iPhone 5s Gets New Software Update 13 Years After Launch

iPhone 5s Gets New Software Update 13 Years After Launch

Alongside iOS 26.2.1 , Apple today released an updated version of iOS 12 for devices that are still running that operating system update, eight years after the software was first released. iOS 12.5.8 is available for the iPhone 5s and the ‌iPhone‌ 6, meaning Apple is continuing to support these devices for 13 and 12 years after launch, respectively. The ‌iPhone‌ 5s came out in September 2013, while the ‌iPhone‌ 6 launched in September 2014. According to Apple's release notes for the update, iOS 12.5.8 extends the certificate required for features like iMessage, FaceTime , and device activation, so they will continue to work after January 2027. Originally, certificate-limited functions like device activation would have ceased when the certificate expired, but now key features on the two older iPhones will continue to work in the years to come. Prior to now, the ‌iPhone‌ 5s and ‌iPhone‌ 6 last received software updates in January 2023, when Apple released important security fixes. Apple has publicly committed to providing a minimum of five years of security updates for an ‌iPhone‌ from the time that it launches, but it often offers vulnerability fixes for an even longer period of time. The ‌iPhone‌ 6s, for example, was released 11 years ago, but it received a security update in September 2025 with the launch of iOS 15.8.5. The device received an iOS 15.8.6 update just today, adding the same certificate extension. Apple also released new versions of iOS 18 and iOS 16. This article, " iPhone 5s Gets New Software Update 13 Years After Launch " first appeared on MacRumors.com Discuss this article in our forums

Users are getting scammed via Google’s new Gmail address change feature

Users are getting scammed via Google’s new Gmail address change feature

Earlier this month, Google started rolling out a new feature that lets users change their Gmail addresses —and it’s already being exploited by cybercriminals and malicious actors. The new feature allows one’s original Gmail address to remain as an alias, so that incoming emails continue to land in the same inbox. The feature is primarily intended for users who want to replace their old address. Security experts are now warning that scammers are specifically exploiting this new feature by crafting deceptively genuine phishing emails that are sent via legitimate Google systems and aim to take complete control of Google accounts. Phishing via Google imitations According to security experts, scam emails are currently being sent that purportedly originate from Google and refer to an alleged change of Gmail address or a necessary security confirmation. The messages appear particularly credible because they’re sent via Google’s own systems and display real Google addresses, such as “no-reply@accounts.google.com” as the sender. These emails often mention a security-related action, such as activating a new address or confirming your identity. A link supposedly leads to a Google support or security page, but in reality users end up on fake websites where they’re asked to enter their password. What makes this particularly insidious is that the scammers are using the “sites.google.com” domain, which is a legitimate Google service for user-generated websites—and is therefore not blocked by many spam filters. These fake sites are made to imitate genuine Google support pages in a way that seems visually authentic at first glance. If attackers succeed in taking over your Google account, the consequences are serious. Not only are Gmail messages affected, but all connected services (such as Google Drive, Google Photos, and Google Calendar) will also be compromised. Furthermore, if your Google account is used to log into third-party services (such as social networks, online shops, or financial services), attackers can trigger a chain reaction and gain access to those other accounts. Security experts warned of this before Security company Check Point Research had previously pointed out a first wave of these attacks at the end of 2025, even before Google had officially announced the new feature more widely. Back then, the attackers had abused a workflow automation tool to send phishing emails via legitimate Google infrastructure. Google stated that its own systems had not been compromised, but that protective measures had been taken. How to recognize phishing emails Despite their professional appearance, many of these fraudulent emails can be spotted if you know what to look for. Typical red flags include: Impersonal salutations such as “Dear customer” instead of your actual first and last name. Urgent wording and threats , such as risk of account suspension, account deletion, or monetary consequences. The urgency is meant to scare you into acting without thinking. Requests to enter passwords or other access data via a link. The link often takes you to a fake website that’s dressed up like the real thing, hoping you’ll enter your credentials—which are then intercepted by the scammer. Google itself recommends never clicking links in emails and instead always checking security warnings directly in your account. To do this, open your browser and manually navigate to your Google account page instead of clicking on links in emails. Genuine warnings usually contain details such as device type, time, and location of access. How to protect your Google account The most important thing you can do is maintain healthy skepticism towards unsolicited emails. Be sure to enable two-factor authentication (2FA) for your Google account—even if attackers know your password, 2FA will prevent access in many cases. Check your security settings regularly, use a long and unique password, and never enter your login credentials via links in emails. When in doubt, always go directly to the official Google website, log into your account, and check whether any action is actually required. New features are often abused by criminals for phishing. It’s therefore important to remain vigilant when it comes to alleged security messages—even if they appear to come from a legitimate source. Further reading: Never, ever delete your spam email. Here’s why

