Search This Blog

Showing posts with label Apple. Show all posts

NSO's Spyware Pegasus Taking Control of Mobile Devices through Apps


NSO's spyware Pegasus has been revealed to assume control for mobile devices through various apps; this is a matter of grave concern as cybersecurity firms have in the past also discovered the Pegasus software to exist in both the Apple and Android operating systems.

While WhatsApp said the number of infected users may go up from the present gauge of 1,400, as more users come forward with this issue, Newswire Reuters even reported citing to sources familiar with WhatsApp's internal investigation that the snooping may also include prominent government and military authorities in about 20 nations, aside from activists and journalists.

Raman Jit Singh Chima, Asia Policy Director, and Senior International Counsel at open internet advocacy group Access Now says that “Surveillance tech firms such as NSO and others market these capabilities with the intent of allowing their clients to hack and surveil all of the everyday smartphone activity of the targeted victim.”

He further included this may also include services, like Gmail, iMessage, Facebook, and Viber.

NSO's utilization of malware to control Apple devices is said to have been first discovered in 2016, and Apple along these lines had even released software upgrades in September 2016 after it found that hackers could have accessed its devices by making a victim click on a link and it was then speculated that Pegasus spyware could have been installed by misusing vulnerabilities in its software.

University of Toronto-based Citizen Lab, which aided WhatsApp in its investigation for the aforementioned issue, said in a 2018 report that Pegasus seems, by all accounts, to be being used by nations with 'dubious' human rights records and histories of harsh conduct by state security administrations.

This includes India too, as one NSO administrator named the Ganges is said to have been operated in India and was discovered by Citizen Lab. Most recently WhatsApp stresses the fact that the number of users affected may go up later on particularly in India because of the total absence of any surveillance reform or data protection laws.

Libreoffice Users Receiving Security Warnings While Installing Macos 10.15 Catalina


Users of the open-source office productivity software LibreOffice have reported keeping running into numerous security warnings when installing the app on the newly released macOS 10.15 Catalina.

It was during the public beta for macOS Catalina that some LibreOffice users observed that Apple's GateKeeper warnings were competent enough to scare off many users.

Despite the fact that Apple had cautioned macOS designers in June that all Mac applications that are marked with a Developer ID would likewise be 'notarized' by Apple and furthermore guaranteed this would empower a "more streamlined Gatekeeper interface" when users download macOS applications from the web.

While LibreOffice version 6.2 was not authorized, the most recent 6.3 version evidently has been. Be that as it may, as per LibreOffice, users are as yet getting the GateKeeper alert with the extra notice that "macOS cannot verify that is app is free from malware”.

"Although we have duly followed the instructions when users launch LibreOffice 6.3.x – which has been notarized by Apple – the system shows the following scary message: 'LibreOffice.the app cannot be opened because the developer cannot be verified', and provides only two options: Move to Bin (delete) and Cancel (revert the operation, i.e., do not run LibreOffice)," writes LibreOffice's Italo Vignoli.

LibreOffice anyway suggested a couple of ways through which the users can without much of a stretch 'bypass' the message. With respect to Apple's notarization, app developer Jeff Johnson has clarified that the key security benefit originates from the necessity that developers utilize their Apple ID and password for their developer account to submit the application to Apple for legal approbation.

Along these lines, the attacker would need to 'compromise' both a signing certificate and the developer's Apple ID in order to distribute the malware.

17 Trojan infested apps you need to delete from your iPhone right now!


Just like the ancient Greek story, where soldiers sneak into the gates of troy by hiding inside a wooden horse similarly Trojans sneak in your phone in the face of harmless apps that you voluntarily install. Apple users are being warned about such apps, to check their devices against a list of malware apps and delete them according to a report by Wandera.

