Search results for: “imessage”

  • A strange iMessage problem Apple needs to solve

    A strange iMessage problem Apple needs to solve

    For the last couple of years, I’ve noticed something odd with Apple’s Messages app, especially when it comes to pictures. I keep hoping Apple will fix it, but so far, they haven’t done anything about it. Here’s the issue: if you send an AVIF picture through iMessage, it doesn’t show up right. AVIF is a type of image that’s getting more popular, so this glitch is kind of frustrating.

    But that’s not the whole story. It’d be fine if Apple just didn’t work with AVIF files at all. Instead, for some strange reason, the image pops up in a tiny box on your screen. There’s no way to make it bigger, so you’re stuck squinting at a super small picture you can’t see.

    This happens on both iPhones and Macs. The funny thing is, before you send the AVIF picture, it looks perfectly fine in the preview. You’d never guess there’d be a problem until after you hit send. It’s not like Apple doesn’t know how to handle AVIF. They added support for it in Safari with iOS 16, which was over two years ago. So, they’re halfway there—they just haven’t updated iMessage to keep up. The files show up, but you can’t view them properly.

    This whole thing feels off. Since AVIF works in Safari and the Photos app, people naturally send these images through iMessage. But when they don’t display correctly, it’s a letdown. You’re left with a useless picture.

    I hope Apple tackles this soon. It’s a small but annoying issue that messes up the experience. With AVIF becoming more common, it’s time for iMessage to catch up and let us see those images the way they’re meant to be seen.

  • How phishing scammers are exploiting a quirky iMessage feature

    How phishing scammers are exploiting a quirky iMessage feature

    The digital world, for all its convenience, is a battlefield. Lurking in the shadows are cybercriminals constantly devising new ways to pilfer personal information. A recent trend has emerged, targeting iPhone users with a clever social engineering tactic that exploits a little-known iMessage behavior. This isn’t a sophisticated technical hack, but rather a manipulation of human behavior, making it all the more insidious. 

    The core of the issue lies in how iMessage handles links from unknown senders. For security reasons, iMessage automatically disables hyperlinks in messages from numbers not saved in your contacts. This is a crucial defense against phishing attempts, preventing accidental clicks on malicious websites. However, a loophole exists: if the recipient replies to the message or adds the sender to their contacts, those previously inactive links suddenly become live. And this is precisely what scammers are now exploiting.

    Imagine receiving a text message seemingly from a reputable organization, perhaps a delivery service like FedEx or a local toll authority. The message might claim a missed delivery or an outstanding balance, prompting immediate action. Crucially, the message includes a link, but initially, it’s not clickable. The message might also include a seemingly innocuous instruction, such as “Reply STOP to unsubscribe” or “Reply NO to decline.” This is the hook.

    The scammers are banking on the user’s natural inclination to respond, especially if the message creates a sense of urgency or concern. By replying, even with a simple “STOP” or “NO,” the user inadvertently activates the embedded link. This seemingly harmless action opens the door for the scammers to direct the victim to a fraudulent website designed to steal personal data, such as login credentials, credit card numbers, or other sensitive information.

    This tactic preys on the familiarity of legitimate business practices. Many companies use automated text messages for notifications, often including instructions to reply with specific keywords. Scammers are mimicking this practice, creating a sense of legitimacy and trust. The surge in SMS phishing (smishing) attacks asking recipients to reply with “Y” to “activate” supposedly legitimate links further blurs the lines. 

    The implications are significant. While tech-savvy users might quickly recognize these attempts for what they are, less experienced users, particularly older individuals, are significantly more vulnerable. They may not be aware of this specific iMessage behavior and are more likely to fall for the social engineering trick.

    So, how can you protect yourself? The most effective defense is simple: never reply to suspicious messages from unknown senders. If you receive a message from an unfamiliar number containing a link, regardless of how urgent or official it appears, resist the urge to respond. If you are genuinely concerned about a potential issue with a delivery or account, contact the organization directly through their official website or phone number, not through the information provided in the suspicious message.