Don’t click that Google email! Gmail address change could be a scam

Don’t click that Google email! Gmail address change could be a scam

Earlier this month, Google started rolling out a new feature that lets users change their Gmail addresses —and it’s already being exploited by cybercriminals and malicious actors. The new feature allows one’s original Gmail address to remain as an alias, so that incoming emails continue to land in the same inbox. The feature is primarily intended for users who want to replace their old address. Security experts are now warning that scammers are specifically exploiting this new feature by crafting deceptively genuine phishing emails that are sent via legitimate Google systems and aim to take complete control of Google accounts. Phishing via Google imitations According to security experts, scam emails are currently being sent that purportedly originate from Google and refer to an alleged change of Gmail address or a necessary security confirmation. The messages appear particularly credible because they’re sent via Google’s own systems and display real Google addresses, such as “no-reply@accounts.google.com” as the sender. These emails often mention a security-related action, such as activating a new address or confirming your identity. A link supposedly leads to a Google support or security page, but in reality users end up on fake websites where they’re asked to enter their password. What makes this particularly insidious is that the scammers are using the “sites.google.com” domain, which is a legitimate Google service for user-generated websites—and is therefore not blocked by many spam filters. These fake sites are made to imitate genuine Google support pages in a way that seems visually authentic at first glance. If attackers succeed in taking over your Google account, the consequences are serious. Not only are Gmail messages affected, but all connected services (such as Google Drive, Google Photos, and Google Calendar) will also be compromised. Furthermore, if your Google account is used to log into third-party services (such as social networks, online shops, or financial services), attackers can trigger a chain reaction and gain access to those other accounts. Security experts warned of this before Security company Check Point Research had previously pointed out a first wave of these attacks at the end of 2025, even before Google had officially announced the new feature more widely. Back then, the attackers had abused a workflow automation tool to send phishing emails via legitimate Google infrastructure. Google stated that its own systems had not been compromised, but that protective measures had been taken. How to recognize phishing emails Despite their professional appearance, many of these fraudulent emails can be spotted if you know what to look for. Typical red flags include: Impersonal salutations such as “Dear customer” instead of your actual first and last name. Urgent wording and threats , such as risk of account suspension, account deletion, or monetary consequences. The urgency is meant to scare you into acting without thinking. Requests to enter passwords or other access data via a link. The link often takes you to a fake website that’s dressed up like the real thing, hoping you’ll enter your credentials—which are then intercepted by the scammer. Google itself recommends never clicking links in emails and instead always checking security warnings directly in your account. To do this, open your browser and manually navigate to your Google account page instead of clicking on links in emails. Genuine warnings usually contain details such as device type, time, and location of access. How to protect your Google account The most important thing you can do is maintain healthy skepticism towards unsolicited emails. Be sure to enable two-factor authentication (2FA) for your Google account—even if attackers know your password, 2FA will prevent access in many cases. Check your security settings regularly, use a long and unique password, and never enter your login credentials via links in emails. When in doubt, always go directly to the official Google website, log into your account, and check whether any action is actually required. New features are often abused by criminals for phishing. It’s therefore important to remain vigilant when it comes to alleged security messages—even if they appear to come from a legitimate source. Further reading: Never, ever delete your spam email. Here’s why

