Recent Posts

Pages: 1 ... 3 4 [5] 6 7 ... 10
41
Android O.S | Apps / How To Deep Clean Your Android Device The Right Way
« Last post by javajolt on February 18, 2026, 12:34:19 AM »
People use smartphones everywhere, without necessarily realizing they're exposing the handsets to all sorts of germs and dirt. In addition to collecting dirt while in use, phones can accumulate dust and lint while sitting in purses or pockets. That's why it's important to give our handsets a deep clean regularly, while also ensuring the cleaning process is safe for the device's components. In what follows, we'll tell you everything you need to know to clean your Android phone thoroughly.

Many people may use protective accessories with their Android devices. These should be included in the cleaning process. You won't remove the screen protector from the display, but you will want to take the handset out of the case. Then, you'll want to clean the case separately (skip this step if you don't use one). You may want to start the cleaning procedure with the case. Power off the handset, remove any connected charging cables or headphones, and take it out of the case. Place the handset on a secure surface so it doesn't slip, and clean the case.

Since cases are made of all sorts of materials, the cleaning procedure will vary. You'll want microfiber cloths on hand for the job, one for using cleaning solutions, and one for drying the case at the end. For plastic, you can use soap and warm water or an ammonia-free spray cleaner. Bleach can be used on plastic cases if needed, but not on silicone. On that note, silicone and rubber cases can be cleaned with dish soap and water. Baking soda can come in handy if the silicone case is stained or dirty. Wood and leather cases can be cleaned with wood or leather cleaner, but you should spray the solution on a microfiber cloth, not the case.

How to clean the screen of your Android phone

Once the case is cleaned and dried, you may leave it to air-dry while you clean the handset. Both Google and Samsung advise users to use soft, lint-free cloths for wiping the entire phone. A microfiber cloth may be the best choice for the job. It should remove dust and smudges from the screen, rear panel, cameras, and sides. You'll want to be careful with the screen protector when cleaning the phone, with Google explicitly advising Pixel 10 Pro Fold users not to remove the protective film or pick at the edges.

A separate, damp cloth can be used to remove any visible markings, like makeup or color transfers. Samsung notes that you can dampen the corner of a microfiber cloth with distilled water for grime that's harder to remove. For the display, you can use screen wipes or eyeglass cleaner, according to Google, while soap and bleach-free cleaning wipes work on the back and sides of Pixel phones. You can use similar tools to clean Android phones from other vendors, not just Pixel and Galaxy devices.

Users who want to disinfect their devices can use alcohol-based wipes (70% isopropyl), according to Google. Samsung also lists hypochlorous acid-based solutions or solutions that contain "more than 70% ethanol or isopropyl alcohol." Bleach should not be used on any surface of the phone. Regardless of the substance, you should not spray or spill the solutions directly onto your phone. Instead, use a microfiber cloth to apply the disinfectant and then clean the display, the cameras, the sides, and the back. A dry microfiber can be used immediately after that to dry the phone.

You'll want to pay attention to the phone's ports, whether it's the USB-C port (or a different connector), the speaker, or the 3.5 mm headphone port (if your phone still has one). Dust can accumulate in these openings and interfere with normal function. You may find the phone doesn't charge, or the sound isn't as crisp as it used to be. Do not use any liquids to remove any dust from those openings. Also, smartphone vendors including Apple, Google, and Samsung advise against using compressed air when cleaning phones. Apple and Samsung suggest using gentle brushes to remove any debris from speakers. Brushes should be clean and dry. The charging port may be trickier. You can use a toothpick to try to remove any visible lint, but you should be very gentle about it.

The entire deep clean process should not take very long, but you may not want to repeat it every day. That said, you can clean the display and case every day with a dry microfiber. This will remove smudges and fingerprints. You can then do a periodic deep clean when needed. As for disinfecting the Android handset, it's up to the user to decide when to do that.

A study published in Antimicrobial Resistance & Infection Control in early 2026 found that cleaning mobile phones belonging to healthcare workers with 70% isopropanol leads to a "significant reduction in microbiological contamination." A 2024 study published in South African Medical Journal also showed that using a 70% isopropyl alcohol solution to clean the phones belonging to healthcare workers in a paediatric intensive care unit was 67% more effective than ultraviolet light disinfection at killing pathogens. These studies indicate that periodic phone disinfection will remove more than grime and lint.

source
42
Apple / Apple patches zero-day flaw that could let attackers take control of devices
« Last post by javajolt on February 16, 2026, 11:26:48 PM »


Apple has released security updates for iPhones, iPads, Macs, Apple Watches, Apple TVs, and Safari, fixing, in particular, a zero-day flaw that is actively exploited in targeted attacks.

