Blog Posts

Blog Posts

iOS 26.5 Beta 2 Unveils New Ad Popup Functionality in Apple Maps

**iOS 26.5 Beta 2: Apple Maps Unveils Advertisements**

Apple has unveiled iOS 26.5 beta 2, which brings notable updates to Apple Maps, particularly with the introduction of advertisements. This development marks a significant change in the operation of Apple Maps, notably in the US and Canada, where ads are expected to debut this summer.

### New Advertising Capabilities in Apple Maps

The newest beta iteration of iOS 26.5 includes a notification within the Maps application that alerts users about the impending ads. The notification reads:

> “Maps may display local ads based on your approximate location, ongoing search terms, or view of the map during your search. To protect your privacy, advertising information is not associated with your Apple Account.”

This notice suggests that while users will encounter ads tailored to their location and search habits, Apple prioritizes user privacy by keeping this information disconnected from personal Apple accounts.

### Ad Location

Upon the official launch, advertisements will display in two primary locations within the Apple Maps interface:

1. **At the top of search results**: This positioning will grant businesses greater exposure when users search for certain locations or services.

2. **In a new ‘Suggested Places’ section**: This feature, introduced in iOS 26.5 beta 1, offers users suggestions for businesses that may align with their search behavior.

### Effects for Users

Although the implementation of ads in Apple Maps could improve the app’s utility by providing relevant local business insights, it also poses questions regarding user experience. Presently, there is no option available to opt out of these ads, meaning users will inevitably come across them when utilizing the app.

### Conclusion

The incorporation of ads into Apple Maps in iOS 26.5 beta 2 marks a new chapter for the application, potentially boosting its revenue while offering users localized business information. As the rollout nears, it will be interesting to see how users react to this alteration and its impact on their overall experience with Apple Maps.

For those experimenting with the beta version, providing feedback on the advertisement experience will be essential as Apple hones its strategy for integrating ads into its mapping service.

iOS 26.4 Substantially Improves an Essential Control Center Function

# iOS 26.4: Major Features and Upgrades

iOS 26.4 is the newest iPhone update, unveiling numerous thrilling features, especially in Apple Music. A notable upgrade is the improvement to the Control Center’s Shazam song recognition, which now operates offline.

## Control Center’s Shazam Song Recognition Now Available Offline

With iOS 26.4, users can experience an enhanced Shazam functionality. This new feature enables offline music recognition, allowing users to identify songs even without an internet connection. Once the device is back online, Shazam will automatically provide the results of the song recognition.

### How It Functions

As per the official iOS 26.4 release notes, the offline music recognition capability records audio data for tracks recognized while offline. When the iPhone reconnects, users will receive a notification with the song information. This upgrade is particularly useful for users often in areas with limited connectivity who wish to identify music playing nearby.

### Configuring Shazam in Control Center

For those who haven’t added the Shazam control to their Control Center yet, it can be set up easily. Users can long-press in any empty section of the Control Center, select ‘Add a Control,’ and search for ‘Recognize Music’ to add it.

## Conclusion

The iOS 26.4 update introduces substantial enhancements to the iPhone’s music recognition features, simplifying the process for users to identify songs anytime and anywhere. This minor yet significant adjustment elevates the overall user experience, particularly for music fans.

Intel Core Ultra X7 358H-Powered Robotics System for Humanoids and Autonomous Vehicles – CNX Software

Open robotics development platform

AAEON CEXD-INTRBL is an “open robotics development system” powered by a 16-core, 180 TOPS Intel Core Ultra X7 Processor 358H (Panther Lake) SoC and designed for the development of AI-enhanced humanoid robots and autonomous vehicle platforms. The Edge AI computer features four 2.5GbE ports with support for IEEE1588 PTP (Precision Time Protocol), two FAKRA connectors for up to eight GMSL2 cameras, four USB 3.2  Type-C ports, two USB 2.0 ports, a CAN Bus connector, and a 40-pin HAT connector with 22 GPIOs. AAEON CEXD-INTRBL specifications: SoC – Intel Core Ultra X7 358H CPU – 16-core (4P + 8E + 4LPE) Panther Lake processor @ up to 4.8 GHz Cache – 18 MB Smart Cache GPU – 12-core Intel Arc B390 GPU @ up to 2.5 GHz (122 TOPS) AI accelerator  – 50 TOPS; CPU + GPU + NPU combined: 180 TOPS PBP – 25 Watts System Memory – Up to […]

The post Intel Core Ultra X7 358H-powered open robotics development system targets humanoid robots and autonomous vehicles appeared first on CNX Software – Embedded Systems News.

Apple TV Set to Launch Three Significant Shows at the Same Time

Apple TV has an exhilarating summer planned, marked by the comeback of fan-favorite series like *Ted Lasso* and *Dark Matter*. As these eagerly awaited shows approach, the existing lineup remains robust and is poised to get even better with fresh releases.

