logo
#

Latest news with #AppleMac

Apple announces free repair program for Mac in India: Check eligible models and other details
Apple announces free repair program for Mac in India: Check eligible models and other details

Time of India

time17 hours ago

  • Time of India

Apple announces free repair program for Mac in India: Check eligible models and other details

Apple has launched a free repair program in India for a specific batch of 2023 Mac mini models equipped with the M2 chip that may experience a "no power" issue. This initiative aims to address a manufacturing defect that prevents a small percentage of these devices from turning on. Apple states that only a small percentage of devices are affected, specifically those that fail to power on due to an internal hardware issue. Users can check their Mac mini's serial number using Apple's support site lookup tool to determine eligibility. Apple Mac free repair program in India: Eligibility and repair process According to Apple's official support page, the program covers Mac mini (2023) devices with the M2 chip that were manufactured between June 16, 2024, and November 23, 2024. If an affected device exhibits the power issue, Apple or an Apple Authorised Service Provider will provide service free of charge. Users in India who own a 2023 Mac mini with the M2 chip are advised to check their device's serial number on Apple's dedicated online tool to determine eligibility. If the device qualifies, customers can schedule an appointment at an Apple Retail Store or visit an Apple Authorised Service Provider for the repair. It's important to note that this program specifically targets the "no power" issue and only applies to the aforementioned 2023 Mac mini models. No other Mac mini models or Apple products are part of this particular program. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like These Are The Most Beautiful Women In The World Undo The repair program is available worldwide, but Apple may restrict or limit service to the original country or region of purchase. This program does not extend the standard warranty coverage of the Mac mini but covers eligible devices for three years after the first retail sale of the unit, even if the regular warranty or AppleCare+ has expired.

'It was like an endless therapy session': Secrets of a celebrity ghostwriter
'It was like an endless therapy session': Secrets of a celebrity ghostwriter