Exploiting this zero-day flaw would allow cybercriminals to run any code they want on the affected device, potentially installing spyware or backdoors without the owner noticing.

Installing these updates as soon as possible keeps your personal information—and everything else on your Apple devices—safe from such an attack.

CVE-2026-20700

The zero-day vulnerability tracked as CVE-2026-20700, is a memory corruption issue in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code.

Apple says the vulnerability was used as part of an infection chain combined with CVE-2025-14174 and CVE-2025-43529 against devices running iOS versions prior to iOS 26.

Those two vulnerabilities were already patched in the December 2025 update.

Updates for your particular device

The table below shows which updates are available and points you to the relevant security content for that operating system (OS).



How to update your Apple devices

How to update your iPhone or iPad

For iOS and iPadOS users, here’s how to check if you’re using the latest software version:

• Go to Settings > General > Software Update. You will see if there are updates available and be guided through installing them.

Turn on Automatic Updates if you haven’t already—you’ll find it on the same screen.



How to update macOS on any version

To update macOS on any supported Mac, use the Software Update feature, which Apple designed to work consistently across all recent versions. Here are the steps:

• Click the Apple menu in the upper-left corner of your screen.

• Choose System Settings (or System Preferences on older versions).

• Select General in the sidebar, then click Software Update on the right. On older macOS, just look for Software Update directly.

• Your Mac will check for updates automatically. If updates are available, click Update Now (or Upgrade Now for major new versions) and follow the on-screen instructions. Before you upgrade to macOS Tahoe 26, please read these instructions.

• Enter your administrator password if prompted, then let your Mac finish the update (it might need to restart during this process).

• Make sure your Mac stays plugged in and connected to the internet until the update is done.

How to update Apple Watch

Ensure your iPhone is paired with your Apple Watch and connected to Wi-Fi, then:

• Keep your Apple Watch on its charger and close to your iPhone.

• Open the Watch app on your iPhone.

• Tap General > Software Update.

• If an update appears, tap Download and Install.

• Enter your iPhone passcode or Apple ID password if prompted.

Your Apple Watch will automatically restart during the update process. Make sure it remains near your iPhone and on charge until the update completes.

How to update Apple TV

Turn on your Apple TV and make sure it’s connected to the internet, then:

• Open the Settings app on Apple TV.

• Navigate to System > Software Updates.

• Select Update Software.

• If an update appears, select Download and Install.

The Apple TV will download the update and restart as needed. Keep your device connected to power and Wi-Fi until the process finishes.

How to update your Safari browser

Safari updates are included with macOS updates, so installing the latest version of macOS will also update Safari. To check manually:

• Open the Apple menu > System Settings > General > Software Update.

• If you see a Safari update listed separately, click Update Now to install it.

• Restart your Mac when prompted.

If you’re on an older macOS version that’s still supported (like Sonoma or Sequoia), Apple may offer Safari updates independently through Software Update.

More advice to stay safe

The most important fix—however inconvenient it may be—is to upgrade to iOS 26.3 (or the latest available version for your device). Not doing so means missing an accumulating list of security fixes, leaving your device vulnerable to newly found vulnerabilities.

 But here are some other useful tips:

• Make it a habit to restart your device on a regular basis.

• Do not open unsolicited links and attachments without verifying with the trusted sender.

• Remember: Apple threat notifications will never ask users to click links, open files, install apps or ask for account passwords or verification codes.

• For Apple Mail users, these vulnerabilities create risk when viewing HTML-formatted emails containing malicious web content.

Malwarebytes for iOS can help keep your device secure, with Trusted Advisor alerting you when important updates are available.

•If you are a high-value target, or you want the extra level of security, consider using Apple’s Lockdown Mode.

source
43
Intel / Intel's new Wi-Fi driver for Windows 10 and 11 brings new network features
« Last post by javajolt on February 12, 2026, 07:56:16 PM »


Intel has released a new Wi-Fi driver for supported Intel network cards and operating systems. Version 24.20.0 introduces a new setting that manages how the driver selects the access point when roaming (switching between access points). It allows you to prioritize access points depending on the channel load or switch back to typical parameters, such as signal strength. This theoretically allows switching to a network with better connection stability and speed.