Among the currently airing shows, *Your Friends & Neighbors* and *For All Mankind* have received considerable praise. *Your Friends & Neighbors* has swiftly returned for its second season, boasting an impressive 88% rating on Rotten Tomatoes, reflecting a favorable reception that exceeds its inaugural season. *For All Mankind*, now in its fifth season, has also been positively acclaimed, achieving a 90% rating as critics commend its compelling narratives and character arc developments.

This week, Apple TV will unveil a new show titled *Margo’s Got Money Troubles*, debuting on April 15 with its premiere three episodes. Created by David E. Kelley and inspired by Rufi Thorpe’s bestselling novel, the cast includes Elle Fanning, Michelle Pfeiffer, and Nicole Kidman, among others. The storyline centers on Margo, a recent college drop-out and hopeful writer, as she tackles the hurdles of motherhood and financial predicaments.

*Margo’s Got Money Troubles* debuted at SXSW, where it garnered enthusiastic reviews and currently boasts an impeccable 100% rating on Rotten Tomatoes. All three highlighted series will continue to roll out new episodes until at least May 20.

Apple TV is offered at $12.99 per month, with promotional rates available through the Apple One package.

Apple Japan Unveils Spring Promotion Showcasing Local Artists in the App Store

Apple’s promotional initiatives have recently gained substantial traction, especially with the introduction of the MacBook Neo campaign, which has drawn considerable interest. Nonetheless, another significant endeavor is unfolding in Japan, where Apple is advertising the App Store through a lively spring campaign that showcases commissioned ads from regional artists.

### ‘Embrace the next chapter with the App Store’

As reported by Creative Blog, Apple Japan’s YouTube channel has introduced a fresh spring campaign comprised of three videos that honor the App Store via distinctive artwork crafted by 13 local artists. Each video commences with a user tapping the App Store icon, which transitions into a captivating sequence of vibrant animations that highlight different apps, each depicted in its unique artistic flair.

In addition to the video advertisements, Apple has rolled out a featured story on the Japanese App Store, oriented around the “new life” season. This initiative prompts users to delve into the apps offered on the App Store as they embark on new adventures, whether that’s beginning their studies, progressing in their professions, or moving to a new town. The messaging underscores that everyone taking a new step is central to this season, motivating users to chase their aspirations.

The featured story showcases a selection of meticulously chosen apps and games intended to aid users in taking their subsequent steps, while also spotlighting individuals making advancements in various domains. Highlighted apps include popular options like Pokémon Sleep, Goodnotes, Royal Kingdom, Procreate Pocket, LINE, CapCut, and ChatGPT.

### Conclusion

Apple’s spring initiative in Japan not only promotes the App Store but also aligns with the theme of fresh starts and personal development. Through partnerships with local artists and an emphasis on the varied applications available, Apple seeks to motivate users to welcome change and use technology to enrich their lives. The campaign exemplifies Apple’s dedication to creativity and community involvement, marking it as a significant component of their marketing approach.

Hack-for-Hire Scheme Aims at iCloud Backups via Forged Apple Pages

### An Emerging Trend of Government Agencies Delegating Their Hacking Activities

A recent probe has uncovered that hackers persist in utilizing conventional strategies to breach iPhones and Android gadgets. This inquiry, brought to light by TechCrunch, involved three cybersecurity research organizations that teamed up to generate reports on an extended hack-for-hire initiative targeting journalists, activists, and officials in the Middle East and North Africa.

As per insights from Access Now, Lookout, and SMEX, the assaults focused on civilians and government representatives across multiple nations, including the UK and possibly the US. Access Now analyzed three specific attack occurrences that took place between 2023 and 2025, while Lookout linked these events to the hack-for-hire group BITTER APT, affiliated with the Indian hack-for-hire company Appin.

In comparison to recent advanced exploit attacks such as the Coruna and DarkSword exploits, which employed intricate chains of vulnerabilities to compromise obsolete devices, this initiative relied on more straightforward approaches, mainly phishing. The hackers intended to mislead iPhone users into disclosing their Apple ID credentials, thereby gaining access to iCloud backups and, ultimately, the comprehensive content of the targets’ devices.

Lookout’s analysis pinpointed nearly 1,500 web addresses that masqueraded as legitimate services, hosting phishing pages and other harmful materials. Specific phishing domains aimed at Apple users included:

– facetime-web[.]me-en[.]io
– apple[.]id-us[.]cc
– icloud[.]com-ar[.]me
– icloud[.]com-service[.]info
– signin-apple[.]com-en-uk[.]info

The initiative reached beyond Apple, also aiming at users of Google, Microsoft, Signal, WhatsApp, and Yahoo, utilizing a range of hacking and phishing methods.

