In the new macOS 26 Tahoe there is change of interface, yes. But the surprise is to be able to write an email or throw a shortcut from Spotlight

More than 40 years of history They contemplate the Mac. It may not be the protagonist of the Apple ecosystem, but Macos always has a relevant study in the updates that the company announces every year. This time it has not been the exception, and this year we have a new version that not only changes its name (Tahoe), but also jumps rumored in numbering. Thus, the traditional sequence after MacOS 15 Sequoia It should have brought us Macos 16, but instead Apple has decided to adopt a version number that corresponds to the “year of launch+1”, which in this case is 26. In this new version of macOS A good face washing was expectedand that’s what we have with MacOS 26 Tahoe. The changes in the interface are the absolute focus, although the most striking novelty is the one that reaches Spotlight, the launcher/search engine integrated in macOS. The interface changes, although not radically. Liquid Glass raises an interface in which for example the taskbar is transparent and that is customizable, such as the control center. The latter can be configured to our liking, adding a lot of direct icons and accesses, even that they can correspond to iPad apps. These customization improvements also reach the folders, in which we can change the color or add a small badge to differentiate them from the rest. The new version of continuity allows us that for example we can have a “twin” of our iPhone on the screen to be able to do things like enjoying calls directly on the MAC screen and also doing it using options such as the Real -time translation. However, where the most curious improvements arrive in Shortcuts and in Spotlight. In Shortcuts, a powerful Automatizon tool, now we can create more powerful shortcuts thanks to the so -called “smart actions”, which take advantage of Apple Intelligence’s functions. But It is in Spotlight where things change especially. We are facing that Apple states that it is the most important update in the history of this component. This pitcher allows you to search for files or launch applications – even those of the iPhone that we have matched with continuity – starting to write its name in the text field. But it is also that we now have a way to access very striking functions without leaving Spotlight using small keyboard shortcuts. Thus, if for example we write “SM” (Send Message) we can start the writing of an email message without opening the mail application. There are several of these personalized commands that make Spotlight into A kind of custom “terminal” In itself from which to execute commands, launch applications and even access the history of the clipboard. The last great novelty of Macos 26 Tahoe comes from the hand of video games. Apple, who has never paid too much attention to this area in the Mac, now offers a control center called Apple Games that reminds us of the Xbox application in Windows. As in that case, in Apple Games We have a form from which to access our library and from which to launch the games that we have bought or buy new. There is a new Game Overlay that allows us to chat with friends, invite them to play or adjust our configuration to play. The developers and users will also benefit metal 4, the new rendering technology specifically designed for the Apple chips GPUs and that allows games that take advantage of it improve its visual quality remarkably, promise in the company. In Xataka | Apple plays in today’s event more than its future in AI: its credibility is played as a company

A 19 -year -old hacked the iPhone, was hired by Apple and ended up fired for not answering an email

The iPhone has been among us for almost 17 years. During all this time, the phone has changed a lot, but some things have remained practically intact since its launch. One of them is the closed ecosystem to which Apple products belong. Anti-Jailbreak. The Cupertino company has struggled to maintain a strong control over what can be done on the iPhone. But even in the first generation of the device there were those who rejected this mechanic and offered users an alternative: the Jailbreak. Jailbreak was nothing other than a method that was used of certain vulnerabilities of the device to remove the restrictions that Apple had imposed. Thus, those who resorted to this method accessed unpaid functions in exchange for putting their safety at risk. The road from Allegra. From advanced adjustments to the possibility of installing third -party applications without going through the App Store (store that was not available at the beginning and arrived in 2008 with OS 2). One of the hackers that had developed his own jailbreak was Nicholas Allegra. The 18 -year -old known on the network as “Comex” launched the first jailbreak publicly available for the iPhone 4 In 2010. To achieve this, he found a way to exploit vulnerability in a Safari library, so his method worked directly from the browser. Advanceing. Comex continued to cultivate his ability to break Apple’s telephone security and the following year launched Jailbreakme 3.0, which reached several iOS devices, including iPad 2. At this point, the community believed that Allegra was “years ahead” of other iOS hackers. And hired. But in 2011, his reality changed radically. The young man He went from creating Jailbreakme to be part of Applethe company that had challenged, as “remote fellow.” It is not clear what the dynamic between the multinational and the young man was, but that link did not take too long to dissolve. The farewell. After almost a year in Apple, in 2012 Allegra He announced on Twitter that was no longer part of Apple. In another message he explained that he had reached that situation because he had “forgotten to answer an email.” The mail in question was an offer to continue hired. The internship had a duration of one year and, apparently, Apple asked Comex by email to confirm if it would continue in the company for one more year. Not receiving an answer, the firm left the iphone hacker contract without effect, so it ceased to be a fellow. Images | Unspash In Xataka | Banks spent years criticizing cryptocurrencies. The BBVA will soon allow to operate with Bitcoin and ETH from its app In Xataka | Japan’s demographic crisis is leaving him without workers. Your solution: thousands of robots with a cat’s face *An earlier version of this article was published in January 2024