In addition, the latest release improves the overall stability and connectivity reliability, plus various "minor issues."

• New option in Advanced settings to toggle the Channel‑Load usage for AP selection during roaming.   

• Improved system stability and more reliable connectivity.

• Enhanced Wi-Fi sensing functionality.

This software version 24.20.0 has been updated to include functional updates. There may be other minor issues addressed that will impact performance, stability, or vendor-specific functionality not listed above. Users are encouraged to update to the latest version for the best performance.

Intel"s new Wi-Fi driver is available for the following network cards:



Intel Wireless Driver 24.20.0 supports 64-bit Windows versions, including Windows 11 and 10. 32-bit Windows 10 is not supported. Note that although the driver still supports Windows 10, official Wi-Fi 7 support is only present on Windows 11 version 24H2 and newer. Therefore, if you want to use the latest Wi-Fi standard, you have to leave Windows 10 behind.

You can download the latest Wi-Fi driver from Intel"s official website using this link.

source
44


Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also addresses five "Critical" vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.

The number of bugs in each vulnerability category is listed below:

   ■ 25 Elevation of Privilege vulnerabilities

   ■ 5 Security Feature Bypass vulnerabilities

   ■ 12 Remote Code Execution vulnerabilities

   ■ 6 Information Disclosure vulnerabilities

   ■ 3 Denial of Service vulnerabilities

   ■ 7 Spoofing vulnerabilities

When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.

As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.

"With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates," explains Microsoft in the Windows 11 update notes.

"Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout."

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.

6 actively exploited zero-days

This month's Patch Tuesday fixes six actively exploited vulnerabilities, three of which are publicly disclosed.

Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The six actively exploited zero-days are:

CVE-2026-21510 - Windows Shell Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.

"To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file." explains Microsoft.

"An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent," continued Microsoft.

While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

CVE-2026-21513 - MSHTML Framework Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.

"Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network," explains Microsoft.

There are no details on how this was exploited.

This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.

CVE-2026-21514 - Microsoft Word Security Feature Bypass Vulnerability

Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.

"An attacker must send a user a malicious Office file and convince them to open it," warns Microsoft's advisory.

"This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control," continues Microsoft.

Microsoft says that the flaw cannot be exploited in the Office Preview Pane.

The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.

CVE-2026-21519 - Desktop Window Manager Elevation of Privilege Vulnerability

Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.

"An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," warns Microsoft.

No details have been shared on how it was exploited.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).

CVE-2026-21525 - Windows Remote Access Connection Manager Denial of Service Vulnerability

Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.

"Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally,' explains Microsoft.

Microsoft has attributed the discovery of the flaw to the ACROS Security team with 0patch.

ACROS CEO Mitja Kolsek told BleepingComputer that the exploit was found in a public malware repository but is unsure how it is being exploited in attacks.

"We found an exploit for this issue in December 2025 in a public malware repository while searching for an exploit for CVE-2025-59230," Kolsek told BleepingComputer.

"This issue turned out to be a 0day at the time, so we patched it (blog.0patch.com/2025/12/free-micropatches-for-windows-remote.html) and reported it to Microsoft. We don't have any information on it having been exploited, but the quality of the combined exploit for both issues suggested professional work."

CVE-2026-21533 - Windows Remote Desktop Services Elevation of Privilege Vulnerability

Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.

"Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally," explains Microsoft.

Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.

CrowdStrike told BleepingComputer that the exploit they observed allows threat actors to add a new user to the Administrator group.

"The CVE-2026-21533 exploit binary modifies a service configuration key, replacing it with an attacker-controlled key, which could enable adversaries to escalate privileges to add a new user to the Administrator group," Adam Meyers, Head of Counter Adversary Operations, CrowdStrike, told BleepingComputer.

"While CrowdStrike does not currently attribute this activity to a specific target or adversary, threat actors possessing the exploit binaries will likely accelerate their attempts to use or sell CVE-2026-21533 in the near term."

Of the six zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.

