A notepad? Maybe save it on one’s desktop? What if it’s the office desktop and that person wants to refer back to it when back home, or vice versa? What if it’s something he or she read on a smartphone but wanted to share it with someone else? An individual can easily clip that information and paste into a document saved on the cloud and give sharing rights to others to view it. There are specific cloud applications built to do just that.
As time goes on, the internet has become much cheaper and accessible for individuals with better speeds. Similarly, tools on which to use the internet have become a lot more ubiquitous, e.g. smartphones and tablets. This has ushered a new wave of accessing any type of information to boost learning at anytime from anywhere.
Whether you own a small business or a big one, you need to be able to access your work files and records conveniently. In order to assess whether wireless networks are the right choice for your business, consider the following pros and cons:
Wi-Fi is easy to install- you can even do it yourself. However, to ensure that there is proper wireless coverage in your area as well as tight security settings, it is recommended that you have it installed from a professional. Wi-Fi is actually the preferred option over Ethernet by businesses and individuals alike.
The cost for purchasing the equipment for wireless networks is low, as there is a large variety to choose from as well as their easy availability. Depending on the usage in your workplace, especially if it is to be used by more than a few people, it is recommended to opt for commercial routers, which are slightly more expensive but worth the investment. You should also have signal amplifiers installed for better speed.
The biggest advantage of a wireless network is that you can access your files anywhere and are not bound by place and device. You can access the data through your phone, tablet or laptop from anywhere at all.
The hard truth is that Ethernet beats wireless every time! There are no ifs, ands, or buts about it. The best that can happen is the margin by which Ethernet beats wireless. Although speed levels via Ethernet will depend on the quality of the Ethernet cable but a Cat-6 cable is capable of delivering speeds of up to 10 GB/s. For Wi-Fi on the other hand, this has improved by leaps and bounds over the last few years; the speed you receive may not depend so much on your internet connection but your Wi-Fi router. We have gone from the 50-something MB/s speeds of the 802.11g standard of Wi-Fi to the speeds of almost 1 GB/s via the 802.11ac standard. The bottleneck of course, is not the Wi-Fi standard but the routers used to deliver the Wi-Fi, which are capped at about 150-300 MB/s, unless you use the most up to date 802.11ac compatible devices available on the market.
There is also the issue of latency between Wi-Fi and a wired connection, which basically is point the points between which the internet signal has to bounce, also known as the number of ‘pings,’ between the router to your device. Wi-Fi has higher latency compared to Ethernet, thus Ethernet will be faster even if they both have equivalent data transfer infrastructure as a result of latency.
Another drawback is wireless inference which Ethernet is not subject to but you Wi-Fi connection will be due to the many issues such as other devices used in your Wi-Fi network, other individuals using the Wi-Fi spectrum in your neighborhood, etc.
Wireless networks have become very popular, especially for their mobility. This is why you may find several other networks in your place of business or work to be well in range. Wireless setup is considered a basic operating need due to its continuous rise with among businesses and homes. Furthermore, newer technologies are being developed increasing the overall bandwidth which serve Wi-Fi at speeds demanded by consumers and required for businesses.
Hard drive of a computer is considered the brain of the machine. It stores all files and information processed on your PC so that they may be accessed later if needed. Recovering files from a hard disk that is not functioning properly can sometimes be tricky and time consuming, but all effort does no go in vain as it is possible to recover data in most cases.
Often times there is simply a boot failure of the hard drive. In such cases, one can take the hard drive and use it as a secondary drive for another PC. This can be done through a USB universal drive adapter. On a Mac, this process is simpler and can be done in a different way. For Mac computers, a working one and a non-working can be connected using a Firewire cable. The next step is to “target boot” the non-working Mac machine by holding the T button. By doing this, the failed hard drive files will appear on the working Mac. However, this is only the case where hard drive is not corrupted.
Two reasons why drives usually crash is because of logical and mechanical failure. Logical failure happens when the hard drive is physically sound, but accidental formatting or corrupt files prevent it from seeking its own data. In this case, the files do exist on the drive and are recoverable.
In mechanical failure, there is some sort of physical damage to the hard drive and it makes sounds. In such cases, the data can be recovered but only with the help of experts who charge a lot of money. Data recovery charges vary from around $150 to $2500, depending on the severity of the case.
When a file is deleted from your desktop and cannot be found in the recycle bin, it can still be recovered using software. Recuva, restoration, disk drill, undeleted plus, free undelete and photorec are some software that can help one in recovering important data. These data/files can only be restored if they are not overwritten. Several programs have been created by companies to recover lost data.
Sometimes the hard drive head gets stuck. If it is being recognized as a USB device but needs initiating and starting, it is a sign the head is stuck and this matter can be resolved by giving it a hard nudge near the cable corrector. However, this method is not recommended always and can result in data loss instead of recovery.
EaseUS Data recovery wizard is a method that can help recover files from a corrupted hard disk. The first step is to launch the wizard and select the files that need to be recovered. Next, scan the hard disk to find all the targeted files. Once all the files are visible, the “recover” button can be pressed to bring the files back. The files can then be backed up onto another disk for future reference.
There are many data recovery companies that can assist in recovering deleted data and files from your computers. However, they are very expensive and charge a lot. The best method is to try to recover files on your own before calling in the experts.
Our technical co-founder, Albert Tirtohadi, shared on Meteor Meetup Singapore group on how to create an Android cordova based mobile app and package it into a production APK.
