hack old iphone This Week In Security: Updates, Leaks, Hacking Old Hardware, And Making New. First off, Apple has issued an update for some very old devices. Well, vintage 2013, but that’s a long time in cell-phone years. Fixed are a trio of vulnerabilities, two of which are reported to be exploited in the wild. CVE-2021-30761 and CVE-2021-30762 are both flaws in Webkit, allowing for arbitrary code execution upon visiting a malicious website. The third bug fixed is a very interesting one, CVE-2021-30737, memory corruption in the ASN.1 decoder. ASN.1 is a serialization format, used in a bunch of different crypto and telecom protocols, like the PKCS key exchange protocols. This bug was reported by [xerub], who showed off an attack against locked iPhone immediately after boot. Need to break into an old iPhone? Looks like there’s an exploit for that now. Samsung’s Pre-installed Apps. Or if we were feeling less charitable, we’d call them bloatware. Either way, researchers at Oversecured took a look… and found some problems. First up is Samsung’s Knox Core app, part of their enterprise security system. This core framework file can install other apps, triggered by a world-writable URI. So first problem, anything that can load a file and call a URI can trigger an arbitrary app install. There is a second problem: part of that install process copies the app-to-be-installed to a world-readable location. This means that with a bit of work, any other app can abuse this to read any file this system app can read, and that’s all of them. Up next is the managed provisioning app. This too allows installing apps, but has a built-in verification system, as it was based on Managed Provisioning from the Android Open Source Project (AOSP). Samsung added features, one of which is a flag to disable the verification. Oh, and this one installs apps as system. “Please install my rootkit, Samsung.” “OK” And the last problem we’ll look at is the TelephonyUI app. It exposes a receiver, PhotoringReceiver, which takes two arguments: the URL to download, and the file location to write it to. This function does check that the remote server reports the file to be an image or video, but this is trivial for an attacker to spoof. The result is that an attacker can send an intent, download an arbitrary file, and write it anywhere on the phone as UID 1001, one of the system users. Volkswagen Data Leaks. Volkswagen has just confirmed that someone got access to a database of their potential and actual customers. Their letter states that a “vendor left electronic data unsecured.” Based on previous breaches, this is probably something like an Elsticsearch instance exposed to the Internet. So there’s good and bad news here. The good, if you only made it into their database as a prospective customer, only your name, physical and email addresses, and a phone number are exposed. The bad? If you were an actual customer, that could include driver’s license number, date of birth, and SSN. Watch out for targeted fishing using the information, though the more likely scenario is something like unemployment fraud committed using the information. EA Code Stolen. Though when it comes to source code, it’s not really theft, just unauthorized copying. Regardless, an unnamed group claims to be in possession of 780 GB of internal data and source code from EA, and is offering access for a mere $28 million. It’s unclear how the breach happened, but known bugs have been suggested, like the high-profile Microsoft Exchange bug from a few months back. Regardless, the dump includes the full source to FIFA 21 and FrostBite, EA’s engine. The really bad part is the collection of API keys and other secrets that were inevitably a part of the grabbed source. The Data of Three Million Machines. Researchers from NordLocker discovered a really big database of data, which appear to have been collected by a network of trojans. How did that malware wind up on real machines? Mostly through cracked software, it seems. An illegal Photoshop download, a Windows crack, and a handful of games. So think long and hard before you’re tempted to fire up you favorite torrent client, you might just be inviting malware in. The malware did quite a bit while it was active, too. It took a screenshot, as well as a webcam capture. Uploaded files from the user’s folders, captured and sent along passwords and cookies, and more. The whole trove of data seems to be 1.2 terabytes worth. Yikes. Apple vs The EU? If you haven’t noticed, a growing collection of people, companies, and now nations are taking issue with Apple’s walled garden approach to smartphone software. The ongoing litigation from Epic over the Fortnight game and the app store has perhaps the highest profile. But the European Union, thanks to their proposed Digital Markets Act (DMA), might soon enter the fray. This legislation aims to limit the power a digital gatekeeper