Research team at Wandera, a software-as-a-service firm, has identified 17 apps that install malicious Trojan module on iOS devices. Apple says that the infected apps have been removed from the app store but after examination they found that the apps did not contain the claimed Trojan malware. Instead, the apps were removed because of being adware specifically called the "clicker Trojan malware" and included code that enabled artificial click-through of add and made it seem like you viewed an advertisement which is against App Store's guidelines. Apple further said that the protective tools of App Store have been updated to detect such apps.

 Below is the list of infected apps:

RTO Vehicle Information
EMI Calculator & Loan Planner
File Manager - Documents
Smart GPS Speedometer
CrickOne - Live Cricket Scores
Daily Fitness - Yoga Poses
FM Radio PRO - Internet Radio
My Train Info - IRCTC & PNR​ (not listed under developer profile)
Around Me Place Finder
Easy Contacts Backup Manager
Ramadan Times 2019
Pro Restaurant Finder - Find Food
BMI Calculator PRO - BMR Calc
Dual Accounts Pro
Video Editor - Mute Video
Islamic World PRO - Qibla
Smart Video Compressor

The developer of these is AppAspect Technologies, from India with apps for iOS as well as Android. Wandera said that on examining these apps, they didn't contain the clicker Trojan malware but they used too. Covington thinks it's a possibility that they used to contain Trojan but were pulled from the store, and republished after removing the Trojan module, perhaps the bust on Play store made them retreat and focus their attention on iOS.

According to Wandera, the Trojan not only performed adware but also steal information and data to send to external command or controller, create back-doors, performance degradation, battery drain and heavy bandwidth use. The fact that they published on App Store and remained undetected is alone a matter of concern. “We were amazed with this one,” Wandera VP Michael Covington said in a statement to Forbes. “We've seen a couple of issues creep into the Apple App Store over the last few months—and it always seems to be the network element.”

Apple stands it's ground that any such Trojan malware existed, saying there was no danger beyond ad click-through fraud. But the good news is, the problem is solved on deleting the apps and no remains are left behind. “There is no access to special frameworks that might have left something behind,” Covington explained.

Apple Apologises To Siri Users for “Not Fully Living Up To Their High Ideals”




Apple apologizes to Siri users for not 'fully living up to their ideals' as well as enabling temporary workers to tune in to voice recordings of Siri users so as to review them.

The announcement was made after a review of the grading programme was finished, which had been triggered to reveal its existence with the help of a Guardian report.

 “As a result of our review, we realise we have not been fully living up to our high ideals, and for that we apologise, as we previously announced, we halted the Siri grading program. We plan to resume later this fall when software updates are released to our users.” Apple said in an unsigned statement posted to its website.

The company committed to three changes to the way Siri is run after it resumes the grading programme:
  • It will no longer keep audio recordings of Siri users by default, though it will retain automatically generated transcripts of the requests.                                                                                
  • Users will be able to opt in to sharing their recordings with Apple. “We hope that many people will choose to help Siri get better,” the company said.                                                                        
  • Only Apple employees will be allowed to listen to those audio samples. The company had previously outsourced the work to contracting firms. Over the past two weeks, it has ended those contracts, resulting in hundreds of job losses around the world.


In the past six months, almost every significant producer of voice-assistance technology has been 'revealed' to have been operating human-oversight programs, having run them in discreetly for a considerable length of time. Many out of them have sworn in to change their frameworks.

Amazon was the first to have been identified, then came along Google and Microsoft, with the former pledging to review its safeguards and the latter updating its privacy policy.

Apple and Samsung smart phones emits more radiofrequency radiation than allowed


Radiofrequency radiation emitted from popular smartphones like iPhone 7 and Samsung Galaxy S8 is more than double over the legal safety limit set by the US regulators, a Chicago Tribune investigation reveals.

The Federal Communications Commission, which regulates phones emission, cleared the devices for the sale, on its website it states that the device “will never exceed” the maximum allowable exposure limit, which is harmful to humans.

