Blog Posts

Blog Posts

Signs That Your External Hard Drive Requires Replacement

Solid-state drives (SSDs) typically offer superior reliability and are not as vulnerable to the same types of physical deterioration as HDDs. Therefore, if you are seeking a more dependable alternative, consider making the switch, particularly when you start to observe signs that your external HDD is nearing its end.

Unusual sounds

Apple Claims Unhackable Nature of Certain iOS Function

prevent a burglar from reaching crucial iPhone information, along with tracking functionalities that can pinpoint misplaced or stolen devices on the map. Additionally, stolen iPhones remain inoperative as long as they’re linked to the user’s Apple Account. Moreover, the iPhone incorporates inherent iOS safeguards against hacks and malware, featuring a somewhat unnoticed iOS security option known as Lockdown Mode, which can stop hackers from monitoring iPhone users.

Lockdown Mode holds significant value in a landscape where advanced attackers can circumvent the built-in iOS security despite Apple’s diligent efforts. However, Lockdown Mode seems to function as designed, successfully hindering hackers from effectively implanting malware on iPhones. Apple informed TechCrunch that iPhones secured by Lockdown Mode have not endured hacks in the nearly four years since the feature’s introduction. This functionality was created in the aftermath of NSO Group’s Pegasus spyware intrusions on iOS, indicating that Apple likely recognizes various sophisticated intrusions aimed at iPhones, including devices lacking Lockdown Mode safeguards.

There may exist highly advanced assaults that could penetrate Lockdown Mode without Apple’s awareness, yet Apple’s assertion appears to be validated by external sources. TechCrunch cites Amnesty International, Citizen Lab, and Google among the entities capable of confirming Lockdown Mode’s effectiveness in repelling attacks. Google’s research reveals a situation where spyware would terminate attacks upon detecting Lockdown Mode protection.

How Lockdown Mode operates

<div class="slide-key image-holder gallery-image-holder credit-image-wrap" data-post-url="https://www.bgr.com/2138530/apple-claims-ios-lockdown-feature-never-been-hacked/" data-post-title="Apple Claims No One Using This iOS Feature Has Ever

Dyson Unveils Portable Version of Its Iconic Fans

Nearly 17 years after Dyson first announced its Air Multiplier fans – one of its first big consumer products after vacuums – the company has miniaturized their design to create a handheld personal cooler called the HushJet Mini Cool. Like Dyson’s larger Air Multipliers, humidifiers, air purifiers, and heaters, the HushJet Mini Cool doesn’t have […]

Gemini Introduces Notebooks for Project Organization

Google’s Gemini is getting a feature called “notebooks” to help you organize things about certain topics in a single place while using the AI chatbot, the company announced on Wednesday. You can pull in things like files, past conversations, and custom instructions into notebooks that Gemini can then use as context while you’re talking with […]

Default Activation of Stolen Device Safeguard for Corporate Devices in iOS 26.4.1

Apple has verified that Stolen Device Protection will be activated by default for enterprise devices upgrading from iOS 26.4 to iOS 26.4.1, and from iPadOS 26.4 to iPadOS 26.4.1. This functionality is part of Apple’s ongoing initiative to bolster security across its devices.

### iOS 26.4 Had Previously Activated the Feature by Default on Non-Enterprise Devices

With the recent launch of iOS 26.4.1 and iPadOS 26.4.1, Apple has issued updates that encompass bug fixes and enhancements. Significantly, the release notes mentioned that the update addressed a CloudKit bug impacting iCloud data synchronization. Apple has also revised its support page to validate that Stolen Device Protection will be automatically activated for enterprise devices during this update.

### Apple Continues to Strengthen Security on Its Devices

This action follows Apple’s earlier choice to enable Stolen Device Protection by default for non-enterprise devices in iOS 26.4. Initially introduced in 2024, this feature provides extra security layers for sensitive operations when an iPhone is outside recognized locations, necessitating biometric authentication for accessing saved passwords or altering account settings. It also imposes a delay for high-risk actions to thwart unauthorized access.

#### How Stolen Device Protection Operates

Stolen Device Protection incorporates various security protocols:

– **Biometric Authentication**: Activities such as accessing stored passwords and payment methods require Face ID or Touch ID, with no alternative fallback, ensuring that solely the authorized user can utilize these features.

– **Security Delay**: Specific actions, such as altering an Apple Account password, require waiting an hour and executing additional biometric authentication.

The update follows Apple’s proactive measures to rectify security vulnerabilities, including those unveiled by the Coruna and DarkSword exploits. Recent updates have been rolled out to fix these vulnerabilities across both legacy and current versions of iOS and iPadOS.

Moreover, the timing of this update aligns with Anthropic’s declaration of its new AI model, Mythos, which is intended to detect security weaknesses in operating systems and browsers. While the choice to enable Stolen Device Protection by default for enterprise devices may not be directly associated with recent exploits or the influence of Mythos, it highlights Apple’s dedication to enhancing user security.

