Search results for: “security”

  • Important Update: iOS 18.3.1 fixes critical security flaw

    Important Update: iOS 18.3.1 fixes critical security flaw

    Apple just released a new update for iPhones and iPads, and it’s really important to install it right away. This update, called iOS 18.3.1 and iPadOS 18.3.1, fixes a big security problem that was being used by hackers.

    According to Apple, this security issue could let someone with physical access to your device turn off a safety feature called USB Restricted Mode when the device is locked. This means someone could plug things into your phone or tablet even if it’s supposed to be secure.

    Apple explains that this issue was part of a very smart and specific attack aimed at certain people. They’ve fixed this by making the way the device handles its security states better. If you have an iPhone or iPad that can run iOS 18, you should update to iOS 18.3.1. For iPads that can’t update to the latest version, there’s also iPadOS 17.7.5 which includes this important fix.

    Updating your device will help keep your information safe from people who might try to use this vulnerability. Make sure to update your device as soon as you can to protect yourself from these kinds of threats.

  • Security issues in DeepSeek app for iPhones

    Security issues in DeepSeek app for iPhones

    The DeepSeek app, which quickly became one of the top downloads on the Apple App Store, has been found to have several serious security issues.

    Past Concerns with DeepSeek

    DeepSeek caught everyone’s attention when it suddenly became the most downloaded app for iPhones. AI experts were amazed because it worked well even on phones with less powerful hardware. This led to a drop in stock prices for some big AI companies in the U.S.

    However, soon after, questions about privacy and security started to come up. Privacy regulators in Italy and Ireland began to question if the app followed European privacy laws, while U.S. officials looked into possible security risks. A major slip-up was when DeepSeek left a database unprotected, spilling over a million lines of user data, including private chats and secret codes.

    New Security Flaws in DeepSeek App

    NowSecure, a company that checks mobile app security, found that DeepSeek has turned off a key security feature on iPhones. This feature, called App Transport Security (ATS), makes sure that private information is sent safely. With ATS off, the app sends data without protection, which could be seen by anyone.

    The data might not look dangerous by itself, but when you put a lot of these pieces together, you can figure out who people are. This was shown in another case with Gravy Analytics where similar data was used to identify millions of people.

    Also, the app uses an old and weak method of hiding data, known as 3DES, which isn’t good enough to keep information secret anymore.

    Espionage Risks

    The app collects lots of little bits of information which, if combined with data from other apps, can be used to pinpoint specific users. For example, if someone is using DeepSeek on an iPad connected to a special network used by emergency services, they might become a target for spying.

    The report from NowSecure strongly suggests that the DeepSeek app for iPhones isn’t safe to use, and it warns that the version for Android phones might be even worse.

  • New security holes found in Apple’s devices

    New security holes found in Apple’s devices

    Security experts have found two major issues, named SLAP and FLOP, that affect all new iPhones, iPads, and Macs, including many older models. These flaws could let someone peek into what’s open on your web browser.

    What Are SLAP and FLOP?SLAP and FLOP are types of security problems discovered by researchers at the Georgia Institute of Technology. They are similar to famous security issues like Spectre and Meltdown. Both rely on a technique called “speculative execution,” where the chip tries to guess what you’ll do next to speed things up. If this guesswork goes wrong, attackers might sneak in bad data to see things they shouldn’t.

    The Dangers of These FlawsNormally, each tab in Safari is like a locked box, keeping its contents separate from others. But with SLAP, if you’re tricked into visiting a bad website, it could open those locks. It could potentially read your emails, track your location on Apple Maps, or check your bank details.

    FLOP is even trickier; it can do the same thing but also works on Chrome, making it more dangerous. These attacks don’t need any harmful software on your device; they use weak spots in Apple’s own system, making them hard to spot.