Recent updates from other companies

Other vendors who released updates or advisories in February 2026 include:

Adobe released security updates for Audition, After Effects, InDesign, Substance 3D, Adobe Lightroom Classic, and other software. None of the flaws are exploited.

BeyondTrust released security updates for a critical RCE flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software.

CISA issued a new binding operational directive requiring federal agencies to remove network edge devices that have reached the end of support.

Cisco released security updates for Secure Web Appliance, Cisco Meeting Management, and more.

Fortinet released security updates for FortiOS and FortiSandbox.

Google has released Android's February security bulletin, which includes no security fixes.

n8n fixed critical vulnerabilities that act as a patch bypass for the previously fixed CVE-2025-68613 RCE flaw.

SAP released the February security updates for multiple products, including fixes for two critical vulnerabilities.

While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.

The February 2026 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.







Update 2/10/26: Added information about how CVE-2026-21533 and CVE-2026-21525 are exploited.

source
45


Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.

Microsoft insists Windows 11 is still following an annual update cadence, which means Windows 11 26H2 is likely on track.

According to Microsoft, Windows 11 26H1 is based on a new platform release to support the upcoming ARM chips.

In a press release, Microsoft says it worked with OEMs and IHVs to support new device innovations and development via a new Windows Update.

"That means that this release is not being made available through broad channels but is only intended for those who purchase these new devices. At this time, devices with Qualcomm Snapdragon® X2 Series processors will come with Windows 11, version 26H1," Microsoft noted.

"Organizations should continue to purchase, deploy, and manage devices running broadly released versions of Windows 11 (e.g. versions 24H2 and 25H2) with confidence."

Microsoft also has an FAQ that clarifies version 26H1 is not a feature update for version 25H2, and that "there is no need to pause device purchases or OS deployments, and no changes are required to existing enterprise rollout plans."

Devices running Windows 11 26H1 won't get specific new features, as changes will be shared across platform releases, but version 26H1 should offer better performance or battery life on new ARM PCs.

All other PCs should get Windows 11 26H2 later this year, but Microsoft hasn't confirmed the fall release yet.

source
46
Quantum computers have just cleared a hurdle that many physicists once doubted they could overcome. In new experiments, the Google Quantum AI team showed that when they bundle more qubits together in the right pattern, the combined logical qubit actually makes fewer mistakes.

In technical terms, they have gone below the error correction threshold that future large-scale quantum machines will need.

Why should anyone outside a physics lab care about a tiny drop in error rates deep inside a metal box cooled almost to absolute zero? The answer has a lot to do with cleaner energy systems, new materials, and the race to cut climate pollution.

What did scientists actually achieve?

Quantum chips rely on fragile qubits that lose their information very quickly. Every tiny vibration or stray signal can nudge them off course, which is why today’s devices are still too noisy for real-world climate or chemistry problems.

To fight this, researchers use quantum error correction. Instead of trusting a single qubit, they spread one unit of information across many physical qubits and treat the whole patch as one logical qubit. When the physical qubits are good enough, adding more of them actually protects the logical qubit from noise.

That cut-off point is known as the surface-code threshold. In their latest work, Google’s Willow processor, a superconducting chip with qubits in a square grid, finally operated below that limit, and when the team enlarged their code from three-by-three qubits to five-by-five and then seven-by-seven, the logical error rate fell by about a factor of two at each step.

In simple terms, scaling up reduced the errors instead of multiplying them. One of the resulting logical qubits even lived more than twice as long as the best single qubit that helped build it.

For the quantum community, that shift signals that fault tolerant machines now look less like science fiction and more like a long but concrete engineering project.

Why this matters for climate solutions

At first glance, small changes in error rates inside a cryogenic chip sound far removed from air pollution, food prices, or the size of the electric bill. Yet many of the hardest climate and energy questions depend on solving extremely demanding computational problems.

Climate models that simulate oceans, clouds, forests, and cities already push some of the world’s largest supercomputers to their limits. Optimization problems that decide how to route power from thousands of solar panels, wind farms, batteries, and electric vehicles without blackouts or wasted energy are equally tough.

Quantum algorithms are being explored for better weather and climate prediction, power-grid optimization, and material discovery for batteries and solar cells.

Analysts expect that fault-tolerant quantum hardware could speed up the design of low-carbon technologies and industrial processes. One study by McKinsey, for example, estimated that quantum-enhanced climate technologies might unlock additional emissions cuts of several gigatons of carbon dioxide per year by the mid 2030s.

