Not much time has passed since the last Apple event, and another one is already right around the corner. Apple has recently confirmed that its next hardware event will take place next week, on October 18th, at 1:00PM ET / 10:00AM PT.
Called “Unleashed,” the upcoming event was teased on Twitter by Apple marketing executive Greg Joswiak. Let’s take a look at the most likely announcements Apple will make:
- New 14- & 16-Inch MacBook Pro Models: According to available information, the stars of the show will be two new MacBook Pro models with an Arm-based processor called the M1X. The new processor is expected to have ten CPU cores and 16 or 32 GPU cores, giving it a substantial performance boost over the already admirably powerful M1 chip that debuted last year. The new MacBooks will likely use mini-LED display technology and offer more connectivity options.
- High-End Mac Mini: The new M1X processor may appear in one additional product: a high-end Mac mini aimed at power users who edit high-definition video, produce music, develop software, and do other demanding tasks on their computers. Additional ports compared to the current M1-powered Mac mini are to be expected, and Apple might even use the same magnetic power plug that doubles as Ethernet cable the new M1 iMac users.
- Third-Generation AirPods: Everyone was expecting Apple to announce the third-generation AirPods during the last event, but that didn’t happen. As such, it’s almost certain that we’ll finally get to see them next week. Their design is anticipated to be similar to the AirPods Pro, but they probably won’t support active noise cancellation nor feature replaceable ear tips.
How To Watch Apple’s Unleashed Event
Just like the previous few events, the October 18 Apple event will be streamed online, and there are several ways how you can watch it as it takes place:
Should you miss it, you’ll be able to watch the archived version of the stream at a later date.
New Variants Of Android Spyware Are Targeting Middle East Users
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates.
British security software and hardware company Sophos has recently revealed that new variants of Android spyware used by the C-23 group are actively targeting users in the Middle East.
C-23, also known as GnatSpy, FrozenCell, or VAMP, is what cybersecurity professionals refer to as an advanced persistent threat (APT) adversary. Such adversaries are typically well-funded and well-organized, which allows them to quickly evolve their tactics to overcome even the most sophisticated cybersecurity defenses.
The C-23 adversary has been known for targeting individuals in the Middle East since at least 2017, with a particular focus on the Palestinian territories.
The latest variants of its Android spyware are most likely distributed via a download link sent to victims as text messages. The link leads to a malicious app that pretends to install legitimate updates on the victim’s mobile device. When the app is launched for the first time, it requests a number of permissions that let it spy on the victim. It then disguises itself to make removal more difficult.
“The new variants use more, and more varied, disguises than previous versions, hiding behind popular app icons such as Chrome, Google, Google Play, YouTube, or the BOTIM voice-over-IP service” explain Sophos. “If targets click a fraudulent icon, the spyware launches the legitimate version of the app, while maintaining surveillance in the background”.
The information the new spyware can steal includes everything from text messages to the names of installed apps to contacts from all kinds of apps, including Facebook and WhatsApp. The spyware can even dismiss notifications and toggle “Do Not Disturb” settings.
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates. The company’s own mobile antivirus app, called Sophos Intercept X for Mobile, can detect the new spyware as well as all kinds of other malicious software.