“We take seriously any claims on non-compliance with the RF (radiofrequency) exposure standards and will be obtaining and testing the subject phones for compliance with FCC rules,” agency spokesman Neil Grace said.

The test was sponsored by the Tribune and conducted as per the federal guidelines at an accredited lab.

A year ago, the Tribune set out an important question to explore: Are cellphones as safe as manufacturers and government regulators say?

The Tribune tested 11 cellphones by measuring how much radiofrequency radiations were absorbed by the human body if the device is positioned near to it. Most of the popular smartphones were proved to be hazardous for the human body.

Apple then issued a statement, questioning the Tribune's test results for the iPhone 7s “were inaccurate due to the test setup not being in accordance with procedures necessary to properly assess the iPhone models.”

“All iPhone models, including iPhone 7, are fully certified by the FCC and in every other country where iPhone is sold,” the statement said. “After careful review and subsequent validation of all iPhone models tested in the (Tribune) report, we confirmed we are in compliance and meet all applicable … exposure guidelines and limits.”

The Tribune tested 11 cellphone models by measuring how much radiofrequency radiation was absorbed by a simulated body positioned near the phone. The Federal Communications Commission has set an exposure limit of 1.6 watts per kilogram averaged over one gram of tissue.

A Slip-Up of Apple Leads to Most of Its Up-To-Date iPhones Vulnerable to Hacking Risk




Apple has apparently left its most up-to-date iPhones vulnerable against a rather hacking risk due to unpatching a bug in the most recent iOS 12.4 update that it had fixed in the earlier iOS 12.3 update. Furthermore, because of the slip-up, all iPhones running iOS 12.4 would now be very easily jailbroken and a few iPhone users have just tweeted that they are effectively running the "jailbreak".

Since jailbreaking an iPhone gives users a chance to modify their iOS devices and run unsupported apps,some security researchers have officially begun exploiting the vulnerability in iOS 12.4 and released a public "jailbreak" on an 'open-sourced software development platform' GitHub.

A security researcher going by the name of "Pwn20wnd" has published a jailbreakfor iOS 12.4, " The exploits for the iPhone can sell for millions of dollars, which means that no one has been willing to release jailbreak code publicly because Apple will quickly patch it," said the report.

Since had fixed this defect, found by a Google hacker, in the earlier iOS 12.3 version.

Ivan Krstic, Head of Security Engineering and Architecture at Apple had as of late declared to pay up to $1 million to security researchers for discovering the flaws and vulnerabilities as a feature of its bug bounty program, during the annual  Black Hat security conference in Las Vegas.

Nonetheless Security experts continue to warn users to be careful of what apps they download with this jailbreak.

New Vulnerability in Bluetooth Connections Allows Hackers to Spy on Private Conversations


Bluetooth is used worldwide as one of the most convenient methods of connecting and controlling the devices in range. However, according to a recent report, a vulnerability labeled as the KNOB (Key Negotiation of Bluetooth) attack has been found in Bluetooth connections.

All the Bluetooth compliant devices can be affected by the vulnerability, which allows attackers to spy on a victim's personal conversations. Hackers can also exploit the vulnerability to manipulate the data present on the compromised device.

How the attack unfolds? 

While establishing a functional Bluetooth connection, both the devices rely upon an encryption key. Therefore,
in order to execute the attack, hackers exploit the vulnerability in the Bluetooth standard and weaken this encryption of Bluetooth devices instead of breaking it straightaway.

The attacker gets in the way while the devices are setting up the encryption key and resorts to brute force attack for breaking the new key with less number of digits and manipulates both the devices to employ the new encryption key.

The vulnerability affects devices by some of the renowned manufacturers namely, Apple, Qualcomm, and Intel. Companies like Apple, Microsoft, Cisco, Google, Blackberry, Broadcom and Chicony has already issued a patch to fix the flaw, as per the reports by Mashable.

