We’ve reached that familiar point in Apple’s annual iPhone speculation cycle when conflicting reports insist an unreleased, unconfirmed product is both behind schedule and set to appear right on time.
As with Apple’s annual macOS system naming fable, this moment comes every year. One publication, sometimes Nikkei, might claim development is running late, while a second industry observer, usually well-connected analyst Mark Gurman, will rebut the claim.
Apple, meanwhile, says nothing at all. How could it, when all the drama concerns a product it hasn’t even acknowledged exists? Instead, the company just sits back, quietly managing the coverage while occupying prime mental real estate without officially doing anything.
How the stories work
The details in these annual stories don’t matter much. At this stage, they usually involve technical or manufacturing process flaws related to a problem identified during the initial test manufacturing cycle, which Apple then manages to fix.
Once the
Apple’s key manufacturing partner Foxconn has confirmed its US factories suffered a ransomware attack in recent days after the gang responsible claimed to have stolen 8TB of data from the company — including confidential Apple information.
This isn’t the first attack to hit Foxconn, and such is the scale and value of the company that it is unlikely to be the last. Criminals understand the value of the information it has and see it as a prime target. That it is an industrial company actively deploying smart factory infrastructure across its premises just makes it an even more interesting challenge; what happens if the machinery itself is attacked?
Industrial defenses have improved; so have attacks
In practice, most large industrial facilities are moving to secure their own internal factory networks using technologies such as SD-WAN, private 5G networks, network segregation, isolation of production environments from the corporate network, and active monitoring against threats to factory
Invitation to be part of group including Elon Musk and Tim Cook highlights American AI and tech ambitions
The billionaire chief executive of the chipmaker Nvidia, Jensen Huang, has joined Donald Trump’s China delegation after a reported last-minute invitation, highlighting the US’s AI and tech ambitions.
Huang will join a roster of US bosses including the Tesla chief executive and X owner, Elon Musk, the Apple chief executive, Tim Cook, and Goldman Sachs’s David Solomon at Trump’s 36-hour meeting with the China president, Xi Jinping.
Continue reading...
Cardano open interest clusters near $0.27 as ADA tests yearly lows, while volume rises 35% and network activity holds steady. Cardano open interest has clustered near the $0.27 support level as ADA trades close to yearly lows. Trading volume has risen 35%, while network data shows steady staking, active development, and ongoing governance work. The […]
The post Cardano Open Interest Clusters at 27 cents as Volatility Signals Build appeared first on Live Bitcoin News.
The FTC's enforcement of the Take It Down Act signals increased regulatory scrutiny on tech giants, potentially reshaping digital privacy norms.
The post US FTC sends compliance letters to Amazon, Alphabet, Apple over new intimate image removal law appeared first on Crypto Briefing.
Apple's stock resilience amid geopolitical tensions highlights its ability to mitigate economic risks, influencing market confidence and dynamics.
The post Apple stock hits all-time high amid geopolitical tensions appeared first on Crypto Briefing.
The FTC's action signals increased regulatory scrutiny on tech giants, potentially reshaping compliance norms and privacy safeguards industry-wide.
The post FTC sends compliance letters to Amazon, Alphabet, and Apple over Take It Down Act appeared first on Crypto Briefing.
As Apple heads toward next month’s Worldwide Developer Conference (WWDC), cast your mind back almost 30 years. That’s when something happened that arguably put events in motion that led to Apple becoming the company it is today. That was when Apple co-founder Steve Jobs returned to the top job at WWDC 1997 — the first such event after Apple acquired NeXT.
The big debt to NS
It took until 2000 to fully realize what the NeXT purchase meant; that’s when the Mac OS X Public Beta was released. The operating system has seen many twists and turns since then, but the NeXTStep OS acquisition forms the basis on which the Apple software ecosystem has been built. Mac, iPhone, iPad – even Apple Watch and Vision Pro – all share elements of it.
You can see its traces each time you use an application that makes use of a macOS API that uses the NS — ‘NeXTStep’ prefix. That means you’re using NeXT when you work in SwiftUI, use Apple’s core frameworks, or write code for use across different platforms in
Apple’s platforms are secure by design, but when it comes to authentication, the company seems to be protecting employees more than it protects IT admins. It’s an attack vector just waiting to be exploited — if it hasn’t been already.
As noted first by Six Colors, the problem is that administrator and People Manager accounts on Apple Business Manager (ABM) can’t sign in using federated authentication, even though they manage the federation process for everyone else.
What are the implications?
What this means in practice is that when admins engage with the authentication process, they need to do so using non-federated Apple Account sign-in with Apple’s two‑factor authentication (typically via a trusted device or trusted phone number using SMS/voice). That’s weird; it means the key accounts that manage protection for sometimes thousands of devices are still only protected by a six-digit SMS code sent to a specified phone number. We know that SMS authentication is risky, with three well-