That kind of potential does not mean quantum computers will magically solve climate change. It does mean they could become powerful helpers for engineers and scientists who are already working on cleaner cement, more efficient catalysts, better carbon capture materials, and smarter, more flexible grids.

The energy footprint puzzle

There is also a catch. Quantum processors like Willow run just a fraction of a degree above absolute zero, inside dilution refrigerators that use a lot of electricity, and studies of quantum data centers show that cooling often consumes far more energy than the computation itself.

At the same time, early comparisons indicate that small quantum systems can already use much less power than today’s largest supercomputers for some tasks, so researchers are testing more efficient cooling, qubit types that work at higher temperatures, and ways to reuse waste heat.

Still a long road ahead

Google’s new result still uses only one logical qubit, so it remains a proof of concept rather than a practical machine. To run meaningful chemistry, climate, or grid simulations, researchers will need many interacting logical qubits and error rates that keep dropping as systems grow.

Even so, crossing the error threshold changes the conversation. Instead of asking whether quantum error correction can ever work, scientists are now focused on how fast it can scale and how to align that growth with planetary limits and climate goals.

For people who care about the environment, the message is measured but hopeful. Reliable quantum computers are not a silver bullet, yet they are slowly moving from lab curiosity toward a tool that could support cleaner technologies, more resilient energy systems, and better understanding of a warming planet.

The study was published in Nature.

source
47

For those who use Gmail, a major change is on the way, prompting a decision users must make.
(Dreamstime/TNS)TNS
It’s a major shift that deserves careful consideration.

Google has just announced two huge changes to Gmail.

Though one might be expected to some, the other comes out of left field, and as a result, more than 2 billion users of the world’s most popular email platform will find themselves at a crossroads and must make a major decision.

The changes come as one of the largest shifts in Gmail in more than two decades since it launched.

The company spoke about the new upgrades in its recent announcement, revealing that the AI upgrades that had been restricted to paid accounts will now be free.

So AI Overviews, Help Me Write and Suggested Replies will be available to all.

“Today we’re bringing @Gmail into the Gemini era,” the company shared , “making it a personal, proactive inbox assistant to help you manage your life, not just your messages. Explore the new features launching today, many of which are made possible by Gemini 3.”

Google added, “as always, you’re in control, and can choose to turn these new @Gmail features on or off.”

With that comes the first decision, where AI processing your emails means sharing the content and metadata of those emails with Google’s Gemini.

This means you would have to share all the contents of your inbox.

It’s all meant to organize messages and suggest actions, while the new tools will make Gmail act more like a personal assistant, which aims towards helping users better manage their inbox.

Users are able to turn the new features on or off, as it gives people a way to choose how they’d want their email to run. Some might choose the AI assistants while others might want to keep it the traditional way, as is.

Here’s the other upgrade, which seemingly comes as a surprise.

Google now gives users the option to change their primary Gmail address without changing to a new account.

Even if you choose to change your primary Gmail address, users are able to keep all their data while the old email address still works.

Think of this as a way to start over, especially if you’re still using your old email address from high school or college, or if you have an embarrassing email address you wished never existed and wanted to change.

For users who choose this path, it’s best to think of this as a fresh start.

But before jumping to make the change in a haste, keep in mind that there are a few things to consider.

You can only undergo a limited number of changes over a limited period of time.

So, with these new options comes a decision users must make.

For users, deciding whether to go the AI route involves heavy consideration of privacy and security since it requires the tools to read your messages.

This is important because Google has often warned that accounts are under attack from hackers attempting all sorts of trickery to steal passwords and other compromising information, breaking into accounts.

All in all, it’s a lot to think about.

source
48
Apple / Apple’s new iOS setting addresses a hidden layer of location tracking
« Last post by javajolt on February 10, 2026, 07:27:13 AM »
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer of location tracking that operates outside these controls. Your cellular carrier has been collecting your location data all along, and until now, there was nothing you could do about it.

Apple just changed this in iOS 26.3 with a new setting called “limit precise location.”

How Apple’s anti-carrier tracking system works

Cellular networks track your phone’s location based on the cell towers it connects to, in a process known as triangulation. In cities where towers are densely packed, triangulation is precise enough to track you down to a street address.