The group of researchers from the Singapore University of Technology and Design, University of Oxford, and CISPA Helmholtz Center for Information Security, who found this critical vulnerability, explained, "We found and exploited a severe vulnerability in the Bluetooth specification that allows an attacker to break the security mechanisms of Bluetooth for any standard-compliant device. As a result, an attacker is able to listen, or change the content of, nearby Bluetooth communication, even between devices that have previously been successfully paired."

Hack an iPhone, win $ 1 million


Apple has massively increased the amount it’s offering hackers for finding vulnerabilities in iPhones and Macs, up to $1 million. It’s by far the highest bug bounty on offer from any major tech company.

That’s up from $200,000, and in the fall the program will be open to all researchers. Previously only those on the company’s invite-only bug bounty program were eligible to receive rewards.

As Forbes reported on Monday, Apple is also launching a Mac bug bounty, which was confirmed Thursday, but it's also extending it to watchOS and its Apple TV operating system. The announcements came in Las Vegas at the Black Hat conference, where Apple’s head of security engineering Ivan Krstić gave a talk on iOS and macOS security.

Forbes also revealed on Monday that Apple was to give bug bounty participants “developer devices”—iPhones that let hackers dive further into iOS. They can, for instance, pause the processor to look at what’s happening with data in memory. Krstić confirmed the iOS Security Research Device program would be by application only. It will arrive next year.

$1 million for an iPhone hack

The full $1 million will go to researchers who can find a hack of the kernel—the core of iOS—with zero clicks required by the iPhone owner. Another $500,000 will be given to those who can find a “network attack requiring no user interaction.” There’s also a 50% bonus for hackers who can find weaknesses in software before it's released.

Apple is increasing those rewards in the face of an increasingly profitable private market where hackers sell the same information to governments for vast sums.

As Maor Shwartz told Forbes, the cost of a single exploit (a program that uses vulnerabilities typically to take control of a computer or phone) can fetch as much as $1.5 millon. An exploit targeting WhatsApp where no clicks are required from the user, for instance, can be sold to a government agency for that much, though such tools are rare. Only one or two a year will be sold, from a pool of around 400 researchers who focus on such high-end hacking. “It’s really hard to research them and produce a working exploit,” he said.

A Bunch of Loopholes in Apple’s iMessage App?


Apple’s devices could be vulnerable to attacks owing it to a few flaws that the researchers have uncovered in its iMessage app.

Where, in one case, the extent of severity of the attack happens to be so large that the only way to safe-guard the device would be to delete all data on it.

The other case saw some files being copied off the device without needing the user to do anything. The fixes were released last week by Apple.

But somehow there was a problem which couldn’t be fixed in the updates, which was brought to the attention of the company by the researchers.

Google’s Project Zero Team was established in July 2014 with an aim to dig all the “previously undocumented cyber vulnerabilities”.

Samaung, Microsoft, Facebook and a few others were warned off by this team regarding the problems in their code.

The unrepaired flaw, according to Apple’s own sources could aid the hackers to crash an app or execute commands of its own accord on iPads, iPhones and iPod Touches.

Installation of new version of the iOS (iOS 12.4) has been strongly advised by the organization. The attacks/dangers could be easily handled by keeping the software up-to-date.

Israeli spyware firm NSO can mine data from social media accounts









An Israeli spyware firm has claimed that they can scoop  user data from the world’s top social media, the Financial Times report. 

The powerful malware Pegasus from NSO Group is the same spyware that breached WhatsApp data earlier this year. 

The firm said that this time their malware can scrap data from the servers of Apple, Google, Amazon, Facebook, and Microsoft. 

According to the reports of the Times, the NSO group had “told buyers its technology can surreptitiously scrape all of an individual’s data from the servers of Apple, Google, Facebook, Amazon and Microsoft, according to people familiar with its sales pitch”.

However, the companies spokesperson denied the allegation in a in written statement to AFP’s request for comment. 
“There is a fundamental misunderstanding of NSO, its services and technology,” it said.

