Image: Getty/Zhang Peng Apple has released iOS 16.2, the latest software update for iPhone and iPad, which fixes multiple security vulnerabilities, including several that could allow cyber attackers to run commands and take control of devices. iOS 16.2 and iPadOS 16.2 contain several new features for iPhone and iPad users, ...
Read More »
Apple just released updates for the iPhone, iPad, Mac, Apple Watch and more: Here’s what’s new
June Wan/ZDNET Apple on Tuesday released iOS 16.2, iPadOS 16.2, WatchOS 9.2, and MacOS 13.1 along with new software for its HomePod and Apple TV lineup. The updates bring new features and capabilities to Apple’s hardware lineup ranging from the option to enable encrypted iCloud backups (a feature called Advanced ...
Read More »Apple brings the iPhone 14’s satellite-powered SOS service to Europe
Jason Cipriani/ZDNET Apple on Tuesday expanded its new emergency service, Emergency SOS via satellite, to customers in France, Germany, Ireland and the UK. Now, iPhone 14 users in those countries will be able to get in touch with emergency services, even if they’re outside of cellular and wi-fi range. Apple ...
Read More »This Linux-targeting malware just got more powerful
Image: Getty A cryptomining malware campaign that targets systems and cloud-computing instances running on Linux has added trojan malware to its capabilities – something that could make attacks more dangerous. Detailed by cybersecurity researchers at Trend Micro, such as several other cryptomining campaigns, this one is secretly compromising Linux systems, using ...
Read More »Burger King just taught iPhone and Android users a brilliant lesson
iStockphoto/Getty Images How often do you wonder about your life? more Technically Incorrect Every week? Every day? Every single minute? Clearly, the last option is the one most favored by famous startup founders. But for the rest of us, we slip into habits, prejudices, and opinions that aren’t always truly ...
Read More »This evasive new cyberattack can bypass air-gapped systems to steal data from the most sensitive networks
Image: Getty/Manuel Breva Colmeiro Cybersecurity researchers have demonstrated a novel method of cyberattack that could allow malicious hackers to steal information from some of the most well-protected computers. Air-gapped systems are isolated from the internet due to the nature of the information they handle. The idea is that by being ...
Read More »Honor Magic Vs hands-on: A foldable alternative to Samsung and Xiaomi
Honor is back in contention on the global stage, and the brand is picking things up right where it left off. The brand has released phones and tablets, and a new area of focus for Honor is foldables, where it made its foray last year with the Magic V. While ...
Read More »Burger King just taught iPhone and Android users a brilliant lesson
iStockphoto/Getty Images How often do you wonder about your life? more Technically Incorrect Every week? Every day? Every single minute? Clearly, the last option is the one most favored by famous startup founders. But for the rest of us, we slip into habits, prejudices, and opinions that aren’t always truly ...
Read More »This is the best way to add more ports to your MacBook or iPad Pro
Satechi USB-C Multimedia Adapter M1. Adrian Kingsley-Hughes/ZDNET I know we’re moving more and more to a wireless world, but I still need my ports. USB-C, HDMI, even a few USB-A ports are handy. This is why, as much as I love my new M2-powered iPad Pro, I find that single ...
Read More »How to locate a user’s GPG key in Thunderbird
iStockphoto/Getty Images Back in October, I wrote a piece about using encrypted email in Thunderbird. If you ever have to send sensitive information via email, you should be using encryption. If you’re not encrypting those missives, the information they contain can be read by a third party. You don’t want ...
Read More »