can exercise over a market. Tim Cook recently gave his thoughts on the idea — not entirely positive. The biggest issue? The DMA would force Apple to allow app sideloading. The official response is that sideloading would “destroy the security of the iPhone.” Now let’s chat about that for a moment. Is it a bit iffy to install apps on your device that haven’t been vetted through the official app store? Sure. If you aren’t careful, you’re likely to install apps with malware, and not have a Google or Apple working to detect and automatically remove the malicious app. On the other hand, it seems just a bit over-the-top to say that this would destroy the iPhone’s security. There have been plenty of vulnerabilities found in the last couple years that can compromise the device from a simple page visit. Not to mention malicious apps that have made it into the store. Allowing you to install any application you wanted would break Apple’s stranglehold on the iOS app store. What this would mean, is that Apple would out on a whole lot of revenue from apps like Fortnight, who would be willing to build their own app store. So what do you think? Is this really the big security problem that Apple says it is, or are they just being protective of their walled garden and the benefits thereof? Hacking a Router. Sometimes, exploits aren’t notable for how serious they are, but for how educational the write-up is. Firmly in that category is this story of getting a remote shell on an ancient Linksys WRT54GL. Quick note, the “L” there stands for Linux, and this particular router exists because the WRT54G was the grand-daddy of custom router firmware. A request for GPL code for the original router led a few hackers to put together their own firmware images, and DD-WRT and OpenWRT were both born out of the efforts. Router revisions happen rapidly, and soon the WRT54G had switched to VxWorks, and cut the flash in half, making support just about impossible for the custom firmwares. Enough customers complained, that Linksys re-released the older version as the WRT54GL. History aside, [Elon Gliksberg] had one of the old routers, and decided to try to break in. Scan the ports with nmap , nothing interesting. The web interface? There is a diagnostic page that can send pings, so it probably runs a linux commands on the backend, so it’s worth trying something like ping 192.168.1.1; echo hello; That endpoint was sufficiently sanitized that it wasn’t a viable attack. A bit of decompiling did lead to one call of system() that could be abused, though. That call was in the post-upgrade logic, to restore the user-interface language. Set the language to some shellcode, and you get execution. From there, it was just the task of getting the reverse shell compiled for that specific device, and using the built-in wget to fetch it. So here’s the irony: this vulnerability is launched as part of uploading firmware, and this device is just about the most widely supported target for custom firmware in the world. You can install your own Linux image on it with the same access this hack requires. Irony aside, the value here is waking through the process, which is well written out, and full of tips for trying to find your own exploit. The WiFi Wart! A couple weeks ago, we covered a nifty new project, the WiFi Wart. Well [Walker] is still at it, and has an update on his progress. There’s good news, like finishing the design of the first prototype boards, sourcing the components, and actually assembling a trio of the test boards. Then there was some bad news, like discovering the hard way that the Low Dropout Regulator (LDO) he ordered was a 3.3 V component, instead of the needed 2.5 V. That’s one board with dead components, and time spent waiting on the replacement parts. Such is the way of things, when building new hardware. We’ll keep you up to date with this promising project, as updates are available. 6 thoughts on “ This Week In Security: Updates, Leaks, Hacking Old Hardware, And Making New ” The right answer for what apple should be doing here is obvious. Have a physical “switch” which must be moved to enable such sideloading. A waleld garden is not a morally acceptable software ecosystem, but there can be security advantages. Thus the sensible thing is to give users the choice, and ensure this choice must be made in a very explicit way which requires physical device acces. The “switch” in question could be buried behind a screw-driver accessed panel and involve desoldering an 0805 or larger resistor from between two pads. Anyone competent enough to do that procedure, which should be clearly documented but isn’t something you could do be accident, is clearly sensible enough to choose whether and when to sideload. Why have some test of “competence”? One of the smartest security guys I know, I wouldn’t trust to pick up a soldering iron by the safe end. I sure as hell trust