“NSO’s products do not provide the type of collection capabilities and access to cloud applications, services, or infrastructure as listed and suggested in today’s FT article.”

In the mean time, Amazon and Google told AFP that they have started an investigation on the basis of report, but so far found no evidence that the software had breached their systems or customer accounts.




Apple pushes out silent update for Mac users to remove Zoom web server

Earlier this week, a US-based security researcher named Jonathan Leitschuh had publicly disclosed a major vulnerability in the Zoom video conferencing software for Apple’s Mac computers which could make any website start a video-enabled call by hacking the webcam of the system. Now, according to a report by TechCrunch, Apple has pushed out an update silently to the macOS which removes the Zoom web server.

As per the report, the US-based technology giant has confirmed the said update has been released and it is installed automatically and does not require any interaction with the user. The purpose of the update is only to remove the local web server installed by the Zoom app. The company said that it pushed the update to protect its users from the risks posed by the exposed web server.

According to Leitschuh’s claims earlier this week, even if Mac users uninstall the Zoom app from their system, the web server continues to persist and it can reinstall Zoom without the user’s permission.

In a statement to The Verge and ZDNet, Zoom had said that it developed the local web server to save Mac users from too many clicks, after Apple changed their Safari browser in a way that requires Zoom users to confirm that they want to launch Zoom every single time. Zoom also said that it will tweak the app such that it will save the user’s and administrator’s preferences for whether the video will be turned on, or not, when they first join a call.

However, it seems Apple took it upon itself to rescue its users from the security vulnerability posed by Zoom app. The silent update was all the more needed because Zoom had installed a local web server that could reinstall the app even if the user had previously uninstalled it.

The Rise of Fingerprinting and Monitoring Of Our Digital Activities




 The concept of digital privacy has evolved so much with time that regardless of whether we secure our data to ensure that we are not tracked on the web, the ad tech industry, through some way or different finds ways to monitor our digital activities.

Being alluded to as a cutting edge tracking technology by security researchers, the fingerprinting technology has for sure achieved new statures.

While it incorporates taking a look at the many characteristics of the user's mobile device or computer, like the screen resolution, operating system and model, it likewise very effectively while triangulating this data, pinpoints and follows the user as they browse the web and make use of the other apps.

Presently since the technique happens imperceptibly out of sight in applications and websites, it becomes very hard to block the particular technology at whatever point it isn't required.

In the course of the most recent couple of years, tech companies like Apple and Mozilla 'introduced aggressive privacy protections' in their internet browsers to make it harder for advertisers to follow the users around the web and serve targeted ads on promotions.

But since a large number of those technologies ended up getting blocked by default, the advertisers needed to come up with an alternate method to track more users.

That is when the fingerprinting technology becomes an integral factor, as it gathers apparently harmless attributes that are commonly shared as default to make applications and sites work appropriately, which happens when the users gives an application the consent to access their location data, their camera and microphone. Thus, many other browsers likewise require the permission before a website can access those sensors.

While some state that the fingerprint method can be dependable and reliable, others say that it is abusive on the grounds that in contrast to cookies, which the users can see and delete, one for the most part can't tell it is going on and can't opt out it.

Nonetheless the solutions for averting fingerprinting are generally new, and some are still being developed. Thus it is difficult to tell how powerful they are since fingerprinting happens undetectably. So here are a few solutions for blocking browser fingerprinting.
  1. Apple users can make use of the protections installed in the Safari browser for computers and mobile devices.
  2. Android users and Windows users can try the Firefox web browser.
  3. Furthermore, the other desktop browsers can easily install an add-on.

In case of mobile users:
Privacy Pro and Disconnect Premium can examine the application activities on the device to recognize and block trackers, including finger printers.

Since Fingerprinting is a perplexing subject since the tracking method applies to both the web and mobile applications it is thusly recommended for the users to become familiar with it and be one at least one step ahead in ensuring their privacy protection themselves.

