logo
#

Latest news with #Apple.

Rice trick WON'T fix your phone if you get it wet in sink or pool on hols – the real ways to dry it are much safer too
Rice trick WON'T fix your phone if you get it wet in sink or pool on hols – the real ways to dry it are much safer too

The Irish Sun

time18-05-2025

  • The Irish Sun

Rice trick WON'T fix your phone if you get it wet in sink or pool on hols – the real ways to dry it are much safer too

DROPPED your iPhone in the sink? Your next move should NOT be to drop it in a bowl of rice. It's a longstanding myth that rice will dry out your 6 This might look like the perfect place for a wet iPhone – but it's a bad idea Credit: Getty 6 Keep your iPhone dry – but if you can't manage that, don't turn to rice Credit: Getty But it turns out that rice isn't very effective at drying your Worse still, Apple says it could even WET IPHONE TROUBLES There are loads of ways your iPhone could end up soaked, from dropping it in the sink or loo – or even the pool on holiday. Apple has been making its iPhones water-resistant since the iPhone 7, but that's not a guarantee that they're waterproof. Read more on iPhone And water can still do serious damage to your iPhone. Most iPhones can likely survive a dunking in water, but pressurised and hot water (like in a shower) can breach water-resistance. And getting water in your Lightning or USB-C port (the one you use for charging) is bad too. In fact, you'll usually Most read in Phones & Gadgets It'll say something like: "Charging not available. Liquid has been detected in the Lightning connector. "Disconnect to allow the connector to dry. This may take several hours." iPhone 16e review – I've secretly tested Apple's cheapest mobile and I love the new button but that's not the best bit If you ignore this warning, it can do serious damage to your iPhone. So only override it if you're in an emergency. Apple explains: "If you charge your iPhone while the Lightning or USB-C connector is wet, the pins on the connector or cable can corrode and cause permanent damage or stop functioning. "Causing connectivity issues for your iPhone or accessory." DRYING YOUR IPHONE – WHAT YOU SHOULDN'T DO There are some things you absolutely shouldn't do, according to Apple. And top of the list "Don't put your iPhone in a bag of rice," Apple explains. "Doing so could allow small particles of rice to damage your iPhone." 6 Definitely don't stuff one of these in your iPhone either Credit: Getty Not only that, but rice simply isn't very good at drawing water from the air around it. You're just as well leaving the iPhone out on the side, and won't risk ruining your mobile. There are a couple of other rules to follow too. "Don't dry your iPhone using an external heat source or compressed air," Apple warned. 6 Never use a heat source to dry your iPhone – you could seriously damage it Credit: Getty IPHONE WATER RESISTANCE Here's the full list from Apple.. Apple says the following iPhone models are "splash, water and dust resistant": iPhone 16e iPhone 16 iPhone 16 Plus iPhone 16 Pro iPhone 16 Pro Max iPhone 15 iPhone 15 Plus iPhone 15 Pro iPhone 15 Pro Max iPhone 14 iPhone 14 Plus iPhone 14 Pro iPhone 14 Pro Max iPhone 13 iPhone 13 mini iPhone 13 Pro iPhone 13 Pro Max iPhone 12 iPhone 12 mini iPhone 12 Pro iPhone 12 Pro Max iPhone SE (2nd generation) iPhone 11 iPhone 11 Pro iPhone 11 Pro Max iPhone XS iPhone XS Max iPhone XR iPhone X iPhone 8 iPhone 8 Plus iPhone 7 iPhone 7 Plus Picture Credit: Apple / The Sun And the Californian tech giant added: "Don't insert a foreign object, such as a cotton swab or a paper towel, into the connector." HOW TO ACTUALLY DRY YOUR IPHONE There are two methods worth trying – one official, and one less so. Firstly, gently tap your iPhone against your hand. Apple recommends making sure that the connector is pointing down towards the ground to allow excess liquid to fall out. Then all you need to do is leave your iPhone in a dry area with a bit of airflow. Wait at least 30 minutes then try to charging again. If the alert pops up warning you about moisture, Apple says leave your iPhone somewhere drive for up to a full day. 6 Silica gel packets are one option for drying an iPhone, Apple fans say Credit: Getty The second isn't an official Apple method, but plenty of iPhone fans say it works. It involves sticking your iPhone in a Ziploc bag with a load of silica gel packets. They're those packets that you get inside a box with new shoes or furniture in. Companies put them in boxes to draw in moisture and stave off damp – and they're extremely effective. 6 A Ziploc bag containing silica gel packets can help to dry things more quickly Credit: Getty These packets – which you can also bag off Amazon – are much better at drawing moisture out from the air than rice. Not to mention they won't end up sneaking into an iPhone nook or cranny. You've probably got a few silica gel packets lying around at home, so grab a few and try using those instead.

Mac users beware: AI-powered malware threats are on the rise
Mac users beware: AI-powered malware threats are on the rise

Yahoo

time18-02-2025

  • Yahoo

Mac users beware: AI-powered malware threats are on the rise

Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That's Apple." in their promotions. However, the tech landscape is changing, and even Apple products aren't beyond cybercriminals' reach. A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency. This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants. Read On The Fox News App What Is Artificial Intelligence (Ai)? One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials. At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale. 4.3 Million Americans Exposed In Massive Health Savings Account Data Breach While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures. So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become. Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play. Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Massive Security Flaw Puts Most Popular Browsers At Risk On Mac Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware. 1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages. 3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated. 4. Use strong and unique passwords: To protect your Mac from malware, it's also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don't have to remember them yourself. By reducing the number of passwords you need to recall, you're less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here. 5. Use two-factor authentication (2FA): Enable 2Fa for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password. How To Remove Your Private Data From The Internet The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures. Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channels Facebook YouTube Instagram Answers to the most asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) Copyright 2025 All rights article source: Mac users beware: AI-powered malware threats are on the rise

Mac users beware: AI-powered malware threats are on the rise
Mac users beware: AI-powered malware threats are on the rise

Fox News

time16-02-2025

  • Fox News

Mac users beware: AI-powered malware threats are on the rise

Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That's Apple." in their promotions. However, the tech landscape is changing, and even Apple products aren't beyond cybercriminals' reach. A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse. Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency. This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants. One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials. At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale. While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures. So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become. Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play. Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware. 1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages. 3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated. 4. Use strong and unique passwords: To protect your Mac from malware, it's also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don't have to remember them yourself. By reducing the number of passwords you need to recall, you're less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here. 5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password. The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures. Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store