Metro

time2 days ago

  • Entertainment
  • Metro

'It was like an endless therapy session': Secrets of a celebrity ghostwriter

Some of the bestselling authors of the last few years didn't write a single word of their book. Prince Harry certainly didn't open up his Apple Mac in a local Starbucks and type out that he put Elizabeth Arden cream on his frostbiten penis, and there's not a chance that Britney Spears rented space at a WeWork to reveal how a conservatorship stripped her of any freedom. Instead, they told their life stories to experienced writers, whose expert storytelling helped earn a slice of the biographies and autobiographies pie that was worth £120.6m in 2023*. Ghostwriters spend hours speaking to celebrities to find out all their secrets – and which will make it onto the pages – but it's unlikely you'll know who they are. If their names are revealed at all, it's usually buried deep in the acknowledgements at the back of the book. One person who knows this all too well, is showbiz journalist Emma, who is understandably going by a pseudonym and took on her first ghostwriting gig around five years ago. Because of her job, Emma's path often crossed with Sarah**, a well-known British name, at showbiz functions. The pair got along well whenever she interviewed the star, so when the book idea was first born, it seemed like an obvious avenue for them to work together on it. 'We're very different people, but we bonded,' Emma tells Metro. 'She could always make me laugh with her one-liners and outspoken way of talking. It was fun to be around someone who was quite unapologetic about it. 'I just liked her. She'd recognise me, even in busy rooms, and make the effort to say hello. I was also quite close with her agent at the time, so that helped. 'There was no way Sarah had the will to write it herself,' adds Emma. 'So it was an immediate yes when I was asked to do it. I'd never ghostwritten before, but I thought it would be a fun challenge figuring out things as I went along.' While J.R. Moehringer is said to be the highest-paid ghostwriter ever after earning a rumoured seven figures for penning Prince Harry's memoir Spare, Emma was offered to choose from an up-front fee of just over £10,000 or be paid in royalties based on the number of copies sold. She opted for the former as she didn't know how well it would perform, while Sarah got six figures from the deal regardless. Through the agent, it was quickly arranged that Emma would head over to the celebrity's home for their first official book session. 'The plan was to run through her story chronologically. She is a natural, so she didn't need any prompts I'd prepared. But she'd go off on tangents, which began to make things a little difficult,' Emma recalls. 'Sometimes, she'd just want to tell me gossip or moan about exes, which I knew could be legally problematic. 'It could be a lot and felt more like an endless therapy session at some points. Sometimes I did have to stop myself asking, 'Why the hell did you do that?'' Over the three-month process, Emma found herself chasing Sarah, desperate to lock in dates for more interview time, as the book publisher got on her case about looming deadlines. Ironically, the ghostwriter even got ghosted at certain points. 'She was very hard to pin down,' Emma remembers. 'Once I travelled to her home, it was a four-hour round trip, but she wasn't there when I arrived. She texted saying I'd got the wrong day, but I looked back at our messages, and I had got the date right – she was trying to gaslight me. 'I also had a full-time job, so sticking to the schedule was important, but Sarah had no concept of that and became very flaky. It was very much about her, it was clear she never viewed my time as important as hers. Most of the time, she wouldn't even give an excuse; she just used to cancel or not pick up the phone.' When they did manage to meet up, Sarah would sometimes end their sessions prematurely: 'She'd say, 'Right, I need to go now, I've booked a pedicure, let's do another time' or 'I'm going out to a party'. 'It was annoying, but I've dealt with celebrities for years, so I know what they can be like. I just plastered on a smile and moved forward,' explains Emma. 'When we did meet up, I would be to get her chatting about some showbiz gossip, even though I knew it was legal dynamite, just to keep her in the room. Then I could sneak in something I needed to know about,' she recalls. Sarah's version of the truth was also something she soon got used to. 'I had to take stuff with a pinch of salt, because she'd tell me things and then I would speak to her family, to get a bit of background, and they would say it wasn't true. 'Even something as simple as where she was at a really important moment of her life, someone would later tell me she'd got it completely wrong. It was a lot of fact checking.' Despite her frustrations, Emma admits that she couldn't help but warm to Sarah. 'I saw a different side to her while spending so many hours together. When she was in her home setting, the guards came completely down. I saw glimpses of the person behind the headlines,' she explains. 'Yes, her world was very different from mine, but there was a normal woman inside it all. As I listened to her full story, I began to understand wht her life must be like and why she behaved the way she did.' Emma continues: 'She would do sweet things like buy my coffee, or drop me back to the train station after we'd finished speaking. Towards the end, it was more like I was meeting a friend for a catch-up. 'We'd discuss TV shows we're watching, making reality TV predictions, for example, and she asked questions about my life as well. I've had times where I've tried to bond with a celebrity in an interview by sharing a similar experience, and they are not interested, but she seemed to genuinely care.' While she didn't proof read her book once the final draft was complete, Sarah did hear different chunks during the writing process. 'I'd read out a chapter to her aloud, and she'd flag any changes she wanted to make,' reveals Emma. 'I found it quite hard sometimes to write in her voice, rather than my own, so this was helpful.' Much to Emma's surprise, once the book was finished, so was her 'friendship' with Sarah. 'It was odd going from spending so much time together to not speaking because it consumed my life. I did try to message Sarah after the book came to an end, but it said this number no longer exists,' she adds. More Trending 'She changes her number a lot; it wasn't personal, but she didn't make the effort to give me the new one. I was like, 'Okay, I guess we won't stay in touch.' But if I saw her out, it'd be nice to catch up.' So what did Sarah think of the finished version, which went on to sell a reported 150,000 copies? 'She didn't ever sit down to read it,' admits Emma. 'She doesn't have the attention span, so I can't say if she was happy with it… her agent was though!' Metro's Senior Features Writer Josie Copson is part of a small London book club, Read It, My Pony, which reads only one genre… Since 2017, I've been part of a book club that exclusively reads celebrity autobiographies. That statement can often make people giggle, as perhaps they aren't the most well-respected genre and book clubs are often associated with intellectual conversation about Pulitzer-prize winning titles. However, I would argue that if you want to learn about what it means to be human, then all you've got to do is visit the Biographies and Memoirs section on Amazon. My journey into the world began with Ja Rule's Unruly. The artist dominates my Spotify, but I was keen to know more about the guy behind the raspy voice. When I told a colleague what I was reading, she expressed interest in also flicking through the pages. She borrowed it and then we booked a meeting room for our lunch break, and dissected why longtime collaborator Ashanti wasn't given more pages, and if his claim that his father invented fat-free cheesecake was true. Since then, we've acquired four more members, given ourselves a name (Read It, My Pony), and read about Daniella Westbrook's struggles with addictions, Gemma Collins' argument on why she's earnt her divaship, how Victoria Beckham became Posh Spice, and what led Lily Allen to quit making music. I've read about lives that couldn't be more different, but I've found they have some common threads… Everyone wants to be special until they are, then they want to prove that they're just like everybody else. No amount of money or success ever makes someone happy. Love, or the pursuit of it, can often be the unravelling of powerful women. Even the most exciting jobs can be mundane. Nobody is immune to negative opinions. Getting an insight into the worlds of women such as Cher, Shania Twain, Drew Barrymore, Demi Moore and Jessica Simpson, and learning that they have their insecurities and problems too, reminds me that everyone is just doing their best to figure life out. They just have a few more eyes on them. *Nielsen Bookscan **Name has been changed Do you have a story you'd like to share? Get in touch by emailing Share your views in the comments below. MORE: Inside the mind of a parent killer: 'I shouldn't have been part of that family' MORE: Billie Eilish, JoJo Siwa, and Fletcher are all dating men and the internet is spiralling MORE: A year ago Hawk Tuah girl went viral – Metro catches up with Haliey Welch to find out what happened next

How To Make Your Apple Mac Private : Simple Steps to Protect Your Privacy
How To Make Your Apple Mac Private : Simple Steps to Protect Your Privacy

Geeky Gadgets

time16-05-2025

  • Geeky Gadgets

How To Make Your Apple Mac Private : Simple Steps to Protect Your Privacy

Have you ever wondered just how much of your personal information your Apple Mac might be sharing without your knowledge? While Apple is often praised for its commitment to privacy, even its devices aren't immune to data collection. From Siri's voice processing to analytics tracking, your Mac may be quietly gathering and transmitting data in ways you didn't expect. The good news? You don't need to overhaul your entire tech setup or switch to a niche operating system like Linux to regain control. With a few strategic adjustments, you can transform your Mac into a fortress of digital privacy without sacrificing its sleek functionality. In this step-by-step overview, privacy advocate Naomi Brockwell walks you through practical ways to make your Mac more secure. You'll discover how to tweak settings during setup, manage network connections, and disable features that might be compromising your data. Whether it's turning off location tracking or allowing macOS's built-in firewall, these changes can significantly reduce your device's digital footprint. Along the way, you'll also learn privacy-conscious habits that go beyond settings, helping you stay one step ahead in an increasingly data-driven world. After all, privacy isn't just a feature—it's a mindset worth cultivating. Apple Mac Privacy Tips Steps to Enhance Privacy During Purchase and Setup When acquiring a new Mac, the steps you take during the purchase and initial setup can significantly impact your privacy. Private Purchase: If possible, buy your Mac in person and pay with cash to avoid linking the device to your personal information. Avoid providing details such as your Apple ID, email address, or phone number during the purchase process. If possible, buy your Mac in person and pay with cash to avoid linking the device to your personal information. Avoid providing details such as your Apple ID, email address, or phone number during the purchase process. Reformat and Update: Before using your Mac, update the operating system to the latest version and perform a clean installation of macOS. This ensures a fresh start by erasing all content and settings, including system and data volumes. Avoid migrating old data during setup to prevent reintroducing unnecessary files or configurations. Before using your Mac, update the operating system to the latest version and perform a clean installation of macOS. This ensures a fresh start by erasing all content and settings, including system and data volumes. Avoid migrating old data during setup to prevent reintroducing unnecessary files or configurations. Configure Privacy Settings: During the initial setup, assign a generic device name to avoid broadcasting personal identifiers. Disable location services, analytics, and other unnecessary features. Create a strong local password without hints to secure your device. How To Make Your Apple Mac Private Watch this video on YouTube. Here are more guides from our previous articles and guides related to Apple privacy settings that you may find helpful. Managing Connectivity and Network Settings Connectivity features such as Wi-Fi, Bluetooth, and network sharing can expose your device to potential risks if not managed carefully. Wi-Fi and Bluetooth: Turn off Wi-Fi and Bluetooth when not in use to prevent your Mac from inadvertently sharing information with nearby devices or networks. Disable automatic connections to known networks or hotspots to maintain control over your connections. Turn off Wi-Fi and Bluetooth when not in use to prevent your Mac from inadvertently sharing information with nearby devices or networks. Disable automatic connections to known networks or hotspots to maintain control over your connections. Firewall Configuration: Enable the built-in macOS firewall to block unauthorized access. Activate 'Stealth Mode' to make your device less visible to network scans. Additionally, disable automatic allowances for built-in and downloaded software to maintain control over network activity. Customizing Notifications and Sound Settings Notifications and sound settings can inadvertently expose sensitive information or draw unnecessary attention to your device. Notification Management: Disable sensitive notifications on the lock screen to prevent unauthorized access to private information. Turn off notification sounds to reduce distractions and potential data leaks. Adjust notification settings to prevent interruptions during sleep or when sharing your screen. Disable sensitive notifications on the lock screen to prevent unauthorized access to private information. Turn off notification sounds to reduce distractions and potential data leaks. Adjust notification settings to prevent interruptions during sleep or when sharing your screen. Sound Settings: Minimize alert volumes and disable startup and interface sound effects. These adjustments not only enhance privacy but also reduce unnecessary noise. Disabling Unnecessary Features Certain macOS features, while convenient, can compromise your privacy by collecting and transmitting data. Disabling these features can significantly enhance your security. AirDrop and Sharing Features: Turn off AirDrop, Handoff, and all sharing options to prevent unauthorized data transfers. These features, while useful, can expose your device to nearby users or networks. Turn off AirDrop, Handoff, and all sharing options to prevent unauthorized data transfers. These features, while useful, can expose your device to nearby users or networks. Siri and Apple Intelligence: Disable Siri and Apple Intelligence features to limit data collection and analysis. These services rely on processing user data to provide personalized recommendations and assistance. Adopting General Privacy Practices Beyond adjusting your Mac's settings, adopting general privacy practices can further enhance your security. Avoid linking your Mac to an Apple ID to prevent Apple from associating your device activity with your personal account. Use strong, unique passwords for all accounts and limit app installations to only those that are necessary. Regularly review and update your privacy settings to minimize data exposure and stay informed about potential vulnerabilities. By following these steps and maintaining a proactive approach, you can take meaningful control of your digital privacy while continuing to enjoy the benefits of your Apple Mac. Media Credit: Naomi Brockwell TV Filed Under: Apple, Guides Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.