For additional details on Stolen Device Protection, users can check Apple’s support page.

Apple Seeks Internal Information from Samsung in South Korea for Current Antitrust Litigation

Apple has sought to acquire internal data from Samsung in South Korea as part of its ongoing antitrust battle with the U.S. government regarding alleged monopolistic practices. Here are the specifics.

### Apple Requests Documents from Samsung in South Korea

In March 2024, the U.S. Department of Justice, along with a coalition of states, filed a lawsuit against Apple, alleging that it leverages App Store policies, developer constraints, and control over crucial iPhone functionalities to restrict competition in the smartphone and related markets.

Following Apple’s unsuccessful effort to dismiss the case, it has entered the discovery phase, during which both parties exchange documentation, request records, and compile evidence to bolster their positions.

This context informs Apple’s recent submission, where it requests the court to issue a formal letter of request, enabling it to pursue documents from Samsung Electronics in South Korea, after Samsung’s U.S. subsidiary declined to provide records claimed to be solely maintained by the Korean parent company:

> Apple Inc. (“Apple”) respectfully requests that this Court issue the accompanying Letter of Request under the Hague Convention of 18 March 1970 on the Taking of Evidence Abroad in Civil or Commercial Matters (“Hague Evidence Convention”) to Samsung Electronics Co., Ltd. (“Samsung Electronics”) in the Republic of Korea. Apple’s Letter of Request seeks internal business reports, market analyses, and data regarding Samsung’s smartphone, smartwatch, and app store businesses. Apple has already subpoenaed Samsung Electronics’ domestic subsidiary, Samsung Electronics America, Inc. (“Samsung America” or “SEA”), but Samsung America has objected to all of Apple’s document requests on the basis that it will not produce documents purportedly in the sole possession, custody, or control of Samsung Electronics.

Apple’s submission is based on the Hague Evidence Convention, providing a procedure for courts to gather evidence from international entities in civil or commercial matters.

Regular readers of 9to5Mac might recall that the Hague Convention was mentioned earlier this year in another case involving Apple.

This year, South Korea declined to fulfill xAI’s document request from superapp developer Kakao, indicating that the demands were excessively broad.

Apple is now utilizing the same framework, although with a more refined request centered on particular Samsung documents related to smartphones, smartwatches, and the Galaxy Store.

Indeed, Apple dedicates a significant portion of its filing to detailing the precise scope and justification behind it, presumably aiming to demonstrate to both the U.S. court and South Korean authorities that the request is specifically targeted and connected to critical issues in the case. In the filing, Apple contends that:

> A. The Requested Evidence Is Important To The Litigation
> B. The Letter Of Request Is Reasonably Specific And Tailored
> C. No Adequate Alternative Means Exist To Obtain The Information
> **D. Issuance Promotes U.S. Interests And Does Not Undermine Korea’s Interests**

It remains to be seen whether Apple’s request will yield positive results. Even if granted by the U.S. court, South Korean authorities must still decide on its execution, and Samsung could raise objections based on Korean law.

To access Apple’s full motion, follow this link.

Mark Hamill’s Character as a Marvel Supervillain Uncovered

Luke Skywalker nearly had a more sinister name. For over three decades, Hamill embodied the voice of one of the most iconic and unhinged villains in the DC animated universe, The Joker, before stepping away from the role in 2022 following the passing of Batman’s voice actor Kevin Conroy.

Yet The Joker isn’t the sole nefarious character Hamill has brought to life. Throughout the years, the enthusiastic comic book collector has voiced a variety of villains, anti-heroes, and outright rogues within the animated realms of Marvel and DC, including Hobgoblin, Nightmare, Tony Zucco, and Red Skull. He even took on the role of The Trickster in not just one, but two live-action “The Flash” TV series -– separated by more than 20 years. However, arguably one of the celebrated actor’s most overlooked performances was as one of Marvel’s most eccentric supervillains: Dr. Arnim Zola.

Who is Arnim Zola?

Within the Marvel universe, Arnim Zola is a brilliant yet deranged Swiss scientist focusing on genetics and biochemistry. Upon uncovering and translating ancient texts outlining Deviant scientific knowledge, Zola starts conducting genetic experiments that ultimately result in the creation of an artificial life form –- the first of numerous. In the years that follow, the scientist produces additional life forms utilizing genetic material cloned from his own neural cells.

During World War II, Zola –- seeking funding for his experiments –- allies himself with the Nazis and Hydra, who advance his cloning technology for their purposes. He invents a brain patterning device that transfers an individual’s personality and memories into a cloned body, hoping it can serve to extend Hitler’s life post-mortem. To validate the efficiency of the technology, he initially transferred his own consciousness into a tall, metallic artificial body, with his head positioned in an ESP box in the center of his chest — and his brain situated within the chest cavity.

The ESP box converts