    Which Devices Are at Risk?These security issues affect any Apple device with chips from the A15 series or the M2 series and newer. Here’s a list of affected devices:

    • iPhone: iPhone 13, 14, 15, 16, and the third-generation iPhone SE.
    • iPad: iPad Air, Pro, and mini models released from 2021.
    • Mac: MacBook Air, MacBook Pro since 2022; Mac mini, Mac Studio, iMac, and Mac Pro since 2023.

    Real-World Threats?So far, there’s no proof these vulnerabilities have been used against users in real life. Apple has acknowledged the problem and has been working on fixes since they were alerted in May 2024 for SLAP and September 2024 for FLOP. Apple’s statement to Bleeping Computer suggests they don’t see these as urgent threats right now.

    The best advice for now is to be careful with the websites you visit until Apple rolls out a fix.

    Source

  • Apple plans to fix security holes in Safari and Chrome for new devices

    Apple plans to fix security holes in Safari and Chrome for new devices

    Students from Georgia Tech have found two new security problems in Apple’s latest chips. These issues, called SLAP and FLOP, could let someone peek into your private internet activities like browsing history, credit card details, emails, and even where you are, just by using a bad website. You don’t need to touch the device to make this happen; a harmful webpage can do the trick by getting around Apple’s safeguards.

    These flaws affect several of Apple’s newer chips:

    • Mac laptops from 2022 onwards
    • Mac desktops from 2023 onwards
    • iPads made since 2021
    • iPhones from 2021 models onwards

    These vulnerabilities were reported to Apple back in May and September of last year, but they haven’t been fixed yet. Apple has promised to patch these security issues soon.

    Apple has shared with Bleeping Computer that they haven’t fixed these problems yet, saying, “We appreciate the researchers’ teamwork as this test improves our knowledge of these risks. We think this doesn’t present an immediate threat to our users.”

    SLAP only affects the Safari browser, while FLOP can hit both Safari and Chrome. They haven’t checked if other browsers like Firefox might have the same problem. There’s no sign yet that these attacks have happened out there in the real world. For more information on how these attacks work, you can check out the dedicated website that explains everything about SLAP and FLOP.

  • Navigating the Digital Labyrinth: A 2025 cybersecurity reading list

    Navigating the Digital Labyrinth: A 2025 cybersecurity reading list

    The digital landscape is in constant flux. From debates surrounding social media regulation to emerging hardware vulnerabilities and the ever-shifting terrain of internet governance, staying informed about cybersecurity is more critical than ever. This year, I’m diving deep into the world of digital security, and I wanted to share my growing reading list and recommended resources for anyone embarking on or continuing their journey into Apple security in 2025.

    This exploration comes after a particularly eventful period. Recent headlines, including discussions around social media platform restrictions, newly discovered hardware vulnerabilities, and renewed debates on net neutrality, highlight the dynamic nature of the digital realm. It’s a reminder that constant learning and adaptation are essential in this field.

    For those serious about understanding the intricacies of Apple’s security protocols, there are some fundamental resources that shouldn’t be overlooked. While they might not be the most captivating reads, they offer invaluable insights into the security concepts and technologies underpinning Apple’s products. Consider these your foundational texts:

    • Apple Platform Security Guide (December 2024): This comprehensive document delves into various facets of Apple’s security framework, covering hardware security, system security, encryption and data protection, app security, services security, and iCloud data security. It’s a deep dive into the technical details, offering a thorough understanding of how Apple safeguards its ecosystem.
    • The NIST Cybersecurity Framework (CSF) 2.0: This framework provides a standardized approach to managing cybersecurity risk. It’s a valuable resource for understanding best practices and industry standards in cybersecurity.
    • Apple Security Research Blog: This blog offers insights into Apple’s ongoing security research and discoveries. It’s a valuable resource for staying up-to-date on the latest security developments within the Apple ecosystem.