TechCrunch highlighted that this pattern reflects an increasing tendency among government agencies to delegate hacking operations to private hack-for-hire enterprises. This setup offers these agencies plausible deniability, as private firms handle all operations and infrastructure. Moreover, engaging these groups may be more economical than acquiring commercial spyware, according to Justin Albrecht, a principal researcher at Lookout.

For additional information, TechCrunch’s report can be found [here](https://techcrunch.com/2026/04/08/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups/).

Assessing the Efficiency of Suction Cups for Fixing MagSafe Desk Chargers

### Scosche Qi2 Home and Office Mount: Transforming MagSafe Charging

MagSafe iPhone desk chargers have gained significant traction, yet users often encounter a prevalent issue: the chargers slide across the desk when trying to grab the phone or check notifications. Scosche has tackled this problem with its cutting-edge Qi2 home and office mount, which employs a robust suction cup rather than depending on a cumbersome base.

#### Distinctive Suction Cup Feature

The prominent aspect of the Scosche mount is its strong suction cup that firmly adheres to any flat surface, such as a desk or bedside table. Once secured, the mount stays in place, enabling users to remove their iPhone effortlessly without the need to stabilize the base. This design not only boosts convenience but also guarantees that the charger remains stationary during usage.

#### Rapid 15-Watt Qi2 Charging

Utilizing the latest Qi2 wireless charging technology, the Scosche mount offers an impressive 15-watt charging speed for compatible iPhones. This is a substantial improvement over the previous 7.5-watt chargers, resulting in a quicker and more effective charging experience.

#### Supplied Accessories

A frequent complaint with MagSafe products is the lack of a power adapter. Scosche has taken care of this by including a 20-watt USB-C power adapter in the package, alongside a cable management clip to maintain an organized workspace. This considerate addition enhances the overall user experience.

#### Flexible Design

The mount showcases a smooth swivel base and a head that can rotate 360 degrees. This adaptability allows users to seamlessly transition between portrait and landscape orientations, making it perfect for FaceTime calls or video viewing. Moreover, it is compatible with StandBy mode, making it an excellent bedside accessory.

#### Conclusion

The Scosche Qi2 home and office mount signifies a noteworthy progression in the world of MagSafe chargers. Its suction cup design ensures stability and ease of operation, while the rapid charging features and included accessories elevate its worth. This charger is an excellent choice for anyone aiming to upgrade their home office or bedside arrangement. For additional details, you can acquire the Scosche Qi2 mount directly from [Scosche](https://www.scosche.com/mpqmroh2-magsafe-compatible-qi2-wireless-charging-phone-mount-home-office?srsltid=AfmBOooNqDwRwVe_FhGR3HFMWYpi65pggKAOPLcw3qkssMSveTUERJS4) or [Amazon](https://amzn.to/4dKQNYN).

Security Bite Podcast: The Effect of Atomic Stealer on Mac Infostealers and Trojans

### The Surge of Trojan Malware in the Mac Ecosystem

Recent cybersecurity analyses have revealed a concerning trend concerning malware aimed at Mac devices. Based on Jamf’s latest Security 360 report, trojan malware now makes up over 50% of all Mac malware detections, a drastic uptick from around 17% just a year ago. This development signifies a crucial transformation in the realm of Mac security threats, with trojans overtaking infostealers to secure the leading position.

#### Grasping Trojan Malware

Trojan malware refers to a category of malicious software that pretends to be legitimate to deceive users into installing it. Once installed, trojans can execute various harmful actions, such as stealing confidential information, introducing additional malware, or granting unauthorized access to the compromised system. The rise in trojan detections suggests that cybercriminals are increasingly utilizing this tactic to breach Mac systems.

#### The Effect of Atomic Stealer

At the core of this increase in trojan malware is a particular malware family identified as Atomic Stealer. This malware is infamous for straddling both a trojan and an infostealer classification, which complicates the conventional understanding of malware types. Atomic Stealer’s capacity to function efficiently in both roles underscores a merging of definitions within the malware space, indicating that cyber threats are advancing and becoming more complex.

#### Consequences for Mac Users

The growing prevalence of trojan malware presents significant threats for Mac users. As these dangers become more widespread, it is vital for individuals and organizations to implement strong security measures. This includes employing advanced security solutions capable of detecting and addressing trojan threats, such as next-generation endpoint detection and response (EDR) systems, and adopting a zero-trust security paradigm.

#### Conclusion

The insights from Jamf’s Security 360 report act as a wake-up call for both Mac users and IT professionals. With trojan malware now prevailing in the threat landscape, it is critical to remain informed about emerging dangers and to invest in comprehensive security measures. By comprehending the evolving nature of malware, users can enhance the protection of their devices and sensitive data against potential breaches.