him to choose his own apps though, fr wherever he wanted. If Apple’s security model is destroyed by allowing people to sideload apps, then their security model is too fragile to trust anyways. can we use those samsung holes to remove all the bloatware on the phone? Now that would be a hack! No need. You can remove all of the bloatware by installing LineageOS, which supports many Samsung devices. it would be nice to be able to just take things out rather than replace the whole thing… “Is this really the big security problem that Apple says it is, or are they just being protective of their walled garden and the benefits thereof?” C) All of the above. Apple is being protective of their voluntary walled garden. They also use that walled garden to provide an additional layer of security which many businesses are willing to pay for. Leave a Reply Cancel reply. Please be kind and respectful to help make the comments section excellent. (Comment Policy) This site uses Akismet to reduce spam. Learn how your comment data is processed. 5 Ways To Put Your Old iPhone To Good Use. If you have anything older than an iPhone 5S: congratulations. You have an old iPhone! Not that that is a bad thing, as those phones are still perfectly capable of doing most tasks. Indeed, had I not dropped my iPhone 4S into a river, I would likely still be using it to this day. Anyways, if you do decide to upgrade your smartphone, what happens to your trusty old iPhone 4/4S/5? One option of course is to sell it, but that is more difficult than it sounds. Sure, you could get a decent amount for your device if you find a buyer on Amazon, Craigslist, or Ebay. The only problem with that is that it takes time and effort on your part to make the sale, and there’s no guarantee that the buyer will be happy with your used device (if they find a scratch or defect for instance, they might ask for a refund). Another option is to sell it off to your cellular service provider or a company like Gazelle, but they will only give you pennies on the dollar. So, if selling your old iPhone isn’t the best idea, what else can you do? Keep it. Yup, even if you have a shiny new iPhone 6 or 6 Plus sitting in your hand right now, your old iPhone is still more than capable of performing other, less obvious tasks. Wondering what they are? Read on! 1. Turn It Into A Universal Remote. Since you are no longer using your old iPhone as a daily driver, you don’t have to worry about draining its battery or otherwise over-using it. Most cable companies have an associated app on the app store that lets you control their cable boxes with your phone, meaning you can use your old iPhone to control every cable-box-controlled TV in your home. It doesn’t end there either. Load Xbox Smart Glass onto your old iPhone, and use it to control your Xbox 360 or Xbox One without the need for a controller. Beyond that, there are several other electronic devices that can be controlled through your iPhone as well. See what you have, and then check if there is an associated app. You will find that the possibilities are nearly endless! 2. Turn It Into A Dedicated Camera. Old iPhones such as the 4 and 5 can be turned into compact cameras with the addition of a few third party attachments (like improved lenses). Even without such additions, you can still treat your old iPhone as though it were an advanced digital camera. Wipe its hard drive, and you will have tons of space to work with. Then, you can use it to shoot and edit videos, pictures, and more! Since your old iPhone is no longer your daily driver, you won’t have to worry about damaging it or putting it through too much use, and also won’t have to worry about clogging your storage with too many photos and videos. 3. Give It To Your Kids. Many parents buy their young children expensive tablets or other touchscreen devices to occupy themselves. Why not save yourself a buck and give them your old smartphone? It won’t have a cellular , so all it is essentially is a tiny tablet, perfect for children to consume content with. If you are worried about your children’s safety, you can even download apps that allow you to set parental controls, blocking content that you don’t want your kids to access. 