    Beyond official documentation, books offer a more narrative and engaging way to explore cybersecurity concepts. Finding resources specifically focused on Apple security can be a challenge, but there are some gems worth seeking out. I was particularly excited to learn about the upcoming second volume of Patrick Wardle’s “The Art of Mac Malware.” The first volume was an excellent guide to malware analysis, and I eagerly anticipate the insights the second volume will provide on malware detection.

    Here are some books currently on my reading list:

    • The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Reread): This book provides a practical guide to dissecting and understanding malicious software targeting macOS. It’s an essential resource for anyone interested in malware analysis.
    • The Art of Mac Malware, Volume 2: Detecting Malicious Software – by Patrick Wardle: Building upon the first volume, this book will delve into techniques for detecting malicious software on macOS systems.
    • The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage – by Cliff Stoll: This classic recounts the true story of a hunt for a hacker infiltrating computer systems. It’s a captivating tale that highlights the early days of cyber espionage.
    • The Art of Invisibility – by Kevin Mitnick: Written by a former hacker, this book explores techniques for protecting privacy and security in the digital age. It offers practical advice on safeguarding personal information in an increasingly connected world.
    • Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers – by Andy Greenberg: This book delves into the world of state-sponsored cyberattacks, focusing on the activities of the Russian hacking group Sandworm. It provides a chilling look at the potential consequences of cyber warfare.
    • Threat Hunting macOS – by Jaron Bradley (ETA unknown): This upcoming book promises to provide valuable insights into proactive threat hunting techniques for macOS environments.
    • Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy – by Cathy O’Neil: This book explores the potential for algorithms and big data to perpetuate bias and inequality. It raises important questions about the ethical implications of data-driven decision-making.

    Looking back at my reading from the previous year, several books stand out as particularly noteworthy:

    • This Is How They Tell Me the World Ends – by Nicole Perlroth: This book explores the vulnerabilities of the global digital infrastructure and the potential for catastrophic cyberattacks.
    • Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker – by Kevin Mitnick: Another captivating memoir from Kevin Mitnick, this book recounts his experiences as a notorious hacker.
    • Cult of the Dead Cow – by Joseph Menn: This book tells the story of the influential hacker group Cult of the Dead Cow and its impact on the cybersecurity landscape.
    • After Steve: How Apple Became a Trillion-Dollar Company and Lost Its Soul – by Tripp Mickle: While not strictly about security, this book offers insights into Apple’s corporate culture and its evolution, which can indirectly influence security priorities.

    I believe that staying informed about cybersecurity is a continuous process. I’m always eager to discover new resources and perspectives. I encourage everyone to share any recommended books, articles, or resources that they’ve found valuable. Collective learning and knowledge sharing are essential in navigating the ever-evolving world of digital security.

  • American-Made Apple Chips: A step closer to reality, alongside new security concerns

    American-Made Apple Chips: A step closer to reality, alongside new security concerns

    The landscape of technology manufacturing is shifting. A significant development in this shift is the near completion of the first US-based facility dedicated to producing A-series chips for Apple devices. This move, hailed as a victory for domestic production, comes alongside new security concerns regarding iPhone vulnerabilities and evolving scam tactics.

    The journey towards “Made in America” Apple chips began in 2022, spurred by the US CHIPS Act. This government initiative aims to reduce American reliance on overseas chip production, particularly in China, and to stimulate domestic job creation. The plan involves establishing several TSMC (Taiwan Semiconductor Manufacturing Company) fabrication plants in Arizona, with some production lines specifically allocated for Apple’s processors, initially for older devices.

    While initial projections aimed for mass production to commence in 2024, the project faced delays, pushing the timeline into the current year. Further, the production of more advanced 2nm chips has been postponed until 2028. Early concerns arose about the practicality of the initial plant, with worries that the output would need to be shipped back to Taiwan for the crucial “packaging” process, which integrates various circuit boards into a single chip. However, Apple later addressed this by announcing plans for a US-based packaging facility.