The source code is available at Git Hub: https://github.com/tirtohadi/demomobile
The slide deck can be downloaded here
If you have started the Getting started with Meteor, you will probably are familiar with the following steps. Create a new meteor project and make it into a meteor app.
It will create the basic app meteor app with a button and a counter that will increment whenever you click the button. You will be able to run it on an android emulator on your development machine
Let's make things a little bit more interesting by adding a button that will access the camera and are able to take a photo and display it to the screen. The code for the camera feature is shamelessly borrowed from this tutorial
First of all, we need to add the mdg:camera package to our project, and then create a template that will activate HTML5 camera function. This is done through calling MeteorCamera.getPicture method from the package. After taking a picture, we will store the image into a session variable, and reactively display the session variable through a template helper.
Next, we want to be able to generate a APK that can be installed into a real android device. It will be a lot more fun to take photos using a real device instead of in an emulator. A lot of the documentation out there for generating APK is using the Android Studio for native app. As a meteor developer, I personally prefer not to install Android Studio just to create an APK. Another option is to build the APK using command line tools.
There are a few steps that you need to do. First of all you need to generate a keystore file to store your private key. You only need to do it once. Afterwards you build your meteor app and an unaligned apk will be generated. You will need to sign the apk with your private key and verify it. Last step is to zipalign the apk so that it is memory efficient. Then your APK can be installed into an android device. A more detailed documentation is taken from here, just go to the bottom section, which says Signing Your App Manually.
That's it you are done! A point to note is that you can specify your app information, icons, splash screens and preferences in a file called mobile-config.js, you can place it at the root folder of your project.
You have a slow and laggy iPhone or Android? It can be very irritating. One common reason is due to Whatsapp. Well, it is not the Whatsapp app itself, but rather the photos and videos that is accumulating and eating up your phone storage. We are constantly sending pictures and videos among friends and family members, especially during festive seasons and special occasions. Your phone will be buzzing with incoming pictures and videos. These pictures and videos are automatically downloaded to your phone and eating up space. Before long, your device will run out of space and starts to lag.
One long-term solution to stop this to disallow Whatsapp from automatically download images and videos sent to you. You can control which image and videos you would like to download.
Here are the steps for iPhone:
While on Android the steps are just slightly different
You can choose, which media you want to download as you receive them, and you will be able to save more space on your phone.
Happy Birthday Singapore! We LOVE you!
Cloud desktop or an online desktop, as some would like to call it, takes all the business apps that are essential for operating a business and moves them into hosted apps. Hosted apps are found in data centers online. Thus, all business apps can now be accessed online from anywhere in the world. Hosted desktops make it possible for a business to access its company data over the internet through a safe and secure connection to a cloud desktop.
Hosted desktops have greatly revolutionized the way businesses operate as now all companies need to do is provide laptops , tablets and an internet connection to the entire team. The need for buying servers and installing software has been eliminated by this new technology. With more and more companies adopting this method, businesses cannot ignore the up rise of cloud computing anymore. There are many reasons why a hosted desktop is beneficial for a business:
A hosted desktop thus provides major benefits to business and is becoming a need in today’s world. Employees benefit from greater access to data and greater sharing and collaboration with anyone globally. Businesses save up on expenditures and benefit from increased employee satisfaction and the convenience of operating business online, from any location.
This article first appear in TechCrunch:
Image courtesy of TechCruncht’s Black Hat season, meaning that we are getting a new batch of zero-day exploits showing how insecure our gadgets are. Xeno Kovah and Trammell Hudson found a serious zero-day vulnerability in OS X letting malware creators completely brick your Mac without any way to reset it to its factory status. Apple told The Guardian that it is working on a fix for both Yosemite and El Capitan.
This zero-day exploit dubbed Thunderstrike 2 targets your Mac’s firmware thanks to an attached Thunderbolt accessory, such as an Ethernet adaptor or an external hard drive. After receiving the code via a phishing email or a malicious web site, malware code could look for connected Thunderbolt accessories and flash their option ROMs.
If you reboot your Mac with this infected Thunderbolt accessory plugged in, the EFI will execute the option ROM before booting OS X. As this option ROM has been infected, it will execute malicious code infecting the EFI itself. For example, it could simply make your Mac’s firmware refuse to boot OS X, turning your Mac into a useless machine. And if your firmware is compromised, there is no way to boot OS X, update the firmware and remove the malicious code.
The best part of this zero-day vulnerability is that your Thunderbolt accessory remains infected. If you plug your Ethernet adaptor into a new Mac, this Mac will get infected as well when it reboots. It’s not as harmful as malware that spreads through the Internet, but it could make some serious damage in an office environment for example.
Stefan Esser found another exploit last month dubbed DYLD. This time it lets malicious developers gain root privilege. It could be used to format your hard drive, but also for more lucrative exploits.
Malwarebytes already spotted an adware creator who uses this zero-day vulnerability to get root permission and then execute a script to install a bunch of applications — the VSearch adware, the Genieo adware and the MacKeeper junkware. It also makes the Mac App Store unusable at it will endlessly prompt you to install Download Shuttle.
Apple already fixed DYLD in El Capitan’s beta but not in the current Yosemite version. It has also added applications using these exploits to its malware blacklist, but it’s just a temporary cat-and-mouse fix. The company will issue security patches for both OS X Yosemite and OS X El Capitan beta. In the mean time, be careful when you download something and unplug all your Thunderbolt devices before rebooting your Mac — just in case.