4. Make It A Permanent Fixture In Your Car. Many modern cars these days are built with a central dashboard computing system included. Still, the majority of folks are driving cars that were made before these systems became commonplace within vehicles. You can address that by turning your old iPhone into a dedicated computer for your older car. All you need is a quality dashboard mount, and you are good to go. Once installed, your phone will perform about as well as any other dashboard computing system, as you will have access not only to your music, but to GPS-based maps as well. 5. Turn It Into An Advanced Flash Drive. Is one of your computing devices running out of space? Worry no more, as your old iPhone can assist you. Just download this app, which allows you to transfer files to your old smartphone over WiFi. This is a great way to put your old phone to good use, especially if you had a model with a lot of storage. Since you no longer need to use it as a daily driver, you can basically delete everything you had on it previously and use that free space to back up images, save documents, store movies, and archive music. Since you can transfer files over WiFi, you can even send files to your new iPhone from your old one, and vice versa. If you are an owner of the 16GB iPhone 6, that fact alone might make it worth keeping your old device around. What did you do with your old iPhone? Did you sell it, or find a creative way to get a few more years of use out of it? Give us your thoughts in the comments section below! How to Hack an iPhone. For a long time, iPhones were renowned for their impregnable walled garden design that could never be hacked. In fact, that was the major selling point of iPhones for a lot of people. However, that was years ago and now there are ways through which you can hack an iPhone very easily. Millions of people use these spying apps for iPhones to track the target iPhone’s data. You might be wondering why you never heard about any such working app. This is because most people who use a hacking app for iPhone have very personal reasons. To some people, protecting the security of their children in the online world is important. This is why, iPhone spying apps are a part of good and vigilant parenting, which is much needed in today’s world. Not only that, but hacking an iPhone can also help you protect your relationships by knowing that your partner is faithful to you. Very often, several successful relationships are ruined due to suspicion. Hacking an iPhone lets you know if there is any truth to your suspicions. Therefore, continue reading this guide to find out how to hack an iPhone and you are going to come out as a pro hacker: Table of Contents. Part 1: How to Hack an iPhone Remotely. Many people think that hacking an iPhone is going to be very tough, and they are not wrong on their part. When you try searching for an iPhone hacking solution, you will find countless results that claim to do wonders for you in this regard. However, when it comes to trying these solutions, most of them end up wasting your time by taking you through a series of clickbait on the name of human verifications and surveys. Therefore, it is important that you find the right tool for the job. Fortunately, here is a perfect app for the purpose: 1.1 Spyic- Best iPhone Hacker App on the Internet. After researching thoroughly for an iPhone hacking app that works as it claims, I hit a gold mine when I stumbled upon Spyic. Spyic is one of the most popular iPhone hacking apps in the world, used by millions of people all over the world. In fact, Spyic is so good that I have read its positive reviews in countless media outlets like PCMag, TechRadar, etc. At first, I was just as sceptical as you and thought it was simply big talk. However, after using Spyic’s every feature, there is nothing to doubt about this app. Spyic holds true to all that it claims and does even more. Here are some of the things you will love about Spyic: What Makes Spyic the Best iPhone Hacking App? There is no iPhone hacking app in the world that works even a tad bit better than Spyic. Believe me, I have tried to find one, but after hours of research, I failed. This is because Spyic has some unmatchable features that you won’t find anywhere else: Web Interface. You won’t need to download any app on your own phone or PC in order to use Spyic. Spyic can work through a web dashboard which opens in any web browser of your choice. Therefore, you can run Spyic on any device directly without installing apps. No Jailbreak Needed. Unlike most other iPhone hacking solutions, Spyic won’t ask you to jailbreak the target iPhone in order to hack it. This adds an extra layer of trust and security in using Spyic. Data Security. Talking about security, Spyic employs the most advanced encryption technology to ensure user security. Your private data is never stored on Spyic’s servers. Therefore, even Spyic’s own team cannot view it, let alone someone else other than you. No Technical Knowledge Needed. You won’t require any knowledge of programming or advanced computing in order to use Spyic. It is as easy as using your web browser to surf your social media accounts. There is no technical knowledge needed. This is just a glimpse of Spyic. In working, there are a lot of other cool things that I discovered about it. However, due to reasons of brevity, I cannot state each and every one of them here. This is why it is a good idea to use Spyic’s demo to learn about how it works. You won’t have to register or install any app in order to access Spyic’s demo. The