This tracking is different from app-based location monitoring, because your phone’s privacy settings have historically been powerless to stop it. Toggle Location Services off entirely, and your carrier still knows where you are.

The new setting reduces the precision of location data shared with carriers. Rather than a street address, carriers would see only the neighborhood where a device is located. It doesn’t affect emergency calls, though, which still transmit precise coordinates to first responders. Apps like Apple’s “Find My” service, which locates your devices, or its navigation services, aren’t affected because they work using the phone’s location sharing feature.

Why is Apple doing this? Apple hasn’t said, but the move comes after years of carriers mishandling location data.

Unfortunately, cellular network operators have played fast and free with this data. In April 2024, the FCC fined Sprint and T-Mobile (which have since merged), along with AT&T and Verizon nearly $200 million combined for illegally sharing this location data. They sold access to customers’ location information to third party aggregators, who then sold it on to third parties without customer consent.

This turned into a privacy horror story for customers. One aggregator, LocationSmart, had a free demo on its website that reportedly allowed anyone to pinpoint the location of most mobile phones in North America.

Limited rollout

The feature only works with devices equipped with Apple’s custom C1 or C1X modems. That means just three devices: the iPhone Air, iPhone 16e, and the cellular iPad Pro with M5 chip. The iPhone 17, which uses Qualcomm silicon, is excluded. Apple can only control what its own modems transmit.

Carrier support is equally narrow. In the US, only Boost Mobile is participating in the feature at launch, while Verizon, AT&T, and T-Mobile are notable absences from the list given their past record. In Germany, Telekom is on the participant list, while both EE and BT are involved in the UK. In Thailand, AIS and True are on the list. There are no other carriers taking part as of today though.

Android also offers some support

Google also introduced a similar capability with Android 15’s Location Privacy hardware abstraction layer (HAL) last year. It faces the same constraint, though: modem vendors must cooperate, and most have not. Apple and Google don’t get to control the modems in most phones. This kind of privacy protection requires vertical integration that few manufacturers possess and few carriers seem eager to enable.

Most people think controlling app permissions means they’re in control of their location. This feature highlights something many users didn’t know existed: a separate layer of tracking handled by cellular networks, and one that still offers users very limited control.

source
49
iPhone | iApps / iPhone Fold rumors
« Last post by javajolt on February 10, 2026, 07:15:54 AM »
Everything we know so far, including the leaked foldable design, upgrades, price and more

We're tracking all of the rumors about Apple's foldable phone, including when it could launch and possible price.


iPhone Air (Engadget)
Apple still hasn’t confirmed plans for a foldable iPhone, but the rumors around the so-called iPhone Fold keep getting louder. After years of speculation, multiple reports now suggest Apple could be aiming for a launch in the second half of 2026, with new details trickling out about the phone’s design, display tech and where it might sit in the iPhone lineup.

As with any unannounced Apple product, nothing is locked in. Features can change, timelines can move and some ideas may never make it beyond internal testing. That said, recent reporting from supply-chain sources, analysts and leakers gives us a clearer picture of how Apple might approach its first foldable and how it could try to set itself apart from rivals like Samsung and Google.

Below, we’ve rounded up the most credible iPhone Fold rumors so far, covering everything from possible release timing and form factor to display details, cameras and pricing. We’ll keep updating this post as new information emerges.

When could the iPhone Fold launch?

Rumors of a foldable iPhone date back as far as 2017, but more recent reporting suggests Apple has finally locked onto a realistic window. Most sources now point to fall 2026, likely alongside the iPhone 18 lineup.

Mark Gurman has gone back and forth on timing, initially suggesting Apple could launch “as early as 2026,” before later writing that the device would ship at the end of 2026 and sell primarily in 2027. Analyst Ming-Chi Kuo has also repeatedly cited the second half of 2026 as Apple’s target.

Some reports still claim the project could slip into 2027 if Apple runs into manufacturing or durability issues, particularly around the hinge or display. Given Apple’s history of delaying products that it feels aren’t ready, that remains a real possibility.

What will the iPhone Fold look like?

Current consensus suggests Apple has settled on a book-style foldable design, similar to Samsung’s Galaxy Z Fold series, rather than a clamshell flip phone.

