Category: Server

  • Apple doubles 5GHz Wi-Fi 6E bandwidth for some devices via iPadOS 26.2, macOS Tahoe 26.2 updates

    Apple doubles 5GHz Wi-Fi 6E bandwidth for some devices via iPadOS 26.2, macOS Tahoe 26.2 updates

    This is pretty nifty.

    Apple apparently snuck a useful upgrade through with its iPadOS 26.2 and macOS Tahoe 26.2 updates, the new operating systems offering improved Wi-Fi speeds for select Macs and iPads that support Wi-Fi 6E.

    The M4 iPad Pro models, M3 iPad Air models, A17 Pro iPad mini, M2 to M5 MacBook Pro models, ‌M2‌, M3, and M4 MacBook Air models, and other Wi-Fi 6E Macs and iPads now support 160MHz maximum channel bandwidth when connected to 5GHz Wi-Fi networks, the same theoretical maximum throughput supported by 6GHz networks. Previously, these devices were limited to 80MHz.

    Under ideal conditions, the devices should see faster file transfers, quicker uploads, and smoother streaming. Wi-Fi 6E devices can take advantage of 6GHz networks, although 5GHz networks remain far more common. 6GHz networks require new router hardware, along with a machine that can take advantage of a 6GHz network.

    Through the upgrade, the devices can connect to 5GHz networks with a throughput approaching peak 6GHz speeds without having to connect to a 6GHz network. Users with a Wi-Fi 6 or Wi-Fi 6E network that supports 160MHz on 5GHz networks will be able to take advantage of the bandwidth improvement. Devices that have the updated 160MHz bandwidth limit will not see improvements when connected to 5GHz routers limited to 80MHz.

    While 5GHz bandwidth has improved on select Macs and iPads, 6GHz networks still offer less congestion and more spectrum to work with.

    Stay tuned for additional details as they become available.

    Via MacRumors and support.apple.com

  • iRobot adds Matter support for several additional Roomba models, allows for HomeKit device integration

    iRobot adds Matter support for several additional Roomba models, allows for HomeKit device integration

    This could come in handy where your home and your robotic vacuum cleaner of choice are concerned.

    OVer the last few weeks, Roomba maker iRobot has added Matter support to a number of its Roomba robot vacuums, allowing them to be integrated with the Home app and used with Siri voice commands.

    The feature has been available for the Roomba Combo 10 Max since earlier this year. Now, existing Roomba Plus 500 Combo, Roomba Max 700 Vac, and Roomba Max 700 Combo vacuums can get Matter support through a firmware update. Matter has not yet been re-added for the Roomba Combo J7 and J9 models.

    Once supported, Matter-enabled Roomba models can be added and controlled via the Home app on devices running iOS 18.4, iPadOS 18.4 or higher, as long as a Home hub is available (Apple TV or HomePod). While the Home app doesn’t offer the full suite of features available with robot vacuums, basic commands are available. The units can be set to vacuum and mop an entire home, or a specific room or area, with ‌Siri‌ voice commands.

    Once added to the home app, the device can integrate with other HomeKit devices. The Roomba, for example, could be set to vacuum whenever you leave the house, or at a certain time. Automations can be triggered by presence, time, sensors, or when an accessory like a light is activated.

    Apple added support for Matter-connected robot vacuums in iOS 18.4 earlier this year. Several companies have since come out with Matter options, including Roborock, Ecovacs, Switchbot, and Roomba.

    Stay tuned for additional details as they become available.

    Via MacRumors and iRobot

  • Apple to expand digital IDs to Apple Wallet in seven additional U.S. states

    Apple to expand digital IDs to Apple Wallet in seven additional U.S. states

    Digital IDs are expanding to several new U.S. states.

    Per MacRumors, the feature, which is currently offered in the following 13 U.S. states as well as Puerto Rico, will expand to several new states in the near future. To set up the feature, open the Wallet app and tap on the plus sign in the top-right corner. Next, select Driver’s License and ID Cards and follow the steps listed onscreen.

    • Arizona (since March 2022)
    • Maryland (since May 2022)
    • Colorado (since November 2022)
    • Georgia (since May 2023)
    • Ohio (since July 2024)
    • Hawaii (since August 2024)
    • California (since September 2024)
    • Iowa (since October 2024)
    • New Mexico (since December 2024)
    • Montana (since August 2025)
    • North Dakota (since September 2025)
    • West Virginia (since October 2025)
    • Illinois (since November 2025)
    • The feature is also available in Puerto Rico.

