|
It's 2026, and we're kicking off the New Year with all of the best Apple-related discounts you can find online this week. Many of these are matching the low prices we saw over the holidays, including AirTags, Apple Pencil Pro, and Apple Watch Series 11.
|
|
With CES 2026 slated to officially start next week, the focus is understandably on all the new products that will be announced at this year's event. But before diving into what's new, we thought it was a good idea to revisit our best of show winners from last year to see where they're at. After all, CES is synonymous with vaporware. The good news is the Engadget team has a keen sense for BS. Of the ones we awarded at CES 2025 that haven't been released, most are coming this year. For the remaining few, we'll be hunting them down this CES.
ASUS Zenbook A14An Asus Zenbook A14 sits out a patio table. Devindra Hardawar for EngadgetWhen we saw the ASUS Zenbook A14 at CES 2025, it left us impressed with its lightweight but well-made chassis, beautiful OLED screen and excellent mix of ports. After spending more time with it, the A14's shortcomings became more apparent. In his
| RELATED ARTICLES | | | | |
|
Apple plans to introduce a 12.9-inch MacBook in spring 2026, according to TrendForce.
|
|
In select U.S. states, residents can add their driver's license or state ID to the Apple Wallet app on the iPhone and Apple Watch, and then use it to display proof of identity or age at select airports and businesses, and in select apps.
|
|
Fresh security research from Jamf Threat Labs may not reflect an active attack, but it does illustrate the layered complexity of today's threat environment.
When Airplane mode isn't Airplane mode
In brief, the researchers have figured out a proof of concept attack that tricks victims into thinking they are using Airplane Mode. However, in reality the attacker has put in place a fake version of that mode that looks normal but lets the attacker maintain access to the device.
This is by no means a straightforward attack and hasn't been seen in the wild. The exploit is complex and would require an attacker to successfully take control of the target device through a series of exploits, the research claims.
To read this article in full, please click here
|
|