    Beyond this crucial advice, iPhone and iPad users can also utilize message filtering. This feature sorts messages from non-contacts into a separate list within the Messages app, providing a clearer view of potential spam. To enable this, go to Settings > Messages and toggle on “Filter Unknown Senders.” This won’t block the messages entirely, but it will help you manage them more effectively.

    It’s important to remember that message filtering isn’t foolproof. Legitimate messages from delivery services, banks, or other essential services might occasionally end up in the filtered list. Therefore, it’s crucial to exercise caution and not automatically dismiss a filtered message as malicious. However, as previously stated, you cannot click links in messages from unknown senders until you either add them to your contacts or reply to their message, and this is a deliberate security measure.

    In the ever-evolving landscape of cyber threats, vigilance is key. By understanding how these scams operate and adopting simple precautionary measures, you can significantly reduce your risk of falling victim to these subtle yet effective phishing attacks. The key takeaway is to be skeptical, avoid reacting impulsively to messages from unknown sources, and always verify information through official channels.

  • Apple alerts users to spyware threats and updates Safari preview

    Apple alerts users to spyware threats and updates Safari preview

    Apple recently warned some users about possible spyware attacks sponsored by governments. The company sent notifications to people in various countries, including an Italian journalist and a Dutch activist, through iMessage and email.

    These alerts are part of Apple’s efforts to protect users from advanced cyber threats, like those from groups such as NSO Group, known for Pegasus spyware. Apple has been sending these warnings since 2021, reaching users in over 150 countries. The company doesn’t share details about the attackers to avoid helping them improve their methods. Instead, Apple encourages affected users to update their devices, use two-factor authentication, and seek help from experts like the Digital Security Helpline.

    In other news, Apple released Safari Technology Preview 218, an experimental browser update for testing new features. This version includes fixes for CSS, JavaScript, Lockdown Mode, and WebRTC, among others. It works on macOS Sonoma and macOS Sequoia and is available via the Software Update feature for those who’ve downloaded the browser from Apple’s website.

    The preview helps developers and users give feedback to improve future Safari versions. You can run it alongside the regular Safari browser, and no developer account is needed to try it. Full details are on Apple’s Safari Technology Preview website. This shows Apple’s focus on both user safety and improving its software, tackling cyber threats while refining tools like Safari for a better web experience.

  • Apple updates security tool and quietly changes product names

    Apple updates security tool and quietly changes product names

    Apple has made two notable changes recently. First, the security database it used to rely on—called the CVE list—is now being managed by a new, independent group. Second, Apple quietly edited its product marketing without any public announcement.

    The CVE list is used to track and report security issues in software and hardware. For a long time, Apple’s security updates used data from this database, which was run by MITRE, a nonprofit group funded by the U.S. government.

    However, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has now taken over the CVE project and made it an independent organization, called CVE.org. Apple has updated its website to show it now uses the new version of this service.

    In another unexpected move, Apple changed the way it refers to some of its products. It recently removed the “i” from names like iCloud, iMessage, and iTunes in some of its marketing images. Now, these services are just called “Cloud,” “Message,” and “Tunes” in the visuals.

    These changes weren’t officially announced, and it’s unclear if this will affect how the services are branded going forward. These two quiet updates show that Apple is making behind-the-scenes changes—both in security and branding—that may shape its future strategy.

    Source/Via

  • Apple rolls out iOS 18.5 public beta with Apple News+ game, new Siri option

    Apple rolls out iOS 18.5 public beta with Apple News+ game, new Siri option

    Apple has released the first public beta of iOS 18.5, giving regular users a chance to try out upcoming features before the official launch. This version includes a few new additions and improvements.

    One of the key features in iOS 18.5 is a new game called “Quartiles” for Apple News+ subscribers. The game was first added in the developer beta last week and is now available to the public. It’s a word puzzle game, and it joins other News+ games like Crossword and Mini Crossword.

    Another small but useful change is a new Siri option. Users can now choose which app Siri should use when sending messages. This gives people more control, especially if they prefer using third-party apps like WhatsApp or Telegram instead of iMessage.

    There aren’t many major updates in this beta, but Apple is likely preparing for the bigger iOS 19 update, which will be announced in June at WWDC.