Blizzard lines up WoW, Overwatch, Hearthstone and Diablo showcases

Blizzard lines up WoW, Overwatch, Hearthstone and Diablo showcases

While we got a peek at a few Xbox Game Studios projects during last week’s Developer Direct event , neither Bethesda nor Activision Blizzard made appearances. Fans of several Blizzard franchises won’t need to wait too long to find out what’s next for their favorite games, though, as the publisher has lined up several showcases to help mark its 35th anniversary. The developer-led streams will include “major game announcements,” according to Blizzard. They’ll all air over the next few weeks. Here’s where and when you can watch each stream: January 29. 12PM ET — World of Warcraft State of Azeroth (YouTube and Twitch ) February 4, 1PM ET — Overwatch Spotlight ( YouTube and Twitch ) February 9, 12:30PM ET — Hearthstone Spotlight on the ( YouTube and Twitch ) February 11, 5PM ET — Diablo 30th Anniversary Spotlight ( YouTube and Twitch ) With Blizzard not holding a BlizzCon in either 2024 or 2025, the announcements at these showcases should help fill the gap until the event returns in September . “This is only the start of what we’ll share around our games this year,” Blizzard president Johanna Faries said. The WoW showcase will take place just over a month before the Midnight expansion arrives on March 2. Among other things, the developers will share their roadmaps for both modern and classic WoW. Overwatch 2 has been teasing a takeover of the game by the villainous Talon faction, and with the next season only a couple of weeks away, we’ll surely hear more about that. Maybe Blizzard will reveal the long-rumored Overwatch mobile spinoff here too (and hopefully an animated series). The second Diablo IV expansion, Lord of Hatred , is set to arrive on April 28 with a new campaign and fresh classes in tow, so expect to learn more during that franchise’s showcase. Hearthstone fans will also soon get a better sense of what to expect for that game this year. This article originally appeared on Engadget at https://www.engadget.com/gaming/blizzard-lines-up-wow-overwatch-hearthstone-and-diablo-showcases-154912932.html?src=rss

Sources: the US DOT plans to use Gemini to draft federal regulations, cutting the process to just 30 days; the DOT used it to draft a still-unpublished FAA rule (Jesse Coburn/ProPublica)

Sources: the US DOT plans to use Gemini to draft federal regulations, cutting the process to just 30 days; the DOT used it to draft a still-unpublished FAA rule (Jesse Coburn/ProPublica)

Jesse Coburn / ProPublica : Sources: the US DOT plans to use Gemini to draft federal regulations, cutting the process to just 30 days; the DOT used it to draft a still-unpublished FAA rule —  The Transportation Department, which oversees the safety of airplanes, cars and pipelines, plans to use Google Gemini to draft new regulations.

Invincible VS Roster Adds Viltrumites Anissa And Lucan

Invincible VS Roster Adds Viltrumites Anissa And Lucan

Invincible VS ’ roster of playable Viltrumites has expanded with the additions of Anissa and Lucan. Acting as the game's 12th and 13th characters, the pair bring even more brutality to an already hyperviolent tag team fighter. Like fellow Viltrumites Omni-Man and Thula, Anissa and Lucan are powerhouses whose immense strength is matched only by their ferocity. Both pummel opponents in their own unique and referential ways, from Anissa “educating” adversaries by slapping them senseless or Lucan breaking spines over his knee like an extraterrestrial Bane. Check them out in action in the trailer below. Anissa and Lucan join an announced roster of Invincible, Omni-Man, Atom Eve, Rex Splode, Monster Girl, Robot, Battle Beast, Thula, Cecil Stedman , Bulletproof, and original character Ella Mental . With a confirmed roster of 18 characters, only five slots remain open; who do you think will fill them? Invincible VS will launch on April 30 for PlayStation 5, Xbox Series X/S, and PC. You can learn more about the game by reading our first preview of the game from last June here .

Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio