Archive for Apple

If You Are Still Running iOS 18, Check Software Update ASAP

Posted in Commentary with tags on April 1, 2026 by itnerd

If you have an older iPhone or iPad that still runs iOS 18, Apple has just released a newer version of iOS and iPadOS 18.7.7. It’s meant to fix this vulnerability that is in the wild and should be considered a today problem. Your other option is to go to iOS 26 which is not affected by this vulnerability and protects you from other vulnerabilities as a bonus. But whatever you do, don’t delay and patch your iDevice ASAP.

That ends today’s public service announcement.

Apple Warns iPhone Users To Stop Running Older Versions Of iOS

Posted in Commentary with tags on March 19, 2026 by itnerd

If you’re running an older version of iOS, you may want to update to the most recent version of iOS that your device supports ASAP. I say that because in a support document Apple is telling people to update to the latest version of iOS that is available for your device to protect yourself from exploit kits that are effective against older versions of iOS, like this exploit kit. This is the advice that Apple is offering:

If your iPhone has an older version of iOS, update to protect your data:

  • Devices with the latest, updated versions of iOS 15 through iOS 26 are already protected. If you have not updated your software recently, update iOS on your iPhone.
  • We released a software update for iOS 15 and iOS 16 on March 11, 2026, to extend protection to older devices that cannot update to the latest version of iOS.
  • Devices with iOS 13 or iOS 14 must update to iOS 15 to receive these protections and will receive an additional alert to install a Critical Security Update in the next few days.
  • Apple Safe Browsing in Safari is on by default and blocks the malicious URL domains identified in these attacks.

Note: Users who are unable to update their device can consider enabling Lockdown Mode (if available) to protect against malicious web content and other threats.

Apple normally doesn’t put out statements like this, so I would take this very seriously and take action ASAP. Because it is highly likely that the exploits that Apple is warning you about are widespread. Which makes them a today problem.

Apple Patches Exploited Zero Day That Has Been Around For YEARS

Posted in Commentary with tags on February 13, 2026 by itnerd

Apple has issued patches this week for an exploited zero-day that’s reported to have been in each version of iOS since v1.0. Which takes us back to the late 2000’s to the first iPhone in 2007.

Apple’s advisory notes: “An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.”

Mobile security expert Madhav Benoi, Head of Security Research, Approov had this to say: 

    “This attack is a powerful primitive that can be used to run arbitrary code. The good news is that it only affects iOS versions below 26.

“The immediate downside for a victim is complete device compromise. It makes sense that it was used for targeted individuals as for certain political/informational gain, this is a weapon that can be used to gain entryway into targets.

“Users and organizational security teams should patch Apple iPhones immediately, and if they’re  still using iOS 18 and haven’t moved to 26, please do As soon As possible. If they’re continuing to run an iOS version below 26, they just be careful with what apps they install. Keep an eye out if any apps are popping up random things and are asking for permissions that they don’t need. This could be an indicator of compromise.”

Damon Small, Board Member, Xcape, Inc. adds this:

    “Apple’s emergency patch for CVE-2026-20700 signifies a rare and concerning development, as the company explicitly warns of an “extremely sophisticated attack,” likely linked to nation-state espionage or commercial spyware. The significant drawback is that even highly controlled mobile ecosystems are vulnerable to advanced exploitation, and targeted individuals may have minimal indication that their devices have been compromised. Discovered by Google’s Threat Analysis Group, this zero-day vulnerability targets the Dynamic Link Editor (dyld), the essential “gatekeeper” responsible for how every application loads and is protected from each other on your device. By compromising this core component, attackers can completely bypass this iOS sandbox, enabling them to execute arbitrary code and silently install persistent surveillance tools.

   “The true concern lies in the frightening precision of the exploit chain, which was used in conjunction with previously patched WebKit vulnerabilities to target high-value individuals with “zero-click” efficiency. For any team managing a fleet of Apple devices, this is not a standard update; it’s a critical emergency that necessitates immediate patching to iOS 26.3 or iOS 18.7.5. Individual users need to be concerned as well and should also update immediately. 

    “Patch fast or get pwned! If your iPhones aren’t on the latest build, assume someone’s already working on the next 0-day.”

If you haven’t updated to iOS 26.3, I’d be doing so ASAP. While you’re at it, you should update the rest of your Apple gear as well as there are updates for watchOS, macOS and others that were released at the same time. While Apple exploits tend to be used against high value targets such as human rights campaigners, journalists, and politicians, that could change at any time. Thus it’s time to patch all the things in order to be safe.

Why Aren’t Apple And Google Acting To Remove Grok And X From Their App Stores?

Posted in Commentary with tags , , , on January 28, 2026 by itnerd

I have to wonder where are the backbones of Tim Cook and Sundar Pichai are. I say that because it has been weeks since the whole Grok allowing users to create objectionable content thing blew up. To recap:

To the last point, the EU is one of a number of governments who are up in arms about this. And rightfully so. Elon Musk has simply gone too far and he needs to be punished for his actions. And the best way to punish him is to pull his apps from the Apple App Store and from the Google Play Store. But that hasn’t happened and you have to wonder why. Is it because Apple and Google don’t want to pick a fight with Elon? Is it because Tim Cook and Sundar Pichai are cowards? Is it about the money that these companies make from their cut of the subscriptions to Grok and X? Who knows?

But I do know this. Section 1.1.4 of Apple’s review rules prohibit the sort of thing that Grok and X are doing at the moment. Ditto for Google Play. Given that, why aren’t these companies enforcing their own rules?

The fact is it’s beyond time for Apple and Google to stand up, grow a pair, and throw Elon’s apps off their respective app stores. Along with any other app that does this sort of thing. Because by not doing so, they are burning the trust that they have with consumers that their apps stores are safe places to get apps from down to the ground. Along with that, it also sends the message that rules are rules, except when they are not.

Apple and Google, you both need to do better. Now.

So About Android Phones Getting AirDrop…. Apple May Not Have Signed Off On This

Posted in Commentary with tags , on November 22, 2025 by itnerd

A couple of days ago I posted a story about Pixel 10’s and ultimately all Android phones getting the ability to support Apple’s AirDrop functionality. One thing that sort of popped into my head at the time was the thought that Apple as a company was not mentioned in terms of signing off on this. As a result, I did some looking around and found my answer via  a statement that Google provided to Android Authority:

We accomplished this through our own implementation. Our implementation was thoroughly vetted by our own privacy and security teams, and we also engaged a third party security firm to pentest the solution.

So Apple was not involved. That really sounds like the whole Beeper situation where Beeper reverse engineered iMessage to give Android users the ability to send and receive iMessages in a very sketchy way. As a result Apple went scorched Earth on Beeper to stop that from working. Now Bepper was a very tiny company which truly had zero chance against Apple. Google is a much bigger company that will stand up to Apple if the latter tries to break this functionality. It should also be noted that Apple gets billions of dollars from Google via an agreement to have Google’s search engine as the default search engine on iDevices. Thus Apple may have a financial incentive not to do anything. Thus the fact that Apple didn’t sign off on this as far as I can tell may be a non factor. But we’ll find out soon enough.

What You Should Do Before Upgrading To macOS Tahoe….. And Why You Shouldn’t Upgrade Just Yet

Posted in Commentary with tags on September 15, 2025 by itnerd

Apple is expected to release their latest OS which is macOS Tahoe today. Before we go on, here’s a list of what macOS Tahoe will run on:

  • iMac 2019 and later
  • Mac Pro 2019 and later
  • Mac Studio 2022 and later
  • MacBook Air with Apple Silicon 2020 and later
  • Mac mini 2020 and later
  • MacBook Pro with Apple Silicon 2020 and later
  • MacBook Pro (16‑inch, 2019)
  • MacBook Pro (13‑inch, 2020, Four Thunderbolt 3 ports)

You should note that some features of Tahoe won’t work on Intel Macs. And on top of that, this is the last year that Intel Macs will be supported. So if you haven’t made the move to Apple Silicon, now would be a really good time to dump your Intel Mac.

Related to the above, here’s list of features that Tahoe includes.

If your Mac isn’t on this list, you’re out of luck. But assuming that it is, here’s some tips on what you might want to do before you pull that trigger and upgrade. And a couple reasons why you shouldn’t.

  1. Don’t Upgrade… At least not yet. Part 1 : The reason why you shouldn’t upgrade is that Apple’s initial releases tend to be buggy. But they usually get better after they release an update or two. Though that wasn’t the case with Sequoia as they never fixed the Time Machine issues that this specific OS had. So you may want to wait until at least the .1 update hits the streets before making the jump. Or better yet, wait until the .2 release to be extra safe. 
  2. Don’t Upgrade… At least not yet. Part 2: Your apps that you depend upon may not be ready for Tahoe. Thus out may be a better strategy to confirm whether they are ready or not. And if they’re not, wait for them to be compatible with Tahoe before you upgrade.
  3. If you Must Upgrade, Make A Backup: Needless to say, making a backup of your current setup is vital before upgrading. That way you have a way to go back to where you were if things don’t work out. There’s plenty of backup solutions out there from Apple’s own Time Machine to third party utilities such as Carbon Copy Cloner that can be used for this purpose.
  4. Upgrade Your Software BEFORE You Upgrade: Assuming your apps are going to be compatible with Tahoe, you should ensure that all your apps are up to date before you pull the trigger on upgrading. That will reduce the risk that something might go sideways during the upgrade.
  5. Run Disk Utility BEFORE You Upgrade: The last thing I would do is boot of the Recovery Partition and run Disk Utility to verify the volume that you plan to install the upgrade on. It likely wouldn’t hurt to do a permission repair as well.

At this point you should be good to go. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues. Or you can take my first couple of suggestions which is to wait for a bit before upgrading. Then follow the rest of my advice. In my case, I am not planning on upgrading to Tahoe. At least not yet given my experience with Sequoia. But I may upgrade in the future depending on what problems do or do not surface in the coming weeks.

How You Can Prepare Your iPhone For iOS 26

Posted in Tips with tags on September 15, 2025 by itnerd

At 1PM EST today, Apple will release iOS 26 to the public. As long as you have a supported device, it will bring you new features and improvements to your iDevice experience.

If you want to see a full feature set, click here.

Speaking of supported devices, here’s what iOS 26 will run on:

  • iPhone 16
  • iPhone 16 Plus
  • iPhone 16 Pro
  • iPhone 16 Pro Max
  • iPhone 15
  • iPhone 15 Plus
  • iPhone 15 Pro
  • iPhone 15 Pro Max
  • iPhone 14
  • iPhone 14 Plus
  • iPhone 14 Pro
  • iPhone 14 Pro Max
  • iPhone 13
  • iPhone 13 mini
  • iPhone 13 Pro
  • iPhone 13 Pro Max
  • iPhone 12
  • iPhone 12 Pro
  • iPhone 12 Pro Max
  • iPhone 12 Mini
  • iPhone 11
  • iPhone 11 Pro
  • iPhone SE Second Generation

If your phone isn’t on this list, then it’s not supported. And the following phones will come with iOS 26 out of the box:

  • iPhone 17
  • iPhone Air
  • iPhone 17 Pro
  • iPhone 17 Pro Max

If you are wondering why there are no iPads on the list, that’s because Apple has spun off the iPads into a separate OS called iPadOS which is due out at the same time. Having said that, this advice applies to iPads as well. 

Now, since this is a major upgrade there is always a chance, no matter how remote that something can go sideways. To make sure that you’re not caught out by something unexpected, here’s what you can do:

1. Update your Apps: Make sure that all your apps are up to date before upgrading by opening the App Store app and seeing if any updates are required. This is important because it is possible that the changes that Apple has made on areas like privacy and performance could break an app that you rely on. Thus I find that it is always a good idea to check for updates and install them before a new version of iOS hits the streets.

2. Dump any uneeded photos, videos or apps: iOS updates tend to need a fair amount of free space to allow for a successful installation. Thus if you have anything less than 8GB of free space, consider deleting unused apps or photos/videos. In terms of the photos and videos you want to keep, you can move them to the cloud or a computer so that they’re safely stored without taking up space on your iPhone. I personally use iCloud myself, but Google Photos is another option.

3. Backup your iDevice: If you value the data on your iDevice, backing it up is a must. You have two options for backing up your iDevice: iCloud or iTunes. Follow this guide to backing up your iPhone using iCloud or iTunes.

At this point you should be good to go to upgrade to iOS 26. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues that you might encounter.

One other thing before I go, you may want to consider not upgrading to iOS 26 and instead wait for iOS 26.1 to hit the streets before you upgrade as that’s likely to have additional bug fixes and also fix issues that hit the streets when iOS 26 comes out. Plus that’s the version that is going to bring Apple Intelligence to the table. I’ll be upgrading later today and if anything seriously goes off the rails, you’ll be the first to hear about it.

iCloud Calendar Spam Is Back With A Crypto Twist

Posted in Commentary with tags on September 8, 2025 by itnerd

iCloud Calendar Spam has been a thing for a while now. And lately it has resurfaced in a big way. Spammers have been sending calendar invitations containing links, most of them taking the form of cryptocurrency scams. And the big problem with this is that email filters and other security measures that are in place to stop scams from hitting your calendar or inbox are completely bypassed. Thus making it far more likely that there will be victims.

Bleeping Computer has a story on this: https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/

Javvad Malik, lead security awareness advocate at cybersecurity company KnowBe4, commented:

“There is an ongoing trend of phishing that rides on reputable services. These attacks, such as the one using iCloud Calendar pass SPF/DKIM/DMARC, and land in inboxes with borrowed legitimacy. People don’t scrutinize calendar links the way they do email links, so a meeting invite with a callback number lowers defenses and funnels victims into vishing or remote‑access scams.

“KnowBe4 Threat Labs has been tracking the same pattern (https://blog.knowbe4.com/phishing-deep-dive-eu-affiliated-survey-platform-exploited-in-sophisticated-credential-harvesting-campaign) of attackers launching campaigns through legitimate platforms AppSheet, Microsoft, Google, QuickBooks, even Telegram which bypass native and SEG controls.

“Don’t just hunt for misspellings and spoofed domains, look at the intent. Ask if this communication was expected, is it trying to spike emotion, and is there an artificial time limit pushing you to act now? If the answer is yes to any, stop and self‑verify via a known channel. And treat calendar invites with the same scepticism as email.”

Apple has a video that addresses this topic that you should look at if get hit by this. But Apple needs to figure out a way to stop this from being an issue in the first place. Maybe with this new wave of spam, they might put some effort and resource into finding a solution.

BREAKING: Masimo Sues The US CBP Over Apple Bringing Back The Apple Watch Blood Oxygen Feature In The US

Posted in Commentary with tags on August 20, 2025 by itnerd

If you thought the Masimo/Apple fight over the blood oxygen feature in the app was over when Apple released a workaround last week, you were wrong. Masimo has apparently filed a new complaint in the US District Court for the District of Columbia. Here’s why and who’s getting sued:

This action challenges an unlawful August 2025 ruling by U.S. Customs and Border Protection (“CBP”) allowing Apple Inc. (“Apple”)—via an ex parte process—to bypass a Limited Exclusion Order (“LEO”) from the U.S. International Trade Commission (“ITC”) that prohibits the importation of Apple Watch products that infringe Masimo Corporation’s (“Plaintiff” or “Masimo”) patents.

And:

It has now come to light that CBP thereafter reversed itself without any meaningful justification, without any material change in circumstances, and without any notice to Masimo, let alone an opportunity for Masimo to be heard. CBP changed its position on Apple’s watch-plus-iPhone redesign through an ex parte proceeding. Specifically, on August 1, 2025, CBP issued an3 ex parte ruling permitting Apple to import devices that, when used with iPhones already in the United States, perform the same functionality that the ITC found to infringe Masimo’s patents. Masimo only discovered this ruling on Thursday, August 14, 2025, when Apple publicly announced it would be reintroducing the pulse oximetry functionality through a software update.

Masimo now wants a temporary restraining order and preliminary injunction to block the CBP’s decision, and they also want the original ruling reinstated. It will be interesting to see if any of that actually happens. But what is clear is that this fight is far from over.

You Should Update Your Macs, iPhones, And iPads To Fix A Security Vulnerability

Posted in Commentary with tags on August 20, 2025 by itnerd

Apple earlier today just released the following updates:

  • macOS 15.6.1, 13.7.8, 14.7.8
  • iOS 18.6.2, and iPadOS 18.6.2 along with iPadOS 17.7.10

Now the reason why you should update all the things ASAP can be found here on Apple’s security page. Below is the one from iOS 18.6.2:

ImageIO

Available for: iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later

Impact: Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

Now, chances are you’re not one of those individuals that are being targeted. But what tends to happen is that other threat actors will simply try to reverse engineer what Apple fixed in order to launch their own attacks on people who have not updated. Thus you might want to patch all the things ASAP as given the state of cybersecurity at the moment, you can never be too careful.