    If you want to try iOS 18.5 public beta, you can sign up for Apple’s Beta Software Program. Make sure to back up your data first, since beta versions may have bugs.

    The final version of iOS 18.5 is expected to be released to everyone in the next few weeks.

  • WhatsApp might soon be your go-to messaging app on iPhone

    WhatsApp might soon be your go-to messaging app on iPhone

    Good news for iPhone users who love WhatsApp! A new update could make it the main messaging app on your phone. Right now, iMessage is the default for sending texts on iPhones. But WhatsApp, which is super popular worldwide, may get a chance to take over that spot.

    This change is tied to a big rule called the Digital Markets Act (DMA) in Europe. The DMA wants to make things fairer for different apps and give users more choices. Because of this, Apple might have to let apps like WhatsApp become the default for messages. That means when you send a text, it could go through WhatsApp instead of iMessage—pretty cool, right?

    WhatsApp is already working on this. They’ve shared plans to add a feature that lets iPhone users pick it as their top app for texting. This would make chatting easier, especially with friends who use Android or other phones, since WhatsApp works across all devices.

    For now, this is mostly aimed at people in Europe because of the DMA rules. But if it goes well, it could spread to other places too. Imagine texting everyone through WhatsApp without switching apps! It’s still in the works, but it’s exciting to think about. What do you think—would you make WhatsApp your main messaging app?

  • How Apple can improve its smart summary feature

    How Apple can improve its smart summary feature

    At WWDC24 last summer, Apple introduced a bunch of Apple Intelligence features, and one that’s been stirring up some debate is notification summaries. People have spotted mistakes in these summaries, which led Apple to tweak their look and even turn them off for news updates. While these summaries won’t ever be flawless, there’s a simple way Apple could make them better. I’d love to see this idea show up in iOS 19.

    What Notification Summaries Do

    The goal of notification summaries is to help you skim your alerts. The feature scans all the notifications in a group, sums them up, and does it all right on your device. Sounds handy, right? But there’s a big catch: Apple Intelligence can only work with what’s in the notification itself.

    This might seem obvious, but here’s the issue: Notifications are already super short. They’re designed to fit in a tiny bubble for quick reading. Plus, the system has to be small enough to run on a chip like the A17 Pro, so it doesn’t have much wiggle room to figure things out.

    Why Summaries Miss the Mark

    Take group chats in iMessage, for example. People often reply to different things at once in busy threads. That’s fun, but Apple Intelligence doesn’t get the full picture. It ends up mixing everything into one messy, wrong summary.

    Right now, it just sums up short notifications in the order they come in. That doesn’t always work well. Here’s my fix: let app makers give Apple’s system some extra info to work with. For iMessage, Apple could tell the system what a new message is replying to.

    My Hope for Apple’s Next Step

    If apps could share a bit more background info—stuff users wouldn’t see—it’d help Apple’s system make smarter summaries. Back in December, Apple Intelligence botched a BBC News summary about Luigi Mangione. It was way off, and Apple ended up turning off news summaries altogether.

    But imagine if the BBC could share the story’s opening paragraph as extra info. That’d give Apple Intelligence more to chew on, leading to better summaries. Big language models will always have quirks, especially ones tiny enough to run on a phone with just 8GB of RAM. Still, Apple can’t keep news summaries off forever. Adding background information from apps could be the answer they need.

  • Apple’s new smart home device teased in tvOS 18.4 Beta

    Apple’s new smart home device teased in tvOS 18.4 Beta

    The latest tvOS 18.4 beta update has dropped some exciting clues about Apple’s upcoming smart home hub. People at MacRumors spotted something called the ChatKit framework in the tvOS code. This is interesting because neither Apple TV nor HomePod has a Messages app right now.

    The ChatKit feature in tvOS 18.4 brings things like reactions and alerts for iMessage tapbacks—think “John didn’t like this” or “Sara added a heart.” These don’t make sense for Apple TV or HomePod, which both use tvOS. But the new smart home hub, also running on tvOS, might use them.

    This “command center” Apple is working on could come with built-in apps, and Messages might be one of them. Since tvOS and iOS share some code, this ChatKit addition could just be a carryover from iOS. Still, it’s new to tvOS with this beta, so it’s worth paying attention to.