    The construction of these plants has not been without controversy. TSMC’s hiring practices have drawn criticism, with a significant number of workers being brought in from Taiwan rather than being recruited locally in the US. While the company initially explained this as a temporary measure during the construction phase, the situation persisted, leading to accusations of “anti-American discrimination” and even a lawsuit.

    Despite these challenges, a recent report suggests that the first plant is on the verge of commencing mass production. This implies that test production has already been successfully completed, with Apple now in the final stages of verifying the quality of the chips produced in Arizona. The first commercially mass-produced chips are anticipated as early as this quarter, pending the completion of final quality assurance checks. This marks a significant milestone in bringing chip production back to American soil.

    Security Vulnerabilities and Evolving Scams: A Double-Edged Sword

    While the news of domestic chip production offers a positive outlook, recent discoveries have highlighted potential security vulnerabilities in iPhones. A security researcher, Thomas Roth, identified a vulnerability in the USB-C controller chip present in the iPhone 15 and 16 models. This vulnerability, in theory, could be exploited to compromise an iPhone.

    The vulnerability lies within the ACE3 USB-C controller, a chip introduced in 2023, which manages power delivery and acts as a sophisticated microcontroller with access to critical internal systems. Roth’s team demonstrated the ability to gain code execution on the ACE3 chip by carefully measuring electromagnetic signals during the chip’s startup process and using electromagnetic fault injection to bypass firmware validation checks. This could, theoretically, grant an attacker complete control over the device.

    However, exploiting this vulnerability is exceptionally complex and requires physical access to the device. Both Apple and Roth himself have concluded that it does not pose a realistic threat to users in real-world scenarios.

    A more pressing security concern involves evolving tactics used by scammers exploiting iMessage. Scammers commonly use SMS and iMessage to distribute phishing links and attempt to install malware. To combat this, iPhones automatically disable links in messages received from unknown senders. These links appear as plain text and are not tappable.

    However, scammers have devised a workaround. By enticing users to reply to their messages, even with a simple “STOP” command, they can bypass this protection. Replying to the message, even with a single character, signals to the iPhone that the user has interacted with the sender, thus legitimizing the message and re-enabling the links. This means users are tricked into making the links live themselves.

    This tactic has become increasingly prevalent, with numerous examples of fraudulent messages impersonating legitimate organizations like USPS or toll road companies. These messages often prompt users to reply with a single character, such as “Y,” to activate the malicious links.

    Staying Safe in a Digital World

    In light of these evolving threats, users must remain vigilant. The most effective way to protect oneself is to exercise extreme caution with links received in any form of electronic communication. Never click on links in emails, text messages, or other messages unless you are absolutely certain of their legitimacy.

    A best practice is to rely on saved bookmarks or manually type URLs into your browser, especially for sensitive websites. If you have any doubts about the authenticity of a message, contact the purported sender directly using known contact information to verify its legitimacy. These simple precautions can significantly reduce the risk of falling victim to scams and compromising your personal information.

  • The Future of Home Security: Schlage unveils revolutionary hands-free smart lock

    The Future of Home Security: Schlage unveils revolutionary hands-free smart lock

    The landscape of home security is about to change dramatically with Schlage’s announcement of its groundbreaking Sense Pro Smart Deadbolt. This isn’t just an incremental improvement; it’s a complete reimagining of how we interact with our front doors. Eschewing the traditional keyhole entirely, the Sense Pro is designed for the smartphone age, offering seamless, hands-free entry through cutting-edge technology. 

    This innovative deadbolt leverages the power of Matter-over-Thread for robust smart home integration, ensuring compatibility with a wide range of platforms, including Apple’s HomeKit. But the true game-changer is its integration of Ultra Wideband (UWB) technology.

    This precision-based technology allows the lock to accurately measure distance, speed, and trajectory, enabling truly hands-free unlocking. Imagine approaching your door with your hands full of groceries; the Sense Pro will recognize your approach and unlock it automatically, providing an unparalleled level of convenience. 