    Apple and local DMV offices have announced that the following U.S. states have signed on to adopt the feature, although no timeframes were disclosed:

    • Connecticut
    • Kentucky
    • Mississippi
    • Oklahoma
    • Utah
    • Arkansas
    • Virginia
    • Participating Airports

    Apple Wallet IDs are accepted at TSA checkpoints in more than 250 airports in the U.S., for domestic travel. Given that Apple Wallet IDs are not accepted by law enforcement and lack many other use cases, carrying a physical ID is still necessary.

    Stay tuned for additional details as they become available.

    Via MacRumors and learn.wallet.apple

  • Jamf identifies the MacSync Stealer malware in the wild, notes its bypassing of Apple’s notifications procedures

    Jamf identifies the MacSync Stealer malware in the wild, notes its bypassing of Apple’s notifications procedures

    You might want to be even more careful online until Apple sorts this out.

    Per AppleInsider, a new variant of the MacSync Stealer malware uses a code-signed Swift application to get around Apple’s macOS Gatekeeper protections.

    While the macOS Gatekeeper and Xprotect features do a commendable job at fending off malware for your Mac, a group of hackers has apparently devised a new means of bypassing Gatekeeper and simpified its attack process.

    Researchers at Jamf Threat Labs posted about a new variant of MacSync Stealer on Tuesday that uses a different method to attack macOS. A method that manages to take advantage of the notarization system Apple employs.

    Where previous versions of the MacSync Stealer software required the use of techniques such as dragging items to a Terminal window or so-called “ChickFix” methods, which include dropping a script file or pasting a Unix command.

    Under the new method, MacSync Stealer is introduced to a Mac as part of a code-signed and notarized Swift application. Users are encouraged to open an installer for a “zk-Call & Messenger” app from a web browser. The new package can now be simply double-clicked to execute it, and an inspection of the Installer binary reveals it is indeed both code-signed and notarized, and is associated with a Developer Team ID.

    The script driving the malware is small, while the file size is about 25.5MB in comparison, having been padded by extra files such as PDFs to make it look more legitimate as an installer.

    Per AppleInsider’s technical description:

    “The installer app does not actually contain the malware itself. Instead, after running, it pulls a secondary payload from a server that houses and installs the malware on the target system.

    The attack itself is ultimately still an encoded dropper, with researchers seeing many of the usual indicators of being MacSync Stealer. The main difference is that the use of a notarized and signed app allowed the first stage to get past Gatekeeper’s protections.”

    Researchers at Jamf have noted that the app demonstrates how malware authors are continuing to “evolve their delivery methods” to maximize infections, and that the group had never seen a Swift-based, code-signed, and notarized form, complete with a second-stage payload.

    Given that this is a notarized and signed app, it doesn’t trigger Gatekeeper’s initial intervention stages. Jamf has stated that it reported the associated Developer Team ID to Apple, and the associated certificate has been revoked. The group also added that code directory hashes were not included as part of Apple’s revocation list at the time of the report’s publication.

    As always, Mac users will need to be vigilant about their digital hygiene and be cautious. This includes being aware of what they are installing and where they are installing it from, such as a trusted developer website or from the Mac App Store.

    Stay tuned for additional details as they become available.

    Via AppleInsider and Jamf Threat Labs

  • Flyover city tours feature quietly excised from Apple Maps

    Flyover city tours feature quietly excised from Apple Maps

    One of the cooler features in Apple Maps has apparently been quietly dismissed from the app.

    The Apple Maps application no longer offers a Flyover feature that provided users with automated tours of notable landmarks in major cities. The feature seems to have disappeared with the launch of iOS 26.

    Flyover city tours were introduced in 2014 with iOS 8 and OS X Yosemite, using Flyover imagery to generate an aerial tour. Most cities with Flyover imagery supported the tour feature, but it may not have been used often since Apple was able to quietly discontinue it.

    In better news, Flyover imagery remains, complete with over 350 cities offering the feature, which offers imagery of landmarks, parks, important buildings, and more from a bird’s-eye view. The images themselves are gathered via small military-grade planes which create detailed maps of buildings from above for the feature. The feature is not available in some areas due to privacy and security concerns.

    Flyover city tours used to be accessible by tapping on the Flyover icon when searching for a city, but that option has now been removed.

    Stay tuned for additional details as they become available.

    Via MacRumors