demo works through the web just like the app itself. Hack an iPhone Without Being Caught. With Spyic, you will never get caught while hacking an iPhone. This is due to the unique design of Spyic that allows you to hack an iPhone without even touching it. Yes, that is true, not only you do not need to touch the other iPhone, you also won’t have to install any app on it. You can hack the iPhone even if it is in a whole other corner of the world. This is because of the genius architecture of Spyic. Since all iPhones come prebuilt with the iCloud feature, the complete data of the iPhone gets synced to the iCloud server. While you cannot access this data directly due to the encryption, Spyic can do it for you. You just have to verify the iCloud credentials of the target device and Spyic will give you their complete data extracted from their iCloud backup. This is another reason why Spyic stands as the undisputed best iPhone hacker on the internet. 1.2 How to Hack into Someone’s iPhone with Spyic. If you want to hack someone’s iPhone, you just have to follow these easy three steps. The whole process will take less than 5 minutes: Step 1: Register for Spyic and get a subscription plan for iOS devices. I suggest going with a longer subscription if you wish to avoid regular renewals. Step 2: Verify the iCloud credentials of the iPhone you wish to hack. Spyic will take a minute or two in order to sync the data. Step 3: You are all set to view the iPhone’s data. Click on the ‘Start’ button to finish the setup process. Once you click on the ‘Start’ button, Spyic will redirect you to your personal dashboard. You can use all of Spyic’s features through this dashboard. Every feature has its tab on the left hand side. Here are some of the cool things you will love doing with Spyic when it comes to iPhone hacking: Spyic’s Features. There are more than 35 features that you get with a Spyic account. Some of my favorite ones include: Message Monitor. You can monitor the text messages and even the iMessages of the other user with Spyic. Spyic also lets you view the deleted messages as well. Location Monitor. With Spyic’s location monitor, you can keep a constant eye on the other person’s whereabouts. You can also check their recent locations along with the timestamps. Geofencing. Geofencing takes location monitoring to the next level. With Geofencing, you can set boundaries on the target iPhone’s location. If the iPhone crosses these boundaries, you can an immediate alert. Call Monitor. With Spyic’s call monitor, you can get the incoming and outgoing call details of the other user. You can even record their phone calls if you like. If you want to check out the rest of Spyic’s features, be sure to give its demo a try. Rest assured, you will never regret using Spyic. Part 2: How to Hack Into An iPhone from A Computer. While hacking an iPhone is possible through your smartphone, it is not as convenient as doing it from a computer. Therefore, here is another method that will let you hack any iPhone directly from your computer. 2.1 Spyier- The iPhone Hacker From a Spy Movie. Spyier is the most widely used iPhone hacking tool in the world. In fact, I am sure that many people in your circle of friends might already be using Spyier (not that they will tell you about it). While Spyier can hack an iPhone as well as an Android phone, the iPhone hacker of Spyier is just what you need. Like Spyic, Spyier too does not require you to install any app on the target iPhone. You can hack any iPhone with Spyier right from your computer, without accessing the target iPhone even once. 2.2 How to Hack Someone’s iPhone Without Without Them Knowing. Hacking an iPhone with Spyier is a child’s play. You just need to make sure that you stick to this guide. Rest assured, you will have the data of the iPhone within a matter of minutes. Here are the steps to accomplish this: Step 1: Open any web browser on your computer and sign up for Spyier. You can use Spyier completely from this web browser to hack any iPhone. You won’t need to open any other app at all. Step 2: Verify the iCloud credentials of the target phone. Usually, there can be multiple devices associated with an iCloud account. Spyier will show you these devices, and you can choose the one which you wish to monitor. Step 3: Once the installation ends, the target iPhone will be already hacked with its data right on your screen. As I promised, this was indeed a child’s play. You will realize this too when you try Spyier for yourself. Part 3: How to Hack iPhone Passcode. There are times when you want to open someone’s iPhone but it is protected by a passcode. While Spyier and Spyic won’t give you any reason to access the target iPhone, they still offer you the passcode if you wish to unlock it. iPhone Keylogger. Both Spyier and Spyic come with the iPhone keylogger module free with the package. With the iPhone keylogger, you