    The Sense Pro isn’t solely reliant on UWB. Recognizing the need for versatility, Schlage has also incorporated NFC technology for tap-to-unlock functionality. This provides a reliable backup option and caters to users who prefer a more traditional approach. Furthermore, a built-in keypad offers yet another layer of access, allowing entry via a personalized code. This multi-faceted approach ensures that users always have a way to access their homes, regardless of the situation. 

    This new lock from Schlage is poised to be among the first to fully utilize the hands-free unlocking capabilities powered by UWB chips in smartphones, particularly iPhones. Apple’s introduction of “Express Mode” in iOS 18 hinted at this future, but the necessary hardware wasn’t yet available. The Sense Pro bridges that gap, ushering in a new era of keyless entry.

    Beyond the hardware, Schlage is also developing a completely redesigned Schlage Home app. This new app promises a more intuitive and user-friendly interface, simplifying remote lock management and providing users with greater control over their home security. While pricing details are yet to be released, Schlage has confirmed that the Sense Pro Smart Deadbolt will be available for purchase later in 2025. This announcement has generated considerable excitement in the smart home community, with many anticipating the arrival of this truly innovative product.  

    Apple Addresses AI Accuracy Concerns with Upcoming Update

    In other news, Apple has acknowledged concerns regarding the accuracy of its Apple Intelligence feature, particularly its notification summarization capabilities. Following several instances of inaccurate and even misleading summaries, Apple has announced an upcoming software update designed to improve the feature’s reliability and transparency. 

    Apple Intelligence, currently in beta and available on compatible devices running iOS 18.1 and later, aims to streamline notification management by grouping notifications from the same app and providing concise, one-sentence summaries. While this feature has the potential to be incredibly useful, recent incidents have highlighted the challenges of relying on AI to accurately interpret and summarize complex information. 

    One particularly concerning incident involved Apple Intelligence generating false notification headlines for BBC News, including incorrect sports results and fabricated celebrity news. These errors prompted BBC News to call on Apple to take action, emphasizing the potential damage to public trust in established news organizations. 

    This wasn’t an isolated incident. Previous errors included misinterpreting a news story about Israeli Prime Minister Benjamin Netanyahu and generating a misleading headline about a murder suspect. These incidents underscore the limitations of current AI technology in accurately processing nuanced information.

    In response to these concerns, Apple has issued a statement assuring users that improvements are on the way. The upcoming software update will provide clearer indicators when a notification has been summarized by Apple Intelligence, giving users more context and preventing confusion. Apple has also encouraged users to report any unexpected or inaccurate notification summaries to further aid in the feature’s development. While Apple Intelligence notification summaries are an opt-in feature and can be disabled, Apple’s commitment to improving its accuracy is a positive step toward ensuring its long-term viability. 

    iOS 18.2.1 Released with Important Bug Fixes

    Finally, Apple has released iOS 18.2.1 and iPadOS 18.2.1, minor updates addressing important bugs and improving overall system stability. These updates arrive almost a month after the release of iOS 18.2 and iPadOS 18.2. 

    The new software is available for download on compatible iPhones and iPads via over-the-air updates. Users can access the update by navigating to Settings > General > Software Update. Apple’s release notes state that iOS 18.2.1 addresses important bugs and recommends the update for all users. These kinds of updates are crucial in maintaining a smooth and secure user experience.

    Looking ahead, Apple is currently testing iOS 18.3 and iPadOS 18.3, with a projected release date sometime in late January. These ongoing updates demonstrate Apple’s commitment to continuously improving its operating systems and providing users with the best possible experience.