How I learned to use several email addresses to keep all my protected digital accounts

A few years ago, when I dedicated myself to repair home computers, it occurred to me to print some professional visit cards so that my clients could easily contact me. In addition to including my phone number, which only allowed to send text messages because WhatsApp was barely taking its first steps, I added my email. I still remember leaving the printing press with a handful of cards in my hands, excited to start distributing them. But as soon as I cross the door, I realized that I had made a mistake: I used my main email. Until that time, it had remained relatively “secret”, but that changed at the moment it was printed on my cards. And it was the same email that I used as an access door to my digital life. I had just exposed it without realizing it. A concern invaded me instantly, accompanied by several questions about the associated risks. What if someone tried access my accounts without permission? Could I use the mail that was on my cards along with the information about me on Facebook to try to guess my security response? And what would happen to the services I had linked? The risk was minimal, I should not expose my main email. My immediate reaction was to create an exclusive secondary account for other services, while the direction printed on the card was only for professional contact. If your security was compromised, the impact would be limited. My accounts on electronic commerce platforms, social networks and other services would continue to have a recovery account other than the main one. Having a single email address for everything was a mistake To better understand why this caution is important, let’s put us for a moment in the mind of a cybercrime. If as an attacker he can access the main mail of a victim, I can easily explore his entrance tray to discover what other services he uses. For example, when you find Amazon emails or social networks, you could request restore passwords directly. If the victim also made the frequent mistake of reusing the same password – and somehow I have achieved it – I would not even have to strive a lot: it would be enough to try that key to accessing multiple platforms, generating a serious domino effect. The aforementioned solution was only temporary. It served me for a while, but we live in such a dynamic world that forces us to evolve, not only to take better advantage of technology, but also to guarantee our safety and privacy. Over the years, keep a contact email and another “secret” ceased to be enough. I discovered that my contact email was not so public or the “secret” so private. Although the latter was not on my card, I trusted any online service that asked me to register. And, as we know, companies, no matter how big they are, do not always protect the data of their users. There have been notorious cases of leaks, Like Yahoo’s 2016 o The Quora of 2018. Although I had never shared it directly with other people, the amount of spam and fraudulent emails that I received made me suspect that my email address had been filtered on the Dark Web, That dark internet area where personal information circulates as a currency. After all, my email was probably part of some database sold to the highest bidder. Of course, among the undessed emails there were also classic scams Like the Nigerian Prince. LinkedIn, at that time, publicly showed the email address of the users who enabled that option in the privacy settings. In addition, there were those who collected this data for mass shipments, which explained the amount of newsletters and unre requested messages that came to be connected to certain people. I soon understood that I needed more than my own emails, because, like many, I had had others assigned by third parties, such as the University or those of work, which are usually deactivated by disconnecting from the institution. I decided to take the necessary measures to improve this aspect of my digital life, which meant Create other mail accounts. Thus were structured: Contact email: Public address so that anyone can write to me. Private mail for services: Exclusive for login and recovery of accounts. Work mail: For everything related to my professional activity. Mail for Newsletters: To receive and manage subscriptions without saturating other accounts. Mail focused on privacy: Proton mail account with end -to -end encryption and tracker lock. In all I tried to apply the maximum security measures: two steps verification, Passkeysrecovery keys, robust passwords, etc. In addition, I incorporated the use of a password manager to avoid the risk of reusing credentials and to generate unique and safe keys for each service. I opted for a reputed manager who allows me to store them safely without depending on memory or physical annotations that can be violated. I also started using “Log in with Apple”With my private email for services, which allows me to hide my real address through random emails (@privateatelay.com). To this I added the Temporary ICloud+ Correos (@icloud.com), Ideal for records on platforms that do not inspire me confidence or whose data protection policy raises doubts. To reinforce security, I implemented multiple recovery methods. Thus, if a method does not work, I always have another access road. This is essential because any recovery method can give problems. If I lose my mobile phone and it is my only access road to my account, I would be in a serious inconvenience. However, having both a telephone number and an associated email, I can recover access without depending on a single factor. The same goes for alternative verification codes: if I do not have immediate access to my phone, I can use one of those previously stored codes to log in safely. Having multiple access recovery methods is not a luxury, but a necessity. In a world where everything … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.