Selling your MacBook? Step-by-step guide to factory reset Apple laptops with M-series chip
Selling your MacBook? Step-by-step guide to factory reset Apple laptops with M-series chip

Hindustan Times

time14-05-2025

  • Hindustan Times

Selling your MacBook? Step-by-step guide to factory reset Apple laptops with M-series chip

If you are considering selling your Apple Mac, you might also be thinking about resetting it and preparing it to be traded in or sold to a new owner. Or, you might simply be passing it on to a family member. Note that this guide is for Mac systems running Apple Silicon (M-series chips) or Intel-based Mac with Apple T2 security chip. Having said that, before you begin formatting your Mac and erasing all content and settings, ensure you backup your Mac if there is any essential data. Read on for the steps. Also Read: Vivo V50 Elite Edition teased with Zeiss branding and sound upgrades- Here's what we know Step 1: Tap on the Apple logo in the top left and then System Settings. In System Settings, go to General. Scroll all the way down and find Transfer or Reset. Step 2: Open Transfer or Reset, and then click on Erase All Content and Settings. This will prompt you for your Mac password; please enter it. Step 3: The Mac will now show you items will be removed, including your Apple ID, biometrics, and Bluetooth accessories will be unpaired, and Find My and Activation Lock will be turned off. Step 4: Click continue and then follow the instructions. That is it. Your Mac should now be reset after a while, and you will know that your laptop has been reset after your Mac displays "Hello" on the screen. Also Read: iOS 19 to take to boost iPhone's battery life with help of AI As mentioned earlier, ensure that any very important data is backed up. You can do this using the Time Machine backup, or you can manually copy files onto an SSD or hard drive. Next, you need to charge your laptop to optimal levels whilst you are resetting it. Also, if you are using a desktop Mac, such as a Mac mini or a Mac Studio, ensure that you have a power backup connected because you would not want the reset process to be interrupted if you lose power. If you are using an older Mac and cannot use Erase All Content and Settings, you need to manually sign out of iTunes, back up files, sign out of iCloud, unpair Bluetooth devices, and also erase your Mac and reinstall macOS from macOS Recovery. MOBILE FINDER: iPhone 16 LATEST Price, Specs And More

Apple Passwords Attack Warning — Do Not Install This Update
Apple Passwords Attack Warning — Do Not Install This Update

Forbes

time05-05-2025

  • Forbes

Apple Passwords Attack Warning — Do Not Install This Update

This update could unlcok your Apple passwords. Although Microsoft users are more used to being on the receiving end of warnings about password compromise attacks, that doesn't mean that Apple fans can be complacent. As 19 billion stolen passwords are confirmed as being published to public forums online, and the FBI issues do not click alerts, Apple Mac users are the latest to be told do not: do not download this update or your Apple passwords could be vulnerable. Here's what you need to know. The days of users of Apple's macOS platform being able to think they were safe from cyber attackers are over. The truth is they never really existed at all. Windows is, without doubt, exposed to a greater number of attacks than macOS, not least due to market share, but that really doesn't make one operating system safer than the other. Especially, it must be said, when the human factor meets technological threat evolution. I have been warning about the danger of malware targeting macOS users for the longest time, with Apple password-stealing attacks high on my alert list. Indeed, in February, I reported how data theft attacks against Apple users had surged by 101%, if you want any further evidence of the clear and present threat to Mac users. A May 5 report from MacPaw's cybersecurity division, Moonlock, has confirmed just how dangerous the password-stealing Mac threat really is. The macOS malware campaign starts with a fake Realtek driver update notification and is believed to be the work of North Korean hackers, according to Mykhailo Hrebeniuk, a macOS security researcher at Moonlock.'Under the hood,' Hrebeniuk said, 'the updated attack delivers an infostealer, a type of malware designed to harvest Mac login credentials, Apple Passwords data, and browser cookies.' I have contacted both Apple and Realtek for a statement and will update this article if I receive any further information. The current macOS malware campaign involves five steps, as follows: The security researchers at Moonlock Lab have, Hrebeniuk said, seen a 340% increase in infostealers targeting Apple passwords through macOS malware campaigns. In this case, the campaign is a receded one that was first observed in April and labelled Contagious Interview, but has now evolved away from using a job offer social engineering lure to a Realtek driver update one. 'As the recycled malware campaign shows,' Hrebeniuk said, 'instead of creating a totally new kind of malware, hackers can simply fine-tune the old one to avoid detection.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store