  • Decoding macOS Security: A deep dive into XProtect and malware defense

    Decoding macOS Security: A deep dive into XProtect and malware defense

    The digital landscape is constantly evolving, and with it, the threats that target our devices. For Mac users, the built-in security suite, XProtect, stands as a crucial first line of defense. But how effective is it? What exactly does it protect against? This article delves into the inner workings of XProtect, exploring its components, detection methods, and the specific malware it targets, offering a comprehensive look at macOS security in 2025. 

    My journey into the world of macOS security has been a fascinating one. From attending security conferences in unexpected locations, like my trip to Kyiv for Objective-See’s Objective by the Sea v2.0, to engaging with leading security experts, I’ve gained invaluable insights into the ever-present battle against malware. This exploration culminates in a detailed examination of XProtect, a topic I began investigating last year and have continued to refine as Apple updates its defenses.

    XProtect: More Than Just a Malware Blocker

    Introduced in macOS X 10.6 Snow Leopard back in 2009, XProtect initially served as a simple malware detector, alerting users to potentially harmful files during installation. However, it has evolved significantly over the years. The 2022 retirement of the Malware Removal Tool (MRT) marked a turning point, paving the way for XProtectRemediator (XPR), a more sophisticated anti-malware component responsible for both detecting and removing threats. 

    XProtect’s strength lies in its use of Yara rules, an open-source tool that identifies malware based on specific patterns within its code or metadata. This allows Apple, and indeed anyone, to create custom detection rules.  

    Today, the XProtect suite comprises three key components:

    • XProtect App: This component uses Yara rules to scan applications upon launch, modification, or signature updates, detecting known malware.

      XProtectRemediator (XPR): XPR takes a more proactive approach, regularly scanning the system for threats using Yara rules and other methods. These scans occur in the background during periods of low activity, minimizing performance impact.

      XProtectBehaviorService (XBS): Introduced more recently, XBS monitors system behavior, looking for suspicious activity related to critical resources.

    The Challenge of Obfuscated Signatures

    One of the challenges in understanding XProtect’s capabilities is Apple’s use of internal naming schemes for its Yara rules. While this obfuscation serves a security purpose, it makes it difficult to pinpoint the exact malware being targeted. For instance, while some rules have relatively clear names like XProtect_MACOS_PIRRIT_GEN (targeting Pirrit adware), many are given generic names like XProtect_MACOS_2fc5997 or internal codenames like XProtect_snowdrift.

    This is where the work of security researchers like Phil Stokes of Sentinel One Labs and independent researcher Alden becomes crucial. Stokes maintains a public repository on GitHub that maps Apple’s obfuscated signatures to common malware names recognized by security vendors and public scanners like VirusTotal. Alden has made significant strides in understanding XPR’s functionality by extracting Yara rules directly from its scanning modules. 

    Locating XProtect on Your Mac

    XProtect is enabled by default on all macOS installations and operates silently in the background. Updates are also automatic. To locate XProtect on your system: 

    1. Open Finder and navigate to Macintosh HD > Library > Apple > System > Library > CoreServices.
    2. Locate “XProtect” and right-click (or Control-click).
    3. Select “Show Package Contents.”
    4. Navigate to Contents > MacOS.

    Important Note: While XProtect provides a solid baseline of protection, it primarily focuses on known threats. Relying solely on XProtect is not advisable. Employing reputable third-party anti-malware solutions is strongly recommended for enhanced security.

    XProtectRemediator v147: A Look at the Malware Arsenal

    XPR’s scanning modules are responsible for malware removal. Examining version 147 reveals a targeted approach against a variety of threats. Here’s a breakdown of some of the identified remediators:

    • Adload: This adware and bundleware loader has been targeting macOS users since 2017, demonstrating a persistent threat. Recent XProtect updates have significantly improved the detection of this malware.
    • BlueTop: Identified as a Trojan-Proxy campaign documented by Kaspersky in late 2023.
    • ColdSnap: Likely targeting the macOS version of the SimpleTea malware, a Remote Access Trojan (RAT) with ties to the 3CX breach and similarities to Linux and Windows variants.
    • Crapyrator: Identified as macOS.Bkdr.Activator, a large-scale malware campaign discovered in February 2024, potentially aimed at creating a macOS botnet or distributing further malware.