Apple Series 4 Watches- Primary Focus on Health; A Bridge between Users and Doctors!





Last year apple made a gigantic announcement for its “Watch Fanatics”. That’s right, the Series 4 which is bulked with heart monitoring, ECG and fall detection for a richer doctor-patient relationship.

Apple’s VP of Health , Dr. Sumbul Desai voiced that the latest products are being designed in regard with the “partnership with your physician”.

As it happens, before associating with Apple, Dr. Desai was the vice-chair of strategy and innovation for the department of medicine at Stanford Medical.

According to her there is something “sacred and special” about the doctor-patient dynamic and if ways could be found to make it better they should be thought upon.

The Apple watches will make it all the easier for doctors as well as patients to focus more on counselling than collecting data and doing research.

The Apple watch would help capture the data and then give it to the physician in “a meaningful way”. This will help the sessions be more productive.


Apple, with the announcement of Series 4 and related health features is certainly looking forward to expanding its hold in the health industry.

Apple is all about, according to Dr. Desai, empowering consumers and guiding them towards a better understanding of health.

The Apple Watch is a device that will help you stay connected and aid you to be healthier and fit especially with the newly introduced activity trends in watch OS 6.

The other features of the excitingly fantastic compact device include the noise app, cycle tracking and heart features.

Per Dr. Desai, wearing the Apple watch every day will help the users lead a healthier and more conscious life as it’s a powerful way to keep on the track of health.

Evidence and science based methods are being employed to develop the aforementioned features and study how the information is surfaced individuals.

Apple conducted a heart study in collaboration with Stanford medicine which covered over 400,000 patients to contemplate whether the watch’s heart-rate sensor could detect irregular rhythms.

The heart study happened to be an example of a new data type and its relation with the clinical medicine. Also it reflected upon the creation of scientific evidence based on these new data.

Apple is known for the way it keeps the data all safe and secure always keeping in mind the importance of the users’ control over the decisions of how to share it and whom to share with.

And now it is going to be pretty prominent in the field of health because at Apple they consider it to be their responsibility.

Facebook's Defunct Research Program Collects 'Untargeted' Data That May Be Sensitive On Almost 200K Users



Facebook's recently launched research program came down with a huge crash as it 'harvested the potential sensitive personal data' of approximately 187,000 people around the globe, including a large number of teenagers of the US.

Apple had already prohibited the use of the application practically about a year back and correspondences among Facebook and Sen. Richard Blumenthal's office detail the breadth of the organization's data collection program for the first time since then.

As indicated by those emails, of the about 190,000 individuals participating, 31,000 were US residents and 4,300 of those natives were between the ages of 13 to 17-years of old. The remaining users were located in India, says the report.

The now-banned research program named Project Atlas and the Research application were although terminated not long ago after reports came of the abuse of a special developer's certificate that enabled the organization to sidestep Apple's App Store.

In the program, the participants were paid $20 every month to download an altered VPN, in which the organization sucked up an enormous sum of personal data, including web browsing histories, encrypted messages, application activity, and much more.

Apple repudiated the enterprise privileges of both Facebook and Google which was likewise observed to manhandle its developers certificate.

Facebook said it decided not to decrypt the majority of the data collected by the program and didn't expand on what the 'non-targeted' content was cleared up in the process.

The contention though hasn't halted Facebook from proceeding to seek after mobile users data through broad market program.



Regardless in another 'iteration announced' only the earlier week called 'Facebook Study,' only accessible through Google Pay, the company says it will compensate users in return for a variety of data points about precisely how and when they use apps on their phones.

Apple’s Lightning Port to be Switched by Android-Style USB-C type on the New iPhone 11?






It’s in the air that there’s a strong chance of Apple abandoning its Lightning port for a USB-C type charging port with its next iPhone.

As quite strongly established the “Lightning” had been a key feature since 2012 and if Apple follows through, the old cables would become superfluous.

