|
After roughly six weeks of beta testing, iOS 26.2 and related updates have finally been released for all users, delivering a number of new features, changes, and bug fixes.
|
|
Satechi and MacRumors partnered up this week to offer our readers an exclusive 30 percent discount on select products for a limited time. This sale is available only on Satechi's website and is set to end on Monday, December 15, so this weekend is your last chance to take advantage of the deals.
|
|
Apple today released iOS 26.2, the second major update to the iOS 26 operating system that came out in September, iOS 26.2 comes a little over a month after iOS 26.1 launched. ?iOS 26?.2 is compatible with the ?iPhone? 11 series and later, as well as the second-generation ??iPhone?? SE.
|
|
Apple is working on a smart home hub that will rely heavily on the more capable version of Siri that's coming next year. We've heard quite a bit about the hub over the last two years, but a recent iOS 26 code leak provides additional insight into what we can expect and confirms rumored features.
|
|
Just a month after introducing GPT 5.1, OpenAI introduced GPT-5.2, the next-generation model that will power its popular chatbot. GPT-5.2 is OpenAI's "most capable model series yet for professional knowledge work."
|
|
Google is developing two pairs of smart glasses with artificial intelligence that will launch in 2026, the company said today. The first set of glasses have AI integration and are designed for screen-free assistance with built-in speakers, microphones, and cameras for speaking to Google Gemini.
|
|
A UK research team based at Durham University has identified an exploit that could allow attackers to figure out what you type on your MacBook Pro — based on the sound each keyboard tap makes.
These kinds of attacks aren't particularly new. The researchers found research dating back to the 1950s into using acoustics to identify what people write. They also note that the first paper detailing use of such an attack surface was written for the US National Security Agency (NSA) in 1972, prompting speculation such attacks may already be in place.
"(The) governmental origin of AS- CAs creates speculation that such an attack may already be possible on modern devices, but remains classified," the researchers wrote.
To read this article in full, please click here
|
|