      DubRobber (XCSSET): A versatile and concerning Trojan dropper.

    • Genieo: A widely known potentially unwanted program (PUP).

      KeySteal: A macOS information stealer first observed in 2021 and added to XProtect in February 2023.

    • Pirrit: An adware family known for injecting ads, collecting browsing data, and manipulating search results.
    • RankStank: Linked to the 3CX supply chain attack attributed to the Lazarus Group.
    • SnowDrift: Identified as the CloudMensis macOS spyware.
    • Trovi: A cross-platform browser hijacker similar to Pirrit, known for redirecting searches, tracking browsing history, and injecting ads.

    Several other remediators, such as BadGacha, CardboardCutout, FloppyFlipper, GreenAcre, RoachFlight, SheepSwap, ShowBeagle, ToyDrop, and WaterNet, remain unidentified at this time, highlighting the ongoing effort to decipher XProtect’s full capabilities.

    The Ongoing Evolution of macOS Security

    The fight against malware is a constant arms race. Apple continuously updates XProtect to address emerging threats, and security researchers work tirelessly to uncover the intricacies of its defenses. By understanding the components and capabilities of XProtect, Mac users can gain a deeper appreciation for the built-in security measures and make informed decisions about their overall security posture. While XProtect provides a valuable layer of protection, combining it with reputable third-party security software remains the most effective approach to safeguarding your Mac in today’s complex digital world.

  • Apple might call new iPhone ‘iPhone 16E’ not ‘iPhone SE 4’

    Apple might call new iPhone ‘iPhone 16E’ not ‘iPhone SE 4’

    Apple is rumored to unveil a new budget-friendly iPhone tomorrow, and hints are strong that it could be named iPhone 16E rather than iPhone SE 4. Initially, many speculated this new model would be another iPhone SE, following the previous generations. However, recent leaks suggest otherwise, leaning towards the name iPhone 16E.

    The name iPhone 16E first popped up in December, mentioned by Fixed Focus Digital on Weibo, a popular social media site in China. Not long after, a leaker named Majin Bu on X (formerly Twitter) echoed these sentiments, suggesting the next iPhone SE might be dubbed iPhone 16E.

    Just today, Majin Bu shared another clue, stating they’ve seen a box labeled “iPhone 16E”. Adding fuel to this rumor, Bloomberg’s tech journalist Mark Gurman commented on a recent post by Apple CEO Tim Cook, hinting at a “new family member” announcement, which might refer to this newly named device. Also, there are several new case listings on Amazon tagged for the iPhone 16E, although this could just be speculation.

    Amazon iPhone 16E

    The expected features for this new phone include a bigger 6.1-inch OLED screen, Face ID for security, a powerful A18 processor, a USB-C port, compatibility with Apple’s AI features, and a custom 5G modem. We’ll find out the official price and when it’s coming out tomorrow.

  • Apple no longer allows downgrade to iOS 18.3

    Apple no longer allows downgrade to iOS 18.3

    Apple has ended the ability to install iOS 18.3 on iPhones, meaning those who updated to iOS 18.3.1 can’t go back to the previous version. The company rolled out iOS 18.3.1 about a week after the release of iOS 18.3.

    iOS Updates

    Apple tends to stop signing older iOS versions shortly after newer ones come out, typically within one to two weeks. Once an older version stops being signed, you can’t put it on your iPhone anymore because of a check that happens on Apple’s servers. This practice pushes people to keep their phones updated. By not letting users revert to older software, Apple makes sure everyone has the latest security fixes.

    Why Update Matters

    The update to iOS 18.3.1 brought several bug corrections and security patches. Notably, it fixed a security hole that hackers were already using, which shows why keeping your iPhone’s software current is crucial.