will get every keystroke that the user has made on their iPhone. This is not only limited to passcodes but even includes their search history, usernames, and passwords. However, if you just need the passcode of the target iPhone, your job will be done after using these apps. Endnotes. If you were wondering how to hack an iPhone, I gave you multiple ways to do it. Now the job remaining is on your shoulders- trying these apps for yourself. If you think you need to hack a beloved one’s iPhone, I suggest that it is something that cannot wait. Therefore, start hacking their iPhone in an instant now. 7 amazing hacks to breathe life into your old iPhone. What should you do with your old iPhone? Well, you could give it back to Apple or trade it in to your old network for a bit of cash, but the chances are that you’ll never get paid its true value. Alternatively, you could hold on to the device and keep it as a spare for when you inevitably drop your new phone and cobweb-shatter the screen so badly that even the guy in the Apple Store lets out a gasp. We prefer that last option, although you don’t have to let it sit idly in drawer. Instead, prolong its working life by taking inspiration from these 7 great uses for your old iPhone. Watch: iOS 10 tips and tricks. Reuse your old iPhone – Security camera. You don’t need to fork out a couple of hundred quid to keep your house secure. By just downloading a free iOS app such as Presence, you can turn your iPhone into a security camera. Presence will let your iPhone live stream video to any number of viewers, so you can always monitor your home. It’s also a motion-detection system that will send you a push notification if anything moves near your old iPhone. What’s more, it’ll work on models all the way back to the iPhone 3GS, so there’s a chance you might own more than one old iPhone that can be turned into a home security system for keeping an eye on your precious items. Check out this guide to how to turn your old iPhone into a security camera. Reuse your old iPhone – Retro games console. That’s right, you can use your old iPhone to play your favourite Mario games, and much, much more. It’ll take a bit of effort to get this one done right, though. You’ll need an iPhone 4S or newer, emulation software and the right cables to connect your device to your TV – or you can use AirPlay if you’ve got an Apple TV. You could even add an old-school controller, but that’s not necessary to play the games. The software is the tricky part. There are loads of different emulators available, and different ones emulate different consoles. There’s no do-it-all emulator, unfortunately. Reuse your old iPhone – Sat-nav. Don’t bother paying out for a sat-nav when you can just turn your old iPhone into a permanent dash-mounted navigator. To do this, your old device does need to have a network connection, so unfortunately you’ll have to pay for one again. Happily, a SIM-only deal with plenty of data is pretty cheap nowadays, so it’s unlikely to break the bank and we reckon it’s worth the benefits. Sure, you could just use your new iPhone for this job, but your older model can become your dedicated car device, saving the battery and data of your everyday phone. Your old iPhone makes for an even better car companion when you enable Find My iPhone, effectively making it Find My Car. Similarly, you can fill it with tracks for roadtrips or, even better, stream directly from Spotify or Apple Music. Check out this guide to how to turn your old iPhone into a sat-nav Related: i Phone 7 vs iPhone 6s – Should you upgrade? Reuse your old iPhone – Remote mouse or trackpad. This one’s a pretty easy hack. It only requires a couple of downloads and could be the solution to putting your computer at the heart of your home entertainment system. First up, you’ll need to download a mouse app from the App Store. Mobile Mouse comes highly recommended and is free, although there is a paid version with more features. Then you’ll need to download some software for your Mac or PC. Very quickly and easily you’ll have a phone you can use as a mouse as well as a mini keyboard. Check out this guide to how to turn your old iPhone into a mouse or trackpad. Reuse your old iPhone – Secondary monitor. OK, so this one is probably better suited to any old iPads you having kicking about, but that’s not to say it won’t work on your iPhone – especially if it’s the chunky 6S Plus. It’s a bit of a faff to set up and some of the software comes at a price, but having two displays can be priceless when working. Plus it’ll still be cheaper than buying a second monitor outright. Watch: iPhone 7 vs 7 Plus. Reuse your old iPhone – Baby monitor. Let your old iPhone help you keep an eye on your youngster. Simply download an app, set up the iPhone with its camera pointing at the baby and then live stream the video feed to your spanking-new iPhone 7. There are