    Apple’s smart home device will be a control center for your connected gadgets. Beyond that, it’ll handle video calls, photo viewing, web browsing, music, news, and more. Picture a tiny iPad—just six inches wide—with a sleek, all-screen look. You could place it on a table or hang it on a wall, and it might pop up in multiple spots around your home. It’ll also have sensors to check the room’s temperature or notice when someone’s nearby.

    There’s no set launch date yet, but rumors point to sometime between April and September 2025. This little gadget could be a game-changer for Apple fans who want a smarter, more connected home. For now, the tvOS 18.4 beta is keeping us guessing about what’s next!

  • Apple resists UK’s push for iCloud access

    Apple resists UK’s push for iCloud access

    Apple has taken a bold step by filing a legal challenge with the UK’s Investigatory Powers Tribunal. This move aims to block the UK government’s request for secret access to private iCloud data, according to the Financial Times.

    iCloud Privacy vs. UK Rules

    Earlier this year, the UK demanded that Apple create a hidden way—called a backdoor—to access encrypted information stored in iCloud by users around the world. The UK based this order on its Investigatory Powers Act. Apple, however, refused to follow through. Instead, it pulled a security feature called Advanced Data Protection from the UK. This tool gives iPhone, iPad, and Mac users strong encryption for their iCloud files, keeping them private.

    Apple is ready to stand firm against the UK to safeguard user privacy. The legal fight it started could be reviewed in court as early as this month. Due to strict UK laws, Apple can’t openly talk about the government’s order, so the case might happen quietly, out of the public eye.

    What’s at Stake?

    Apple has warned before that it would rather stop offering some iCloud services in the UK than weaken its security. For now, it’s only removed Advanced Data Protection, but other popular tools like FaceTime and iMessage could also disappear if the UK keeps pushing. The government says it needs this access to tackle terrorism and child abuse cases.

    Apple has a history of resisting such demands. Back in 2016, it fought the U.S. government when asked to unlock an iPhone tied to a shooting in San Bernardino, California. After a big legal clash, Apple held its ground. Interestingly, the U.S. now supports strong encryption to shield users from foreign cyber threats.

    A Bigger Picture

    The U.S. is also checking if the UK’s request breaks the CLOUD Act, a law that stops the UK from seeking data on American users—and the other way around. This could spark more tension between the two nations over privacy rules.

  • Apple’s security update in the UK made simple

    Apple’s security update in the UK made simple

    On February 21, Apple stopped offering its Advanced Data Protection feature in the UK after the government quietly asked for a way to unlock private user data stored in iCloud—not just in the UK, but everywhere. This decision has left some UK Apple users wondering how safe their information is now. Let’s break it down.

    What Was Advanced Data Protection?

    Advanced Data Protection, or ADP, started in 2022 as Apple’s top security option for iCloud. It’s a setting users can turn on to lock more of their data—like backups, photos, and notes—with a special kind of protection called end-to-end encryption. This means only the user can unlock it on their own devices, and no one else, not even Apple, can peek inside. Without ADP, Apple uses regular encryption for things like email and calendars, where it keeps a spare key and can open the data if a court orders it.

    Not many people likely used ADP since Apple never shared numbers. Some might not know about it, while others have older devices that can’t handle it because they need the latest software.
    Who’s Impacted by This Change?

    This affects two groups in the UK:

    • New users: Since February 21, they can’t turn on ADP. They’ll see a message saying it’s no longer available.
    • Current ADP users: If you already had it on, you’ll need to switch it off yourself soon to keep using iCloud. Apple can’t do it for you and promises more help later.

    If you never used ADP, nothing changes—your data still has Apple’s basic protection, where Apple holds the key.

    What’s Still Safe?

    Even without ADP, some iCloud features stay super secure by default, like iMessage, FaceTime, passwords, and health info. These use end-to-end encryption no matter what.

    Why Did This Happen?

    The UK government used a law to secretly demand Apple build a hidden way into encrypted data worldwide. Apple said no, worried it would weaken security for everyone—like leaving a house key out for anyone to find. Instead, they pulled ADP from the UK, hoping to bring it back someday with better safety for users.