A “Screengrab” of the new recovery mode screen in iOS 13 (the next version of Apple’s iPhone software) kind of confirms the deal.

Apple has already undertaken the USB-C cables for its iPad Pro. The change if executed on the phones will lead to all the current chargers going down the drain lest to be used for the new phones.



The iPhone 13 download isn’t absolutely out in the open yet but, it will be officially released in September along with the fresh and new iPhone 11. Fans can obviously access a beta version of it via the Apple websites.

Along with the change in cables, reportedly, the common iTunes icon will also no longer be there and could be replaced by an icon of a “laptop”.

In the older versions of the OS, the cable would point to the iTunes logo during a restore from the computer. But now, it shows a generic silhouette of a laptop.

Also, iTunes could now be split into Music, Podcasts and Books.



The USB-C type is a standard connector for several Android phones and laptops and is inherently being use by Samsung , OnePlus and Google Pixel in some of their phones.

Original Apple chargers sell for around $25 and the copies are available for quite a low amount. But, for quite some time now USB-C has made quite a fan base.

These C type cables allow the devices to charge way faster than any other older type of cable could as it allowed only a limited amount of power in.

After iPad Pro being released with the C-type port Apple enthusiasts had been hoping for a similar change and feature availability in the new iPhones.


Apple has come a long way since it ditched the 30-pin connector in 2012 and embraced the “Lightning” port.

But should the port be changed the older adapters and chargers would all be rendered redundant. The users sure have raised a few complaints before the Apple Launch event.

Apple to shut down iTunes




Apple has officially confirmed that they are now shutting down their 18-year-old iTunes music library and replacing it with three new different apps. 

The firm revealed it will be launching three newer entertainment apps Apple Music, Apple Podcast, and Apple TV. 

The users of iTunes music should not worry as they will still have access to their existing music library. 

“Users will have access to their entire music library, whether they downloaded the songs, purchased them or ripped them from a CD,” reads a press release.

The customer’s music library would be automatically transferred to Apple Music, audiobooks and podcasts would be shifted to Apple Podcast, and videos will be stored in the Apple TV app. 

However, users using any other operating system rather than a Mac, will not be able to download the latest three apps, and for them, iTunes Music would be still available. 


This WWDC 2019 Its iOS 13, macOS Catalina, And More



At its Worldwide Developers Conference (WWDC) 2019 event Apple disclosed the 'next variant' of its operating system for Macs dubbed as macOS Catalina.

Being quite a progressive upgrade over the macOS 10 Mojave operating system and will be made accessible to eligible Mac users in fall 2019 while the public beta for macOS Catalina is scheduled to arrive in July 2019.

The expansion of the cross platform applications under Project Catalyst is a component that was first presented with macOS Mojave and iOS 12 for the organization's own applications and is considered as one of the biggest one.

Through iOS 13 and, Apple will now enable its developers to use this element for testing their very own applications for compatibility.



Aside from the introduction of macOS Catalina, Apple additionally displayed its new 'Find My' app likewise to be made accessible to iOS. The 'Find My' app incorporates yet another network feature system with the assistance of which consumers can track their Apple devices notwithstanding when they are not connected with the internet.

As a piece of the company's new cross platform application initiative, a large number of new and upgraded applications, including Apple Music, Podcasts, Books, TV and Reminders have likewise been brought into highlight.

While the music and TV apps are the new ones, the podcasts, Books and Reminders apps are simply overhauled. The Music app is known to have been supplanting iTunes, which has been being used for a long time now.

Notwithstanding this, the other updations made by Apple incorporates features like Sidecar, RealityKit and the Swift UI.

While the Sidecar is introduced with macOS Catalina, with the capacity to send any app to an external display, which includes connected monitors and iPads. The RealityKit feature accessible in Apple's AR Kit 3 can be accessed by developers within Xcode and numerous apps like Minecraft have already begun utilizing it.