loads of apps available, so it’s worth taking a bit of time to work out which one will be best for you. Consider whether you’ll need it to work when not connected to Wi-Fi (using data via a SIM) as well as checking the privacy settings of the app. Check out this guide to how to turn your old iPhone into a baby monitor. Reuse your old iPhone – Smart home controller. Again, there are loads of apps – Manything, Bemo and Rico, to name a few – that let you turn your old iPhone into a smart home hub. The success of this project will come down to the number of smart objects that you own. If you love your Philips Hue light bulbs, smart thermostat and more, this could be perfect for you. We’re pretty big fans of IFTTT, which integrates all your smartphone features – and much more – into one app. Watch: The refresh – The best tech gossip this week. What’s your best hack for an old iPhone? Let us know in the comments below. 10 Hacks For Your Old iPhone – Don’t Dump it. If you haven’t yet sold or traded in your old iPhone you may have thought about just putting it in the bin, especially if it’s quite worn or scratched. However, even though your old iPhone is no longer connected to a network and may not even contain a sim anymore, it can still connect to wi-fi so there are some cool ways you can reuse it to make it useful. Using Old iPhone as a Flash Drive. If you’re in need of some external memory you can use your old iPhone as a flash drive to store your photos, videos and documents and move them between your computers. Use your iPhone As aa MP3 Player. Instead of loading your whole music collection onto your nice new phone, you could re-use your old iPhone as a dedicated MP3 player. You could connect it to bluetooth speakers at a party to make sure the tunes are playing all night long, or keep your old phone in your car to connect to the car stereo so you always have your favourite music when you’re on the road. Jailbreak Your Old iPhone. If you like to play around with your phone and try out new apps then jailbreaking your old iPhone will mean you can do some cool things and download new apps that otherwise wouldn’t be available, so you can use your second phone as a variety of useful and fun tools. Search online for the software to download for your phone’s iOS but bear in mind that jailbreaking will void your old phone’s warranty. Clock and Alarm. Set your phone up in a dock or stand and download a clock app such as the free FaceClock Analogue to recycle your old iPhone into a dedicated personalised clock and alarm. Alarm Clock Free is also a great app if you prefer to look at a digital display and it will also show you local weather and temperature information as soon as you wake up. Using Your iPhone As a Remote Control. Instead of filling your new phone with apps that control the gadgets in your home such as your heating or stereo, re-use your old iPhone and turn it into a dedicated remote control for your house by keeping all the apps on there instead. You’ll be able to control your gadgets from a single device without using up valuable space and power on your new phone. Why Not Use Old iPhone As a Baby Monitor. Turning your previous iPhone into a baby monitor is easy with the Cloud Baby Monitor $3.99 app which allows for audio and video streaming with night vision mode and the ability for you to talk to your baby through the app. Instead of paying for an expensive monitor, use your old iPhone on a wi-fi network instead. Use your Old iPhone As a Voice Recorder. If you like to take voice notes, keep track of conversations or record voiceovers for videos then you can recycle your old iPhone into a dedicated voice recorder using the inbuilt app or a free app like Voice Record Pro. Voice Record Pro will allow you to record in MP3 and MP4 plus export and import your files from services on the web. Ebook Reader. If you like reading ebooks then turning your old phone into an ebook reader is the obvious choice. You can download apps such as the Kindle app, read books on the built in iBooks app on your phone or download i2Reader for $4.99 which will give you a larger choice of readable formats as well as helpful options. Dedicated Centre. If you’re always on Skype to your friends, colleagues or clients then it makes sense to set up a dedicated Skype dialler so you can call and answer calls quickly and easily. This is simple when you have an old iPhone to reuse as you can set the phone up in a stand on your desk so it’s always in position. Use Your iPhone As a Scanner. Using your iPhone as a scanner to keep track of receipts and documents is easy as all you need is the phone’s built in camera. Mount the iPhone above a well lit area so that you can fit a page of A4 on the screen then just snap a photo any time you need to copy a document. You can then use email or a service like over wi-fi to send the images to your computer if you need to.