When unfolded, the iPhone Fold is expected to resemble a small tablet like the iPad mini (8.3 inches). Based on the rumor mill, though, the iPhone Fold may be a touch smaller, with an internal display measuring around 7.7 to 7.8 inches. When closed, it should function like a conventional smartphone, with an outer display in the 5.5-inch range.

CAD leaks and alleged case-maker molds suggest the device may be shorter and wider than a standard iPhone when folded, creating a squarer footprint that better matches the aspect ratio of the inner display. Several reports have also pointed to the iPhone Air as a potential preview of Apple’s foldable design work, with its unusually thin chassis widely interpreted as a look at what one half of a future foldable iPhone could resemble.

If that theory holds, it could help explain the Fold’s rumored dimensions. Thickness is expected to land between roughly 4.5 and 5.6mm when unfolded, putting it in a similar range to the iPhone Air, and just over 9 to 11mm when folded, depending on the final hinge design and internal layering.


iPhone 17 Pro, iPhone Air (Engadget)
Display and the crease question

The display is arguably the biggest challenge for any foldable phone, and it’s an area where Apple appears to have invested years of development.

Multiple reports say Apple will rely on Samsung Display as its primary supplier. At CES 2026, Samsung showcased a new crease-less foldable OLED panel, which several sources — including Bloomberg — suggested could be the same technology Apple plans to use.

According to these reports, the panel combines a flexible OLED with a laser-drilled metal support plate that disperses stress when folding. The goal is a display with a nearly invisible crease, something Apple reportedly considers essential before entering the foldable market.

If Apple does use this panel, it would mark a notable improvement over current foldables, which still show visible creasing under certain lighting conditions.

Cameras and biometrics

Camera rumors suggest Apple is planning a four-camera setup. That may include:

   • Two rear cameras (main and ultra-wide, both rumored at 48MP)

   • One punch-hole camera on the outer display

   • One under-display camera on the inner screen

Several sources claim Apple will avoid Face ID entirely on the iPhone Fold. Instead, it’s expected to rely on Touch ID built into the power button, similar to recent iPad models. This would allow Apple to keep both displays free of notches or Dynamic Island cutouts.

Under-display camera technology has historically produced lower image quality, but a rumored 24MP sensor would be a significant step up compared to existing foldables, which typically use much lower-resolution sensors.

iPhone Fold’s hinge and materials

The hinge is another area where Apple may diverge from competitors. Multiple reports claim Apple will use Liquidmetal, which is a long-standing trade name for a metallic glass alloy the company has previously used in smaller components. While often referred to as “liquid metal” or “Liquid Metal” in reports, Liquidmetal is the branding Apple has historically associated with the material.

Liquidmetal is said to be stronger and more resistant to deformation than titanium, while remaining relatively lightweight. If accurate, this could help improve long-term durability and reduce wear on the foldable display.

Leaks from Jon Prosser also reference a metal plate beneath the display that works in tandem with the hinge to minimize creasing — a claim that aligns with reporting from Korean and Chinese supply-chain sources.

Battery and other components

Battery life is another potential differentiator. According to Ming-Chi Kuo and multiple Asian supply-chain reports, Apple is testing high-density battery cells in the 5,000 to 5,800mAh range.

That would make it the largest battery ever used in an iPhone, and competitive with (or larger than) batteries in current Android foldables. The device is also expected to use a future A-series chip and Apple’s in-house modem.

Price

None of this will come cheap, that’s for certain. Nearly every report agrees that the iPhone Fold will be Apple’s most expensive iPhone ever.

Estimates currently place the price between $2,000 and $2,500 in the US. Bloomberg has said the price will be “at least $2,000,” while other analysts have narrowed the likely range to around $2,100 and $2,300. That positions the iPhone Fold well above the iPhone Pro Max and closer to Apple’s high-end Macs and iPads.

Despite years of rumors, there’s still plenty that remains unclear. Apple hasn’t confirmed the name “iPhone Fold,” final dimensions, software features or how iOS would adapt to a folding form factor. Durability, repairability and long-term reliability are also open questions. For now, the safest assumption is that Apple is taking its time and that many of these details could still change before launch.

source
50
iPhone | iApps / Introducing The Apple iPhone Fold 🔥
« Last post by javajolt on February 10, 2026, 07:00:21 AM »


Concept Trailer By TT Technology

source
Pages: 1 ... 3 4 [5] 6 7 ... 10