Finally the Swift UI feature is the successor to the Swift code language Apple presented a couple of years prior, this element makes it a lot simpler for the developers to code apps for the majority of Apple's platforms and the X code -preview highlight displays how the apps will look like, in real life.




Teen sues Apple for $1 billion over Face-recognition software




A student in New York has sued Apple Inc for $1 billion, over the company’s facial-recognition software which falsely linked him to a multiple of thefts from the Apple stores. 

According to the victim, Ousmane Bah, 18,  he was arrested from his home in November and was charged with stealing from an Apple store. 

In a law suit filed by him on Monday, states that even the photo on the arrest warrant didn’t resembles him, and the theft he was charged with, in Boston, took place on the day in June he was attending his senior prom in Manhattan.

It is not clear yet how real thief is using his identification details in the Apple store. However, he did admit that he lost his a non-photo learner’s permit, which may have been found or stolen by the thief and being used as identification proof in Apple stores. 

As a result, the victim claim that his identification details are  connected to the thief’s face in Apple’s facial-recognition system, which he said the company uses in its stores to track people suspected of theft.

“He was forced to respond to multiple false allegations which led to severe stress and hardship,” states the complaint.


Google and Apple removes TikTok from App Stores in India




Google and Apple has removed the Chinese video app Tiktok from their App Stores, a day after Indian Government urged the companies to do so. 

India’s Ministry of Electronics and Information Technology (MeitY) requested the companies to block the app after the  state court ordered to ban access of the app as questions regarding its usage were raised. It was noted that people were using it for pornographic purposes and exploiting children.

According to  analytics firm Sensor Tower, TikTok had the highest number of users in India, and 75% of them were women. It has been downloaded more than 230 million times. 

However, a TikTok representative said that he “faith in the Indian judicial system.” The company hopes that they would be able to lift the ban and would come stronger than before, “We are optimistic about an outcome that would be well received by over 120 million monthly active users in India.”

The app has already banned in Bangladesh and had faced largest ever fine in the United States for illegaly collecting informations on children. 

TikTok users in India who had previously downloaded the app on their phones were still able to use the service on Wednesday.

TikTok's official statement: ’’At TikTok, we have faith in the Indian Judicial system and the stipulations afforded to social media platforms by the Information Technology (Intermediaries Guidelines) Rules, 2011. We are committed to continuously enhancing our existing measures and introducing additional technical and moderation processes as part of our ongoing commitment to our users in India.’’

‘’In line with this, we have been stepping up efforts to take down objectionable content. To date, we have removed over 6 million videos that violated our Terms of Use and Community Guidelines, following an exhaustive review of content generated by our users in India."




Indian Government asks Apple and Google to remove TikTok from App Stores







The government of India has asked Google and Apple to remove the Chinese short-video sharing application TikTok from their app stores.

India’s Ministry of Electronics and Information Technology (MeitY) reportedly asked the companies to do so after the Supreme Court of India, refused to stay an order by the Madras High Court to ban the app. 

The bench was headed by the Chief Justice Ranjan Gogoi, and the matter was posted till April 22, as the Madras High Court is expected to hear the case on April 16. 

TikTok's official statement: ’’As per the proceedings in the Supreme Court today, the Madras High Court will hear the matter on ex party ad interim order. The Supreme Court has listed the matter again for April 22, 2019, to be apprised of the outcome of the hearing on the April 16th, 2019 before the Madurai Bench of Madras High Court.’’

‘’At TikTok, we have faith in the Indian Judicial system and the stipulations afforded to social media platforms by the Information Technology (Intermediaries Guidelines) Rules, 2011. We are committed to continuously enhancing our existing measures and introducing additional technical and moderation processes as part of our ongoing commitment to our users in India.’’

‘’In line with this, we have been stepping up efforts to take down objectionable content. To date, we have removed over 6 million videos that violated our Terms of Use and Community Guidelines, following an exhaustive review of content generated by our users in India."